160 related articles for article (PubMed ID: 10622970)
1. Protecting confidentiality in the Rockies.
Linton M; Clayton P
Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
[No Abstract] [Full Text] [Related]
2. Protecting confidentiality & improving health.
Coleman D
Healthplan; 1998; 39(6):38-43. PubMed ID: 10351346
[No Abstract] [Full Text] [Related]
3. Guarding patient confidentiality under managed care.
Walker LM
Med Econ; 1997 May; 74(10):155-6, 159-62, 168-70 passim. PubMed ID: 10167105
[No Abstract] [Full Text] [Related]
4. Enterprise integration. The CIO tapes. Roundtable discussion.
Anderson M; Bates L; Brickman RD; Garrin P; Jones MR; Joslyn S; Moloney R; Rierden B; Smith FJ; Sollish L; Straus JH; Swoben J; Wade JC; Walter DF
Health Manag Technol; 1997 Jul; 18(8):14-6, 18, 62. PubMed ID: 10169800
[No Abstract] [Full Text] [Related]
5. Ending the paper chase. Health plans are weighing the benefits and drawbacks of computer-based patient record systems.
Stevens L
Healthplan; 1996; 37(6):44-8, 50-1. PubMed ID: 10162985
[No Abstract] [Full Text] [Related]
6. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
7. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
8. Ethical guidance in Web site development.
Van Brunt D; Salehizadeh B
Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
[No Abstract] [Full Text] [Related]
9. Protecting patient confidentiality.
Minard BF; Hofmann PB; James A
Healthc Exec; 1996; 11(2):12-6. PubMed ID: 10156288
[No Abstract] [Full Text] [Related]
10. Confidentiality of electronic medical records in the managed care environment.
Dhir KS; Aggarwal SS
J Health Hum Serv Adm; 1998; 21(1):80-91. PubMed ID: 10345543
[TBL] [Abstract][Full Text] [Related]
11. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
12. Teaching effective security.
Siwicki B
Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
[No Abstract] [Full Text] [Related]
13. Clinical data repository: one stop shopping for data.
Swartz D
Telemed Today; 1999 Oct; 7(5):26-8. PubMed ID: 10848008
[No Abstract] [Full Text] [Related]
14. Avoiding legal pitfalls in records automation.
Tomes JP
Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
[No Abstract] [Full Text] [Related]
15. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
16. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
Aikins R; Anderson J
Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
[No Abstract] [Full Text] [Related]
17. Information technology, best practices, and care management: Part I.
Finch M
Manag Care Interface; 1998 Nov; 11(11):96-8. PubMed ID: 10187423
[TBL] [Abstract][Full Text] [Related]
18. Managed care, electronic charting and documentation.
Farrell TW
Benders Health Care Law Mon; 1995 Dec; ():10-4. PubMed ID: 10158646
[No Abstract] [Full Text] [Related]
19. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.
Ilioudis C; Pangalos G
J Med Internet Res; 2001; 3(2):E14. PubMed ID: 11720956
[TBL] [Abstract][Full Text] [Related]
20. Provider automation. Earning the public trust.
Watson S
Health Data Manag; 1996 Jan; 4(1):26-7. PubMed ID: 10154353
[No Abstract] [Full Text] [Related]
[Next] [New Search]