328 related articles for article (PubMed ID: 10166454)
1. Ambulatory care computerized patient record systems: benchmark security features and safeguards.
Ripps AS
J AHIMA; 1997 May; 68(5):32-4. PubMed ID: 10166454
[TBL] [Abstract][Full Text] [Related]
2. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record.
Nagle CE
Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480
[No Abstract] [Full Text] [Related]
3. Privacy protections afforded by computer-based patient record systems.
Amatayakul M
Top Health Inf Manage; 1996 May; 16(4):22-7. PubMed ID: 10157658
[TBL] [Abstract][Full Text] [Related]
4. Data security, job security. Attendees at annual AHIMA conference turn attention to legal, staffing issues.
Conn J
Mod Healthc; 2007 Oct; 37(41):31. PubMed ID: 17972495
[No Abstract] [Full Text] [Related]
5. Privacy and security for electronic health records.
Sharpe VA
Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
[No Abstract] [Full Text] [Related]
6. Privacy and security requirements of distributed computer based patient records.
Moehr JR
Int J Biomed Comput; 1994 Feb; 35 Suppl():57-64. PubMed ID: 8188423
[TBL] [Abstract][Full Text] [Related]
7. Standards for confidentiality, privacy, access, and data security.
Hanken MA
Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660
[TBL] [Abstract][Full Text] [Related]
8. Security requirements for electronic patients records: the Norwegian view.
Iversen KR
Int J Biomed Comput; 1994 Feb; 35 Suppl():51-6. PubMed ID: 8188422
[TBL] [Abstract][Full Text] [Related]
9. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records.
Barrows RC; Clayton PD
Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447
[TBL] [Abstract][Full Text] [Related]
10. Bound or gagged? Privacy, confidentiality and CPR.
La Puma J
Manag Care; 1996 Sep; 5(9):53-4. PubMed ID: 10162182
[No Abstract] [Full Text] [Related]
11. Contemporary issues in HIM. Kerberos--security for sensitive data.
Pinkert JR
J AHIMA; 1994 Jun; 65(6):22-4, 26-8; quiz 56-7. PubMed ID: 10134105
[TBL] [Abstract][Full Text] [Related]
12. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
13. Mobile health requires mobile security: challenges, solutions, and standardization.
Pharow P; Blobel B
Stud Health Technol Inform; 2008; 136():697-702. PubMed ID: 18487813
[TBL] [Abstract][Full Text] [Related]
14. Privacy and medical record information.
Agich GJ
J Am Med Inform Assoc; 1994; 1(4):323-4. PubMed ID: 7719817
[No Abstract] [Full Text] [Related]
15. 3 keys to security.
Joch A
Hosp Health Netw; 2004 Jan; 78(1):40-4, 2. PubMed ID: 14768450
[TBL] [Abstract][Full Text] [Related]
16. Security standards for medical information systems.
Humphreys T
Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
[TBL] [Abstract][Full Text] [Related]
17. Privacy and security compliance in the E-healthcare marketplace.
Lutes M
Healthc Financ Manage; 2000 Mar; 54(3):48-50. PubMed ID: 10847915
[TBL] [Abstract][Full Text] [Related]
18. Protecting individual privacy: a pothole on the information superhighway?
Patrikas EO
Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
[TBL] [Abstract][Full Text] [Related]
19. Formal policies for flexible EHR security.
Blobel B; Pharow P
Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
[TBL] [Abstract][Full Text] [Related]
20. Private matters, public good.
Ziegler J
State Health Care Am; 1997; ():18-21. PubMed ID: 10168079
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]