471 related articles for article (PubMed ID: 10143650)
1. Data security: how much is enough?
Anderson HJ
Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
[No Abstract] [Full Text] [Related]
2. Keeping records private.
Cross M
Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
[No Abstract] [Full Text] [Related]
3. The impact of technology on the confidentiality of health information.
White AW; Wager KA; Lee FW
Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
[TBL] [Abstract][Full Text] [Related]
4. How healthy are firewalls? Rating their resistance.
Holzbaur H
Healthc Inform; 1997 Jun; 14(6):30-2, 34, 36 passim. PubMed ID: 10168128
[No Abstract] [Full Text] [Related]
5. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Provider recommendations for safeguarding patient confidentiality.
Webman D
Behav Healthc Tomorrow; 1994; 3(1):32, 37-8. PubMed ID: 10142495
[No Abstract] [Full Text] [Related]
6. As networks multiply, privacy concerns grow.
Siwicki B
Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
[TBL] [Abstract][Full Text] [Related]
7. Formal policies for flexible EHR security.
Blobel B; Pharow P
Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
[TBL] [Abstract][Full Text] [Related]
8. EHR in the perspective of security, integrity and ethics.
Nordberg R
Stud Health Technol Inform; 2006; 121():291-8. PubMed ID: 17095827
[TBL] [Abstract][Full Text] [Related]
9. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
10. Legal review: protecting the confidentiality and integrity of patient records.
McKenzie DJ
Top Health Inf Manage; 1997 May; 17(4):62-71. PubMed ID: 10168994
[TBL] [Abstract][Full Text] [Related]
11. Protecting individual privacy: a pothole on the information superhighway?
Patrikas EO
Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
[TBL] [Abstract][Full Text] [Related]
12. Privacy and security for electronic health records.
Sharpe VA
Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
[No Abstract] [Full Text] [Related]
13. How secure is the Internet for healthcare applications?
Campbell LA
Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
[TBL] [Abstract][Full Text] [Related]
14. Security and the Internet: healthcare's concerns and approaches to think, build, and operate solutions today.
Quinn J; Jaworski S; Toole J
Healthc Inf Manage; 1998; 12(1):81-92. PubMed ID: 10179270
[No Abstract] [Full Text] [Related]
15. Impact of enterprisewide data.
Frey LA; Bloomrosen M
Top Health Inf Manage; 1995 May; 15(4):31-43. PubMed ID: 10142452
[TBL] [Abstract][Full Text] [Related]
16. Private matters, public good.
Ziegler J
State Health Care Am; 1997; ():18-21. PubMed ID: 10168079
[TBL] [Abstract][Full Text] [Related]
17. Identity-management factors in e-health and telemedicine applications.
Savastano M; Hovsto A; Pharow P; Blobel B
J Telemed Telecare; 2008; 14(7):386-8. PubMed ID: 18852323
[TBL] [Abstract][Full Text] [Related]
18. Encryption grows in importance to physicians.
Health Data Manag; 1997 Sep; 5(9):56-8. PubMed ID: 10169999
[No Abstract] [Full Text] [Related]
19. Electronic medical records and social benefit records: issues of standardization and confidentiality.
Blocker WP
J AHIMA; 1992 Aug; 63(8):66-73. PubMed ID: 10119456
[No Abstract] [Full Text] [Related]
20. The adoption of IT security standards in a healthcare environment.
Gomes R; LapĆ£o LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]