These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

132 related articles for article (PubMed ID: 11154960)

  • 21. Unintended consequences. Lawmakers and regulators must look at policy and IT issues simultaneously.
    Wallace S
    Hosp Health Netw; 2005 Apr; 79(4):84. PubMed ID: 15916348
    [No Abstract]   [Full Text] [Related]  

  • 22. Advanced tool kits for EPR security.
    Blobel B
    Int J Med Inform; 2000 Nov; 60(2):169-75. PubMed ID: 11154968
    [TBL] [Abstract][Full Text] [Related]  

  • 23. UK National Data Guardian for Health and Care's Review of Data Security: Trust, better security and opt-outs.
    Chan T; Di Iorio CT; De Lusignan S; Lo Russo D; Kuziemsky C; Liaw ST
    J Innov Health Inform; 2016 Dec; 23(3):627-632. PubMed ID: 28059698
    [TBL] [Abstract][Full Text] [Related]  

  • 24. The challenge for security and privacy services in distributed health settings.
    Katsikas S; Lopez J; Pernul G
    Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Availability of health data: requirements and solutions.
    Espinosa AL
    Int J Med Inform; 1998 Mar; 49(1):97-104. PubMed ID: 9723807
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Cryptographic protection of health information: cost and benefit.
    Biskup J; Bleumer G
    Int J Biomed Comput; 1996 Oct; 43(1-2):61-7. PubMed ID: 8960923
    [TBL] [Abstract][Full Text] [Related]  

  • 27. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Information governance standards for managing e-health information.
    Huston JL
    J Telemed Telecare; 2005; 11 Suppl 2():S56-8. PubMed ID: 16375798
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Investment appraisal of the protection, confidentiality and security arrangements of patient data.
    Loftus D; Carroll T
    Stud Health Technol Inform; 1997; 43 Pt A():186-90. PubMed ID: 10179534
    [TBL] [Abstract][Full Text] [Related]  

  • 30. PCASSO: a secure architecture for access to clinical data via the Internet.
    Masys DR; Baker DB; Barnhart R; Buss T
    Stud Health Technol Inform; 1998; 52 Pt 2():1130-4. PubMed ID: 10384635
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Specific interoperability problems of security infrastructure services.
    Pharow P; Blobel B
    Stud Health Technol Inform; 2006; 121():349-63. PubMed ID: 17095833
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Information security requirements in patient-centred healthcare support systems.
    Alsalamah S; Gray WA; Hilton J; Alsalamah H
    Stud Health Technol Inform; 2013; 192():812-6. PubMed ID: 23920670
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Patient records. At GPs' fingertips.
    Mitchell P
    Health Serv J; 1998 Oct; 108(5628):suppl 8-10. PubMed ID: 10187506
    [No Abstract]   [Full Text] [Related]  

  • 35. Security and confidentiality in an electronic medical record.
    Olson LA; Peters SG; Stewart JB
    Healthc Inf Manage; 1998; 12(1):27-37. PubMed ID: 10179264
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Patient confidentiality in the electronic age.
    Conner VW
    J Intraven Nurs; 1999; 22(4):199-202. PubMed ID: 10476136
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Results of European projects enabling secure regional, national and international health care networks.
    Blobel B
    Stud Health Technol Inform; 1999; 64():73-82. PubMed ID: 10747558
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Security for the digital information age of medicine: issues, applications, and implementation.
    Epstein MA; Pasieka MS; Lord WP; Mankovich NJ
    J Digit Imaging; 1997 Aug; 10(3 Suppl 1):122-7. PubMed ID: 9268856
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.