These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

108 related articles for article (PubMed ID: 8591289)

  • 1. The implementation of security in health care information systems: closing the gap between theory and practice.
    Flikkenschild E; Louwerse K
    Medinfo; 1995; 8 Pt 1():648-51. PubMed ID: 8591289
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Demonstration results for the standard ENV 12924.
    Louwerse K
    Stud Health Technol Inform; 2002; 69():111-39; discussion 229-37. PubMed ID: 15458164
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experiences with a new security standard for healthcare information systems.
    Louwerse K; van Ditmarsch M; Flikkenschild E
    Stud Health Technol Inform; 1999; 68():311-4. PubMed ID: 10724896
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Developing the security culture at the SEISMED Reference Centres.
    Fowler J
    Stud Health Technol Inform; 1996; 27():156-61. PubMed ID: 10172824
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The SEISMED guidelines for host systems security.
    Furnell SM; Sanders PW
    Stud Health Technol Inform; 1996; 27():150-5. PubMed ID: 10163730
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The SEISMED High Level Security Policy for Health Care.
    Katsikas SK
    Stud Health Technol Inform; 1996; 27():125-30. PubMed ID: 10163727
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Information management systems for intensive care.
    Bowes CL; Wilson AJ
    Comput Methods Programs Biomed; 1994 Jul; 44(1):31-5. PubMed ID: 7988109
    [TBL] [Abstract][Full Text] [Related]  

  • 9. High level security policies for Healthcare Information Systems.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2003; 96():98-104. PubMed ID: 15061530
    [TBL] [Abstract][Full Text] [Related]  

  • 10. How to achieve secure environments for information systems in medicine.
    Barber B; Bleumer G; Davey J; Louwerse K
    Medinfo; 1995; 8 Pt 1():635-9. PubMed ID: 8591286
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security policy development for Healthcare Information Systems.
    Gritzalis D; Kokolakis S
    Stud Health Technol Inform; 2003; 96():105-10. PubMed ID: 15061531
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An integrated secure design of a medical database system.
    Pangalos G; Khair M; Bozios L
    Medinfo; 1995; 8 Pt 1():666-70. PubMed ID: 8591294
    [TBL] [Abstract][Full Text] [Related]  

  • 13. The health information system security threat lifecycle: an informatics theory.
    Fernando JI; Dawson LL
    Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Development of security guidelines for existing healthcare systems.
    Furnell SM; Sanders PW; Warren MJ
    Med Inform (Lond); 1995; 20(2):139-48. PubMed ID: 8569307
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The adoption of IT security standards in a healthcare environment.
    Gomes R; LapĆ£o LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Practical aspects of handling data protection and data security.
    Louwerse CP
    Stud Health Technol Inform; 1991; 1():324-33. PubMed ID: 10172818
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Info-vigilance or safety in health information systems.
    Barber B; Allaert FA; Kluge EH
    Stud Health Technol Inform; 2001; 84(Pt 2):1229-33. PubMed ID: 11604924
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Guidelines for secure system development and secure implementation.
    Bakker AR; Van Dorp H; Van Veenen G
    Stud Health Technol Inform; 1996; 27():184-9. PubMed ID: 10163733
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A chief security officer charts new territory.
    Miaoulis WM
    Health Data Manag; 1997 Jul; 5(7):92-6. PubMed ID: 10169485
    [No Abstract]   [Full Text] [Related]  

  • 20. How to assure security: CEN standards, directives, or European Guidelines?
    Louwerse K
    Stud Health Technol Inform; 1996; 27():145-7. PubMed ID: 10163729
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.