BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

232 related articles for article (PubMed ID: 18693862)

  • 1. A security architecture for health information networks.
    Kailar R; Muralidhar V
    AMIA Annu Symp Proc; 2007 Oct; 2007():379-83. PubMed ID: 18693862
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Framework model and principles for trusted information sharing in pervasive health.
    Ruotsalainen P; Blobel B; Nykänen P; Seppälä A; Sorvari H
    Stud Health Technol Inform; 2011; 169():497-501. PubMed ID: 21893799
    [TBL] [Abstract][Full Text] [Related]  

  • 3. How secure is the Internet for healthcare applications?
    Campbell LA
    Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Safe and secure. Interview by Bill Siwicki.
    Baker DB
    Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
    [No Abstract]   [Full Text] [Related]  

  • 5. Protecting individual privacy: a pothole on the information superhighway?
    Patrikas EO
    Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
    [TBL] [Abstract][Full Text] [Related]  

  • 6. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 8. The impact of technology on the confidentiality of health information.
    White AW; Wager KA; Lee FW
    Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Health care, CHIN (community health information network) technology, and privacy.
    Brown L; Brown D
    Healthc Inf Manage; 1995; 9(2):35-42. PubMed ID: 10143327
    [No Abstract]   [Full Text] [Related]  

  • 10. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 11. New standards focus on information security.
    Hanken MA
    J AHIMA; 1998 Mar; 69(3):45. PubMed ID: 10177482
    [No Abstract]   [Full Text] [Related]  

  • 12. Formal policies for flexible EHR security.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Protecting patient privacy and data quality in a community health information network.
    McKenzie DJ
    J Healthc Qual; 1996; 18(6):17-21. PubMed ID: 10162085
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The official position of American Health Information Management Association. Issue: Confidential health information and the Internet.
    J AHIMA; 1998 Jan; 69(1):suppl 2 p. following 8. PubMed ID: 10174716
    [No Abstract]   [Full Text] [Related]  

  • 15. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.
    Marshall GF; Gillespie W; Fox SJ
    J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The adoption of IT security standards in a healthcare environment.
    Gomes R; Lapão LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Provider recommendations for safeguarding patient confidentiality.
    Webman D
    Behav Healthc Tomorrow; 1994; 3(1):32, 37-8. PubMed ID: 10142495
    [No Abstract]   [Full Text] [Related]  

  • 18. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Balancing individual and societal needs: micro- vs. macro-ethics.
    Gulbinat W
    Behav Healthc Tomorrow; 1994; 3(1):32, 39-41. PubMed ID: 10142496
    [No Abstract]   [Full Text] [Related]  

  • 19. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.