These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 31663871)

  • 21. Evaluation of Causes of Protected Health Information Breaches.
    Jiang JX; Bai G
    JAMA Intern Med; 2019 Feb; 179(2):265-267. PubMed ID: 30453327
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Privacy and security: are your health information systems up to standard?
    Magennis T; Mitchell J
    Health Inf Manag; 1996 Dec-1997 Feb; 26(4):197-201. PubMed ID: 10166462
    [TBL] [Abstract][Full Text] [Related]  

  • 23. What caused the breach? An examination of use of information technology and health data breaches.
    Wikina SB
    Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Data breaches. Final rule.
    Department of Veterans Affairs
    Fed Regist; 2008 Apr; 73(71):19747-8. PubMed ID: 18464350
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Health data security: a new priority.
    Siwicki B
    Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
    [TBL] [Abstract][Full Text] [Related]  

  • 26. The myth of secure computing.
    Austin RD; Darby CA
    Harv Bus Rev; 2003 Jun; 81(6):120-6, 138. PubMed ID: 12800722
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Little breaches: OCR releases first "small breach" data.
    Heubusch K
    J AHIMA; 2011 Oct; 82(10):56-7. PubMed ID: 22029215
    [No Abstract]   [Full Text] [Related]  

  • 28. Prevention of HIPAA security breaches.
    Fesko H; McGuigan P
    Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
    [No Abstract]   [Full Text] [Related]  

  • 29. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.
    Hepp SL; Tarraf RC; Birney A; Arain MA
    Health Inf Manag; 2018 Sep; 47(3):116-124. PubMed ID: 28745562
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Privacy and security compliance in the E-healthcare marketplace.
    Lutes M
    Healthc Financ Manage; 2000 Mar; 54(3):48-50. PubMed ID: 10847915
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Preventing a data breach from becoming a disaster.
    Goldberg E
    J Bus Contin Emer Plan; 2013; 6(4):295-303. PubMed ID: 23835422
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Posturing for the unknown: the future of HIS security standards.
    Brown L; Speir J
    Infocare; 1994 Sep; ():12-4, 16, 18. PubMed ID: 10138463
    [No Abstract]   [Full Text] [Related]  

  • 34. HIPAA brings new requirements, new opportunities.
    Moynihan JJ; McLure ML
    Healthc Financ Manage; 2000 Mar; 54(3):52-6. PubMed ID: 10847916
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cyber crimes.
    Nuzback K
    Tex Med; 2014 Jul; 110(7):27-33. PubMed ID: 25023560
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Implementing technological safeguards to ensure patient privacy.
    Leestma R
    Caring; 2003 Feb; 22(2):16-8. PubMed ID: 12625255
    [TBL] [Abstract][Full Text] [Related]  

  • 37. For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations.
    Ignatovski M
    Health Inf Manag; 2023 Feb; ():18333583231158886. PubMed ID: 36840419
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Fulfilling the transcriptionist's responsibility for information security.
    Miller DW
    J Am Assoc Med Transcr; 1995; 14(3):30, 32-5. PubMed ID: 10142442
    [No Abstract]   [Full Text] [Related]  

  • 39. Data breach.
    Dodge J
    Health Data Manag; 2010 Sep; 18(9):40, 42, 44 passim. PubMed ID: 20853759
    [No Abstract]   [Full Text] [Related]  

  • 40. Effective audit trails--a taxonomy for determination of information requirements.
    Asaro PV; Herting RL; Roth AC; Barnes MR
    Proc AMIA Symp; 1999; ():663-5. PubMed ID: 10566442
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.