These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

173 related articles for article (PubMed ID: 38219392)

  • 1. [Cybersecurity and use of ICT in the health sector].
    Cervera García A; Goussens A
    Aten Primaria; 2024 Mar; 56(3):102854. PubMed ID: 38219392
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 4. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 5. [The responsibilities arising from the use of information and communication technologies in health professional practice].
    Muñoz Fernández L; Díaz García E; Gallego Riestra S
    An Pediatr (Engl Ed); 2020 May; 92(5):307.e1-307.e6. PubMed ID: 32280006
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.
    He Y; Aliyu A; Evans M; Luo C
    J Med Internet Res; 2021 Apr; 23(4):e21747. PubMed ID: 33764885
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis.
    Yeo LH; Banfield J
    Perspect Health Inf Manag; 2022; 19(Spring):1i. PubMed ID: 35692854
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An overview of cybersecurity in Zimbabwe's financial services sector.
    Maphosa V
    F1000Res; 2023; 12():1251. PubMed ID: 38559360
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Managing cybersecurity risk in healthcare settings.
    Clarke M; Martin K
    Healthc Manage Forum; 2024 Jan; 37(1):17-20. PubMed ID: 37625818
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs.
    Jerry-Egemba N
    Healthc Manage Forum; 2024 Jan; 37(1):21-25. PubMed ID: 37725069
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cybersecurity Enterprises Policies: A Comparative Study.
    Mishra A; Alzoubi YI; Gill AQ; Anwar MJ
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062504
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Risk management-based security evaluation model for telemedicine systems.
    Kim DW; Choi JY; Han KH
    BMC Med Inform Decis Mak; 2020 Jun; 20(1):106. PubMed ID: 32522216
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cybersecurity considerations for radiology departments involved with artificial intelligence.
    Kelly BS; Quinn C; Belton N; Lawlor A; Killeen RP; Burrell J
    Eur Radiol; 2023 Dec; 33(12):8833-8841. PubMed ID: 37418025
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The need for cybersecurity self-evaluation in healthcare.
    Burke W; Stranieri A; Oseni T; Gondal I
    BMC Med Inform Decis Mak; 2024 May; 24(1):133. PubMed ID: 38783250
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
    Al-Muhtadi J; Shahzad B; Saleem K; Jameel W; Orgun MA
    Health Informatics J; 2019 Jun; 25(2):315-329. PubMed ID: 28480788
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
    Natsiavas P; Rasmussen J; Voss-Knude M; Votis Κ; Coppolino L; Campegiani P; Cano I; Marí D; Faiella G; Clemente F; Nalin M; Grivas E; Stan O; Gelenbe E; Dumortier J; Petersen J; Tzovaras D; Romano L; Komnios I; Koutkias V
    BMC Med Inform Decis Mak; 2018 Oct; 18(1):85. PubMed ID: 30326890
    [TBL] [Abstract][Full Text] [Related]  

  • 20. REVISITING HEALTH INFORMATION TECHNOLOGY ETHICAL, LEGAL, and SOCIAL ISSUES and EVALUATION: TELEHEALTH/TELEMEDICINE and COVID-19.
    Kaplan B
    Int J Med Inform; 2020 Nov; 143():104239. PubMed ID: 33152653
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.