These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

89 related articles for article (PubMed ID: 26357770)

  • 1. The only way to control BYOD is to embrace it.
    Cidon A
    Health Manag Technol; 2015 Apr; 36(4):12-3. PubMed ID: 26357770
    [No Abstract]   [Full Text] [Related]  

  • 2. Real-world BYOD security BYOD security strategie from two distinct healthcare organizations.
    Free J
    Health Manag Technol; 2014 Mar; 35(3):14-7. PubMed ID: 24734389
    [No Abstract]   [Full Text] [Related]  

  • 3. Bring-your-own-device in medical schools and healthcare facilities: A review of the literature.
    Kadimo K; Kebaetse MB; Ketshogileng D; Seru LE; Sebina KB; Kovarik C; Balotlegi K
    Int J Med Inform; 2018 Nov; 119():94-102. PubMed ID: 30342692
    [TBL] [Abstract][Full Text] [Related]  

  • 4. From COWs to BYOD.
    Kabachinski J
    Biomed Instrum Technol; 2013; 47(3):254-8. PubMed ID: 23692113
    [No Abstract]   [Full Text] [Related]  

  • 5. Left to their own devices how healthcare organizations are tackling the BYOD trend.
    Williams J
    Biomed Instrum Technol; 2014; 48(5):327-39. PubMed ID: 25244198
    [No Abstract]   [Full Text] [Related]  

  • 6. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature.
    Wani TA; Mendoza A; Gray K
    JMIR Mhealth Uhealth; 2020 Jun; 8(6):e18175. PubMed ID: 32554388
    [TBL] [Abstract][Full Text] [Related]  

  • 7. They keep health facilities humming. Interview by Jerry Laws.
    Davidson G
    Occup Health Saf; 2010 Jan; 79(1):32-5. PubMed ID: 20112785
    [No Abstract]   [Full Text] [Related]  

  • 8. Bring your own device or bring your own disruption? How to handle the mulitude of challenges.
    Hughes J
    Health Manag Technol; 2015 Apr; 36(4):14-5. PubMed ID: 26357771
    [No Abstract]   [Full Text] [Related]  

  • 9. BYOD policies address personal issues.
    Hosp Case Manag; 2013 Mar; 21(3):42-3. PubMed ID: 23484227
    [No Abstract]   [Full Text] [Related]  

  • 10. CREATING YOUR PRACTICE'S 'BRING YOUR OWN DEVICE' POLICY.
    Rieders L; Monroy M
    Med Econ; 2014 Oct; 91(20):44-5. PubMed ID: 26242083
    [No Abstract]   [Full Text] [Related]  

  • 11. Mobile device management software: the answer to BYOD?
    Goedert J
    Health Data Manag; 2013 Feb; 21(2):32, 34, 36 passim. PubMed ID: 23469480
    [No Abstract]   [Full Text] [Related]  

  • 12. Mobile tech gets security check.
    Schuerenberg BK
    Health Data Manag; 2003 Nov; 11(11):54-7. PubMed ID: 14619104
    [No Abstract]   [Full Text] [Related]  

  • 13. Lack of built-in security shouldn't inhibit PDA use.
    Goodman T
    Health Manag Technol; 2003 Nov; 24(11):58, 57. PubMed ID: 14608717
    [No Abstract]   [Full Text] [Related]  

  • 14. Mobility matters: BYOD - proceed with caution.
    Kehoe B
    Hosp Health Netw; 2013 Jun; 87(6):17. PubMed ID: 23885476
    [No Abstract]   [Full Text] [Related]  

  • 15. User-centric IT: it's about the user...then the device.
    Rice M
    Health Manag Technol; 2013 Feb; 34(2):8. PubMed ID: 23469467
    [No Abstract]   [Full Text] [Related]  

  • 16. Perceived security of BYOD devices in medical institutions.
    Alexandrou A; Chen LC
    Int J Med Inform; 2022 Dec; 168():104882. PubMed ID: 36242855
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Challenges and benefits in a mobile medical world: Institutions should create a set of BYOD guidelines that foster mobile device usage.
    Meneghetti A
    Health Manag Technol; 2013 Feb; 34(2):6-7. PubMed ID: 23469466
    [No Abstract]   [Full Text] [Related]  

  • 18. Judgment call.
    Health Devices; 2012 Oct; 41(10):314-29. PubMed ID: 23444672
    [No Abstract]   [Full Text] [Related]  

  • 19. The need for a security policy in health care institutions.
    Katsikas SK; Gritzalis DA
    Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Information security strategies for healthcare: part II.
    Artz NH
    J Healthc Inf Manag; 2004; 18(3):12-3. PubMed ID: 15301410
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 5.