These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

128 related articles for article (PubMed ID: 8569307)

  • 1. Development of security guidelines for existing healthcare systems.
    Furnell SM; Sanders PW; Warren MJ
    Med Inform (Lond); 1995; 20(2):139-48. PubMed ID: 8569307
    [TBL] [Abstract][Full Text] [Related]  

  • 2. The SEISMED guidelines for host systems security.
    Furnell SM; Sanders PW
    Stud Health Technol Inform; 1996; 27():150-5. PubMed ID: 10163730
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The SEISMED High Level Security Policy for Health Care.
    Katsikas SK
    Stud Health Technol Inform; 1996; 27():125-30. PubMed ID: 10163727
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The AIM SEISMED guidelines for system development and design.
    van Dorp HD; Dubbeldam JF
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [TBL] [Abstract][Full Text] [Related]  

  • 6. High level security policies for Healthcare Information Systems.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2003; 96():98-104. PubMed ID: 15061530
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.
    Ilioudis C; Pangalos G
    J Med Internet Res; 2001; 3(2):E14. PubMed ID: 11720956
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Addressing information security training and awareness within the European healthcare community.
    Furnell S; Sanders P; Warren M
    Stud Health Technol Inform; 1997; 43 Pt B():707-11. PubMed ID: 10179759
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A generic methodology for health care data security.
    Furnell SM; Gaunt PN; Pangalos G; Sanders PW; Warren MJ
    Med Inform (Lond); 1994; 19(3):229-45. PubMed ID: 7707744
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Medical database security evaluation.
    Pangalos GJ
    Med Inform (Lond); 1993; 18(4):283-92. PubMed ID: 8072337
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Guidelines for secure system development and secure implementation.
    Bakker AR; Van Dorp H; Van Veenen G
    Stud Health Technol Inform; 1996; 27():184-9. PubMed ID: 10163733
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security policy development for Healthcare Information Systems.
    Gritzalis D; Kokolakis S
    Stud Health Technol Inform; 2003; 96():105-10. PubMed ID: 15061531
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security management in the healthcare environment.
    Furnell SM; Sanders PW
    Medinfo; 1995; 8 Pt 1():675-8. PubMed ID: 8591296
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Overview on security standards for Healthcare information systems.
    Kokolakis S; Gritzalis D; Katsikas S; Ottes F
    Stud Health Technol Inform; 2002; 69():13-21; discussion 229-37. PubMed ID: 15458161
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The implementation of security in health care information systems: closing the gap between theory and practice.
    Flikkenschild E; Louwerse K
    Medinfo; 1995; 8 Pt 1():648-51. PubMed ID: 8591289
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Information management systems for intensive care.
    Bowes CL; Wilson AJ
    Comput Methods Programs Biomed; 1994 Jul; 44(1):31-5. PubMed ID: 7988109
    [TBL] [Abstract][Full Text] [Related]  

  • 18. The need for a security policy in health care institutions.
    Katsikas SK; Gritzalis DA
    Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Methods of responding to healthcare security incidents.
    Furnell S; Gritzalis D; Katsikas S; Mavroudakis K; Sanders P; Warren M
    Stud Health Technol Inform; 1998; 52 Pt 2():1138-42. PubMed ID: 10384637
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Developing the security culture at the SEISMED Reference Centres.
    Fowler J
    Stud Health Technol Inform; 1996; 27():156-61. PubMed ID: 10172824
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.