BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

102 related articles for article (PubMed ID: 10169949)

  • 1. Perhaps pigs do fly!
    Keever GW
    Healthc Inform; 1997 Aug; 14(8):88. PubMed ID: 10169949
    [No Abstract]   [Full Text] [Related]  

  • 2. Putting a lock on records.
    Fuller SR
    Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
    [No Abstract]   [Full Text] [Related]  

  • 3. Is the future in the palm of your hand?
    Briggs B
    Health Data Manag; 2002 Jan; 10(1):44-52, 54-8, 60-2. PubMed ID: 11828962
    [No Abstract]   [Full Text] [Related]  

  • 4. Is the future in the cards?
    Dakins DR
    Health Data Manag; 2001 Jul; 9(7):44-8. PubMed ID: 11464725
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Eight steps to integrating security standards.
    Happ J;
    Biomed Instrum Technol; 2006; Suppl():22-4. PubMed ID: 16596845
    [No Abstract]   [Full Text] [Related]  

  • 6. Safe and secure. Interview by Bill Siwicki.
    Baker DB
    Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
    [No Abstract]   [Full Text] [Related]  

  • 7. Federal guidance outlines requirements for the use of portable devices.
    Mancino PB; Gulick SL
    J Am Coll Radiol; 2007 Aug; 4(8):523-4. PubMed ID: 17660113
    [No Abstract]   [Full Text] [Related]  

  • 8. Cradle-to-grave records: U.S. project sets standards.
    Page D
    Diagn Imaging (San Franc); 1999 Sep; Suppl():P5, P7. PubMed ID: 10623312
    [No Abstract]   [Full Text] [Related]  

  • 9. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 10. Thin is in: web-based systems enhance security, clinical quality.
    Sausser GD
    Healthc Financ Manage; 2003 Jul; 57(7):86-9. PubMed ID: 12866161
    [No Abstract]   [Full Text] [Related]  

  • 11. Security, durability & portable computers.
    Miller D
    Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
    [No Abstract]   [Full Text] [Related]  

  • 12. Remote access security.
    Stevens RA; O'Loughlin-Cahill K
    Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
    [No Abstract]   [Full Text] [Related]  

  • 13. EHR meltdown: how to protect your patient data.
    Schackow TE; Palmer T; Epperly T
    Fam Pract Manag; 2008 Jun; 15(6):A3-8. PubMed ID: 18595558
    [No Abstract]   [Full Text] [Related]  

  • 14. The computerized patient record.
    Usher JL
    Caring; 1997 Dec; 16(12):32-4, 36. PubMed ID: 10176253
    [TBL] [Abstract][Full Text] [Related]  

  • 15. With worries galore, should health care rely on the Internet?
    Siwicki B
    Health Data Manag; 1998 Dec; 6(12):26-8, 30. PubMed ID: 10187486
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The future of card technology in health care.
    Kelly B
    Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
    [No Abstract]   [Full Text] [Related]  

  • 17. No alteration without authorization. Configuration management can select and arrange data as desired--while also protecting its content.
    Brown CL; Gentles IM
    Healthc Inform; 2004 Apr; 21(4):41-3. PubMed ID: 15116516
    [No Abstract]   [Full Text] [Related]  

  • 18. New Year's resolutions.
    Lowes R
    Med Econ; 2005 Jan; 82(1):16-7. PubMed ID: 15696883
    [No Abstract]   [Full Text] [Related]  

  • 19. JCAHO surveys stress Y2K solutions.
    Hosp Peer Rev; 1999 May; 24(5):69-70. PubMed ID: 10623125
    [No Abstract]   [Full Text] [Related]  

  • 20. Readers' perspective. "By 2010 biometric security technology will be commonly used to protect patient information".
    Altee K; McLaughlin N; Corkhill E; Beavans I; Broderick M; Green M
    Health Data Manag; 2004 Jan; 12(1):64. PubMed ID: 14725112
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.