These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

258 related articles for article (PubMed ID: 11899730)

  • 1. Biometrics technology adds innovation to healthcare organization security systems.
    Perrin RA
    Healthc Financ Manage; 2002 Mar; 56(3):86-8. PubMed ID: 11899730
    [No Abstract]   [Full Text] [Related]  

  • 2. One and done. The use of biometrics and authentication technologies can help healthcare organizations reduce workflow costs while safeguarding access to patient data.
    Kuperstein M
    Health Manag Technol; 2001 Dec; 22(12):22-3. PubMed ID: 11766428
    [No Abstract]   [Full Text] [Related]  

  • 3. Positive identification. Fingerprint images identify patients under any circumstances.
    Moser L
    Health Manag Technol; 2000 Dec; 21(12):22. PubMed ID: 11141990
    [No Abstract]   [Full Text] [Related]  

  • 4. Access denied. Mayo Clinic is a believer in using biometrics to protect medical data, but technological flaws shut doctors out, shut system down.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):22-4, 26, 30. PubMed ID: 12510564
    [No Abstract]   [Full Text] [Related]  

  • 5. Biometrics: can we have a show of hands?
    Briggs B
    Health Data Manag; 2002 Dec; 10(12):48-50, 52. PubMed ID: 12528643
    [No Abstract]   [Full Text] [Related]  

  • 6. Health care data security: one size does not fit all.
    Krohn R
    Manag Care Interface; 2001 Nov; 14(11):60-2. PubMed ID: 11715765
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Eyeing a new solution. Next generation of scanners offers security advances.
    Morrissey J
    Mod Healthc; 2002 Nov; 32(47):28. PubMed ID: 12510565
    [No Abstract]   [Full Text] [Related]  

  • 8. Controlling your high-tech security shopping list.
    Amatayakul M
    Healthc Financ Manage; 2004 Feb; 58(2):86-7. PubMed ID: 14997724
    [No Abstract]   [Full Text] [Related]  

  • 9. Put your finger on the right solution.
    Keener RE
    Health Manag Technol; 2000 Dec; 21(12):20-1. PubMed ID: 11141989
    [No Abstract]   [Full Text] [Related]  

  • 10. Biometric authentication: privacy protection or invasion?
    Pothen DJ; Parmanto B
    J AHIMA; 2001; 72(7):24, 26. PubMed ID: 15724366
    [No Abstract]   [Full Text] [Related]  

  • 11. Iris scanning: the eye of the storm. Several industries have hastened development of authentication technologies-including healthcare.
    Stumpf S
    Telemed Today; 2002; 9(3):27-8. PubMed ID: 12528482
    [No Abstract]   [Full Text] [Related]  

  • 12. Readers' perspective. "By 2010 biometric security technology will be commonly used to protect patient information".
    Altee K; McLaughlin N; Corkhill E; Beavans I; Broderick M; Green M
    Health Data Manag; 2004 Jan; 12(1):64. PubMed ID: 14725112
    [No Abstract]   [Full Text] [Related]  

  • 13. Technology: biometric recognition.
    Jain AK
    Nature; 2007 Sep; 449(7158):38-40. PubMed ID: 17805286
    [No Abstract]   [Full Text] [Related]  

  • 14. Five ways to deal with information security incidents under HIPAA.
    Hosp Secur Saf Manage; 2001 Feb; 21(10):1-3. PubMed ID: 11260852
    [No Abstract]   [Full Text] [Related]  

  • 15. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Putting an end to 'inside jobs'.
    Szynal D
    Health Data Manag; 2001 Jun; 9(6):62-4. PubMed ID: 11409339
    [No Abstract]   [Full Text] [Related]  

  • 17. Juggling skills a must for health care CSOs.
    Gillespie G
    Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
    [No Abstract]   [Full Text] [Related]  

  • 18. Wireless network safe and secure.
    Helgeson L
    Health Data Manag; 2005 Feb; 13(2):110, 112, 114. PubMed ID: 15913103
    [No Abstract]   [Full Text] [Related]  

  • 19. Data security. You really put your finger on it.
    Kelly B
    Health Data Manag; 2000 May; 8(5):88, 90-2, 94. PubMed ID: 11183072
    [No Abstract]   [Full Text] [Related]  

  • 20. Two technologies let hospitals pass on words.
    Briggs B
    Health Data Manag; 2004 Sep; 12(9):34-6, 38, 40 passim. PubMed ID: 15568574
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 13.