These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

197 related articles for article (PubMed ID: 37088852)

  • 1. The elephant in the room: cybersecurity in healthcare.
    Cartwright AJ
    J Clin Monit Comput; 2023 Oct; 37(5):1123-1132. PubMed ID: 37088852
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.
    He Y; Aliyu A; Evans M; Luo C
    J Med Internet Res; 2021 Apr; 23(4):e21747. PubMed ID: 33764885
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Developing a Novel Ontology for Cybersecurity in Internet of Medical Things-Enabled Remote Patient Monitoring.
    Bughio KS; Cook DM; Shah SAA
    Sensors (Basel); 2024 Apr; 24(9):. PubMed ID: 38732910
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An Overview on Security and Privacy of Data in IoMT Devices: Performance Metrics, Merits, Demerits, and Challenges.
    Khatiwada P; Yang B
    Stud Health Technol Inform; 2022 Nov; 299():126-136. PubMed ID: 36325853
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Managing cybersecurity risk in healthcare settings.
    Clarke M; Martin K
    Healthc Manage Forum; 2024 Jan; 37(1):17-20. PubMed ID: 37625818
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Think Like a Hacker.
    Khera M
    J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 11. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.
    Portela D; Nogueira-Leite D; Almeida R; Cruz-Correia R
    JMIR Form Res; 2023 Jun; 7():e41738. PubMed ID: 37389934
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Healthcare Breaches During COVID-19: The Effect of the Healthcare Entity Type on the Number of Impacted Individuals.
    Ignatovski M
    Perspect Health Inf Manag; 2022; 19(4):1c. PubMed ID: 36348732
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cybersecurity and Information Assurance for the Clinical Laboratory.
    Patel AU; Williams CL; Hart SN; Garcia CA; Durant TJS; Cornish TC; McClintock DS
    J Appl Lab Med; 2023 Jan; 8(1):145-161. PubMed ID: 36610432
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Trends and best practices in health care cybersecurity insurance policy.
    Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A
    J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Disruption of Library Services Due to Hospital Cyberattack: A Case Study.
    Stokes AM
    Med Ref Serv Q; 2022; 41(2):204-212. PubMed ID: 35511424
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things.
    Suleski T; Ahmed M
    J Med Internet Res; 2023 Aug; 25():e44114. PubMed ID: 37490633
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management.
    Upendra P
    Biomed Instrum Technol; 2021 Nov; 55(4):121-130. PubMed ID: 34727574
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.