BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

379 related articles for article (PubMed ID: 14571553)

  • 1. Practice brief. Security risk analysis and management: an overview.
    Amatayakul M;
    J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
    [No Abstract]   [Full Text] [Related]  

  • 2. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
    Gillespie G
    Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
    [No Abstract]   [Full Text] [Related]  

  • 3. The first steps toward security.
    Goedert J
    Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
    [No Abstract]   [Full Text] [Related]  

  • 4. Recognizing and reducing risks: HIPAA privacy and security enforcement.
    Wachler AB; Fehn AK
    Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The computer-based patient record: risks, security, and the HIM role.
    Picukaric JM
    J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259
    [No Abstract]   [Full Text] [Related]  

  • 6. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Down the beaten HIPAA path.
    Goedert J
    Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
    [No Abstract]   [Full Text] [Related]  

  • 8. The HIPAA prescription for healthcare--why isn't it working?
    Gue DG; Upham R
    Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
    [No Abstract]   [Full Text] [Related]  

  • 9. Privacy and security become financial concern under HITECH Act.
    McDavid JP
    Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690
    [No Abstract]   [Full Text] [Related]  

  • 10. Prevention of HIPAA security breaches.
    Fesko H; McGuigan P
    Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
    [No Abstract]   [Full Text] [Related]  

  • 11. An IT contingency plan to meet HIPAA security standards.
    Nutten S; Mansueti C
    J AHIMA; 2004 Feb; 75(2):30-7; quiz 39-40. PubMed ID: 14981853
    [No Abstract]   [Full Text] [Related]  

  • 12. Beyond HIPAA: the complexities of electronic record management.
    Kahn RA
    J AHIMA; 2003 Apr; 74(4):31-6; quiz 37-8. PubMed ID: 12698938
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Sounding the alarm. Knowing when to notify patients of a data breach can be unclear.
    Dimick C
    J AHIMA; 2009 Feb; 80(2):20-4; quiz 25-6. PubMed ID: 19245055
    [No Abstract]   [Full Text] [Related]  

  • 14. Translating the language of security.
    Amatayakul M;
    J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390
    [No Abstract]   [Full Text] [Related]  

  • 15. New data security regs to pose challenge to healthcare administrators.
    Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791
    [No Abstract]   [Full Text] [Related]  

  • 16. Final HIPAA security regulations: a review.
    Garner JC
    Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Practice brief. Redisclosure of patient health information.
    American Information Management Association
    J AHIMA; 2001 Sep; 72(8):72A-72B; quiz 75-6. PubMed ID: 15714649
    [No Abstract]   [Full Text] [Related]  

  • 18. Final security regulations present challenges, opportunities for HIM.
    Rode D
    J AHIMA; 2003 May; 74(5):14, 16, 18. PubMed ID: 12793446
    [No Abstract]   [Full Text] [Related]  

  • 19. Patient privacy and security of electronic medical information for radiologists: the basics.
    Andriole KP; Khorasani R
    J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391
    [No Abstract]   [Full Text] [Related]  

  • 20. What will stop data breaches?
    Goedert J
    Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 19.