These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

145 related articles for article (PubMed ID: 37061434)

  • 1. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 2. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Healthcare Breaches During COVID-19: The Effect of the Healthcare Entity Type on the Number of Impacted Individuals.
    Ignatovski M
    Perspect Health Inf Manag; 2022; 19(4):1c. PubMed ID: 36348732
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 9. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.
    Blanke SJ; McGrady E
    J Healthc Risk Manag; 2016 Jul; 36(1):14-24. PubMed ID: 27400172
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
    Lee J; Choi SJ
    J Med Internet Res; 2021 Jul; 23(7):e26157. PubMed ID: 34255672
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Which information locations in covered entities under HIPAA must be secured first? A multi-criteria decision-making approach.
    Fard Bahreini A
    J Healthc Risk Manag; 2023 Oct; 43(2):27-36. PubMed ID: 37616038
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers.
    Agaku IT; Adisa AO; Ayo-Yusuf OA; Connolly GN
    J Am Med Inform Assoc; 2014; 21(2):374-8. PubMed ID: 23975624
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.
    Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C
    JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Factors Associated with Information Breach in Healthcare Facilities: A Systematic Literature Review.
    Khanijahani A; Iezadi S; Agoglia S; Barber S; Cox C; Olivo N
    J Med Syst; 2022 Nov; 46(12):90. PubMed ID: 36322261
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem.
    Degaspari J
    Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950
    [No Abstract]   [Full Text] [Related]  

  • 16. Healthcare Data Breaches: Insights and Implications.
    Seh AH; Zarour M; Alenezi M; Sarkar AK; Agrawal A; Kumar R; Khan RA
    Healthcare (Basel); 2020 May; 8(2):. PubMed ID: 32414183
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Assessing the impact of health information exchange on hospital data breach risk.
    Choi SJ; Chen M; Tan X
    Int J Med Inform; 2023 Sep; 177():105149. PubMed ID: 37453177
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 19. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.
    Becker C
    Mod Healthc; 2006 Feb; 36(8):6-7, 16, 1. PubMed ID: 16515213
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.