585 related articles for article (PubMed ID: 10620984)
1. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
2. How healthy are firewalls? Rating their resistance.
Holzbaur H
Healthc Inform; 1997 Jun; 14(6):30-2, 34, 36 passim. PubMed ID: 10168128
[No Abstract] [Full Text] [Related]
3. Keeping records private.
Cross M
Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
[No Abstract] [Full Text] [Related]
4. Data security: how much is enough?
Anderson HJ
Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
[No Abstract] [Full Text] [Related]
5. Organizational repertoires and rites in health information security.
Cooper T; Collmann J; Neidermeier H
Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
[No Abstract] [Full Text] [Related]
6. Safe and secure. Interview by Bill Siwicki.
Baker DB
Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
[No Abstract] [Full Text] [Related]
7. Privacy and security for electronic health records.
Sharpe VA
Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
[No Abstract] [Full Text] [Related]
8. The impact of technology on the confidentiality of health information.
White AW; Wager KA; Lee FW
Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
[TBL] [Abstract][Full Text] [Related]
9. 21st century information systems for integrated delivery systems.
Pryor D
Behav Healthc Tomorrow; 1996 Dec; 5(6):80, 78-9. PubMed ID: 10163201
[No Abstract] [Full Text] [Related]
10. High level security policies for health: from theory to practice.
Defteraios S; Lambrinoudakis C; Gritzalis D
Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
[TBL] [Abstract][Full Text] [Related]
11. Encryption grows in importance to physicians.
Health Data Manag; 1997 Sep; 5(9):56-8. PubMed ID: 10169999
[No Abstract] [Full Text] [Related]
12. Health care, CHIN (community health information network) technology, and privacy.
Brown L; Brown D
Healthc Inf Manage; 1995; 9(2):35-42. PubMed ID: 10143327
[No Abstract] [Full Text] [Related]
13. As networks multiply, privacy concerns grow.
Siwicki B
Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
[TBL] [Abstract][Full Text] [Related]
14. Formal policies for flexible EHR security.
Blobel B; Pharow P
Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
[TBL] [Abstract][Full Text] [Related]
15. Linking claims to automated medical records.
Anderson HJ; Leech E
Med Claims Manag; 1993; 1(1):60-3. PubMed ID: 10143615
[No Abstract] [Full Text] [Related]
16. New security rules aim to tighten up access to data.
Carrington C
Diagn Imaging (San Franc); 1999 Feb; 21(2):51-4. PubMed ID: 10351549
[No Abstract] [Full Text] [Related]
17. The official position of American Health Information Management Association. Issue: Confidential health information and the Internet.
J AHIMA; 1998 Jan; 69(1):suppl 2 p. following 8. PubMed ID: 10174716
[No Abstract] [Full Text] [Related]
18. Protecting individual privacy: a pothole on the information superhighway?
Patrikas EO
Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
[TBL] [Abstract][Full Text] [Related]
19. The adoption of IT security standards in a healthcare environment.
Gomes R; LapĆ£o LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
20. Data security. Raising the drawbridge.
Balaban D
Health Data Manag; 1998 Aug; 6(8):81-2. PubMed ID: 10181954
[No Abstract] [Full Text] [Related]
[Next] [New Search]