BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

236 related articles for article (PubMed ID: 10168008)

  • 1. Putting a lock on records.
    Fuller SR
    Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
    [No Abstract]   [Full Text] [Related]  

  • 2. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
    Watson A
    AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
    [No Abstract]   [Full Text] [Related]  

  • 3. Remote access security.
    Stevens RA; O'Loughlin-Cahill K
    Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
    [No Abstract]   [Full Text] [Related]  

  • 4. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 5. Ethical guidance in Web site development.
    Van Brunt D; Salehizadeh B
    Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
    [No Abstract]   [Full Text] [Related]  

  • 6. Teaching effective security.
    Siwicki B
    Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
    [No Abstract]   [Full Text] [Related]  

  • 7. Protecting confidentiality in the Rockies.
    Linton M; Clayton P
    Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
    [No Abstract]   [Full Text] [Related]  

  • 8. Information management implications of federal health care reform.
    Dowling AF
    Healthc Inf Manage; 1994; 8(1):7-18. PubMed ID: 10131856
    [No Abstract]   [Full Text] [Related]  

  • 9. Data security.
    Morrissey J
    Mod Healthc; 1996 Sep; 26(40):32-3, 35-8, 40. PubMed ID: 10161903
    [No Abstract]   [Full Text] [Related]  

  • 10. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Protecting your paperless medical record system requires addressing risks.
    Sokol PE
    QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
    [No Abstract]   [Full Text] [Related]  

  • 12. Avoiding legal pitfalls in records automation.
    Tomes JP
    Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
    [No Abstract]   [Full Text] [Related]  

  • 13. Dialogue. Privacy protection: paper or computer records? Best strategies for clinical delivery systems.
    Wald J
    Behav Healthc Tomorrow; 1996 Feb; 5(1):39, 42, 44. PubMed ID: 10158448
    [No Abstract]   [Full Text] [Related]  

  • 14. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
    Aikins R; Anderson J
    Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
    [No Abstract]   [Full Text] [Related]  

  • 16. Keep tabs on who sees what.
    Toth CL
    Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
    [No Abstract]   [Full Text] [Related]  

  • 17. By the rules: making security policies stick.
    Zender A
    J AHIMA; 1999 Oct; 70(9):62-5. PubMed ID: 10977407
    [No Abstract]   [Full Text] [Related]  

  • 18. Information security: how safe is your system?
    Brandt M
    Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
    [No Abstract]   [Full Text] [Related]  

  • 19. What you see; what you get. Agencies, employers clamping down on medical records snooping.
    Blesch G
    Mod Healthc; 2010 May; 40(18):14-5. PubMed ID: 20480556
    [No Abstract]   [Full Text] [Related]  

  • 20. Striking a balance between access and security.
    Bunschoten B
    Health Data Manag; 1996 May; 4(5):69-70, 72. PubMed ID: 10157341
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.