These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

230 related articles for article (PubMed ID: 10150605)

  • 21. Three computational systems for disclosing medical data in the year 1999.
    Sweeney L
    Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Legal requirements for computer security: electronic medical records and data interchange.
    Waller AA; Darrah JM
    Behav Healthc Tomorrow; 1996 Feb; 5(1):45-7. PubMed ID: 10158449
    [No Abstract]   [Full Text] [Related]  

  • 23. The health information network.
    Flaherty G
    Aust Fam Physician; 1993 Apr; 22(4):563-5. PubMed ID: 8481121
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Medical network security and viruses.
    Fernandez Del Val C
    Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Moving records on the Internet.
    Chin TL
    Health Data Manag; 1996 Apr; 4(4):24, 26. PubMed ID: 10156032
    [No Abstract]   [Full Text] [Related]  

  • 27. Information technology must lead the way.
    Rock JR
    J Healthc Resour Manag; 1996 Mar; 14(2):48. PubMed ID: 10156561
    [No Abstract]   [Full Text] [Related]  

  • 28. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Security threats and solutions in distributed, interoperable health information systems using middleware.
    Blobel B; Holena M
    Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Securing the healthcare border.
    Elliott M
    Health Manag Technol; 2005 Sep; 26(9):32, 34-5. PubMed ID: 16218276
    [No Abstract]   [Full Text] [Related]  

  • 31. The information corridor: electronic charting in health care.
    Walsh G; Williams G
    Leadersh Health Serv; 1995; 4(1):40-1. PubMed ID: 10140969
    [No Abstract]   [Full Text] [Related]  

  • 32. Design and implementation of a smart card based healthcare information system.
    Kardas G; Tunali ET
    Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586
    [TBL] [Abstract][Full Text] [Related]  

  • 33. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Authentication and authorisation prototype on the mu grid for medical data management.
    Seitz L; Montagnat J; Pierson JM; Oriol D; Lingrand D
    Stud Health Technol Inform; 2005; 112():222-33. PubMed ID: 15923731
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Security and the Internet: healthcare's concerns and approaches to think, build, and operate solutions today.
    Quinn J; Jaworski S; Toole J
    Healthc Inf Manage; 1998; 12(1):81-92. PubMed ID: 10179270
    [No Abstract]   [Full Text] [Related]  

  • 37. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Balancing individual and societal needs: micro- vs. macro-ethics.
    Gulbinat W
    Behav Healthc Tomorrow; 1994; 3(1):32, 39-41. PubMed ID: 10142496
    [No Abstract]   [Full Text] [Related]  

  • 38. Who's looking at your files? Prying eyes find computerized health records an increasingly tempting target.
    Gorman C
    Time; 1996 May; 147(19):60-2. PubMed ID: 10157257
    [No Abstract]   [Full Text] [Related]  

  • 39. Safe and secure. Interview by Bill Siwicki.
    Baker DB
    Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
    [No Abstract]   [Full Text] [Related]  

  • 40. Data protection in networks.
    Rihaczek K
    Stud Health Technol Inform; 1991; 1():249-70. PubMed ID: 10164071
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 12.