These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

111 related articles for article (PubMed ID: 10179266)

  • 1. Information security at the Fifteenth Medical Group.
    Yeager RA; Kindle M
    Healthc Inf Manage; 1998; 12(1):39-50. PubMed ID: 10179266
    [No Abstract]   [Full Text] [Related]  

  • 2. Military maneuvers. DoD moves ahead with integrated clinical records.
    Hudson T
    Hospitals; 1993 Feb; 67(4):28-9. PubMed ID: 8428736
    [No Abstract]   [Full Text] [Related]  

  • 3. HIPAA update and other computer news.
    Lowes R
    Med Econ; 2003 May; 80(9):30, 33. PubMed ID: 12776614
    [No Abstract]   [Full Text] [Related]  

  • 4. Privacy, confidentiality, and security: protecting "personally identifiable information".
    Schulte Scott J
    Healthc Financ Manage; 1999 Mar; 53(3):26-7. PubMed ID: 10351051
    [No Abstract]   [Full Text] [Related]  

  • 5. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security combines awareness with technology issues.
    Braly D
    Health Manag Technol; 1996 Sep; 17(10):42, 44. PubMed ID: 10160332
    [No Abstract]   [Full Text] [Related]  

  • 7. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 8. Confidence and confidentiality.
    Hagland M
    Health Manag Technol; 1997 Nov; 18(12):20-2, 24, 56. PubMed ID: 10174735
    [No Abstract]   [Full Text] [Related]  

  • 9. Information age requires strategic security plans.
    Baldwin G
    Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931
    [No Abstract]   [Full Text] [Related]  

  • 10. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Electronic medical records, chapter 2: the obstacles.
    Pentecost MJ
    J Am Coll Radiol; 2006 Mar; 3(3):167-8. PubMed ID: 17412033
    [No Abstract]   [Full Text] [Related]  

  • 12. Inside job. When it comes to patient information, the importance of maintaining proper data security can never be overestimated.
    Grey M
    Healthc Inform; 2007 Oct; 24(10):50-4, 56. PubMed ID: 17990649
    [No Abstract]   [Full Text] [Related]  

  • 13. Confidentiality and medical information.
    Clayton PD
    Ann Emerg Med; 2001 Sep; 38(3):312-6. PubMed ID: 11524652
    [No Abstract]   [Full Text] [Related]  

  • 14. Panel calls for improved security for medical records.
    AIDS Policy Law; 1997 Mar; 12(5):3. PubMed ID: 11364165
    [TBL] [Abstract][Full Text] [Related]  

  • 15. It's time to beef up your information security.
    Healthc Benchmarks; 1999 Mar; 6(3):31-4. PubMed ID: 10346179
    [No Abstract]   [Full Text] [Related]  

  • 16. Electronic Health Care Records in Europe: confidentiality issues from an American perspective.
    Petrisor AI; Close JM
    Stud Health Technol Inform; 2002; 87():44-6. PubMed ID: 15458041
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
    Aikins R; Anderson J
    Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
    [No Abstract]   [Full Text] [Related]  

  • 18. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 19. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Readers' perspectives. . . The HIPPA security rule has contributed to better protection of patient information. Do you agree or disagree?
    Dechow J; Price A; Kerber J; Brancato C; Shaw K
    Health Data Manag; 2005 Dec; 13(12):64. PubMed ID: 16381497
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.