These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

135 related articles for article (PubMed ID: 11766428)

  • 1. One and done. The use of biometrics and authentication technologies can help healthcare organizations reduce workflow costs while safeguarding access to patient data.
    Kuperstein M
    Health Manag Technol; 2001 Dec; 22(12):22-3. PubMed ID: 11766428
    [No Abstract]   [Full Text] [Related]  

  • 2. Biometrics technology adds innovation to healthcare organization security systems.
    Perrin RA
    Healthc Financ Manage; 2002 Mar; 56(3):86-8. PubMed ID: 11899730
    [No Abstract]   [Full Text] [Related]  

  • 3. The power of PKI (Public Key Infrastructure).
    Lovorn J
    Health Manag Technol; 2001 Dec; 22(12):20-1. PubMed ID: 11766427
    [No Abstract]   [Full Text] [Related]  

  • 4. Iris scanning: the eye of the storm. Several industries have hastened development of authentication technologies-including healthcare.
    Stumpf S
    Telemed Today; 2002; 9(3):27-8. PubMed ID: 12528482
    [No Abstract]   [Full Text] [Related]  

  • 5. Security savvy. Midwest healthcare system secures patient information with two-factor authentication.
    Slabodnick D
    Health Manag Technol; 2002 May; 23(5):32-3. PubMed ID: 12016710
    [No Abstract]   [Full Text] [Related]  

  • 6. Access denied. Mayo Clinic is a believer in using biometrics to protect medical data, but technological flaws shut doctors out, shut system down.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):22-4, 26, 30. PubMed ID: 12510564
    [No Abstract]   [Full Text] [Related]  

  • 7. Getting personal. Biometric security devices gain access to health care facilities.
    Moss B
    Health Facil Manage; 2002 Sep; 15(9):20-4. PubMed ID: 12373934
    [No Abstract]   [Full Text] [Related]  

  • 8. Biometrics: can we have a show of hands?
    Briggs B
    Health Data Manag; 2002 Dec; 10(12):48-50, 52. PubMed ID: 12528643
    [No Abstract]   [Full Text] [Related]  

  • 9. Readers' perspective. "By 2010 biometric security technology will be commonly used to protect patient information".
    Altee K; McLaughlin N; Corkhill E; Beavans I; Broderick M; Green M
    Health Data Manag; 2004 Jan; 12(1):64. PubMed ID: 14725112
    [No Abstract]   [Full Text] [Related]  

  • 10. What you know, what you have, what you are.
    McBride M
    Health Manag Technol; 2005 Dec; 26(12):10, 12, 14. PubMed ID: 16381115
    [No Abstract]   [Full Text] [Related]  

  • 11. Long-term planning for authentication solutions.
    Boon T
    Health Manag Technol; 2001 Dec; 22(12):52, 51. PubMed ID: 11766435
    [No Abstract]   [Full Text] [Related]  

  • 12. Incoming! With new IT assets arriving and existing ones aging, organizations need a system of keeping track.
    Hagland M
    Healthc Inform; 2004 Feb; 21(2):72-4, 76. PubMed ID: 15004914
    [No Abstract]   [Full Text] [Related]  

  • 13. Fingerprint verification on medical image reporting system.
    Chen YC; Chen LK; Tsai MD; Chiu HC; Chiu JS; Chong CF
    Comput Methods Programs Biomed; 2008 Mar; 89(3):282-8. PubMed ID: 18178287
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Body identification, biometrics and medicine: ethical and social considerations.
    Mordini E; Ottolini C
    Ann Ist Super Sanita; 2007; 43(1):51-60. PubMed ID: 17536154
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security/authentication HotList.
    Health Manag Technol; 2002 Dec; 23(12):46-7. PubMed ID: 12467266
    [No Abstract]   [Full Text] [Related]  

  • 16. Eyeing a new solution. Next generation of scanners offers security advances.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):28. PubMed ID: 12510565
    [No Abstract]   [Full Text] [Related]  

  • 17. Biometrics offers alternative to password entry.
    Thompson CA
    Am J Health Syst Pharm; 2005 Jun; 62(11):1115-6. PubMed ID: 15914868
    [No Abstract]   [Full Text] [Related]  

  • 18. IT outsourcing secures confidentiality. Healthcare provider of long-term care services enables remote access and saves money doing it.
    Health Manag Technol; 2002 Nov; 23(11):46-8. PubMed ID: 12416427
    [No Abstract]   [Full Text] [Related]  

  • 19. Put your finger on the right solution.
    Keener RE
    Health Manag Technol; 2000 Dec; 21(12):20-1. PubMed ID: 11141989
    [No Abstract]   [Full Text] [Related]  

  • 20. Data security. You really put your finger on it.
    Kelly B
    Health Data Manag; 2000 May; 8(5):88, 90-2, 94. PubMed ID: 11183072
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.