These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

154 related articles for article (PubMed ID: 26199974)

  • 1. ROUND TABLE: HOW TO PROTECT PATIENT DATA. A panel of hospital security experts sheds light on the biggest threats to patient privacy and what they're doing to safeguard medical records.
    Kass EM; Skvarenina M; Syed H; Mertz J; Houston J; Dunn G; Rhodes R; Hughes K
    Health Data Manag; 2015 Apr; 23(4):30, 33-4, 36 passim. PubMed ID: 26199974
    [No Abstract]   [Full Text] [Related]  

  • 2. Security of electronic medical information and patient privacy: what you need to know.
    Andriole KP
    J Am Coll Radiol; 2014 Dec; 11(12 Pt B):1212-6. PubMed ID: 25467897
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A hospital imperative: enterprisewide IT security.
    Page D
    Hosp Health Netw; 2010 Dec; 84(12):45-6. PubMed ID: 21268504
    [No Abstract]   [Full Text] [Related]  

  • 4. Preserving confidentiality and security of patient health care information.
    Williamson JB
    Top Health Inf Manage; 1996 May; 16(4):56-60. PubMed ID: 10157662
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The privacy and security of occupational health records.
    Burton B; Cothran C; Davis N; Dooling J; Dunn R; Jensen J; Odia G; Rose AD; Twiggs M
    J AHIMA; 2013 Apr; 84(4):52-6. PubMed ID: 23781608
    [No Abstract]   [Full Text] [Related]  

  • 6. Evaluation of a Cyber Security System for Hospital Network.
    Faysel MA
    Stud Health Technol Inform; 2015; 216():915. PubMed ID: 26262217
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Network, privacy revisited. Blumenthal eyes national policy for IT security.
    Conn J
    Mod Healthc; 2009 Nov; 39(44):12. PubMed ID: 20135784
    [No Abstract]   [Full Text] [Related]  

  • 8. Proctecting patient medical data. The C-suite's role.
    Birk S
    Healthc Exec; 2013; 28(5):20-2, 24, 26 passim. PubMed ID: 24143839
    [No Abstract]   [Full Text] [Related]  

  • 9. Balancing access to patient data/security.
    Hoppszallern S
    Hosp Health Netw; 2013 Feb; 87(2):24. PubMed ID: 23513668
    [No Abstract]   [Full Text] [Related]  

  • 10. Balancing the need for big data and patient data privacy--an IT infrastructure for a decentralized emergency care research database.
    Ahlbrandt J; Brammen D; Majeed RW; Lefering R; Semler SC; Thun S; Walcher F; Röhrig R
    Stud Health Technol Inform; 2014; 205():750-4. PubMed ID: 25160287
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Patient information, consents and privacy protection scheme for an information system dedicated to pervasive developmental disorders.
    Ben Said M; Robel L; Messiaen C; Craus Y; Jais JP; Golse B; Landais P
    Stud Health Technol Inform; 2014; 205():755-9. PubMed ID: 25160288
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Is the biggest security threat to medical information simply a lack of understanding?
    Williams PA
    Stud Health Technol Inform; 2011; 168():179-87. PubMed ID: 21893927
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Integrating the hospital information system (HIS) into the Austrian electronic health record ("ELGA") using the example of the health care facility "Breitenstein".
    Bonstingl M
    Stud Health Technol Inform; 2014; 198():203-10. PubMed ID: 24825704
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Data security: an update.
    Hosp Secur Saf Manage; 1997 May; 18(1):5-8. PubMed ID: 10167758
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Electronic health systems: challenges faced by hospital-based providers.
    Agno CF; Guo KL
    Health Care Manag (Frederick); 2013; 32(3):246-52. PubMed ID: 23903942
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Implementing security in computer based patient records clinical experiences.
    Iversen KR; Heimly V; Lundgren TI
    Medinfo; 1995; 8 Pt 1():657-60. PubMed ID: 8591292
    [TBL] [Abstract][Full Text] [Related]  

  • 18. EMRlog method for computer security for electronic medical records with logic and data mining.
    Martínez Monterrubio SM; Frausto Solis J; Monroy Borja R
    Biomed Res Int; 2015; 2015():542016. PubMed ID: 26495300
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security, Privacy, and Safety Standards in Canadian Healthcare.
    Gillis G
    J AHIMA; 2015 Apr; 86(4):44-6. PubMed ID: 26930790
    [No Abstract]   [Full Text] [Related]  

  • 20. Advances and current state of the security and privacy in electronic health records: survey from a social perspective.
    Tejero A; de la Torre I
    J Med Syst; 2012 Oct; 36(5):3019-27. PubMed ID: 21947856
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.