102 related articles for article (PubMed ID: 10169949)
1. Perhaps pigs do fly!
Keever GW
Healthc Inform; 1997 Aug; 14(8):88. PubMed ID: 10169949
[No Abstract] [Full Text] [Related]
2. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
3. Is the future in the palm of your hand?
Briggs B
Health Data Manag; 2002 Jan; 10(1):44-52, 54-8, 60-2. PubMed ID: 11828962
[No Abstract] [Full Text] [Related]
4. Is the future in the cards?
Dakins DR
Health Data Manag; 2001 Jul; 9(7):44-8. PubMed ID: 11464725
[TBL] [Abstract][Full Text] [Related]
5. Eight steps to integrating security standards.
Happ J;
Biomed Instrum Technol; 2006; Suppl():22-4. PubMed ID: 16596845
[No Abstract] [Full Text] [Related]
6. Safe and secure. Interview by Bill Siwicki.
Baker DB
Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
[No Abstract] [Full Text] [Related]
7. Federal guidance outlines requirements for the use of portable devices.
Mancino PB; Gulick SL
J Am Coll Radiol; 2007 Aug; 4(8):523-4. PubMed ID: 17660113
[No Abstract] [Full Text] [Related]
8. Cradle-to-grave records: U.S. project sets standards.
Page D
Diagn Imaging (San Franc); 1999 Sep; Suppl():P5, P7. PubMed ID: 10623312
[No Abstract] [Full Text] [Related]
9. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
10. Thin is in: web-based systems enhance security, clinical quality.
Sausser GD
Healthc Financ Manage; 2003 Jul; 57(7):86-9. PubMed ID: 12866161
[No Abstract] [Full Text] [Related]
11. Security, durability & portable computers.
Miller D
Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
[No Abstract] [Full Text] [Related]
12. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
13. EHR meltdown: how to protect your patient data.
Schackow TE; Palmer T; Epperly T
Fam Pract Manag; 2008 Jun; 15(6):A3-8. PubMed ID: 18595558
[No Abstract] [Full Text] [Related]
14. The computerized patient record.
Usher JL
Caring; 1997 Dec; 16(12):32-4, 36. PubMed ID: 10176253
[TBL] [Abstract][Full Text] [Related]
15. With worries galore, should health care rely on the Internet?
Siwicki B
Health Data Manag; 1998 Dec; 6(12):26-8, 30. PubMed ID: 10187486
[TBL] [Abstract][Full Text] [Related]
16. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
17. No alteration without authorization. Configuration management can select and arrange data as desired--while also protecting its content.
Brown CL; Gentles IM
Healthc Inform; 2004 Apr; 21(4):41-3. PubMed ID: 15116516
[No Abstract] [Full Text] [Related]
18. New Year's resolutions.
Lowes R
Med Econ; 2005 Jan; 82(1):16-7. PubMed ID: 15696883
[No Abstract] [Full Text] [Related]
19. JCAHO surveys stress Y2K solutions.
Hosp Peer Rev; 1999 May; 24(5):69-70. PubMed ID: 10623125
[No Abstract] [Full Text] [Related]
20. Readers' perspective. "By 2010 biometric security technology will be commonly used to protect patient information".
Altee K; McLaughlin N; Corkhill E; Beavans I; Broderick M; Green M
Health Data Manag; 2004 Jan; 12(1):64. PubMed ID: 14725112
[No Abstract] [Full Text] [Related]
[Next] [New Search]