Insurance, Physician Services
Attitude of Health Personnel
The privacy of information and its protection against unauthorized disclosure.
Institutional Management Teams
Primary Health Care
Interviews as Topic
The transfer of information from experts in the medical and public health fields to patients and the public. The study and use of communication strategies to inform and influence individual and community decisions that enhance health.
A method of data collection and a QUALITATIVE RESEARCH tool in which a small group of individuals are brought together and allowed to interact in a discussion of their opinions about topics, issues, or questions.
Sequence Analysis, DNA
The arrangement of two or more amino acid or base sequences from an organism or organisms in such a way as to align areas of the sequences sharing common properties. The degree of relatedness or homology between the sequences is predicted computationally or statistically based on weights assigned to the elements aligned between the sequences. This in turn can serve as a potential indicator of the genetic relatedness between the organisms.
Dysplastic Nevus Syndrome
Clinically atypical nevi (usually exceeding 5 mm in diameter and having variable pigmentation and ill defined borders) with an increased risk for development of non-familial cutaneous malignant melanoma. Biopsies show melanocytic dysplasia. Nevi are clinically and histologically identical to the precursor lesions for melanoma in the B-K mole syndrome. (Stedman, 25th ed)
It is a form of protection provided by law. In the United States this protection is granted to authors of original works of authorship, including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works. (from Circular of the United States Copyright Office, 6/30/2008)
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
The legal authority or formal permission from authorities to carry on certain activities which by law or regulation require such permission. It may be applied to licensure of institutions as well as individuals.