221 related articles for article (PubMed ID: 11603347)
1. Ethical guidance in Web site development.
Van Brunt D; Salehizadeh B
Healthc Exec; 2001; 16(5):68-9. PubMed ID: 11603347
[No Abstract] [Full Text] [Related]
2. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
3. Confidentiality principles for medical records on the World Wide Web.
Rind DM; Safran C
Stud Health Technol Inform; 1998; 52 Pt 2():1148-50. PubMed ID: 10384639
[TBL] [Abstract][Full Text] [Related]
4. Teaching effective security.
Siwicki B
Health Data Manag; 1998 Nov; 6(11):84, 86-7. PubMed ID: 10185899
[No Abstract] [Full Text] [Related]
5. Putting a lock on records.
Fuller SR
Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008
[No Abstract] [Full Text] [Related]
6. Protecting confidentiality & improving health.
Coleman D
Healthplan; 1998; 39(6):38-43. PubMed ID: 10351346
[No Abstract] [Full Text] [Related]
7. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
8. Protecting confidentiality in the Rockies.
Linton M; Clayton P
Healthplan; 1999; 40(5):63-6. PubMed ID: 10622970
[No Abstract] [Full Text] [Related]
9. Security considerations when choosing an EMR system.
Mendoza E
Health Manag Technol; 2003 Oct; 24(10):48. PubMed ID: 14535124
[No Abstract] [Full Text] [Related]
10. Healthcare 2020: political challenges in the information age.
Coile RC; Trusko BE
Health Manag Technol; 1999 Oct; 20(9):26-7, 29. PubMed ID: 10622886
[No Abstract] [Full Text] [Related]
11. How to encrypt medical data against intrusion.
Langer S
Diagn Imaging (San Franc); 2000 Aug; 22(8):69-71, 79. PubMed ID: 11066448
[No Abstract] [Full Text] [Related]
12. Avoiding legal pitfalls in records automation.
Tomes JP
Health Data Manag; 1994 Mar; 2(2):61-4. PubMed ID: 10154872
[No Abstract] [Full Text] [Related]
13. Charting a new course in privacy.
Chin TL
Health Data Manag; 1997 May; 5(5):51-2, 54. PubMed ID: 10167249
[No Abstract] [Full Text] [Related]
14. Initiatives and experiences in developing, implementing, and administering data security and confidentiality policies.
Aikins R; Anderson J
Healthc Inf Manage; 1998; 12(1):51-7. PubMed ID: 10179267
[No Abstract] [Full Text] [Related]
15. Maintaining confidentiality: health care's ongoing dilemma.
Dowd SB; Dowd LP
Health Care Superv; 1996 Sep; 15(1):24-31. PubMed ID: 10159637
[TBL] [Abstract][Full Text] [Related]
16. [Security specifications for electronic medical records on the Internet].
Mocanu M; Mocanu C
Oftalmologia; 2007; 51(4):7-13. PubMed ID: 18543666
[TBL] [Abstract][Full Text] [Related]
17. Is it safe? Security speed bumps on the information highway.
Bergeron BP
J Med Pract Manage; 2001; 16(6):297-300. PubMed ID: 11497309
[TBL] [Abstract][Full Text] [Related]
18. EHR in the perspective of security, integrity and ethics.
Nordberg R
Stud Health Technol Inform; 2006; 121():291-8. PubMed ID: 17095827
[TBL] [Abstract][Full Text] [Related]
19. Commentary: managing social, legal, and ethical issues of personal information systems.
Peladeau P
Top Health Inf Manage; 1996 May; 16(4):66-73. PubMed ID: 10157664
[TBL] [Abstract][Full Text] [Related]
20. Medical privacy. New technologies pose a threat.
Roberts SS
Diabetes Forecast; 2002 Dec; 55(12):57-9. PubMed ID: 14870705
[No Abstract] [Full Text] [Related]
[Next] [New Search]