These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
246 related articles for article (PubMed ID: 10157659)
1. Implementation of information security and confidentiality policies, procedures, and standards. Perry JW Top Health Inf Manage; 1996 May; 16(4):28-43. PubMed ID: 10157659 [TBL] [Abstract][Full Text] [Related]
2. Implementing a clinical information system. Curtis EH; Patterson VR Top Health Rec Manage; 1991 Aug; 12(1):10-21. PubMed ID: 10112159 [TBL] [Abstract][Full Text] [Related]
3. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
4. The new bedside manner: computer terminals--implementation issues. Walker N Top Health Inf Manage; 1993 May; 13(4):63-76. PubMed ID: 10139113 [TBL] [Abstract][Full Text] [Related]
5. High level security policies for health: from theory to practice. Defteraios S; Lambrinoudakis C; Gritzalis D Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949 [TBL] [Abstract][Full Text] [Related]
7. Frontier hospitals pursue computer record as national effort moves on. Hosp Patient Relat Rep; 1992 May; 7(5):4-5. PubMed ID: 10118688 [No Abstract] [Full Text] [Related]
8. Maintaining patient confidentiality in an electronic world. Marr P Int J Biomed Comput; 1994 Feb; 35 Suppl():213-7. PubMed ID: 8188417 [TBL] [Abstract][Full Text] [Related]
9. Standards for confidentiality, privacy, access, and data security. Hanken MA Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660 [TBL] [Abstract][Full Text] [Related]
10. AAMT (American Association for Medical Transcription) speaks out on confidentiality, privacy, and patient care documentation. J Am Assoc Med Transcr; 1995; 14(4):42, 44-7. PubMed ID: 10143813 [TBL] [Abstract][Full Text] [Related]
11. Implementing a mainframe coding/abstracting system. Paige L Top Health Inf Manage; 1992 Aug; 13(1):27-34. PubMed ID: 10122868 [TBL] [Abstract][Full Text] [Related]
12. EMR confidentiality and information security. Kurtz G J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596 [TBL] [Abstract][Full Text] [Related]
13. EDMS: what it was, is, and could be. Foster JT Top Health Inf Manage; 2002 Aug; 23(1):42-51. PubMed ID: 12402635 [TBL] [Abstract][Full Text] [Related]
14. Security standards for medical information systems. Humphreys T Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728 [TBL] [Abstract][Full Text] [Related]
15. Government health information security standards. Beat the clock by developing security strategies now. Fuller SR Healthc Inform; 1997 Nov; 14(11):63-4, 66. PubMed ID: 10174847 [No Abstract] [Full Text] [Related]
16. Information security: how safe is your system? Brandt M Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279 [No Abstract] [Full Text] [Related]
17. Security and confidentiality in an electronic medical record. Olson LA; Peters SG; Stewart JB Healthc Inf Manage; 1998; 12(1):27-37. PubMed ID: 10179264 [TBL] [Abstract][Full Text] [Related]
18. Adding it up. Implementing an EMR is one thing, documenting the financials along the way is another. Gunasekaran S Healthc Inform; 2007 Sep; 24(9):48-9. PubMed ID: 17927066 [No Abstract] [Full Text] [Related]
19. Formal policies for flexible EHR security. Blobel B; Pharow P Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829 [TBL] [Abstract][Full Text] [Related]