These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
174 related articles for article (PubMed ID: 37725069)
61. Exploring the Risks, Benefits, Advances, and Challenges in Internet Integration in Medicine With the Advent of 5G Technology: A Comprehensive Review. Agrawal V; Agrawal S; Bomanwar A; Dubey T; Jaiswal A Cureus; 2023 Nov; 15(11):e48767. PubMed ID: 38098915 [TBL] [Abstract][Full Text] [Related]
62. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451 [TBL] [Abstract][Full Text] [Related]
63. Cybersecurity in digital healthcare-challenges and potential solutions. Sitaru S; Bramm G; Zink A; Hiller M Dermatologie (Heidelb); 2023 Mar; 74(3):213-217. PubMed ID: 36725703 [No Abstract] [Full Text] [Related]
64. Perspectives on Cybersecurity and Plastic Surgery: A Survey of Plastic Surgeons and Scoping Review of the Literature. Hines E; Trivedi S; Hoang-Tran C; Mocharnuk J; Pfaff MJ Aesthet Surg J; 2023 Oct; 43(11):1376-1383. PubMed ID: 37186025 [TBL] [Abstract][Full Text] [Related]
65. Protecting Patient Data Is the New Scope of Practice: A Recommended Cybersecurity Curricula for Healthcare Students to Prepare for this Challenge. Swede MJ; Scovetta V; Eugene-Colin M J Allied Health; 2019; 48(2):148-155. PubMed ID: 31167018 [TBL] [Abstract][Full Text] [Related]
66. Stakeholder Perception's of Cybersecurity for Welfare Technology and Remote Care Devices. Skjelvik A Stud Health Technol Inform; 2024 May; 314():173-177. PubMed ID: 38785026 [TBL] [Abstract][Full Text] [Related]
67. Fuzzy Cognitive Scenario Mapping for Causes of Cybersecurity in Telehealth Services. Poleto T; Carvalho VDH; Silva ALBD; Clemente TRN; Silva MM; Gusmão APH; Costa APCS; Nepomuceno TCC Healthcare (Basel); 2021 Nov; 9(11):. PubMed ID: 34828550 [TBL] [Abstract][Full Text] [Related]
68. Cybersecurity: Positive Changes Through Processes and Team Culture. Pullin DW Front Health Serv Manage; 2018; 35(1):3-12. PubMed ID: 30124509 [TBL] [Abstract][Full Text] [Related]
69. Enhancing patient safety: A national standard for cyber resiliency in healthcare. Samuelson-Kiraly C; Mitchell JI; Kingston D; Chunduri S Healthc Manage Forum; 2024 Jan; 37(1):9-12. PubMed ID: 37649329 [TBL] [Abstract][Full Text] [Related]
70. Are implanted electronic devices hackable? Alexander B; Haseeb S; Baranchuk A Trends Cardiovasc Med; 2019 Nov; 29(8):476-480. PubMed ID: 30482482 [TBL] [Abstract][Full Text] [Related]
71. An SOS on Cybersecurity To protect patient data, hospitals beef up risk management programs. Hello, chief security officers and 'white hat hackers'. Taylor M Hosp Health Netw; 2015 Feb; 89(2):36-38. PubMed ID: 30277345 [No Abstract] [Full Text] [Related]
72. Development of an enterprise risk inventory for healthcare. Etges APBDS; Grenon V; Lu M; Cardoso RB; de Souza JS; Kliemann Neto FJ; Felix EA BMC Health Serv Res; 2018 Jul; 18(1):578. PubMed ID: 30041651 [TBL] [Abstract][Full Text] [Related]
73. Cybersecurity threats to cardiac implantable devices: room for improvement. Tomaiko E; Zawaneh MS Curr Opin Cardiol; 2021 Jan; 36(1):1-4. PubMed ID: 33264170 [TBL] [Abstract][Full Text] [Related]
74. REVISITING HEALTH INFORMATION TECHNOLOGY ETHICAL, LEGAL, and SOCIAL ISSUES and EVALUATION: TELEHEALTH/TELEMEDICINE and COVID-19. Kaplan B Int J Med Inform; 2020 Nov; 143():104239. PubMed ID: 33152653 [TBL] [Abstract][Full Text] [Related]
75. Health Care and Cybersecurity: Bibliometric Analysis of the Literature. Jalali MS; Razak S; Gordon W; Perakslis E; Madnick S J Med Internet Res; 2019 Feb; 21(2):e12644. PubMed ID: 30767908 [TBL] [Abstract][Full Text] [Related]
76. Information security climate and the assessment of information security risk among healthcare employees. Kessler SR; Pindek S; Kleinman G; Andel SA; Spector PE Health Informatics J; 2020 Mar; 26(1):461-473. PubMed ID: 30866704 [TBL] [Abstract][Full Text] [Related]
77. Cybersecurity in Medical Imaging. Ferrara A Radiol Technol; 2019 Jul; 90(6):563-575. PubMed ID: 31270257 [TBL] [Abstract][Full Text] [Related]
78. Healthcare cybersecurity risk management: keys to an effective plan. Coronado AJ; Wong TL Biomed Instrum Technol; 2014; Suppl():26-30. PubMed ID: 24848146 [No Abstract] [Full Text] [Related]
79. Security Attacks and Solutions in Electronic Health (E-health) Systems. Zeadally S; Isaac JT; Baig Z J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389 [TBL] [Abstract][Full Text] [Related]
80. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information. Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]