Literature DB >> 28384777

Hospital Risk of Data Breaches.

Ge Bai1, John Xuefeng Jiang2, Renee Flasher3.   

Abstract

Mesh:

Year:  2017        PMID: 28384777      PMCID: PMC5818824          DOI: 10.1001/jamainternmed.2017.0336

Source DB:  PubMed          Journal:  JAMA Intern Med        ISSN: 2168-6106            Impact factor:   21.873


× No keyword cloud information.
  3 in total

1.  Data breaches of protected health information in the United States.

Authors:  Vincent Liu; Mark A Musen; Timothy Chou
Journal:  JAMA       Date:  2015-04-14       Impact factor: 56.272

2.  Keeping personal health information safe: the importance of good data hygiene.

Authors:  David Blumenthal; Deven McGraw
Journal:  JAMA       Date:  2015-04-14       Impact factor: 56.272

3.  A More Detailed Understanding Of Factors Associated With Hospital Profitability.

Authors:  Ge Bai; Gerard F Anderson
Journal:  Health Aff (Millwood)       Date:  2016-05-01       Impact factor: 6.301

  3 in total
  11 in total

1.  Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system.

Authors:  William J Gordon; Adam Wright; Robert J Glynn; Jigar Kadakia; Christina Mazzone; Elizabeth Leinbach; Adam Landman
Journal:  J Am Med Inform Assoc       Date:  2019-06-01       Impact factor: 4.497

2.  Evaluation of Causes of Protected Health Information Breaches.

Authors:  John Xuefeng Jiang; Ge Bai
Journal:  JAMA Intern Med       Date:  2019-02-01       Impact factor: 21.873

3.  Trends and characteristics of protected health information breaches in the United States.

Authors:  Md Mahbub Hossain; Y Alicia Hong
Journal:  AMIA Annu Symp Proc       Date:  2020-03-04

4.  Demographic differences in willingness to share electronic health records in the All of Us Research Program.

Authors:  Christine L M Joseph; Amy Tang; David W Chesla; Mara M Epstein; Pamala A Pawloski; Alan B Stevens; Stephen C Waring; Brian K Ahmedani; Christine C Johnson; Cathryn D Peltz-Rauchman
Journal:  J Am Med Inform Assoc       Date:  2022-06-14       Impact factor: 7.942

5.  Feasibility of Homomorphic Encryption for Sharing I2B2 Aggregate-Level Data in the Cloud.

Authors:  Jean Louis Raisaro; Jeffrey G Klann; Kavishwar B Wagholikar; Hossein Estiri; Jean-Pierre Hubaux; Shawn N Murphy
Journal:  AMIA Jt Summits Transl Sci Proc       Date:  2018-05-18

6.  National and Transnational Security Implications of Asymmetric Access to and Use of Biological Data.

Authors:  Kavita M Berger; Phyllis A Schneck
Journal:  Front Bioeng Biotechnol       Date:  2019-02-25

7.  Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.

Authors:  William J Gordon; Adam Wright; Ranjit Aiyagari; Leslie Corbo; Robert J Glynn; Jigar Kadakia; Jack Kufahl; Christina Mazzone; James Noga; Mark Parkulo; Brad Sanford; Paul Scheib; Adam B Landman
Journal:  JAMA Netw Open       Date:  2019-03-01

8.  Key Considerations for Incorporating Conversational AI in Psychotherapy.

Authors:  Adam S Miner; Nigam Shah; Kim D Bullock; Bruce A Arnow; Jeremy Bailenson; Jeff Hancock
Journal:  Front Psychiatry       Date:  2019-10-18       Impact factor: 4.157

9.  Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.

Authors:  Jay G Ronquillo; J Erik Winterholler; Kamil Cwikla; Raphael Szymanski; Christopher Levy
Journal:  JAMIA Open       Date:  2018-06-11

10.  Hospital Productivity After Data Breaches: Difference-in-Differences Analysis.

Authors:  Jinhyung Lee; Sung J Choi
Journal:  J Med Internet Res       Date:  2021-07-06       Impact factor: 5.428

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.