These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

130 related articles for article (PubMed ID: 7988108)

  • 21. Security management in the healthcare environment.
    Furnell SM; Sanders PW
    Medinfo; 1995; 8 Pt 1():675-8. PubMed ID: 8591296
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Use of the ISO/IEC 17799 framework in healthcare information security management.
    Posthumus L
    Stud Health Technol Inform; 2004; 103():447-52. PubMed ID: 15747954
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Cybersecurity-A Serious Patient Care Concern.
    Jarrett MP
    JAMA; 2017 Oct; 318(14):1319-1320. PubMed ID: 28973258
    [No Abstract]   [Full Text] [Related]  

  • 24. The second wave. Report unveils another national IT plan.
    Conn J
    Mod Healthc; 2006 Apr; 36(15):12-3. PubMed ID: 16669513
    [No Abstract]   [Full Text] [Related]  

  • 25. Practical approaches to creating a security culture.
    Gaunt N
    Int J Med Inform; 2000 Nov; 60(2):151-7. PubMed ID: 11154966
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure HL7 transactions using Internet mail (Internet draft).
    Schadow G; Tucker M; Rishel W
    Stud Health Technol Inform; 2002; 69():141-52; discussion 229-37. PubMed ID: 15458165
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Margaret McCartney: The NHS needs big, firm IT pants.
    McCartney M
    BMJ; 2017 May; 357():j2352. PubMed ID: 28512210
    [No Abstract]   [Full Text] [Related]  

  • 29. Building a secure home: protecting individually identifiable patient information.
    Keese JM
    Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
    [No Abstract]   [Full Text] [Related]  

  • 30. Completing the HIPAA compliance journey: security standards.
    Pieper SK
    Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
    [No Abstract]   [Full Text] [Related]  

  • 31. Cybersecurity in health care.
    Perakslis ED
    N Engl J Med; 2014 Jul; 371(5):395-7. PubMed ID: 25075831
    [No Abstract]   [Full Text] [Related]  

  • 32. The SEISMED High Level Security Policy for Health Care.
    Katsikas SK
    Stud Health Technol Inform; 1996; 27():125-30. PubMed ID: 10163727
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Cold front.
    Whittle S
    Health Serv J; 2003 Jul; 113(5865):suppl 13-5. PubMed ID: 12899001
    [No Abstract]   [Full Text] [Related]  

  • 34. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].
    Hao S; Lü Y; Liu J; Liu Y; Xu D
    Wei Sheng Yan Jiu; 2018 Jan; 47(1):103-107. PubMed ID: 29903233
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.
    Papoutsi C; Reed JE; Marston C; Lewis R; Majeed A; Bell D
    BMC Med Inform Decis Mak; 2015 Oct; 15():86. PubMed ID: 26466787
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Transparent Medical Data Systems.
    Spagnuelo D; Lenzini G
    J Med Syst; 2017 Jan; 41(1):8. PubMed ID: 27853968
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A formal, mathematics oriented method for identifying security risks in information systems.
    van Piggelen HU
    Stud Health Technol Inform; 1997; 43 Pt A():191-5. PubMed ID: 10179535
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Safety and security of information systems.
    Shaw R
    Stud Health Technol Inform; 1996; 27():190-9. PubMed ID: 10163734
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Dealing with information accessibility and security.
    Lafrance S
    Clin Perform Qual Health Care; 1997; 5(2):86-9. PubMed ID: 10167218
    [TBL] [Abstract][Full Text] [Related]  

  • 40. What is security auditing?
    Amatayakul M
    J AHIMA; 2004; 75(10):58-9. PubMed ID: 15559842
    [No Abstract]   [Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.