These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

178 related articles for article (PubMed ID: 34803469)

  • 41. The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection.
    Hakim ZM; Ebner NC; Oliveira DS; Getz SJ; Levin BE; Lin T; Lloyd K; Lai VT; Grilli MD; Wilson RC
    Behav Res Methods; 2021 Jun; 53(3):1342-1352. PubMed ID: 33078362
    [TBL] [Abstract][Full Text] [Related]  

  • 42. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Cloud-based email phishing attack using machine and deep learning algorithm.
    Butt UA; Amin R; Aldabbas H; Mohan S; Alouffi B; Ahmadian A
    Complex Intell Systems; 2023; 9(3):3043-3070. PubMed ID: 35668732
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Phishing Email Detection Based on Binary Search Feature Selection.
    Sonowal G
    SN Comput Sci; 2020; 1(4):191. PubMed ID: 33063047
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy.
    Lawson P; Pearson CJ; Crowson A; Mayhorn CB
    Appl Ergon; 2020 Jul; 86():103084. PubMed ID: 32174448
    [TBL] [Abstract][Full Text] [Related]  

  • 46. The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia.
    Alharbi F; Alsulami M; Al-Solami A; Al-Otaibi Y; Al-Osimi M; Al-Qanor F; Al-Otaibi K
    Sensors (Basel); 2021 Oct; 21(20):. PubMed ID: 34696114
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information.
    Lee YY; Gan CL; Liew TW
    Int J Environ Res Public Health; 2023 Feb; 20(4):. PubMed ID: 36834209
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Clinicians' Perspectives on Healthcare Cybersecurity and Cyber Threats.
    Alanazi AT
    Cureus; 2023 Oct; 15(10):e47026. PubMed ID: 37965389
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Quantifying Phishing Susceptibility for Detection and Behavior Decisions.
    Canfield CI; Fischhoff B; Davis A
    Hum Factors; 2016 Dec; 58(8):1158-1172. PubMed ID: 27562565
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults.
    Sarno DM; Lewis JE; Bohil CJ; Neider MB
    Hum Factors; 2020 Aug; 62(5):704-717. PubMed ID: 31237787
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Reconceptualizing cybersecurity awareness capability in the data-driven digital economy.
    Akter S; Uddin MR; Sajib S; Lee WJT; Michael K; Hossain MA
    Ann Oper Res; 2022 Aug; ():1-26. PubMed ID: 35935743
    [TBL] [Abstract][Full Text] [Related]  

  • 54. Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors.
    Kennison SM; Chan-Tin E
    Front Psychol; 2020; 11():546546. PubMed ID: 33250806
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Towards a Multi-Layered Phishing Detection.
    Rendall K; Nisioti A; Mylonas A
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32823675
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.
    Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
    Xiong A; Proctor RW; Yang W; Li N
    Hum Factors; 2017 Jun; 59(4):640-660. PubMed ID: 28060529
    [TBL] [Abstract][Full Text] [Related]  

  • 60. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.