BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

146 related articles for article (PubMed ID: 10151258)

  • 1. Rapist accesses patient records; MA hospitals mull criminal screening.
    Hosp Secur Saf Manage; 1995 Sep; 16(5):1-4. PubMed ID: 10151258
    [No Abstract]   [Full Text] [Related]  

  • 2. Guidelines for minimal data security measures for the protection of computer-based patient records.
    Gabrieli E
    J Clin Comput; 1993; 22(1):1-48 concl. PubMed ID: 10131095
    [No Abstract]   [Full Text] [Related]  

  • 3. The future of card technology in health care.
    Kelly B
    Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
    [No Abstract]   [Full Text] [Related]  

  • 4. Gang members on your security staff? Check it out.
    Hosp Secur Saf Manage; 1995 Aug; 16(4):1-3. PubMed ID: 10144426
    [No Abstract]   [Full Text] [Related]  

  • 5. Information security: how safe is your system?
    Brandt M
    Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
    [No Abstract]   [Full Text] [Related]  

  • 6. Data security: an update.
    Hosp Secur Saf Manage; 1997 May; 18(1):5-8. PubMed ID: 10167758
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security combines awareness with technology issues.
    Braly D
    Health Manag Technol; 1996 Sep; 17(10):42, 44. PubMed ID: 10160332
    [No Abstract]   [Full Text] [Related]  

  • 8. The metamorphosis of medical records.
    Goedert J
    Health Data Manag; 2004 Oct; 12(10):68, 72, 74 passim. PubMed ID: 15536826
    [No Abstract]   [Full Text] [Related]  

  • 9. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The role of enterprise person directories.
    Gabler JM
    Health Manag Technol; 1997 Oct; 18(11):40, 42, 44. PubMed ID: 10175204
    [No Abstract]   [Full Text] [Related]  

  • 11. Building a secure home: protecting individually identifiable patient information.
    Keese JM
    Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
    [No Abstract]   [Full Text] [Related]  

  • 12. Keep tabs on who sees what.
    Toth CL
    Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
    [No Abstract]   [Full Text] [Related]  

  • 13. Seeking for knowledge. Computer-based patient record (CPR) (paperless patient record).
    Frimpong S
    IHRIM; 1996 Nov; 37(4):10-4. PubMed ID: 10162784
    [No Abstract]   [Full Text] [Related]  

  • 14. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 15. When technology and health care collide: issues with electronic medical records and electronic mail.
    Jurevic AM
    UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
    [No Abstract]   [Full Text] [Related]  

  • 16. Guidelines for minimal data security measures for the protection of computer-based patient records.
    Gabrieli ER
    J Clin Comput; 1993; 21(6):139-82 contd. PubMed ID: 10184018
    [No Abstract]   [Full Text] [Related]  

  • 17. Juggling skills a must for health care CSOs.
    Gillespie G
    Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
    [No Abstract]   [Full Text] [Related]  

  • 18. A marriage of necessity: automated and manual systems.
    Dorenfest S
    Health Manag Technol; 1995 Apr; 16(5):25, 27. PubMed ID: 10141778
    [No Abstract]   [Full Text] [Related]  

  • 19. [Electronic patient records. Systems should be developed locally].
    Therkelsen L
    Sygeplejersken; 1994 Mar; 94(10):20-1, 32. PubMed ID: 7940218
    [No Abstract]   [Full Text] [Related]  

  • 20. Protecting patient data.
    Frawley K
    Qual Lett Healthc Lead; 1998 Jun; 10(6):10-3. PubMed ID: 10180625
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 8.