These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

151 related articles for article (PubMed ID: 9325940)

  • 1. Security on the Internet: is your system vulnerable?
    Neray P
    Nurs Manage; 1997 Jul; 28(7):64. PubMed ID: 9325940
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Major email security flaws discovered: how to protect your data.
    James JS
    AIDS Treat News; 1998 Aug; (No 301):8. PubMed ID: 11365692
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Internet security concerns.
    Simpson RL
    Nurs Manage; 1997 Dec; 28(12):24-7. PubMed ID: 9423448
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Moving records on the Internet.
    Chin TL
    Health Data Manag; 1996 Apr; 4(4):24, 26. PubMed ID: 10156032
    [No Abstract]   [Full Text] [Related]  

  • 5. It's 10 p.m.--do you know where your data are?
    Nussbaum GM; Ault SP
    Healthc Inf Manage; 1998; 12(1):3-13. PubMed ID: 10179265
    [No Abstract]   [Full Text] [Related]  

  • 6. Medical network security and viruses.
    Fernandez Del Val C
    Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Who's looking at your files? Prying eyes find computerized health records an increasingly tempting target.
    Gorman C
    Time; 1996 May; 147(19):60-2. PubMed ID: 10157257
    [No Abstract]   [Full Text] [Related]  

  • 8. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation].
    Stehle W
    Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659
    [TBL] [Abstract][Full Text] [Related]  

  • 9. How secure is the Internet for healthcare applications?
    Campbell LA
    Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security and the Internet: healthcare's concerns and approaches to think, build, and operate solutions today.
    Quinn J; Jaworski S; Toole J
    Healthc Inf Manage; 1998; 12(1):81-92. PubMed ID: 10179270
    [No Abstract]   [Full Text] [Related]  

  • 11. Information technologies need to protect patient confidentiality.
    Pendrak RF; Ericson RP
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security on the Web: Big Brother is watching you.
    Huizinga R; Berry M
    AARN News Lett; 1997 Jun; 53(6):15. PubMed ID: 9306762
    [No Abstract]   [Full Text] [Related]  

  • 13. As networks multiply, privacy concerns grow.
    Siwicki B
    Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Protect your net. Good policy + good technology = dependable security.
    Schneider P
    Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843
    [No Abstract]   [Full Text] [Related]  

  • 15. Who knows your medical secrets? It's getting easier for health marketers, your boss, and your mortgage company to find out what ails you.
    Consum Rep; 2000 Aug; 65(8):22-6. PubMed ID: 11067693
    [No Abstract]   [Full Text] [Related]  

  • 16. The impact of technology on the confidentiality of health information.
    White AW; Wager KA; Lee FW
    Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Electronic commerce: is your health care organization safe?
    Holden VH
    Manag Care Q; 1998; 6(1):53-7. PubMed ID: 10177288
    [No Abstract]   [Full Text] [Related]  

  • 18. [Unsecured e-mail communication between physicians is critically evaluated].
    Radiologe; 1999 Sep; 39(9):MA155. PubMed ID: 10525650
    [No Abstract]   [Full Text] [Related]  

  • 19. Healthcare information security. The threats and the safeguards--and how to manage them.
    Health Devices; 2001; 30(1-2):31-48. PubMed ID: 11258232
    [TBL] [Abstract][Full Text] [Related]  

  • 20. The threat of hackers. The need to secure patient data & other important records on your agency's notebook computers.
    Ott W
    JEMS; 2008 Aug; 33(8):68-71. PubMed ID: 18692732
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 8.