These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

229 related articles for article (PubMed ID: 17990649)

  • 1. Inside job. When it comes to patient information, the importance of maintaining proper data security can never be overestimated.
    Grey M
    Healthc Inform; 2007 Oct; 24(10):50-4, 56. PubMed ID: 17990649
    [No Abstract]   [Full Text] [Related]  

  • 2. The threat from within. Implementing secure access controls helps organizations protect sensitive patient information from insider threat.
    Libenson E
    Healthc Inform; 2007 Jul; 24(7):54. PubMed ID: 17695828
    [No Abstract]   [Full Text] [Related]  

  • 3. Business process design. Securing computerized health information files.
    Barthel CW; Kalina CM; Fitko J
    AAOHN J; 1998 Dec; 46(12):581-6; quiz 587-8. PubMed ID: 10025251
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Data security.
    Morrissey J
    Mod Healthc; 1996 Sep; 26(40):32-3, 35-8, 40. PubMed ID: 10161903
    [No Abstract]   [Full Text] [Related]  

  • 5. Electronic medical records, chapter 2: the obstacles.
    Pentecost MJ
    J Am Coll Radiol; 2006 Mar; 3(3):167-8. PubMed ID: 17412033
    [No Abstract]   [Full Text] [Related]  

  • 6. Securing the transmission and storage of medical information.
    Sardinas JL; Muldoon JD
    Comput Nurs; 1998; 16(3):162-8; quiz 169-70. PubMed ID: 9611868
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Data security.
    Tabar P
    Healthc Inform; 2000 Feb; 17(2):50-2. PubMed ID: 11321693
    [No Abstract]   [Full Text] [Related]  

  • 8. Five steps to keep EMRs private. Simple ways exist for implementing technical safeguards to mitigate security risks, while becoming compliant and maintaining current levels of service.
    Bhatnagar S
    Health Manag Technol; 2010 Apr; 31(4):32. PubMed ID: 20419959
    [No Abstract]   [Full Text] [Related]  

  • 9. When once isn't enough.
    Khulusi B
    Health Manag Technol; 2001 Oct; 22(10):38. PubMed ID: 11584700
    [No Abstract]   [Full Text] [Related]  

  • 10. Protecting your paperless medical record system requires addressing risks.
    Sokol PE
    QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
    [No Abstract]   [Full Text] [Related]  

  • 11. Benefits and obstacles for hospital executives of the electronic medical record.
    Gleser M
    Healthc Inf Manage; 1993; 7(1):32-4. PubMed ID: 10124581
    [No Abstract]   [Full Text] [Related]  

  • 12. Putting a lock on records.
    Fuller SR
    Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
    [No Abstract]   [Full Text] [Related]  

  • 13. Patient identification: the Achilles heel of computerized health information.
    Gabler J
    Health Manag Technol; 1996 Mar; 17(3):98, 91. PubMed ID: 10156420
    [No Abstract]   [Full Text] [Related]  

  • 14. Left unresolved, privacy issues will scuttle any attempts at HIE. As the desire to exchange health information between institutions grows, privacy issues must be addressed.
    Raths D
    Healthc Inform; 2008 Feb; 25(2):66, 68. PubMed ID: 18320883
    [No Abstract]   [Full Text] [Related]  

  • 15. Health information privacy: why trust matters.
    Mancilla D; Biedermann S
    Health Care Manag (Frederick); 2009; 28(1):71-4. PubMed ID: 19225339
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Protecting patient data.
    Frawley K
    Qual Lett Healthc Lead; 1998 Jun; 10(6):10-3. PubMed ID: 10180625
    [No Abstract]   [Full Text] [Related]  

  • 17. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job.
    Conn J
    Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729
    [No Abstract]   [Full Text] [Related]  

  • 18. Information security at the Fifteenth Medical Group.
    Yeager RA; Kindle M
    Healthc Inf Manage; 1998; 12(1):39-50. PubMed ID: 10179266
    [No Abstract]   [Full Text] [Related]  

  • 19. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
    Aikins R; Anderson J
    Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
    [No Abstract]   [Full Text] [Related]  

  • 20. Protecting electronic data.
    Allen M
    Nurs Times; 2006 Jul 11-17; 102(28):20-1. PubMed ID: 16869215
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 12.