These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

100 related articles for article (PubMed ID: 11141989)

  • 1. Put your finger on the right solution.
    Keener RE
    Health Manag Technol; 2000 Dec; 21(12):20-1. PubMed ID: 11141989
    [No Abstract]   [Full Text] [Related]  

  • 2. Biometrics technology adds innovation to healthcare organization security systems.
    Perrin RA
    Healthc Financ Manage; 2002 Mar; 56(3):86-8. PubMed ID: 11899730
    [No Abstract]   [Full Text] [Related]  

  • 3. Safe and secure. With HIPAA deadlines looming and a prolific number of security choices on the horizon, healthcare organizations face a challenging future.
    Rogoski RR
    Health Manag Technol; 2002 Dec; 23(12):14-6, 20. PubMed ID: 12467260
    [No Abstract]   [Full Text] [Related]  

  • 4. Controlling your high-tech security shopping list.
    Amatayakul M
    Healthc Financ Manage; 2004 Feb; 58(2):86-7. PubMed ID: 14997724
    [No Abstract]   [Full Text] [Related]  

  • 5. Positive identification. Fingerprint images identify patients under any circumstances.
    Moser L
    Health Manag Technol; 2000 Dec; 21(12):22. PubMed ID: 11141990
    [No Abstract]   [Full Text] [Related]  

  • 6. Data security. You really put your finger on it.
    Kelly B
    Health Data Manag; 2000 May; 8(5):88, 90-2, 94. PubMed ID: 11183072
    [No Abstract]   [Full Text] [Related]  

  • 7. Mobile tech gets security check.
    Schuerenberg BK
    Health Data Manag; 2003 Nov; 11(11):54-7. PubMed ID: 14619104
    [No Abstract]   [Full Text] [Related]  

  • 8. Strengthening system security to prepare for HIPAA.
    Shehata A
    Health Manag Technol; 2002 Sep; 23(9):14-5, 19. PubMed ID: 12232896
    [No Abstract]   [Full Text] [Related]  

  • 9. Reader's perspectives. Health care organizations should put the identifier rules of the Health Insurance Portability and Accountability Act on the back burner.
    Yanick M; Carney R
    Health Data Manag; 2002 Apr; 10(4):64. PubMed ID: 11963417
    [No Abstract]   [Full Text] [Related]  

  • 10. Privacy and security standards.
    Brittin AJ
    Health Manag Technol; 2000 Nov; 21(11):12-3. PubMed ID: 11155623
    [No Abstract]   [Full Text] [Related]  

  • 11. How secure is your practice?
    Dirubbo NE
    Nurse Pract; 2008 Apr; 33(4):6. PubMed ID: 18388544
    [No Abstract]   [Full Text] [Related]  

  • 12. You can drown in too much security.
    Baughman K
    Behav Healthc; 2008 Aug; 28(8):31-2. PubMed ID: 18795734
    [No Abstract]   [Full Text] [Related]  

  • 13. Mega enterprise chooses smart cards.
    Lynch JT; Lassus B
    Health Manag Technol; 2000 Nov; 21(11):50, 52, 78. PubMed ID: 11155634
    [No Abstract]   [Full Text] [Related]  

  • 14. HIPAA compliance support via portals.
    Stanford J
    Internet Healthc Strateg; 2002 Apr; 4(4):10-2. PubMed ID: 11989113
    [No Abstract]   [Full Text] [Related]  

  • 15. One, two, three ... authenticate me.
    Walker T
    Health Manag Technol; 2000 Dec; 21(12):16-7. PubMed ID: 11141988
    [No Abstract]   [Full Text] [Related]  

  • 16. HIPAA at the eleventh hour: do you know where your imaging center is?
    Kroken P
    Radiol Manage; 2003; 25(2):10-1. PubMed ID: 12800556
    [No Abstract]   [Full Text] [Related]  

  • 17. Completing the HIPAA compliance journey: security standards.
    Pieper SK
    Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
    [No Abstract]   [Full Text] [Related]  

  • 18. Protecting electronic health information as part of HIPAA.
    Pai SS; Robinson M; Zimmerman JL
    Dent Today; 2004 Oct; 23(10):126-31. PubMed ID: 15559465
    [No Abstract]   [Full Text] [Related]  

  • 19. Chief security officers sound off on HIPAA rules. Interview by Gary Baldwin.
    Aikins R; Krause M; Silliman M
    Health Data Manag; 2000 Sep; 8(9):86-8, 90, 92. PubMed ID: 11187340
    [No Abstract]   [Full Text] [Related]  

  • 20. Security software for hand-held computers.
    Morrison KM
    Fam Pract Manag; 2002 Jun; 9(6):59-60. PubMed ID: 12083018
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 5.