These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 37220229)

  • 1. Cybersecurity and Technical Patient Privacy Protection.
    Nachbar JM; Kinney BM; Sacks JM; Gurtner GC; TerKonda SP; Reddy SK; Jeffers LL
    Plast Reconstr Surg; 2024 Jul; 154(1):250-257. PubMed ID: 37220229
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cybersecurity and remote working: Croatia's (non-)response to increased cyber threats.
    Škiljić A
    Int Cybersecur Law Rev; 2020; 1(1-2):51-61. PubMed ID: 38624512
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Phishing in healthcare organisations: threats, mitigation and approaches.
    Priestman W; Anstis T; Sebire IG; Sridharan S; Sebire NJ
    BMJ Health Care Inform; 2019 Sep; 26(1):. PubMed ID: 31488498
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Description of Data Breaches Notifications in France and Lessons Learned for the Healthcare Stakeholders.
    Simon M; Looten V
    Stud Health Technol Inform; 2020 Nov; 275():192-196. PubMed ID: 33227767
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 7. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.
    Lee J; Choi SJ
    J Med Internet Res; 2021 Jul; 23(7):e26157. PubMed ID: 34255672
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Ethics in public health research: privacy and public health at risk: public health confidentiality in the digital age.
    Myers J; Frieden TR; Bherwani KM; Henning KJ
    Am J Public Health; 2008 May; 98(5):793-801. PubMed ID: 18382010
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Design and implementation of website information disclosure assessment system.
    Cho YC; Pan JY
    PLoS One; 2015; 10(3):e0117180. PubMed ID: 25768434
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Privacy, confidentiality, and security in information systems of state health agencies.
    O'Brien DG; Yasnoff WA
    Am J Prev Med; 1999 May; 16(4):351-8. PubMed ID: 10493295
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Is patient confidentiality compromised with the electronic health record?: a position paper.
    Wallace IM
    Comput Inform Nurs; 2015 Feb; 33(2):58-62; quiz E1. PubMed ID: 25532832
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
    Al-Muhtadi J; Shahzad B; Saleem K; Jameel W; Orgun MA
    Health Informatics J; 2019 Jun; 25(2):315-329. PubMed ID: 28480788
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.