These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 30645793)

  • 21. Identity crisis. Organizations are implementing medical identity theft teams to combat rising incidents.
    Bowe R
    J AHIMA; 2013 Jan; 84(1):38-42; quiz 43. PubMed ID: 23379030
    [No Abstract]   [Full Text] [Related]  

  • 22. Responding to identity theft. One organization's effort to turn a negative event into a positive result.
    O'Brien J
    J AHIMA; 2008 Apr; 79(4):40-1. PubMed ID: 18517048
    [No Abstract]   [Full Text] [Related]  

  • 23. Security, durability & portable computers.
    Miller D
    Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
    [No Abstract]   [Full Text] [Related]  

  • 24. Data security tips.
    J Calif Dent Assoc; 2015 Jan; 43(1):41-2, 44. PubMed ID: 25632519
    [No Abstract]   [Full Text] [Related]  

  • 25. How to safeguard your clinical data. Security systems against crashes, thieves, and hackers.
    Bergeron BP
    Postgrad Med; 1999 Jan; 105(1):27-9. PubMed ID: 9924489
    [No Abstract]   [Full Text] [Related]  

  • 26. Medical data of 655 000 Americans put up for sale by hacker.
    Dyer O
    BMJ; 2016 Jun; 353():i3664. PubMed ID: 27365497
    [No Abstract]   [Full Text] [Related]  

  • 27. Healthcare organizations must have an identity theft policy: FACTA or fiction?
    Alexander J
    Healthc Financ Manage; 2008 Sep; 62(9):38, 40. PubMed ID: 18782976
    [No Abstract]   [Full Text] [Related]  

  • 28. Healthcare identity theft: prevention and response.
    Center for Healthcare Environmental Management
    Healthc Hazard Manage Monit; 2005 Sep; 19(1):1-8. PubMed ID: 16187575
    [No Abstract]   [Full Text] [Related]  

  • 29. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job.
    Conn J
    Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729
    [No Abstract]   [Full Text] [Related]  

  • 30. Identity theft and fraud--the impact on HIM operations.
    Davis N; Lemery C; Roberts K
    J AHIMA; 2005 Apr; 76(4):64A-64D. PubMed ID: 15871474
    [No Abstract]   [Full Text] [Related]  

  • 31. VA theft included medical data. Groups concerned information could be used to discriminate against vets.
    Lubell J
    Mod Healthc; 2006 May; 36(22):12. PubMed ID: 16770961
    [No Abstract]   [Full Text] [Related]  

  • 32. Risk management. Theft happens. Protecting the data is what matters.
    Terreri A
    Hosp Health Netw; 2009 Feb; 83(2):10. PubMed ID: 19294968
    [No Abstract]   [Full Text] [Related]  

  • 33. Will we ever learn? A national healthcare identifier system may go a long way to reducing the danger of identity theft.
    Hieb B
    Healthc Inform; 2006 Jul; 23(7):42-3. PubMed ID: 16900966
    [No Abstract]   [Full Text] [Related]  

  • 34. Who stole my identity?
    Ferrara RC
    J Healthc Prot Manage; 2003; 19(1):107-12. PubMed ID: 12629794
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Privacy, security worries could thwart health IT efforts.
    Med Health; 2005 Nov; 59(42):1, 4. PubMed ID: 16323297
    [No Abstract]   [Full Text] [Related]  

  • 36. Cybersecurity for the travelling scientist.
    Owens B
    Nature; 2017 Aug; 548(7665):123-124. PubMed ID: 28770861
    [No Abstract]   [Full Text] [Related]  

  • 37. Medical Identity Theft: A Case Report.
    Sharma A; Baweja P
    Ann Intern Med; 2017 Mar; 166(5):380. PubMed ID: 28265656
    [No Abstract]   [Full Text] [Related]  

  • 38. BYOD done the smarter way.
    Ranganathan V
    Health Manag Technol; 2016; 37(3):20-1. PubMed ID: 27215109
    [No Abstract]   [Full Text] [Related]  

  • 39. Blanket security, security blanket.
    DeGrazio R
    Health Facil Manage; 1995 Feb; 8(2):28, 30, 32. PubMed ID: 10139800
    [No Abstract]   [Full Text] [Related]  

  • 40. Compliance with security standards: an ongoing process.
    Kertesz L
    AHIP Cover; 2005; 46(4):10, 70, 72. PubMed ID: 16149654
    [No Abstract]   [Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.