These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
22. HIPAA watch. Securing the perimeter. Higgins M Health Manag Technol; 2000 Dec; 21(12):8, 10, 12. PubMed ID: 11142001 [No Abstract] [Full Text] [Related]
23. Mobile tech gets security check. Schuerenberg BK Health Data Manag; 2003 Nov; 11(11):54-7. PubMed ID: 14619104 [No Abstract] [Full Text] [Related]
24. Insecurity. How safe are your data? Schneider P Healthc Inform; 1997 Apr; 14(4):76-8, 80, 82-6. PubMed ID: 10166770 [No Abstract] [Full Text] [Related]
25. Formal policies for flexible EHR security. Blobel B; Pharow P Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829 [TBL] [Abstract][Full Text] [Related]
26. Wireless network safe and secure. Helgeson L Health Data Manag; 2005 Feb; 13(2):110, 112, 114. PubMed ID: 15913103 [No Abstract] [Full Text] [Related]
27. Addressing security in the networking era. Siwicki B Health Data Manag; 1996 Nov; 4(11):62-3, 65, 67-8. PubMed ID: 10162226 [No Abstract] [Full Text] [Related]
28. Privacy in an IT world: can it be? Brandt M Healthc Inform; 1996 Oct; 13(10):44, 46, 48. PubMed ID: 10162034 [No Abstract] [Full Text] [Related]
29. Bracing for a crash. While IT outages are rare, providers need a plan. Conn J Mod Healthc; 2012 May; 42(20):32-3. PubMed ID: 22666970 [No Abstract] [Full Text] [Related]
33. Safe and secure. Interview by Bill Siwicki. Baker DB Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946 [No Abstract] [Full Text] [Related]
34. Network operating systems. Is there a final answer? A. Unix, B. Windows, C. Novell, D. Linux. Briggs B Health Data Manag; 2000 Oct; 8(10):62-6, 68, 70 passim. PubMed ID: 11140317 [No Abstract] [Full Text] [Related]
35. [Computer viruses and computer network breakdowns threaten patient safety. Incident reports or Lex Maria reports required when the patient is at risk]. Boström U Lakartidningen; 2007 Jul 11-24; 104(28-29):2082-6. PubMed ID: 17702382 [No Abstract] [Full Text] [Related]
36. Commentary: Collaborating to Achieve a Mutual Cybersecurity Advantage. Hagestad B; Straumann A Biomed Instrum Technol; 2017; 51(1):34-39. PubMed ID: 28103101 [No Abstract] [Full Text] [Related]
37. Proceed with caution along the information superhighway. Rootenberg JD Calif Hosp; 1994; 8(6):8-10. PubMed ID: 10139104 [No Abstract] [Full Text] [Related]
38. It's 2002: how HIPAA--ready are you? Wilson KJ; McPherson CE Health Manag Technol; 2002 Jan; 23(1):14-5, 20. PubMed ID: 11808473 [No Abstract] [Full Text] [Related]
39. New data security regs to pose challenge to healthcare administrators. Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791 [No Abstract] [Full Text] [Related]
40. EHR in the perspective of security, integrity and ethics. Nordberg R Stud Health Technol Inform; 2006; 121():291-8. PubMed ID: 17095827 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]