These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

278 related articles for article (PubMed ID: 10276649)

  • 1. A case for system security.
    Meason R
    Comput Healthc; 1986 Jun; 7(6):60, 62. PubMed ID: 10276649
    [TBL] [Abstract][Full Text] [Related]  

  • 2. The importance of CRT terminals in an OCS/MIS system decision.
    Johnson RL
    Healthc Comput Commun; 1984 Oct; 1(9):26-8. PubMed ID: 10268280
    [No Abstract]   [Full Text] [Related]  

  • 3. Institutional security indicator report: a management tool to bridge the communications gap.
    Gonzalez P; Savoca R; McDermott R; Vaughn T
    J Healthc Prot Manage; 1985; 1(3):51-60. PubMed ID: 10272301
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The personal computer--a promising security and safety management tool.
    Hosp Secur Saf Manage; 1986 Jul; 7(3):5-10. PubMed ID: 10278561
    [No Abstract]   [Full Text] [Related]  

  • 5. Computer-related fraud in hospitals--an interview with Harold Dailey.
    Dailey HW
    Top Health Care Financ; 1978; 5(2):39-73. PubMed ID: 734656
    [No Abstract]   [Full Text] [Related]  

  • 6. Automating energy management: getting more than we bargained for.
    Palumbo J
    Softw Healthc; 1985; 3(4):75-6. PubMed ID: 10273976
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The AAR report--how to record and disseminate afterhours entry activity, insecure areas and unsafe conditions.
    Olson TF
    J Healthc Prot Manage; 1984; 1(1):108-14. PubMed ID: 10270660
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Which major systems? On which types of computer?
    Packer CL
    Hospitals; 1984 Dec; 58(23):81-2. PubMed ID: 6548463
    [No Abstract]   [Full Text] [Related]  

  • 9. Supporting your operation with information.
    Moore J
    J Healthc Prot Manage; 1985; 2(1):11-25. PubMed ID: 10276188
    [No Abstract]   [Full Text] [Related]  

  • 10. Software security key, firewalls, visual integration emerge.
    Seliger R
    Health Manag Technol; 1999 Aug; 20(7):10, 12. PubMed ID: 10620981
    [No Abstract]   [Full Text] [Related]  

  • 11. Computer user groups: a shared rural hospital experience.
    Swanson SS
    Healthc Financ Manage; 1984 Nov; 38(11):76-80. PubMed ID: 10315625
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Common sense and computer security.
    Buss MD; Salerno LM
    Harv Bus Rev; 1984; 62(2):112-21. PubMed ID: 10265790
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A comparison of the utilization of general purpose computers in hospitals of the United States of America and England.
    Lopez M
    J Clin Comput; 1982; 11(2):56-95. PubMed ID: 10257556
    [No Abstract]   [Full Text] [Related]  

  • 14. Information system flexibility.
    Poggio FL
    Comput Healthc; 1986 Apr; 7(4):36-8. PubMed ID: 10300584
    [No Abstract]   [Full Text] [Related]  

  • 15. Computerizing your security operation--it can be done!
    Smith S
    J Healthc Prot Manage; 1992; 8(2):90-101. PubMed ID: 10121336
    [No Abstract]   [Full Text] [Related]  

  • 16. A personal system for utilization review management.
    Allen CV
    Med Group Manage; 1985; 32(5):14-21, 32. PubMed ID: 10272837
    [No Abstract]   [Full Text] [Related]  

  • 17. "Facilities management--a new solution for hospital information systems". Interview by Bill Childs.
    Aprahamian RV
    Comput Healthc; 1983 Jan; 4(1):66, 68. PubMed ID: 10257864
    [No Abstract]   [Full Text] [Related]  

  • 18. Health care communication networks: disseminating employee information for hospital security.
    Sumner J; Liberman A; Rotarius T; Wan TT; Eaglin R
    Health Care Manag (Frederick); 2009; 28(4):287-98. PubMed ID: 19910705
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Computers and the health care industry.
    Huesing S
    Dimens Health Serv; 1979 Feb; 56(2):22, 24-6. PubMed ID: 421974
    [No Abstract]   [Full Text] [Related]  

  • 20. Management policies and procedures needed for effective computer security.
    Madnick SE
    Sloan Manage Rev; 1978; 20(1):61-74. PubMed ID: 10239542
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.