These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

183 related articles for article (PubMed ID: 7988109)

  • 1. Information management systems for intensive care.
    Bowes CL; Wilson AJ
    Comput Methods Programs Biomed; 1994 Jul; 44(1):31-5. PubMed ID: 7988109
    [TBL] [Abstract][Full Text] [Related]  

  • 2. TANIT AIM project (A2036): Telematics for ANaesthesia and Intensive Therapy.
    Bowes CL; Holland J
    Comput Methods Programs Biomed; 1994 Oct; 45(1-2):159-64. PubMed ID: 7889753
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Data protection and security within TANIT.
    Corbeel LJ; Corbeel IL; Hortmann M
    Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A generic methodology for health care data security.
    Furnell SM; Gaunt PN; Pangalos G; Sanders PW; Warren MJ
    Med Inform (Lond); 1994; 19(3):229-45. PubMed ID: 7707744
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Implementing security on a prototype hospital database.
    Khair M; Pangalos G; Andria F; Bozios L
    Stud Health Technol Inform; 1997; 43 Pt A():176-80. PubMed ID: 10179532
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security and confidentiality approach for the Clinical E-Science Framework (CLEF).
    Kalra D; Singleton P; Milan J; Mackay J; Detmer D; Rector A; Ingram D
    Methods Inf Med; 2005; 44(2):193-7. PubMed ID: 15924174
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Clinical data systems, Part 2: Components and techniques.
    Wyatt JC
    Lancet; 1994 Dec; 344(8937):1609-14. PubMed ID: 7983996
    [No Abstract]   [Full Text] [Related]  

  • 8. Investment appraisal of the protection, confidentiality and security arrangements of patient data.
    Loftus D; Carroll T
    Stud Health Technol Inform; 1997; 43 Pt A():186-90. PubMed ID: 10179534
    [TBL] [Abstract][Full Text] [Related]  

  • 9. The implementation of security in health care information systems: closing the gap between theory and practice.
    Flikkenschild E; Louwerse K
    Medinfo; 1995; 8 Pt 1():648-51. PubMed ID: 8591289
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Privacy and efficiency in patients focused health care processes.
    Morger O; Nitsche U; Teufel S
    Stud Health Technol Inform; 1998; 52 Pt 2():1143-7. PubMed ID: 10384638
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Control and use of information, seen from a nurse's perspective.
    Pluyter-Wenting ES
    Int J Biomed Comput; 1996 Oct; 43(1-2):27-32. PubMed ID: 8960918
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security and safeguarding of health and hospital information.
    Davis NA
    J AHIMA; 1996 Apr; 67(4):32, 34-5. PubMed ID: 10155776
    [No Abstract]   [Full Text] [Related]  

  • 14. Strong authentication: knowing who's accessing your doctor portal.
    Internet Healthc Strateg; 2004 Nov; 6(11):4-6. PubMed ID: 15603211
    [No Abstract]   [Full Text] [Related]  

  • 15. Developments in health care, the increasing role of information technology: security issues.
    Immonen S
    Int J Biomed Comput; 1996 Oct; 43(1-2):9-15. PubMed ID: 8960916
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Integrating non-proprietary workstations into proprietary systems.
    Foy JL
    Int J Biomed Comput; 1994 Jan; 34(1-4):277-83. PubMed ID: 8125639
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enterprise systems.
    Ball MJ
    Int J Biomed Comput; 1995 Apr; 39(1):113-8. PubMed ID: 7601523
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security versus access: trade-offs are only part of the story.
    Shea S
    J Am Med Inform Assoc; 1994; 1(4):314-5. PubMed ID: 7719814
    [No Abstract]   [Full Text] [Related]  

  • 19. PCASSO: a model for safe use of the Internet in healthcare.
    Baker DB
    J AHIMA; 2000 Mar; 71(3):33-6; quiz 37-8. PubMed ID: 11009665
    [No Abstract]   [Full Text] [Related]  

  • 20. A computer science approach to managing security in health care.
    Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
    Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.