These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

98 related articles for article (PubMed ID: 23923275)

  • 1. Proceed with caution. I.T. security concerns, a host of other issues have kept mental health data in the shadows.
    Gardner E
    Health Data Manag; 2013 Jul; 21(7):20-5. PubMed ID: 23923275
    [No Abstract]   [Full Text] [Related]  

  • 2. Balancing access and security.
    Berkowitz L; Brostoff G
    Behav Healthc; 2007 Dec; 27(12):30-2. PubMed ID: 18429590
    [No Abstract]   [Full Text] [Related]  

  • 3. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 4. Patients' access to their electronic record: proceed with caution.
    Vautrey R
    Br J Gen Pract; 2013 Jun; 63(611):327-8. PubMed ID: 23735404
    [No Abstract]   [Full Text] [Related]  

  • 5. Privacy, security and access with sensitive health information.
    Croll P
    Stud Health Technol Inform; 2010; 151():167-75. PubMed ID: 20407159
    [TBL] [Abstract][Full Text] [Related]  

  • 6. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 7. EHR trends and challenges. MRI's survey finds workflow and record access among top IT-manager concerns.
    Blair J
    Healthc Inform; 2003 Nov; 20(11):56-8. PubMed ID: 14649092
    [No Abstract]   [Full Text] [Related]  

  • 8. Privacy warning. GAO finds fault with HHS' IT efforts.
    DoBias M
    Mod Healthc; 2007 Feb; 37(6):8-9. PubMed ID: 17315294
    [No Abstract]   [Full Text] [Related]  

  • 9. How to protect valuable patient data. Encryption, passwords essential lines of defense, experts say.
    McBride M
    Med Econ; 2012 Sep; 89(17):42-4. PubMed ID: 23488397
    [No Abstract]   [Full Text] [Related]  

  • 10. The evolution of Health Information Systems, security in practice and open issues.
    Bakker AR
    Stud Health Technol Inform; 2003; 96():15-20. PubMed ID: 15061520
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Health data security: a new priority.
    Siwicki B
    Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Final HIPAA security regulations: a review.
    Garner JC
    Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Give payers EHR data: report. Privacy, security advocates oppose fraud fighting' plan.
    Conn J
    Mod Healthc; 2007 Aug; 37(33):14. PubMed ID: 17855947
    [No Abstract]   [Full Text] [Related]  

  • 14. Security risk! Accessing and sharing data.
    Gallagher LA
    Nurs Manage; 2013 Mar; 44(3):22-7. PubMed ID: 23435105
    [No Abstract]   [Full Text] [Related]  

  • 15. Behavioral healthcare computer systems and the law: the problem of privacy.
    Brannigan VM
    Behav Healthc Tomorrow; 1994; 3(1):57-61. PubMed ID: 10142500
    [No Abstract]   [Full Text] [Related]  

  • 16. Privilege management and access control in Shared Care IS and EHR.
    Blobel B; Nordberg R
    Stud Health Technol Inform; 2003; 95():251-6. PubMed ID: 14663995
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Provider recommendations for safeguarding patient confidentiality.
    Webman D
    Behav Healthc Tomorrow; 1994; 3(1):32, 37-8. PubMed ID: 10142495
    [No Abstract]   [Full Text] [Related]  

  • 18. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.
    King T; Brankovic L; Gillard P
    Int J Med Inform; 2012 Apr; 81(4):279-89. PubMed ID: 22306206
    [TBL] [Abstract][Full Text] [Related]  

  • 19. The threat from within. Implementing secure access controls helps organizations protect sensitive patient information from insider threat.
    Libenson E
    Healthc Inform; 2007 Jul; 24(7):54. PubMed ID: 17695828
    [No Abstract]   [Full Text] [Related]  

  • 20. Security requirements in EHR systems and archives.
    Ruotsalainen P
    Stud Health Technol Inform; 2004; 103():453-8. PubMed ID: 15747955
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.