These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

110 related articles for article (PubMed ID: 10168451)

  • 1. Installing and operating a fingerprint ID system for patients.
    Hosp Secur Saf Manage; 1997 Jun; 18(2):11-2. PubMed ID: 10168451
    [No Abstract]   [Full Text] [Related]  

  • 2. Using fingerprints to improve patient sign-in, identification.
    Hosp Secur Saf Manage; 1998 Sep; 19(5):1-2. PubMed ID: 10186152
    [No Abstract]   [Full Text] [Related]  

  • 3. High-tech identification. Indiana hospital uses fingerprints to track patients.
    Gray C
    Mod Healthc; 1998 Apr; 28(14):92. PubMed ID: 10178308
    [No Abstract]   [Full Text] [Related]  

  • 4. Hospital turns to biometrics for patient registration and protection.
    Hosp Secur Saf Manage; 1999 Nov; 20(7):9-10. PubMed ID: 11184614
    [No Abstract]   [Full Text] [Related]  

  • 5. Positive identification. Fingerprint images identify patients under any circumstances.
    Moser L
    Health Manag Technol; 2000 Dec; 21(12):22. PubMed ID: 11141990
    [No Abstract]   [Full Text] [Related]  

  • 6. Hospital employs education, security system to combat baby mix-ups.
    Hosp Secur Saf Manage; 1999 May; 20(1):1-4. PubMed ID: 10537513
    [No Abstract]   [Full Text] [Related]  

  • 7. Hospital security investigations.
    Houston KM
    J Healthc Prot Manage; 2002; 18(1):49-53. PubMed ID: 11951391
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Thumbs up for positive patient identification.
    Burdine CI
    NAHAM Manage J; 1997; 23(4):3, 10. PubMed ID: 10166780
    [No Abstract]   [Full Text] [Related]  

  • 9. Biometric identification. Ultrasonic systems can succeed where optical systems may not.
    Pierce FS
    Health Manag Technol; 2003 May; 24(5):38-9. PubMed ID: 12760092
    [No Abstract]   [Full Text] [Related]  

  • 10. Touch endorsement protects patients' money, valuables.
    Smulowitz D
    Hosp Financ Manage; 1980 Nov; 34(11):74-5. PubMed ID: 10249037
    [No Abstract]   [Full Text] [Related]  

  • 11. Wandering patients: potential for tragedy.
    Harwood G; McGlenister E
    Leadersh Health Serv; 1993; 2(1):30-3. PubMed ID: 10124280
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Information technology security.
    Elliott AT
    Nucl Med Commun; 2003 Dec; 24(12):1205. PubMed ID: 14627845
    [No Abstract]   [Full Text] [Related]  

  • 13. The role of patients and their health cards in integrated eHealth environments.
    Hildebrand C; Pharow P; Blobel B
    Stud Health Technol Inform; 2008; 136():629-34. PubMed ID: 18487801
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Tracking incidents before they become lawsuits paying off for hospitals.
    Hosp Secur Saf Manage; 1997 Jun; 18(2):9-11. PubMed ID: 10168455
    [No Abstract]   [Full Text] [Related]  

  • 15. Risk analysis in health care establishments.
    Barber B; Davey J
    Stud Health Technol Inform; 1996; 27():120-4. PubMed ID: 10163726
    [No Abstract]   [Full Text] [Related]  

  • 16. Identity theft: when bad things happen to your patients' and employees' good name.
    Costello J
    J Healthc Prot Manage; 2001; 17(2):111-6. PubMed ID: 11602978
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Patient fingerprinting speeds up registration, cuts medical records backlog, mistakes.
    Health Care Cost Reengineering Rep; 1997 Sep; 2(9):133-5. PubMed ID: 10173921
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Believing in biometrics.
    Baldwin FD
    Healthc Inform; 2000 Aug; 17(8):37-8, 40, 42-4. PubMed ID: 11185138
    [No Abstract]   [Full Text] [Related]  

  • 19. Institutional security indicator report: a management tool to bridge the communications gap.
    Gonzalez P; Savoca R; McDermott R; Vaughn T
    J Healthc Prot Manage; 1985; 1(3):51-60. PubMed ID: 10272301
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Taming risks by: conducting employee background checks.
    Wagner L
    Provider; 1997 Jun; 23(6):42, 45. PubMed ID: 10168004
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.