These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

138 related articles for article (PubMed ID: 36840419)

  • 21. Mitigating the consequences of electronic health record data breaches for patients and healthcare workers.
    Looi JCL; Allison S; Bastiampillai T; Maguire PA; Kisely S; Looi RCH
    Aust Health Rev; 2024 Feb; 48(1):4-7. PubMed ID: 38109886
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A dataset for accounting, finance and economics research on US data breaches.
    Rosati P; Lynn T
    Data Brief; 2021 Apr; 35():106924. PubMed ID: 33748365
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study.
    Budimir S; Fontaine JRJ; Huijts NMA; Haans A; Loukas G; Roesch EB
    J Med Internet Res; 2021 May; 23(5):e24879. PubMed ID: 33978591
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Healthcare Data Breaches: Insights and Implications.
    Seh AH; Zarour M; Alenezi M; Sarkar AK; Agrawal A; Kumar R; Khan RA
    Healthcare (Basel); 2020 May; 8(2):. PubMed ID: 32414183
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Preventing a data breach from becoming a disaster.
    Goldberg E
    J Bus Contin Emer Plan; 2013; 6(4):295-303. PubMed ID: 23835422
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 27. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization.
    Arain MA; Tarraf R; Ahmad A
    J Multidiscip Healthc; 2019; 12():73-81. PubMed ID: 30666123
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Emotional Experiences of Cybersecurity Breach Victims.
    Budimir S; Fontaine JRJ; Roesch EB
    Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):612-616. PubMed ID: 34185598
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study.
    Dolezel D; Beauvais B; Stigler Granados P; Fulton L; Kruse CS
    J Med Internet Res; 2023 Dec; 25():e51471. PubMed ID: 38127426
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.
    He Y; Zamani E; Yevseyeva I; Luo C
    J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Privacy please: Power distance and people's responses to data breaches across countries.
    Madan S; Savani K; Katsikeas CS
    J Int Bus Stud; 2023; 54(4):731-754. PubMed ID: 35607320
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Sustainable Digital Health Demands Cybersecurity Transformation.
    DeFord D
    Front Health Serv Manage; 2022 Apr; 38(3):31-38. PubMed ID: 35191859
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A cybersecurity primer for translational research.
    Perakslis ED; Stanley M
    Sci Transl Med; 2016 Jan; 8(322):322ps2. PubMed ID: 26791947
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Cybersecurity and Technical Patient Privacy Protection.
    Nachbar JM; Kinney BM; Sacks JM; Gurtner GC; TerKonda SP; Reddy SK; Jeffers LL
    Plast Reconstr Surg; 2024 Jul; 154(1):250-257. PubMed ID: 37220229
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cyber crimes.
    Nuzback K
    Tex Med; 2014 Jul; 110(7):27-33. PubMed ID: 25023560
    [TBL] [Abstract][Full Text] [Related]  

  • 40. The A to Z of healthcare data breaches.
    Kobus TJ
    J Healthc Risk Manag; 2012; 32(1):24-8. PubMed ID: 22833327
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.