BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

466 related articles for article (PubMed ID: 11565145)

  • 1. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
    Gillespie G
    Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
    [No Abstract]   [Full Text] [Related]  

  • 2. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Down the beaten HIPAA path.
    Goedert J
    Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
    [No Abstract]   [Full Text] [Related]  

  • 4. The HIPAA prescription for healthcare--why isn't it working?
    Gue DG; Upham R
    Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
    [No Abstract]   [Full Text] [Related]  

  • 5. The first steps toward security.
    Goedert J
    Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
    [No Abstract]   [Full Text] [Related]  

  • 6. Final HIPAA security regulations: a review.
    Garner JC
    Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy and security become financial concern under HITECH Act.
    McDavid JP
    Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690
    [No Abstract]   [Full Text] [Related]  

  • 8. What will stop data breaches?
    Goedert J
    Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
    [No Abstract]   [Full Text] [Related]  

  • 9. Patient privacy and security of electronic medical information for radiologists: the basics.
    Andriole KP; Khorasani R
    J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391
    [No Abstract]   [Full Text] [Related]  

  • 10. Practice brief. Security risk analysis and management: an overview.
    Amatayakul M;
    J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
    [No Abstract]   [Full Text] [Related]  

  • 11. Clearing the final HIPAA hurdle: preparing for compliance with the HIPAA Security Rule.
    Gertz E; Burge D
    Mich Health Hosp; 2003; 39(4):16-7. PubMed ID: 12886652
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Can you keep a secret?
    Curtin L; Simpson RL
    Health Manag Technol; 2001 Jun; 22(6):44. PubMed ID: 11409284
    [No Abstract]   [Full Text] [Related]  

  • 13. New data security regs to pose challenge to healthcare administrators.
    Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791
    [No Abstract]   [Full Text] [Related]  

  • 14. The rules are out. A middle ground has been successfully achieved.
    Hellerstein D
    Health Manag Technol; 2001 Feb; 22(2):8, 10. PubMed ID: 11225346
    [No Abstract]   [Full Text] [Related]  

  • 15. Prevention of HIPAA security breaches.
    Fesko H; McGuigan P
    Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
    [No Abstract]   [Full Text] [Related]  

  • 16. HIPAA update. Achieving compliance with the new standards.
    Amatayakul M
    MD Comput; 2000; 17(3):54-6. PubMed ID: 10842986
    [No Abstract]   [Full Text] [Related]  

  • 17. A security strategy: possibly the biggest task on healthcare's to-do list.
    Tabar P
    Healthc Inform; 2001 Feb; 18(2):46, 48. PubMed ID: 11225064
    [No Abstract]   [Full Text] [Related]  

  • 18. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB; Fehn AK
    Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Is nothing sacred on the Net?
    McCarthy R
    Bus Health; 2001 Feb; 19(2):21-2, 25-6. PubMed ID: 11225081
    [No Abstract]   [Full Text] [Related]  

  • 20. Data security: the time to begin is now.
    Goedert J
    Health Data Manag; 1999 Feb; 7(2):108-10, 112, 114-8. PubMed ID: 10346126
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 24.