BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

274 related articles for article (PubMed ID: 16596845)

  • 1. Eight steps to integrating security standards.
    Happ J;
    Biomed Instrum Technol; 2006; Suppl():22-4. PubMed ID: 16596845
    [No Abstract]   [Full Text] [Related]  

  • 2. Managing security risks with 80001.
    Mankovich N; Fitzgerald B
    Biomed Instrum Technol; 2011; Suppl():27-32. PubMed ID: 21992042
    [No Abstract]   [Full Text] [Related]  

  • 3. Practice brief. Health informatics standards and information transfer: exploring the HIM role. American Health Information Management Association.
    American Health Information Management Association.
    J AHIMA; 2001 Jan; 72(1):68A-68D. PubMed ID: 11211403
    [No Abstract]   [Full Text] [Related]  

  • 4. How secure is secure?
    Fotsch E
    Healthc Financ Manage; 1996 Nov; 50(11):30, 32. PubMed ID: 10162344
    [No Abstract]   [Full Text] [Related]  

  • 5. Health IT Czar focuses on interoperability.
    Brailer DJ
    Biomed Instrum Technol; 2006; Suppl():6-7. PubMed ID: 16596841
    [No Abstract]   [Full Text] [Related]  

  • 6. Clinical system security: interim guidelines.
    Anderson R
    BMJ; 1996 Jan; 312(7023):109-11. PubMed ID: 8555896
    [No Abstract]   [Full Text] [Related]  

  • 7. New standards focus on information security.
    Hanken MA
    J AHIMA; 1998 Mar; 69(3):45. PubMed ID: 10177482
    [No Abstract]   [Full Text] [Related]  

  • 8. Keeping records private.
    Cross M
    Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
    [No Abstract]   [Full Text] [Related]  

  • 9. Data security: how much is enough?
    Anderson HJ
    Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
    [No Abstract]   [Full Text] [Related]  

  • 10. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Understanding HIPAA transactions and code sets.
    Rode D
    J AHIMA; 2001 Jan; 72(1):26-32; quiz 33-4. PubMed ID: 11211394
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Protecting individual privacy: a pothole on the information superhighway?
    Patrikas EO
    Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Practice brief. Issue: E-mail security. American Health Information Management Association.
    Rhodes HB
    J AHIMA; 1997 Jun; 68(6):3 p. following 52; quiz 55-6. PubMed ID: 10167800
    [No Abstract]   [Full Text] [Related]  

  • 14. FDA issues reminder on cybersecurity for networked medical devices.
    Biomed Instrum Technol; 2010; Suppl():4. PubMed ID: 20225707
    [No Abstract]   [Full Text] [Related]  

  • 15. Implementing HIPAA security standards--are you ready?
    Fuller S
    J AHIMA; 1999 Oct; 70(9):36-40, 42-4, quiz 47-8. PubMed ID: 10977404
    [No Abstract]   [Full Text] [Related]  

  • 16. How healthy are firewalls? Rating their resistance.
    Holzbaur H
    Healthc Inform; 1997 Jun; 14(6):30-2, 34, 36 passim. PubMed ID: 10168128
    [No Abstract]   [Full Text] [Related]  

  • 17. Safe and secure. Interview by Bill Siwicki.
    Baker DB
    Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
    [No Abstract]   [Full Text] [Related]  

  • 18. Keeping data secure: protected health information and medical equipment.
    Swim R
    Biomed Instrum Technol; 2012; 46(4):278-80. PubMed ID: 22839985
    [No Abstract]   [Full Text] [Related]  

  • 19. Defending your data: minimizing risks in a networked environment.
    McKenzie DJ
    J AHIMA; 1996 Sep; 67(8):62-4; quiz 65-6. PubMed ID: 10159918
    [No Abstract]   [Full Text] [Related]  

  • 20. The impact of technology on the confidentiality of health information.
    White AW; Wager KA; Lee FW
    Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.