These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

111 related articles for article (PubMed ID: 32370950)

  • 1. Evaluation framework for automatic privacy auditing tools for hospital data breach detections: A case study.
    Yesmin T; Carter MW
    Int J Med Inform; 2020 Jun; 138():104123. PubMed ID: 32370950
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Explaining accesses to electronic medical records using diagnosis information.
    Fabbri D; Lefevre K
    J Am Med Inform Assoc; 2013 Jan; 20(1):52-60. PubMed ID: 23125422
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.
    Menon AK; Jiang X; Kim J; Vaidya J; Ohno-Machado L
    Mach Learn; 2014 Apr; 95(1):87-101. PubMed ID: 24683293
    [TBL] [Abstract][Full Text] [Related]  

  • 4. [Construction of data remote monitoring and auditing system for clinical trials].
    Shen L; Huang Q; Zhai Y; Qiu Y; Zhao Q; Wu L; Zhou M; Liu J
    Zhejiang Da Xue Xue Bao Yi Xue Ban; 2020 Aug; 49(4):531-536. PubMed ID: 32985168
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Taking the next step to privacy compliance for hospitals: implementing the OHA guidelines.
    Beardwood J
    Hosp Q; 2003; 7(1):68-71, 4. PubMed ID: 14674181
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems.
    Hedda M; Malin BA; Yan C; Fabbri D
    AMIA Annu Symp Proc; 2017; 2017():866-875. PubMed ID: 29854153
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Lessons learned from a privacy breach at an academic health science centre.
    Malonda J; Campbell J; Crivianu-Gaita D; Freedman MH; Stevens P; Laxer RM
    Healthc Q; 2009; 12(1):61-5, 2. PubMed ID: 19142065
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Using statistical and machine learning to help institutions detect suspicious access to electronic health records.
    Boxwala AA; Kim J; Grillo JM; Ohno-Machado L
    J Am Med Inform Assoc; 2011; 18(4):498-505. PubMed ID: 21672912
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quality consciousness...auditing for HIPAA Privacy Compliance.
    LePar K
    J Nurs Care Qual; 2004; 19(2):105-13; quiz 114-5. PubMed ID: 15077827
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings.
    Eikey EV; Murphy AR; Reddy MC; Xu H
    Int J Med Inform; 2015 Dec; 84(12):1065-75. PubMed ID: 26467571
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Privacy and Security within Biobanking: The Role of Information Technology.
    Heatherly R
    J Law Med Ethics; 2016 Mar; 44(1):156-60. PubMed ID: 27256131
    [TBL] [Abstract][Full Text] [Related]  

  • 12. To report or not to report health care data breaches.
    Walden A; Cortelyou-Ward K; Gabriel MH; Noblin A
    Am J Manag Care; 2020 Dec; 26(12):e395-e402. PubMed ID: 33315333
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Data security and patient confidentiality: the manager's role.
    Fisher F; Madge B
    Int J Biomed Comput; 1996 Oct; 43(1-2):115-9. PubMed ID: 8960931
    [TBL] [Abstract][Full Text] [Related]  

  • 15. HS.Register - An Audit-Trail Tool to Respond to the General Data Protection Regulation (GDPR).
    Gonçalves-Ferreira D; Leite M; Santos-Pereira C; Correia ME; Antunes L; Cruz-Correia R
    Stud Health Technol Inform; 2018; 247():81-85. PubMed ID: 29677927
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The European cross-border health data exchange roadmap: Case study in the Italian setting.
    Nalin M; Baroni I; Faiella G; Romano M; Matrisciano F; Gelenbe E; Martinez DM; Dumortier J; Natsiavas P; Votis K; Koutkias V; Tzovaras D; Clemente F
    J Biomed Inform; 2019 Jun; 94():103183. PubMed ID: 31009760
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.
    Verhelst HM; Stannat AW; Mecacci G
    Sci Eng Ethics; 2020 Dec; 26(6):2975-2984. PubMed ID: 32696430
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective.
    Zakaria N; Stanton J; Stam K
    AMIA Annu Symp Proc; 2003; 2003():1059. PubMed ID: 14728562
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Machine Learning for Health: Algorithm Auditing & Quality Control.
    Oala L; Murchison AG; Balachandran P; Choudhary S; Fehr J; Leite AW; Goldschmidt PG; Johner C; Schörverth EDM; Nakasi R; Meyer M; Cabitza F; Baird P; Prabhu C; Weicken E; Liu X; Wenzel M; Vogler S; Akogo D; Alsalamah S; Kazim E; Koshiyama A; Piechottka S; Macpherson S; Shadforth I; Geierhofer R; Matek C; Krois J; Sanguinetti B; Arentz M; Bielik P; Calderon-Ramirez S; Abbood A; Langer N; Haufe S; Kherif F; Pujari S; Samek W; Wiegand T
    J Med Syst; 2021 Nov; 45(12):105. PubMed ID: 34729675
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems.
    Zhu G; Liu H; Feng M
    Int J Environ Res Public Health; 2018 Oct; 15(10):. PubMed ID: 30297659
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.