These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
104 related articles for article (PubMed ID: 10168451)
21. Infant hospital abduction: security measures to aid in prevention. Vincent JL MCN Am J Matern Child Nurs; 2009; 34(3):179-83. PubMed ID: 19550261 [TBL] [Abstract][Full Text] [Related]
22. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium. France FH; Bangels M; De Clercq E Int J Med Inform; 2007; 76(2-3):84-8. PubMed ID: 17126596 [TBL] [Abstract][Full Text] [Related]
23. Closing the door on wanderers. Bowers DM J Healthc Prot Manage; 1998-1999 Winter; 15(1):109-17. PubMed ID: 10346257 [TBL] [Abstract][Full Text] [Related]
24. Abnormal hematology patients: flagged and not forgotten. DeLaubell RL MLO Med Lab Obs; 1990 Nov; 22(11):55-6, 58. PubMed ID: 10109594 [No Abstract] [Full Text] [Related]
25. Safeguarding newborns: managing the risk. Nelson TE RN; 1999 Mar; 62(3):67-70. PubMed ID: 10205569 [No Abstract] [Full Text] [Related]
30. Design and implementation of a smart card based healthcare information system. Kardas G; Tunali ET Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586 [TBL] [Abstract][Full Text] [Related]
31. Patient registration. No one leaves home without it. Appleby C Hosp Health Netw; 1997 Feb; 71(3):72. PubMed ID: 9041805 [No Abstract] [Full Text] [Related]
32. What can we learn about patient safety from information sources within an acute hospital: a step on the ladder of integrated risk management? Hogan H; Olsen S; Scobie S; Chapman E; Sachs R; McKee M; Vincent C; Thomson R Qual Saf Health Care; 2008 Jun; 17(3):209-15. PubMed ID: 18519628 [TBL] [Abstract][Full Text] [Related]
33. Methodology development for quantitative optimization of security enhancement in medical information systems -Case study in a PACS and a multi-institutional radiotherapy database-. Haneda K; Umeda T; Koyama T; Harauchi H; Inamura K Igaku Butsuri; 2002; 22(4):302-17. PubMed ID: 12766275 [TBL] [Abstract][Full Text] [Related]
34. HIPAA violator will serve time. Taylor M Mod Healthc; 2004 Nov; 34(46):17. PubMed ID: 15609728 [No Abstract] [Full Text] [Related]
35. From tangled webs to network integrity: computer security in hospital management. Part II. Ravella JA; Gravel JL Hosp Mater Manage; 1987 Feb; 12(2):6-9. PubMed ID: 10301534 [TBL] [Abstract][Full Text] [Related]
36. What the security director should know about risk management. Chaff L J Healthc Prot Manage; 1987; 4(1):100-6. PubMed ID: 10285694 [TBL] [Abstract][Full Text] [Related]
37. Power plans. Enlighten your organization to the importance of preparedness. Hagland M Healthc Inform; 2005 Apr; 22(4):26-8. PubMed ID: 15913211 [No Abstract] [Full Text] [Related]
38. High-tech sentinels. The role of equipment in an overall security effort. Leonidas T; O'Donnel J Health Facil Manage; 2005 Jul; 18(7):25-9. PubMed ID: 16130373 [No Abstract] [Full Text] [Related]
39. VAs test smart cards for security, employee ID, cashless transfers. Hosp Secur Saf Manage; 1999 Oct; 20(6):3-4. PubMed ID: 10662012 [No Abstract] [Full Text] [Related]