146 related articles for article (PubMed ID: 10151258)
1. Rapist accesses patient records; MA hospitals mull criminal screening.
Hosp Secur Saf Manage; 1995 Sep; 16(5):1-4. PubMed ID: 10151258
[No Abstract] [Full Text] [Related]
2. Guidelines for minimal data security measures for the protection of computer-based patient records.
Gabrieli E
J Clin Comput; 1993; 22(1):1-48 concl. PubMed ID: 10131095
[No Abstract] [Full Text] [Related]
3. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
4. Gang members on your security staff? Check it out.
Hosp Secur Saf Manage; 1995 Aug; 16(4):1-3. PubMed ID: 10144426
[No Abstract] [Full Text] [Related]
5. Information security: how safe is your system?
Brandt M
Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
[No Abstract] [Full Text] [Related]
6. Data security: an update.
Hosp Secur Saf Manage; 1997 May; 18(1):5-8. PubMed ID: 10167758
[TBL] [Abstract][Full Text] [Related]
7. Security combines awareness with technology issues.
Braly D
Health Manag Technol; 1996 Sep; 17(10):42, 44. PubMed ID: 10160332
[No Abstract] [Full Text] [Related]
8. The metamorphosis of medical records.
Goedert J
Health Data Manag; 2004 Oct; 12(10):68, 72, 74 passim. PubMed ID: 15536826
[No Abstract] [Full Text] [Related]
9. Security standards for medical information systems.
Humphreys T
Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
[TBL] [Abstract][Full Text] [Related]
10. The role of enterprise person directories.
Gabler JM
Health Manag Technol; 1997 Oct; 18(11):40, 42, 44. PubMed ID: 10175204
[No Abstract] [Full Text] [Related]
11. Building a secure home: protecting individually identifiable patient information.
Keese JM
Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
[No Abstract] [Full Text] [Related]
12. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
13. Seeking for knowledge. Computer-based patient record (CPR) (paperless patient record).
Frimpong S
IHRIM; 1996 Nov; 37(4):10-4. PubMed ID: 10162784
[No Abstract] [Full Text] [Related]
14. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
15. When technology and health care collide: issues with electronic medical records and electronic mail.
Jurevic AM
UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
[No Abstract] [Full Text] [Related]
16. Guidelines for minimal data security measures for the protection of computer-based patient records.
Gabrieli ER
J Clin Comput; 1993; 21(6):139-82 contd. PubMed ID: 10184018
[No Abstract] [Full Text] [Related]
17. Juggling skills a must for health care CSOs.
Gillespie G
Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
[No Abstract] [Full Text] [Related]
18. A marriage of necessity: automated and manual systems.
Dorenfest S
Health Manag Technol; 1995 Apr; 16(5):25, 27. PubMed ID: 10141778
[No Abstract] [Full Text] [Related]
19. [Electronic patient records. Systems should be developed locally].
Therkelsen L
Sygeplejersken; 1994 Mar; 94(10):20-1, 32. PubMed ID: 7940218
[No Abstract] [Full Text] [Related]
20. Protecting patient data.
Frawley K
Qual Lett Healthc Lead; 1998 Jun; 10(6):10-3. PubMed ID: 10180625
[No Abstract] [Full Text] [Related]
[Next] [New Search]