These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 15458159)

  • 1. Law and standards faced with market rules.
    Allaert FA
    Stud Health Technol Inform; 2002; 69():1-6; discussion 229-37. PubMed ID: 15458159
    [No Abstract]   [Full Text] [Related]  

  • 2. Law and standards faced to market rules in health information security.
    Allaert FA; Le Teuff G; Quantin C
    Stud Health Technol Inform; 2003; 95():125-9. PubMed ID: 14663974
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Overview on security standards for Healthcare information systems.
    Kokolakis S; Gritzalis D; Katsikas S; Ottes F
    Stud Health Technol Inform; 2002; 69():13-21; discussion 229-37. PubMed ID: 15458161
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Draft standard for high level security policies for Healthcare establishments.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():23-47; discussion 229-37. PubMed ID: 15458162
    [No Abstract]   [Full Text] [Related]  

  • 5. High level security policies for health care establishments.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2004; 103():407-15. PubMed ID: 15747948
    [TBL] [Abstract][Full Text] [Related]  

  • 6. [How to use the health information systems].
    Fabrégas B
    Soins; 1999 Sep; (638):36-9. PubMed ID: 10876594
    [No Abstract]   [Full Text] [Related]  

  • 7. You can drown in too much security.
    Baughman K
    Behav Healthc; 2008 Aug; 28(8):31-2. PubMed ID: 18795734
    [No Abstract]   [Full Text] [Related]  

  • 8. Security. Safety first.
    Whitfield L
    Health Serv J; 2008 Apr; Suppl():5, 7. PubMed ID: 18655295
    [No Abstract]   [Full Text] [Related]  

  • 9. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary.
    Lukes S
    Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069
    [No Abstract]   [Full Text] [Related]  

  • 10. Use of the ISO/IEC 17799 framework in healthcare information security management.
    Posthumus L
    Stud Health Technol Inform; 2004; 103():447-52. PubMed ID: 15747954
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Why we need standardisation in Healthcare security.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():7-12; discussion 229-37. PubMed ID: 15458160
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The HIPAA security rule. The final version provides a flexible framework for achieving compliance.
    Hirsch R
    Healthc Inform; 2003 Apr; 20(4):56, 58. PubMed ID: 18800468
    [No Abstract]   [Full Text] [Related]  

  • 13. IT security training in the Healthcare environment.
    Patel A
    Stud Health Technol Inform; 2002; 69():221-8; discussion 229-37. PubMed ID: 15458168
    [No Abstract]   [Full Text] [Related]  

  • 14. Standard guide for EDI (HL7) communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():153-81; discussion 229-37. PubMed ID: 15458166
    [No Abstract]   [Full Text] [Related]  

  • 15. Standard guide for implementing HL7 communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():183-219; discussion 229-37. PubMed ID: 15458167
    [No Abstract]   [Full Text] [Related]  

  • 16. Informatics in the service of health, a look to the future.
    Moehr JR
    Methods Inf Med; 1998 Jun; 37(2):165-70. PubMed ID: 9656659
    [TBL] [Abstract][Full Text] [Related]  

  • 17. [Warning for flood--threatening increase of the quantity of information].
    Pedersen J
    Tidsskr Nor Laegeforen; 2003 Aug; 123(15):2098. PubMed ID: 12934145
    [No Abstract]   [Full Text] [Related]  

  • 18. GAO rebukes HHS on milestones. Agency says privacy, security must be addressed timely.
    Conn J
    Mod Healthc; 2007 Jun; 37(26):46. PubMed ID: 17622047
    [No Abstract]   [Full Text] [Related]  

  • 19. Confronting internal data threats.
    Huyghe J
    Infocare; 1997; ():72. PubMed ID: 10167728
    [No Abstract]   [Full Text] [Related]  

  • 20. Organizational repertoires and rites in health information security.
    Cooper T; Collmann J; Neidermeier H
    Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.