These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

125 related articles for article (PubMed ID: 10174367)

  • 1. Security measures for protecting confdential information on the Internet and Intranets.
    Rapalus P
    Employ Relat Today; 1997; 24(3):49-58. PubMed ID: 10174367
    [No Abstract]   [Full Text] [Related]  

  • 2. Protecting organizations from electronic-transaction fraud.
    Sagner JS
    Healthc Financ Manage; 1995 Feb; 49(2):80. PubMed ID: 10146183
    [No Abstract]   [Full Text] [Related]  

  • 3. Securing the IT infrastructure. Protection can be solid and ongoing, even on a conservative budget.
    Norton RC
    Healthc Inform; 2004 Jan; 21(1):22. PubMed ID: 14763104
    [No Abstract]   [Full Text] [Related]  

  • 4. The official position of American Health Information Management Association. Issue: Confidential health information and the Internet.
    J AHIMA; 1998 Jan; 69(1):suppl 2 p. following 8. PubMed ID: 10174716
    [No Abstract]   [Full Text] [Related]  

  • 5. Records on the Internet.
    Bazzoli F
    Health Data Manag; 1997 Feb; 5(2):96-8, 100, 102 passim. PubMed ID: 10165018
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Managing security risks with 80001.
    Mankovich N; Fitzgerald B
    Biomed Instrum Technol; 2011; Suppl():27-32. PubMed ID: 21992042
    [No Abstract]   [Full Text] [Related]  

  • 7. Address e-mail security in the quality department.
    Spath P
    Hosp Peer Rev; 2001 Nov; 26(11):157-9. PubMed ID: 11692529
    [No Abstract]   [Full Text] [Related]  

  • 8. The challenge of cyberspace. Human resource issues and policies in the high-tech health care workplace.
    Lyncheski JE
    Balance; 1998; 2(5):19-20. PubMed ID: 10186015
    [No Abstract]   [Full Text] [Related]  

  • 9. Understanding chain of trust and business partner agreements. American Health Information Management Association.
    Cassidy BS;
    J AHIMA; 2000 Oct; 71(9):16A-16C. PubMed ID: 11141801
    [No Abstract]   [Full Text] [Related]  

  • 10. Protecting and securing networked medical devices.
    Riha C
    Biomed Instrum Technol; 2004; 38(5):392-6. PubMed ID: 15521516
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Mobile tech gets security check.
    Schuerenberg BK
    Health Data Manag; 2003 Nov; 11(11):54-7. PubMed ID: 14619104
    [No Abstract]   [Full Text] [Related]  

  • 12. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 13. Patient-centered e-mail: developing the right policies.
    Murphy G
    J AHIMA; 2000 Mar; 71(3):47-54; quiz 55-6. PubMed ID: 11009669
    [No Abstract]   [Full Text] [Related]  

  • 14. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 15. Electronic security standards due to come on line.
    Reed G
    Healthc Financ Manage; 2000 Dec; 54(12):70. PubMed ID: 11141692
    [No Abstract]   [Full Text] [Related]  

  • 16. Computing--disasters, security and patient confidentiality. Security red alert.
    Manuel G
    Health Serv J; 1991 Jul; 101(5262):29-30. PubMed ID: 10113976
    [No Abstract]   [Full Text] [Related]  

  • 17. e-novation: managing with new technology. Live wires.
    Hoeksma J
    Health Serv J; 2001 May; 111(5756):suppl 11. PubMed ID: 11398658
    [No Abstract]   [Full Text] [Related]  

  • 18. Moving toward a unified information security program.
    Ruano M
    J AHIMA; 2003 Jan; 74(1):66-8. PubMed ID: 12530350
    [No Abstract]   [Full Text] [Related]  

  • 19. Protect your net. Good policy + good technology = dependable security.
    Schneider P
    Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843
    [No Abstract]   [Full Text] [Related]  

  • 20. RHIOs--build in healthcare fraud management from the beginning.
    Hanson SP; Cassidy BS
    J Healthc Inf Manag; 2006; 20(3):39-46. PubMed ID: 16903660
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.