These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. The EDITH approach: the management of authorisations and security in healthcare information systems. Ferrara FM Stud Health Technol Inform; 1996; 27():200-13. PubMed ID: 10163735 [TBL] [Abstract][Full Text] [Related]
3. Hospitals get a wireless makeover. Gillespie G Health Data Manag; 2005 Dec; 13(12):60, 62. PubMed ID: 16381496 [No Abstract] [Full Text] [Related]
4. The struggle to define what 'Intranet-enabled' really means. Siwicki B Health Data Manag; 1997 Dec; 5(12):40, 42-3. PubMed ID: 10184827 [No Abstract] [Full Text] [Related]
5. "Don't I know you? I'd recognize that fingerprint anywhere". Keener RE Health Manag Technol; 1999 Aug; 20(7):8-9. PubMed ID: 10620995 [No Abstract] [Full Text] [Related]
6. Addressing the new network security challenges. Siwicki B Health Data Manag; 1997 Dec; 5(12):45-6, 48. PubMed ID: 10175525 [No Abstract] [Full Text] [Related]
7. Authorization & security aspects in the middleware-based healthcare information system. Andany J; Bjorkendal C; Ferrara FM; Scherrer JR; Spahni S Stud Health Technol Inform; 1999; 68():315-20. PubMed ID: 10724897 [TBL] [Abstract][Full Text] [Related]
8. Securing the IT infrastructure. Protection can be solid and ongoing, even on a conservative budget. Norton RC Healthc Inform; 2004 Jan; 21(1):22. PubMed ID: 14763104 [No Abstract] [Full Text] [Related]
9. An interview with SAIC health solutions chief technology officer Dixie Baker. Interview by Richard D Lang. Baker D J Healthc Inf Manag; 2003; 17(3):31-2. PubMed ID: 12858594 [No Abstract] [Full Text] [Related]
11. A case for system security. Meason R Comput Healthc; 1986 Jun; 7(6):60, 62. PubMed ID: 10276649 [TBL] [Abstract][Full Text] [Related]
12. Is it safe? Security speed bumps on the information highway. Bergeron BP J Med Pract Manage; 2001; 16(6):297-300. PubMed ID: 11497309 [TBL] [Abstract][Full Text] [Related]
13. Physician-centered computers for storage and retrieval of clinical data. Read JS J Med Pract Manage; 1988; 4(2):102-6. PubMed ID: 10291256 [TBL] [Abstract][Full Text] [Related]
14. How to establish a computer security program. Isaacson G Health Care Secur Saf Manage; 1982 Jan; 2(9):5-9. PubMed ID: 10253810 [No Abstract] [Full Text] [Related]
15. Design and implementation of a smart card based healthcare information system. Kardas G; Tunali ET Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586 [TBL] [Abstract][Full Text] [Related]
16. Keeping the airwaves safe and secure. Increasing access to Wi-FI networks requires stronger tools to protect them. Schuerenberg BK Health Data Manag; 2005 Dec; 13(12):40, 42, 44, 46. PubMed ID: 16381493 [No Abstract] [Full Text] [Related]
17. Fundamentals and trade-offs of IT security. LaRochelle B Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984 [No Abstract] [Full Text] [Related]
18. Infrastructure upgrades a top priority, conference survey shows. Bunschoten B Health Data Manag; 1996 Apr; 4(4):8-9. PubMed ID: 10156040 [No Abstract] [Full Text] [Related]
19. Information technology security. Elliott AT Nucl Med Commun; 2003 Dec; 24(12):1205. PubMed ID: 14627845 [No Abstract] [Full Text] [Related]
20. Privacy and security for electronic health records. Sharpe VA Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204 [No Abstract] [Full Text] [Related] [Next] [New Search]