These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
137 related articles for article (PubMed ID: 10134105)
1. Contemporary issues in HIM. Kerberos--security for sensitive data. Pinkert JR J AHIMA; 1994 Jun; 65(6):22-4, 26-8; quiz 56-7. PubMed ID: 10134105 [TBL] [Abstract][Full Text] [Related]
2. Ambulatory care computerized patient record systems: benchmark security features and safeguards. Ripps AS J AHIMA; 1997 May; 68(5):32-4. PubMed ID: 10166454 [TBL] [Abstract][Full Text] [Related]
3. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection. Caruso RD Radiographics; 2004; 24(5):1503-12. PubMed ID: 15371625 [TBL] [Abstract][Full Text] [Related]
4. Privacy and security requirements of distributed computer based patient records. Moehr JR Int J Biomed Comput; 1994 Feb; 35 Suppl():57-64. PubMed ID: 8188423 [TBL] [Abstract][Full Text] [Related]
5. Formal policies for flexible EHR security. Blobel B; Pharow P Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829 [TBL] [Abstract][Full Text] [Related]
6. Privacy and medical record information. Agich GJ J Am Med Inform Assoc; 1994; 1(4):323-4. PubMed ID: 7719817 [No Abstract] [Full Text] [Related]
7. Computer security and data confidentiality. Schmaus D AORN J; 1991 Oct; 54(4):885-90. PubMed ID: 1952911 [No Abstract] [Full Text] [Related]
8. Standards for confidentiality, privacy, access, and data security. Hanken MA Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660 [TBL] [Abstract][Full Text] [Related]
9. Implementing security in computer based patient records clinical experiences. Iversen KR; Heimly V; Lundgren TI Medinfo; 1995; 8 Pt 1():657-60. PubMed ID: 8591292 [TBL] [Abstract][Full Text] [Related]
10. Security requirements for electronic patients records: the Norwegian view. Iversen KR Int J Biomed Comput; 1994 Feb; 35 Suppl():51-6. PubMed ID: 8188422 [TBL] [Abstract][Full Text] [Related]
11. Data security. A token effort. Bazzoli F Health Data Manag; 1998 Apr; 6(4):106-9. PubMed ID: 10179379 [No Abstract] [Full Text] [Related]
12. The value of HIM in and security privacy compliance. Amatayakul M J AHIMA; 2007 May; 78(5):44-6; quiz 49-50. PubMed ID: 17552321 [No Abstract] [Full Text] [Related]
13. The computer-based patient record: risks, security, and the HIM role. Picukaric JM J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259 [No Abstract] [Full Text] [Related]
14. Utilizing SELinux to mandate ultra-secure access control of medical records. Croll PR; Henricksen M; Caelli B; Liu V Stud Health Technol Inform; 2007; 129(Pt 1):498-502. PubMed ID: 17911767 [TBL] [Abstract][Full Text] [Related]
15. Legal issues of the electronic dental record: security and confidentiality. Szekely DG; Milam S; Khademi JA J Dent Educ; 1996 Jan; 60(1):19-23. PubMed ID: 8594098 [TBL] [Abstract][Full Text] [Related]
16. UAMS unit charts course to paperless office. Gardner N J Ark Med Soc; 1999 Aug; 96(3):92-4. PubMed ID: 10483151 [No Abstract] [Full Text] [Related]