These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

231 related articles for article (PubMed ID: 10177776)

  • 1. Charting new territory. Interview by Tyler L. Chin.
    Borten K
    Health Data Manag; 1998 Jan; 6(1):32-7. PubMed ID: 10177776
    [No Abstract]   [Full Text] [Related]  

  • 2. Information security: how safe is your system?
    Brandt M
    Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
    [No Abstract]   [Full Text] [Related]  

  • 3. Health data security: a new priority.
    Siwicki B
    Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record.
    Nagle CE
    Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480
    [No Abstract]   [Full Text] [Related]  

  • 5. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 6. [Information and communication technologies: a charter to protect individual liberties].
    Lanzalavi A
    Rev Infirm; 2007 Sep; (133):28-9. PubMed ID: 17941524
    [No Abstract]   [Full Text] [Related]  

  • 7. Preserving the privacy of computerized patient records.
    Miller DW
    Healthc Inform; 1993 Oct; 10(10):72-4. PubMed ID: 10129483
    [No Abstract]   [Full Text] [Related]  

  • 8. Data security, job security. Attendees at annual AHIMA conference turn attention to legal, staffing issues.
    Conn J
    Mod Healthc; 2007 Oct; 37(41):31. PubMed ID: 17972495
    [No Abstract]   [Full Text] [Related]  

  • 9. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Investment appraisal of the protection, confidentiality and security arrangements of patient data.
    Loftus D; Carroll T
    Stud Health Technol Inform; 1997; 43 Pt A():186-90. PubMed ID: 10179534
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Health care security chiefs share their predictions, tips. Interview by Bill Siwicki.
    Borten K; Hinton T; Krause M; Miaoulis WM; Sanovic R
    Health Data Manag; 1997 Sep; 5(9):52-4. PubMed ID: 10169998
    [No Abstract]   [Full Text] [Related]  

  • 12. Charting a new course in privacy.
    Chin TL
    Health Data Manag; 1997 May; 5(5):51-2, 54. PubMed ID: 10167249
    [No Abstract]   [Full Text] [Related]  

  • 13. Preparing for the computerized patient. Record and managing its security.
    Pierce S
    J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443
    [No Abstract]   [Full Text] [Related]  

  • 14. Data protection and security within TANIT.
    Corbeel LJ; Corbeel IL; Hortmann M
    Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
    [TBL] [Abstract][Full Text] [Related]  

  • 15. New technologies raise concerns about protecting patient confidentiality.
    Hosp Patient Relat Rep; 1991 Feb; 6(2):1-2. PubMed ID: 10109410
    [No Abstract]   [Full Text] [Related]  

  • 16. How safe are computerized patient records?
    Kibbe D; Bard MR
    Fam Pract Manag; 1997 May; 4(5):34-6, 41-4, 46 passim. PubMed ID: 10184800
    [No Abstract]   [Full Text] [Related]  

  • 17. It's time to beef up your information security.
    Healthc Benchmarks; 1999 Mar; 6(3):31-4. PubMed ID: 10346179
    [No Abstract]   [Full Text] [Related]  

  • 18. Strong authentication: knowing who's accessing your doctor portal.
    Internet Healthc Strateg; 2004 Nov; 6(11):4-6. PubMed ID: 15603211
    [No Abstract]   [Full Text] [Related]  

  • 19. HIPAA. Blueprint for privacy and security. Bringing information protection up to code will require a new way of doing things.
    Marietti C
    Healthc Inform; 2002 Jan; 19(1):55-8, 60. PubMed ID: 12827790
    [No Abstract]   [Full Text] [Related]  

  • 20. Provider automation. Earning the public trust.
    Watson S
    Health Data Manag; 1996 Jan; 4(1):26-7. PubMed ID: 10154353
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.