These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

152 related articles for article (PubMed ID: 23505950)

  • 1. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem.
    Degaspari J
    Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950
    [No Abstract]   [Full Text] [Related]  

  • 2. 5 steps to prevent a data breach in your practice.
    Rey J
    Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
    [No Abstract]   [Full Text] [Related]  

  • 3. Time for an update: Health data breaches cited in GAO's call for fix.
    Conn J
    Mod Healthc; 2012 Aug; 42(32):8-9. PubMed ID: 22953491
    [No Abstract]   [Full Text] [Related]  

  • 4. Taking aim at medical identity theft. Document security key element to comply with government regulations.
    Raymond C
    J Med Pract Manage; 2010; 25(6):383-5. PubMed ID: 20695253
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Hackers, breaches and other threats to electronic records.
    Gupta A
    Health Data Manag; 2011 Sep; 19(9):54-5. PubMed ID: 21905520
    [No Abstract]   [Full Text] [Related]  

  • 6. Trends and characteristics of protected health information breaches in the United States.
    Hossain MM; Hong YA
    AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Seizing the real opportunity presented by data breaches.
    Free J
    Health Manag Technol; 2015 Mar; 36(3):2. PubMed ID: 26204721
    [No Abstract]   [Full Text] [Related]  

  • 8. How safe is your patient data?
    Lowes R
    Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
    [No Abstract]   [Full Text] [Related]  

  • 9. Unraveling data breaches.
    Goedert J
    Health Data Manag; 2011 Aug; 19(8):34-8, 40. PubMed ID: 21877637
    [No Abstract]   [Full Text] [Related]  

  • 10. Protecting health data in a troubling time. Understand who and what you're up against.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609
    [No Abstract]   [Full Text] [Related]  

  • 11. A new approach to IT security.
    Kruger D; Anschutz T
    Healthc Financ Manage; 2013 Feb; 67(2):104-6, 108. PubMed ID: 23413677
    [TBL] [Abstract][Full Text] [Related]  

  • 12. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.
    Becker C
    Mod Healthc; 2006 Feb; 36(8):6-7, 16, 1. PubMed ID: 16515213
    [TBL] [Abstract][Full Text] [Related]  

  • 14. 2008 HIMSS analytics report: security of patient data.
    HIMSS
    J Healthc Prot Manage; 2008; 24(2):14-26. PubMed ID: 18800655
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security, durability & portable computers.
    Miller D
    Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
    [No Abstract]   [Full Text] [Related]  

  • 16. Cyberthreats: A primer for healthcare professionals.
    Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR
    Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records.
    Barrows RC; Clayton PD
    Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Keeping data safe. The threat of security breaches can fuel preventive strategies.
    Rogoski RR
    Healthc Inform; 2014 Mar; 31(2):37-9. PubMed ID: 24812992
    [No Abstract]   [Full Text] [Related]  

  • 19. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job.
    Conn J
    Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729
    [No Abstract]   [Full Text] [Related]  

  • 20. Medical identity theft and telemedicine security.
    Terry M
    Telemed J E Health; 2009 Dec; 15(10):928-32. PubMed ID: 19908998
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 8.