217 related articles for article (PubMed ID: 10131856)
1. Information management implications of federal health care reform.
Dowling AF
Healthc Inf Manage; 1994; 8(1):7-18. PubMed ID: 10131856
[No Abstract] [Full Text] [Related]
2. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
Watson A
AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
[No Abstract] [Full Text] [Related]
3. The silent secret to health care reform: information.
Blocker WP
Stand News; 1994 Mar; 22(3):29-33. PubMed ID: 10160501
[No Abstract] [Full Text] [Related]
4. Security and electronic signature standards--HCFA. Proposed rule.
Fed Regist; 1998 Aug; 63(155):43242-80. PubMed ID: 10182571
[TBL] [Abstract][Full Text] [Related]
5. Keeping medical records private in the electronic information age.
Drislane D
J Am Health Policy; 1994; 4(2):28-32. PubMed ID: 10132592
[TBL] [Abstract][Full Text] [Related]
6. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
7. Health care management and the Internet: breaking the barriers of geography and time.
Brockmann P
Healthc Inf Manage; 1997; 11(3):17-26. PubMed ID: 10175690
[No Abstract] [Full Text] [Related]
8. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
9. Business process design. Securing computerized health information files.
Barthel CW; Kalina CM; Fitko J
AAOHN J; 1998 Dec; 46(12):581-6; quiz 587-8. PubMed ID: 10025251
[TBL] [Abstract][Full Text] [Related]
10. Health care reform: summary of the Clinton administration's health reform plan: American Health Security Act of 1993.
Baker N
J Health Hosp Law; 1993 Oct; 26(10):289-95. PubMed ID: 10136101
[No Abstract] [Full Text] [Related]
11. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
12. Healthcare reform and confidentiality.
Frawley KA
J Am Assoc Med Transcr; 1994; 13(3):36, 38. PubMed ID: 10133632
[No Abstract] [Full Text] [Related]
13. Information security: how safe is your system?
Brandt M
Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
[No Abstract] [Full Text] [Related]
14. Point of care and patient privacy: who is in control?
Morgan JD
Top Health Inf Manage; 1994 May; 14(4):36-43. PubMed ID: 10134759
[TBL] [Abstract][Full Text] [Related]
15. Organizational repertoires and rites in health information security.
Cooper T; Collmann J; Neidermeier H
Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
[No Abstract] [Full Text] [Related]
16. Information becomes lifeblood of reform. Interview by Carolyn Dunbar.
Silva JS
Comput Healthc; 1993 Nov; 14(12):14-5, 18, 20. PubMed ID: 10129667
[TBL] [Abstract][Full Text] [Related]
17. Panel calls for improved security for medical records.
AIDS Policy Law; 1997 Mar; 12(5):3. PubMed ID: 11364165
[TBL] [Abstract][Full Text] [Related]
18. Enterprise integration. The CIO tapes. Roundtable discussion.
Anderson M; Bates L; Brickman RD; Garrin P; Jones MR; Joslyn S; Moloney R; Rierden B; Smith FJ; Sollish L; Straus JH; Swoben J; Wade JC; Walter DF
Health Manag Technol; 1997 Jul; 18(8):14-6, 18, 62. PubMed ID: 10169800
[No Abstract] [Full Text] [Related]
19. Computerized patient records.
Story RH
Ala Med; 1995 Jun; 64(12):22-7. PubMed ID: 7668194
[No Abstract] [Full Text] [Related]
20. Promoting health information networks while protecting patient confidentiality.
Carey MH
QRC Advis; 1995 Feb; 11(4):7-8. PubMed ID: 10140295
[No Abstract] [Full Text] [Related]
[Next] [New Search]