These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

135 related articles for article (PubMed ID: 28953575)

  • 1. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.
    Zandona DJ; Thompson JM
    Health Care Manag (Frederick); 2017; 36(4):364-371. PubMed ID: 28953575
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security practices and regulatory compliance in the healthcare industry.
    Kwon J; Johnson ME
    J Am Med Inform Assoc; 2013 Jan; 20(1):44-51. PubMed ID: 22955497
    [TBL] [Abstract][Full Text] [Related]  

  • 3. HIPAA--a real world perspective.
    Nulan C
    Radiol Manage; 2001; 23(2):29-37; quiz 38-40. PubMed ID: 11302064
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 5. HIPAA security: compliance in radiology--an academic radiology department's plan contrasted with a small private practice.
    Haramati N
    J Healthc Inf Manag; 2000; 14(4):65-82. PubMed ID: 11190264
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Interpreting international governance standards for health IT use within general medical practice.
    Mahncke RJ; Williams PA
    Stud Health Technol Inform; 2014; 204():86-91. PubMed ID: 25087532
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Managing Security Risk: Modeling the Root Causes of Data Breaches.
    Dolezel D; McLeod A
    Health Care Manag (Frederick); 2019; 38(4):322-330. PubMed ID: 31663871
    [TBL] [Abstract][Full Text] [Related]  

  • 8. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Indirect effect of management support on users' compliance behaviour towards information security policies.
    Humaidi N; Balakrishnan V
    Health Inf Manag; 2018 Jan; 47(1):17-27. PubMed ID: 28537207
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Strategic Alignment: The Driving Force for Information Governance.
    Washington L
    J AHIMA; 2017 Jan; 88(1):40-3. PubMed ID: 29400937
    [No Abstract]   [Full Text] [Related]  

  • 12. The SEISMED High Level Security Policy for Health Care.
    Katsikas SK
    Stud Health Technol Inform; 1996; 27():125-30. PubMed ID: 10163727
    [TBL] [Abstract][Full Text] [Related]  

  • 13. AHIMA comments on certification proposed rule.
    Dimick C
    J AHIMA; 2012 Jun; 83(6):60-1. PubMed ID: 22741512
    [No Abstract]   [Full Text] [Related]  

  • 14. Patient safety and privacy in the electronic health information era: medical and beyond.
    Civelek AC
    Clin Biochem; 2009 Mar; 42(4-5):298-9. PubMed ID: 19863928
    [No Abstract]   [Full Text] [Related]  

  • 15. Data breach remediation efforts and their implications for hospital quality.
    Choi SJ; Johnson ME; Lehmann CU
    Health Serv Res; 2019 Oct; 54(5):971-980. PubMed ID: 31506956
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.
    Hepp SL; Tarraf RC; Birney A; Arain MA
    Health Inf Manag; 2018 Sep; 47(3):116-124. PubMed ID: 28745562
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Compliance with HIPAA security standards in U.S. Hospitals.
    Davis D; Having K
    J Healthc Inf Manag; 2006; 20(2):108-15. PubMed ID: 16669594
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Why information security belongs on the CFO's agenda.
    Quinnild J; Fusile J; Smith C
    Healthc Financ Manage; 2006 Feb; 60(2):56-9. PubMed ID: 16519212
    [TBL] [Abstract][Full Text] [Related]  

  • 19. [Information security in health care].
    Ködmön J; Csajbók ZE
    Orv Hetil; 2015 Jul; 156(27):1075-80. PubMed ID: 26122901
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Risk assessment: where security meets compliance.
    Hamilton CR; Ochinko P
    J Healthc Prot Manage; 2008; 24(2):39-48. PubMed ID: 18800658
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.