These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 7707744)

  • 1. A generic methodology for health care data security.
    Furnell SM; Gaunt PN; Pangalos G; Sanders PW; Warren MJ
    Med Inform (Lond); 1994; 19(3):229-45. PubMed ID: 7707744
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Information management systems for intensive care.
    Bowes CL; Wilson AJ
    Comput Methods Programs Biomed; 1994 Jul; 44(1):31-5. PubMed ID: 7988109
    [TBL] [Abstract][Full Text] [Related]  

  • 3. TANIT AIM project (A2036): Telematics for ANaesthesia and Intensive Therapy.
    Bowes CL; Holland J
    Comput Methods Programs Biomed; 1994 Oct; 45(1-2):159-64. PubMed ID: 7889753
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The SEISMED guidelines for host systems security.
    Furnell SM; Sanders PW
    Stud Health Technol Inform; 1996; 27():150-5. PubMed ID: 10163730
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Development of security guidelines for existing healthcare systems.
    Furnell SM; Sanders PW; Warren MJ
    Med Inform (Lond); 1995; 20(2):139-48. PubMed ID: 8569307
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The AIM SEISMED guidelines for system development and design.
    van Dorp HD; Dubbeldam JF
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Integrated computerized records provide improved quality of care with little loss of privacy.
    Gardner RM
    J Am Med Inform Assoc; 1994; 1(4):320-2. PubMed ID: 7719816
    [No Abstract]   [Full Text] [Related]  

  • 9. Addressing information security training and awareness within the European healthcare community.
    Furnell S; Sanders P; Warren M
    Stud Health Technol Inform; 1997; 43 Pt B():707-11. PubMed ID: 10179759
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Developing a Public Key Infrastructure for a secure regional e-Health environment.
    Pangalos G; Mavridis I; Ilioudis C; Georgiadis C
    Methods Inf Med; 2002; 41(5):414-8. PubMed ID: 12501814
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Implementing security on a prototype hospital database.
    Khair M; Pangalos G; Andria F; Bozios L
    Stud Health Technol Inform; 1997; 43 Pt A():176-80. PubMed ID: 10179532
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The role of risk analysis in European harmonisation of security for healthcare information systems.
    Davey J
    Comput Methods Programs Biomed; 1995; 48(1-2):133-7. PubMed ID: 8846697
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Results of European projects enabling secure regional, national and international health care networks.
    Blobel B
    Stud Health Technol Inform; 1999; 64():73-82. PubMed ID: 10747558
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An integrated secure design of a medical database system.
    Pangalos G; Khair M; Bozios L
    Medinfo; 1995; 8 Pt 1():666-70. PubMed ID: 8591294
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Data protection and security within TANIT.
    Corbeel LJ; Corbeel IL; Hortmann M
    Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Implementing security in computer based patient records clinical experiences.
    Iversen KR; Heimly V; Lundgren TI
    Medinfo; 1995; 8 Pt 1():657-60. PubMed ID: 8591292
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Assessing staff attitudes towards information security in a European healthcare establishment.
    Furnell SM; Gaunt PN; Holben RF; Sanders PW; Stockel CT; Warren MJ
    Med Inform (Lond); 1996; 21(2):105-12. PubMed ID: 8947888
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Integrated web-based viewing and secure remote access to a clinical data repository and diverse clinical systems.
    Duncan RG; Saperia D; Dulbandzhyan R; Shabot MM; Polaschek JX; Jones DT
    Proc AMIA Symp; 2001; ():149-53. PubMed ID: 11825172
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Control and use of information, seen from a nurse's perspective.
    Pluyter-Wenting ES
    Int J Biomed Comput; 1996 Oct; 43(1-2):27-32. PubMed ID: 8960918
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.