These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
237 related articles for article (PubMed ID: 10124918)
21. Converting to a new incident reporting system. Camacho HS J Healthc Prot Manage; 1999; 15(2):90-4. PubMed ID: 10557449 [TBL] [Abstract][Full Text] [Related]
22. Growing role for security dept in hospitals seen by new IAHSS president. International Association for Healthcare Security and Safety. Hosp Secur Saf Manage; 1992 Jun; 13(2):10-2. PubMed ID: 10119723 [No Abstract] [Full Text] [Related]
23. Rethinking the link: information systems improvements and reengineering. Kaplan JH Healthc Exec; 1996; 11(2):17-9. PubMed ID: 10156289 [No Abstract] [Full Text] [Related]
24. Tailoring a hospital security department's initiatives to meet financial constraints. Holmberg MA J Healthc Prot Manage; 2001; 17(2):88-94. PubMed ID: 11602987 [TBL] [Abstract][Full Text] [Related]
26. How to upgrade your security and safety department. Health Care Secur Saf Manage; 1981 Oct; 2(6):5-9. PubMed ID: 10254847 [No Abstract] [Full Text] [Related]
27. A team approach to the environment of care. Jacobs G J Healthc Prot Manage; 1997; 13(2):20-3. PubMed ID: 10173425 [TBL] [Abstract][Full Text] [Related]
28. Security investigations in a healthcare environment. Hansen GR J Healthc Prot Manage; 1992; 8(2):102-5. PubMed ID: 10121321 [No Abstract] [Full Text] [Related]
29. Resolving the people problems for a hospital's security department. Bing DD; Sarratt WG J Healthc Prot Manage; 1988; 5(1):24-40. PubMed ID: 10303768 [TBL] [Abstract][Full Text] [Related]
30. Barbarians at the gates? Combating some new threats to hospital security professionals. Rusting RR; Applebaum A J Healthc Prot Manage; 1996; 12(2):94-111. PubMed ID: 10158939 [TBL] [Abstract][Full Text] [Related]
31. Getting a lock on risk. JCAHO standards for security management programs. McLaughlin SB Health Facil Manage; 1999 Apr; 12(4):28, 30-2. PubMed ID: 10351485 [No Abstract] [Full Text] [Related]
32. Computerizing your security operation--it can be done! Smith S J Healthc Prot Manage; 1992; 8(2):90-101. PubMed ID: 10121336 [No Abstract] [Full Text] [Related]
33. Lotus 1-2-3 and the security manager. Palmisano G J Healthc Prot Manage; 1987; 4(1):53-60. PubMed ID: 10285696 [No Abstract] [Full Text] [Related]
34. A tonic for hospital security. Saenz P J Healthc Prot Manage; 1993; 9(2):99-103. PubMed ID: 10129070 [TBL] [Abstract][Full Text] [Related]
35. How hospital system restructured RM, security, safety, workers' comp. Hosp Secur Saf Manage; 1994 Oct; 15(6):10-1. PubMed ID: 10137769 [No Abstract] [Full Text] [Related]
36. The future of healthcare security management. Roll FG J Healthc Prot Manage; 1992-1993 Winter; 9(1):22-5. PubMed ID: 10124917 [TBL] [Abstract][Full Text] [Related]
37. Dealing with problem number one--budget cuts: can you do more with less? Hosp Secur Saf Manage; 2001 Sep; 22(5):5-9. PubMed ID: 11601375 [TBL] [Abstract][Full Text] [Related]
38. Matching security to expansion: experiences of Las Vegas hospitals. Hosp Secur Saf Manage; 1998 Aug; 19(4):5-8. PubMed ID: 10183001 [TBL] [Abstract][Full Text] [Related]
39. Special report. Integrated security systems in hospitals--an update. Hosp Secur Saf Manage; 1994 Dec; 15(8):5-9. PubMed ID: 10139285 [TBL] [Abstract][Full Text] [Related]
40. An interview with: consultant David Aggleton on effective security planning. Aggleton D Hosp Secur Saf Manage; 2001 Aug; 22(4):13-4. PubMed ID: 11561343 [No Abstract] [Full Text] [Related] [Previous] [Next] [New Search]