BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

221 related articles for article (PubMed ID: 11603347)

  • 1. Ethical guidance in Web site development.
    Van Brunt D; Salehizadeh B
    Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
    [No Abstract]   [Full Text] [Related]  

  • 2. Remote access security.
    Stevens RA; O'Loughlin-Cahill K
    Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
    [No Abstract]   [Full Text] [Related]  

  • 3. Confidentiality principles for medical records on the World Wide Web.
    Rind DM; Safran C
    Stud Health Technol Inform; 1998; 52 Pt 2():1148-50. PubMed ID: 10384639
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Teaching effective security.
    Siwicki B
    Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
    [No Abstract]   [Full Text] [Related]  

  • 5. Putting a lock on records.
    Fuller SR
    Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
    [No Abstract]   [Full Text] [Related]  

  • 6. Protecting confidentiality & improving health.
    Coleman D
    Healthplan; 1998; 39(6):38-43. PubMed ID: 10351346
    [No Abstract]   [Full Text] [Related]  

  • 7. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 8. Protecting confidentiality in the Rockies.
    Linton M; Clayton P
    Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
    [No Abstract]   [Full Text] [Related]  

  • 9. Security considerations when choosing an EMR system.
    Mendoza E
    Health Manag Technol; 2003 Oct; 24(10):48. PubMed ID: 14535124
    [No Abstract]   [Full Text] [Related]  

  • 10. Healthcare 2020: political challenges in the information age.
    Coile RC; Trusko BE
    Health Manag Technol; 1999 Oct; 20(9):26-7, 29. PubMed ID: 10622886
    [No Abstract]   [Full Text] [Related]  

  • 11. How to encrypt medical data against intrusion.
    Langer S
    Diagn Imaging (San Franc); 2000 Aug; 22(8):69-71, 79. PubMed ID: 11066448
    [No Abstract]   [Full Text] [Related]  

  • 12. Avoiding legal pitfalls in records automation.
    Tomes JP
    Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
    [No Abstract]   [Full Text] [Related]  

  • 13. Charting a new course in privacy.
    Chin TL
    Health Data Manag; 1997 May; 5(5):51-2, 54. PubMed ID: 10167249
    [No Abstract]   [Full Text] [Related]  

  • 14. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
    Aikins R; Anderson J
    Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
    [No Abstract]   [Full Text] [Related]  

  • 15. Maintaining confidentiality: health care's ongoing dilemma.
    Dowd SB; Dowd LP
    Health Care Superv; 1996 Sep; 15(1):24-31. PubMed ID: 10159637
    [TBL] [Abstract][Full Text] [Related]  

  • 16. [Security specifications for electronic medical records on the Internet].
    Mocanu M; Mocanu C
    Oftalmologia; 2007; 51(4):7-13. PubMed ID: 18543666
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Is it safe? Security speed bumps on the information highway.
    Bergeron BP
    J Med Pract Manage; 2001; 16(6):297-300. PubMed ID: 11497309
    [TBL] [Abstract][Full Text] [Related]  

  • 18. EHR in the perspective of security, integrity and ethics.
    Nordberg R
    Stud Health Technol Inform; 2006; 121():291-8. PubMed ID: 17095827
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Commentary: managing social, legal, and ethical issues of personal information systems.
    Peladeau P
    Top Health Inf Manage; 1996 May; 16(4):66-73. PubMed ID: 10157664
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Medical privacy. New technologies pose a threat.
    Roberts SS
    Diabetes Forecast; 2002 Dec; 55(12):57-9. PubMed ID: 14870705
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.