BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

167 related articles for article (PubMed ID: 20841770)

  • 1. Access control in healthcare: the methodology from legislation to practice.
    Ferreira A; Correia R; Chadwick D; Antunes L
    Stud Health Technol Inform; 2010; 160(Pt 1):666-70. PubMed ID: 20841770
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Access control: how can it improve patients' healthcare?
    Ferreira A; Cruz-Correia R; Antunes L; Chadwick D
    Stud Health Technol Inform; 2007; 127():65-76. PubMed ID: 17901600
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Meeting EHR security requirements: SeAAS approach.
    Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
    Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Risk assessment of integrated electronic health records.
    Bjornsson BT; Sigurdardottir G; Stefansson SO
    Stud Health Technol Inform; 2010; 155():78-84. PubMed ID: 20543313
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 6. [ELGA--the electronic health record in the light of data protection and data security].
    Ströher A; Honekamp W
    Wien Med Wochenschr; 2011 Jul; 161(13-14):341-6. PubMed ID: 21858632
    [TBL] [Abstract][Full Text] [Related]  

  • 7. [Security services: an overview of the French legislation on cryptography].
    Quantin C; Kerkri E; Allaert FA; Bouzelat H; Dusserre L
    Rev Epidemiol Sante Publique; 2000 Jan; 48(1):81-7. PubMed ID: 10740087
    [TBL] [Abstract][Full Text] [Related]  

  • 8. The realities of HIPAA and how to incorporate them into your practice.
    Farrell K
    Mich Med; 2001; 100(4):12-5. PubMed ID: 11478079
    [No Abstract]   [Full Text] [Related]  

  • 9. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.
    Chhanabhai P; Holt A
    MedGenMed; 2007 Jan; 9(1):8. PubMed ID: 17435617
    [TBL] [Abstract][Full Text] [Related]  

  • 10. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 11. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.
    Chasteen JE; Murphy G; Forrey A; Heid D
    J Contemp Dent Pract; 2004 Aug; 5(3):158-67. PubMed ID: 15318267
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Access control mechanisms for distributed healthcare environments.
    Sergl-Pommerening M
    Stud Health Technol Inform; 2004; 105():210-21. PubMed ID: 15718610
    [TBL] [Abstract][Full Text] [Related]  

  • 13. OSMA launches physician trusted HIE for meaningful use!
    Yeaman B
    J Okla State Med Assoc; 2011; 104(11-12):431. PubMed ID: 22413418
    [No Abstract]   [Full Text] [Related]  

  • 14. Health Information Security & Privacy Collaboration (HISPC) Provider Education Toolkit (PET).
    Conner MH; Cole L; Krebs CA
    Ky Nurse; 2010; 58(1):8. PubMed ID: 20128210
    [No Abstract]   [Full Text] [Related]  

  • 15. Implementing context and team based access control in healthcare intranets.
    Georgiadis CK; Mavridis IK; Nikolakopoulou G; Pangalos GI
    Med Inform Internet Med; 2002 Sep; 27(3):185-201. PubMed ID: 12507264
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Is the biggest security threat to medical information simply a lack of understanding?
    Williams PA
    Stud Health Technol Inform; 2011; 168():179-87. PubMed ID: 21893927
    [TBL] [Abstract][Full Text] [Related]  

  • 17. HIPAA--a real world perspective.
    Nulan C
    Radiol Manage; 2001; 23(2):29-37; quiz 38-40. PubMed ID: 11302064
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Context-aware access control for pervasive access to process-based healthcare systems.
    Koufi V; Vassilacopoulos G
    Stud Health Technol Inform; 2008; 136():679-84. PubMed ID: 18487810
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Breaches of health information: are electronic records different from paper records?
    Sade RM
    J Clin Ethics; 2010; 21(1):39-41. PubMed ID: 20465074
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security requirements for electronic patients records: the Norwegian view.
    Iversen KR
    Int J Biomed Comput; 1994 Feb; 35 Suppl():51-6. PubMed ID: 8188422
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.