These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 8591289)

  • 21. Information security concepts and practices: the case of a provincial multi-specialty hospital.
    Cavalli E; Mattasoglio A; Pinciroli F; Spaggiari P
    Int J Med Inform; 2004 Mar; 73(3):297-303. PubMed ID: 15066562
    [TBL] [Abstract][Full Text] [Related]  

  • 22. The AIM SEISMED guidelines for system development and design.
    van Dorp HD; Dubbeldam JF
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 24. The need for a security policy in health care institutions.
    Katsikas SK; Gritzalis DA
    Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A generic methodology for health care data security.
    Furnell SM; Gaunt PN; Pangalos G; Sanders PW; Warren MJ
    Med Inform (Lond); 1994; 19(3):229-45. PubMed ID: 7707744
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Management information systems. Hey, big spender ... signature verification system.
    Kazik J
    Health Serv J; 1993 Apr; 103(5350):43. PubMed ID: 10127277
    [No Abstract]   [Full Text] [Related]  

  • 27. Overview on security standards for Healthcare information systems.
    Kokolakis S; Gritzalis D; Katsikas S; Ottes F
    Stud Health Technol Inform; 2002; 69():13-21; discussion 229-37. PubMed ID: 15458161
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Security, safety and quality in Health Information Systems.
    Barber B
    Stud Health Technol Inform; 2003; 96():91-7. PubMed ID: 15061529
    [TBL] [Abstract][Full Text] [Related]  

  • 29. The six safety first principles of health information systems: a programme of implementation. Part 2. The environment, convenience and legal issues.
    De Schouwer P; Barber B; Jensen OA; Lamberts H; Roger-France F; Zöllner H
    Stud Health Technol Inform; 1991; 1():302-7. PubMed ID: 10172816
    [No Abstract]   [Full Text] [Related]  

  • 30. Security management in the healthcare environment.
    Furnell SM; Sanders PW
    Medinfo; 1995; 8 Pt 1():675-8. PubMed ID: 8591296
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Why we need standardisation in Healthcare security.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():7-12; discussion 229-37. PubMed ID: 15458160
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Health care security and privacy, quality and safety.
    Louwerse CP
    Stud Health Technol Inform; 1993; 6():203-7. PubMed ID: 10163817
    [TBL] [Abstract][Full Text] [Related]  

  • 33. [Information and communication technologies: a charter to protect individual liberties].
    Lanzalavi A
    Rev Infirm; 2007 Sep; (133):28-9. PubMed ID: 17941524
    [No Abstract]   [Full Text] [Related]  

  • 34. Implementation of information security and confidentiality policies, procedures, and standards.
    Perry JW
    Top Health Inf Manage; 1996 May; 16(4):28-43. PubMed ID: 10157659
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Draft standard for high level security policies for Healthcare establishments.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():23-47; discussion 229-37. PubMed ID: 15458162
    [No Abstract]   [Full Text] [Related]  

  • 37. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Standard guide for implementing HL7 communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():183-219; discussion 229-37. PubMed ID: 15458167
    [No Abstract]   [Full Text] [Related]  

  • 39. The role of risk analysis in European harmonisation of security for healthcare information systems.
    Davey J
    Comput Methods Programs Biomed; 1995; 48(1-2):133-7. PubMed ID: 8846697
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Square pegs in round holes: information systems, hospitals and the significance of contextual awareness.
    Tjora AH; Scambler G
    Soc Sci Med; 2009 Feb; 68(3):519-25. PubMed ID: 19054601
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.