BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

164 related articles for article (PubMed ID: 23513668)

  • 1. Balancing access to patient data/security.
    Hoppszallern S
    Hosp Health Netw; 2013 Feb; 87(2):24. PubMed ID: 23513668
    [No Abstract]   [Full Text] [Related]  

  • 2. How to prevent cyber-virus damage to your practice.
    Rashbaum KN
    Med Econ; 2012 Feb; 89(4):58-60. PubMed ID: 24417011
    [No Abstract]   [Full Text] [Related]  

  • 3. e-Consent design and implementation issues for health information managers.
    Grain H
    Health Inf Manag; 2004; 33(3):84-8. PubMed ID: 18490785
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Examining the impact of electronic care records on confidentiality and nursing practice.
    Moore R; Stonham G
    Nurs Times; 2010 Apr 13-19; 106(14):16-8. PubMed ID: 20446631
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Risk assessment of integrated electronic health records.
    Bjornsson BT; Sigurdardottir G; Stefansson SO
    Stud Health Technol Inform; 2010; 155():78-84. PubMed ID: 20543313
    [TBL] [Abstract][Full Text] [Related]  

  • 6. ROUND TABLE: HOW TO PROTECT PATIENT DATA. A panel of hospital security experts sheds light on the biggest threats to patient privacy and what they're doing to safeguard medical records.
    Kass EM; Skvarenina M; Syed H; Mertz J; Houston J; Dunn G; Rhodes R; Hughes K
    Health Data Manag; 2015 Apr; 23(4):30, 33-4, 36 passim. PubMed ID: 26199974
    [No Abstract]   [Full Text] [Related]  

  • 7. Strategic Alignment: The Driving Force for Information Governance.
    Washington L
    J AHIMA; 2017 Jan; 88(1):40-3. PubMed ID: 29400937
    [No Abstract]   [Full Text] [Related]  

  • 8. The privacy and security of occupational health records.
    Burton B; Cothran C; Davis N; Dooling J; Dunn R; Jensen J; Odia G; Rose AD; Twiggs M
    J AHIMA; 2013 Apr; 84(4):52-6. PubMed ID: 23781608
    [No Abstract]   [Full Text] [Related]  

  • 9. Meeting EHR security requirements: SeAAS approach.
    Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
    Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A hospital imperative: enterprisewide IT security.
    Page D
    Hosp Health Netw; 2010 Dec; 84(12):45-6. PubMed ID: 21268504
    [No Abstract]   [Full Text] [Related]  

  • 11. Leveraging the cloud for electronic health record access.
    Coats B; Acharya S
    Perspect Health Inf Manag; 2014; 11(Winter):1g. PubMed ID: 24808814
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Proctecting patient medical data. The C-suite's role.
    Birk S
    Healthc Exec; 2013; 28(5):20-2, 24, 26 passim. PubMed ID: 24143839
    [No Abstract]   [Full Text] [Related]  

  • 13. Protecting health data in a troubling time. Understand who and what you're up against.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609
    [No Abstract]   [Full Text] [Related]  

  • 14. Balancing access and security.
    Berkowitz L; Brostoff G
    Behav Healthc; 2007 Dec; 27(12):30-2. PubMed ID: 18429590
    [No Abstract]   [Full Text] [Related]  

  • 15. Advances and current state of the security and privacy in electronic health records: survey from a social perspective.
    Tejero A; de la Torre I
    J Med Syst; 2012 Oct; 36(5):3019-27. PubMed ID: 21947856
    [TBL] [Abstract][Full Text] [Related]  

  • 16. 2013 most wired.
    Weinstock M
    Hosp Health Netw; 2013 Jul; 87(7):26-37. PubMed ID: 23961586
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Electronic health records: privacy, confidentiality, and security.
    Harman LB; Flite CA; Bond K
    Virtual Mentor; 2012 Sep; 14(9):712-9. PubMed ID: 23351350
    [No Abstract]   [Full Text] [Related]  

  • 18. Protecting patient information. Much work remains to be done on the data security front.
    Degaspari J
    Healthc Inform; 2011 Mar; 28(3):32-3. PubMed ID: 21446261
    [No Abstract]   [Full Text] [Related]  

  • 19. Incentivizing data donation.
    Nat Biotechnol; 2015 Sep; 33(9):885. PubMed ID: 26348938
    [No Abstract]   [Full Text] [Related]  

  • 20. EMRlog method for computer security for electronic medical records with logic and data mining.
    Martínez Monterrubio SM; Frausto Solis J; Monroy Borja R
    Biomed Res Int; 2015; 2015():542016. PubMed ID: 26495300
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.