These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

177 related articles for article (PubMed ID: 36348732)

  • 1. Healthcare Breaches During COVID-19: The Effect of the Healthcare Entity Type on the Number of Impacted Individuals.
    Ignatovski M
    Perspect Health Inf Manag; 2022; 19(4):1c. PubMed ID: 36348732
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs.
    Jerry-Egemba N
    Healthc Manage Forum; 2024 Jan; 37(1):21-25. PubMed ID: 37725069
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cybersecurity Risks in a Pandemic.
    Williams CM; Chaturvedi R; Chakravarthy K
    J Med Internet Res; 2020 Sep; 22(9):e23692. PubMed ID: 32897869
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Sustainable Digital Health Demands Cybersecurity Transformation.
    DeFord D
    Front Health Serv Manage; 2022 Apr; 38(3):31-38. PubMed ID: 35191859
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 9. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The elephant in the room: cybersecurity in healthcare.
    Cartwright AJ
    J Clin Monit Comput; 2023 Oct; 37(5):1123-1132. PubMed ID: 37088852
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.
    He Y; Aliyu A; Evans M; Luo C
    J Med Internet Res; 2021 Apr; 23(4):e21747. PubMed ID: 33764885
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Assessing the impact of health information exchange on hospital data breach risk.
    Choi SJ; Chen M; Tan X
    Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 16. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.
    Looi JCL; Allison S; Bastiampillai T; Maguire PA; Kisely S; Looi RCH
    Aust Health Rev; 2024 Feb; 48(1):4-7. PubMed ID: 38109886
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Information security climate and the assessment of information security risk among healthcare employees.
    Kessler SR; Pindek S; Kleinman G; Andel SA; Spector PE
    Health Informatics J; 2020 Mar; 26(1):461-473. PubMed ID: 30866704
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Ransomware in Hospitals: What Providers Will Inevitably Face When Attacked.
    Kelpsas B; Nelson A
    J Med Pract Manage; 2016 Sep; 32(1):67-70. PubMed ID: 30452851
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Healthcare Challenges in the Era of Cybersecurity.
    Tully J; Selzer J; Phillips JP; O'Connor P; Dameff C
    Health Secur; 2020; 18(3):228-231. PubMed ID: 32559153
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.