236 related articles for article (PubMed ID: 10168008)
1. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
2. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
Watson A
AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
[No Abstract] [Full Text] [Related]
3. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
4. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
5. Ethical guidance in Web site development.
Van Brunt D; Salehizadeh B
Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
[No Abstract] [Full Text] [Related]
6. Teaching effective security.
Siwicki B
Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
[No Abstract] [Full Text] [Related]
7. Protecting confidentiality in the Rockies.
Linton M; Clayton P
Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
[No Abstract] [Full Text] [Related]
8. Information management implications of federal health care reform.
Dowling AF
Healthc Inf Manage; 1994; 8(1):7-18. PubMed ID: 10131856
[No Abstract] [Full Text] [Related]
9. Data security.
Morrissey J
Mod Healthc; 1996 Sep; 26(40):32-3, 35-8, 40. PubMed ID: 10161903
[No Abstract] [Full Text] [Related]
10. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
11. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
12. Avoiding legal pitfalls in records automation.
Tomes JP
Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
[No Abstract] [Full Text] [Related]
13. Dialogue. Privacy protection: paper or computer records? Best strategies for clinical delivery systems.
Wald J
Behav Healthc Tomorrow; 1996 Feb; 5(1):39, 42, 44. PubMed ID: 10158448
[No Abstract] [Full Text] [Related]
14. Information technologies need to protect patient confidentiality.
Pendrak RF; Ericson RP
Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
[TBL] [Abstract][Full Text] [Related]
15. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
Aikins R; Anderson J
Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
[No Abstract] [Full Text] [Related]
16. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
17. By the rules: making security policies stick.
Zender A
J AHIMA; 1999 Oct; 70(9):62-5. PubMed ID: 10977407
[No Abstract] [Full Text] [Related]
18. Information security: how safe is your system?
Brandt M
Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
[No Abstract] [Full Text] [Related]
19. What you see; what you get. Agencies, employers clamping down on medical records snooping.
Blesch G
Mod Healthc; 2010 May; 40(18):14-5. PubMed ID: 20480556
[No Abstract] [Full Text] [Related]
20. Striking a balance between access and security.
Bunschoten B
Health Data Manag; 1996 May; 4(5):69-70, 72. PubMed ID: 10157341
[No Abstract] [Full Text] [Related]
[Next] [New Search]