BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 8765774)

  • 1. [The physician and the computer. Bedside].
    Fällman H
    Lakartidningen; 1996 Jul; 93(30-31):2640-1. PubMed ID: 8765774
    [No Abstract]   [Full Text] [Related]  

  • 2. Data security: how much is enough?
    Anderson HJ
    Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
    [No Abstract]   [Full Text] [Related]  

  • 3. Point of care and patient privacy: who is in control?
    Morgan JD
    Top Health Inf Manage; 1994 May; 14(4):36-43. PubMed ID: 10134759
    [TBL] [Abstract][Full Text] [Related]  

  • 4. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation].
    Stehle W
    Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The threat of hackers. The need to secure patient data & other important records on your agency's notebook computers.
    Ott W
    JEMS; 2008 Aug; 33(8):68-71. PubMed ID: 18692732
    [No Abstract]   [Full Text] [Related]  

  • 6. Electronic patient records for dental school clinics: more than paperless systems.
    Atkinson JC; Zeller GG; Shah C
    J Dent Educ; 2002 May; 66(5):634-42. PubMed ID: 12056768
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Ensuring confidentiality on computer networks.
    Smith JP
    Diagn Imaging (San Franc); 1995 Jul; 17(7):43-4, 47. PubMed ID: 10150605
    [No Abstract]   [Full Text] [Related]  

  • 8. Keeping records private.
    Cross M
    Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
    [No Abstract]   [Full Text] [Related]  

  • 9. Technological healing.
    Stoneham L
    Tex Med; 2001 Apr; 97(4):34-41. PubMed ID: 11344922
    [No Abstract]   [Full Text] [Related]  

  • 10. Privacy and efficiency in patients focused health care processes.
    Morger O; Nitsche U; Teufel S
    Stud Health Technol Inform; 1998; 52 Pt 2():1143-7. PubMed ID: 10384638
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Fundamentals and trade-offs of IT security.
    LaRochelle B
    Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
    [No Abstract]   [Full Text] [Related]  

  • 12. Patient assessment systems using the World Wide Web.
    Kohane IS
    Behav Healthc Tomorrow; 1997 Feb; 6(1):77-9. PubMed ID: 10164823
    [TBL] [Abstract][Full Text] [Related]  

  • 13. EMR confidentiality and information security.
    Kurtz G
    J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Three computational systems for disclosing medical data in the year 1999.
    Sweeney L
    Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Attention for security now more needed than ever.
    Pluyter-Wenting ES
    Stud Health Technol Inform; 1997; 46():253-6. PubMed ID: 10175407
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The adoption of IT security standards in a healthcare environment.
    Gomes R; Lapão LV
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [TBL] [Abstract][Full Text] [Related]  

  • 17. As networks multiply, privacy concerns grow.
    Siwicki B
    Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Analysis of security problems in a medical image encryption system.
    Alvarez G; Li S; Hernandez L
    Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Panel calls for improved security for medical records.
    AIDS Policy Law; 1997 Mar; 12(5):3. PubMed ID: 11364165
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Promoting health information networks while protecting patient confidentiality.
    Carey MH
    QRC Advis; 1995 Feb; 11(4):7-8. PubMed ID: 10140295
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.