These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

171 related articles for article (PubMed ID: 8188411)

  • 41. The six safety first principles of health information systems: a programme of implementation. Part 1. Safety and security.
    Barber B; Jensen OA; Lamberts H; Roger-France F; De Schouwer P; Zöllner H
    Stud Health Technol Inform; 1991; 1():296-301. PubMed ID: 10164074
    [No Abstract]   [Full Text] [Related]  

  • 42. Efficient storage of healthcare data in XML-based smart cards.
    Gündem TI; Armağan O
    Comput Methods Programs Biomed; 2006 Jan; 81(1):26-40. PubMed ID: 16360974
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Six Sigma: not for the faint of heart.
    Benedetto AR
    Radiol Manage; 2003; 25(2):40-53. PubMed ID: 12800564
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Data security in medical computer systems.
    White R
    Dermatol Clin; 1986 Oct; 4(4):657-63. PubMed ID: 3780067
    [TBL] [Abstract][Full Text] [Related]  

  • 46. [Aspects of data protection in telemedicine].
    Vetter R
    Z Arztl Fortbild Qualitatssich; 2001 Oct; 95(9):662-6. PubMed ID: 11688233
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Security measures required for HIPAA privacy.
    Amatayakul M
    J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
    [TBL] [Abstract][Full Text] [Related]  

  • 48. The need for a security policy in health care institutions.
    Katsikas SK; Gritzalis DA
    Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Software safety in medical applications.
    Knight JC; Wika KG
    J Image Guid Surg; 1995; 1(3):121-32. PubMed ID: 9079437
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Privacy, confidentiality, and security in clinical information systems: dilemmas and opportunities for the nurse executive.
    Styffe EJ
    Nurs Adm Q; 1997; 21(3):21-8. PubMed ID: 9215003
    [TBL] [Abstract][Full Text] [Related]  

  • 51. An electronic registry for physiotherapists in Belgium.
    Buyl R; Nyssen M
    Stud Health Technol Inform; 2008; 136():383-8. PubMed ID: 18487761
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Project administration departments improve information systems initiatives.
    Mahlen K
    Healthc Financ Manage; 1997 Dec; 51(12):38, 40, 42. PubMed ID: 10174782
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Providing longitudinal health care information with the new German Health Card--a pilot system to track patient pathways.
    Marschollek M; Demirbilek E
    Comput Methods Programs Biomed; 2006 Mar; 81(3):266-71. PubMed ID: 16458996
    [TBL] [Abstract][Full Text] [Related]  

  • 54. MPEG-21 as an access control tool for the National Health Service Care Records Service.
    Brox GA
    J Telemed Telecare; 2005; 11 Suppl 1():23-5. PubMed ID: 16035983
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Computer-based oral health records on the World Wide Web.
    Schleyer TK; Dasari VR
    Quintessence Int; 1999 Jul; 30(7):451-60. PubMed ID: 10635257
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Experiences with an electronic patient record in a clinical context: considerations for design.
    Berg M; Langenberg C; vd Berg I; Kwakkernaat J
    Stud Health Technol Inform; 1997; 43 Pt B():811-5. PubMed ID: 10179780
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Towards a continuous evolution and adaptation of information systems in healthcare.
    Lenz R; Kuhn KA
    Int J Med Inform; 2004 Feb; 73(1):75-89. PubMed ID: 15036081
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Authorization & security aspects in the middleware-based healthcare information system.
    Andany J; Bjorkendal C; Ferrara FM; Scherrer JR; Spahni S
    Stud Health Technol Inform; 1999; 68():315-20. PubMed ID: 10724897
    [TBL] [Abstract][Full Text] [Related]  

  • 59. An archetype-based testing framework.
    Chen R; Garde S; Beale T; Nyström M; Karlsson D; Klein GO; Ahlfeldt H
    Stud Health Technol Inform; 2008; 136():401-6. PubMed ID: 18487764
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Attention for security now more needed than ever.
    Pluyter-Wenting ES
    Stud Health Technol Inform; 1997; 46():253-6. PubMed ID: 10175407
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.