221 related articles for article (PubMed ID: 11603347)
21. Securing information on the Internet.
Opel DD
Healthc Exec; 1998; 13(6):46-7. PubMed ID: 10186220
[No Abstract] [Full Text] [Related]
22. Striking a balance between access and security.
Bunschoten B
Health Data Manag; 1996 May; 4(5):69-70, 72. PubMed ID: 10157341
[No Abstract] [Full Text] [Related]
23. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
24. What you see; what you get. Agencies, employers clamping down on medical records snooping.
Blesch G
Mod Healthc; 2010 May; 40(18):14-5. PubMed ID: 20480556
[No Abstract] [Full Text] [Related]
25. Information age requires strategic security plans.
Baldwin G
Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931
[No Abstract] [Full Text] [Related]
26. Provider automation. Earning the public trust.
Watson S
Health Data Manag; 1996 Jan; 4(1):26-7. PubMed ID: 10154353
[No Abstract] [Full Text] [Related]
27. Strong authentication: knowing who's accessing your doctor portal.
Internet Healthc Strateg; 2004 Nov; 6(11):4-6. PubMed ID: 15603211
[No Abstract] [Full Text] [Related]
28. Protecting your records in an online world.
Pa Med; 2001; 104(1):10-2. PubMed ID: 11197136
[No Abstract] [Full Text] [Related]
29. Patient record security starts with privacy rights.
Exec Solut Healthc Manag; 1998 Jul; 1(5):15-6. PubMed ID: 10181811
[No Abstract] [Full Text] [Related]
30. Is confidentiality of the computerized patient record something that cannot be achieved, and does it really matter?
Med Interface; 1995 Mar; 8(3):14-5. PubMed ID: 10141386
[No Abstract] [Full Text] [Related]
31. Safe and secure. Interview by Bill Siwicki.
Baker DB
Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
[No Abstract] [Full Text] [Related]
32. The official position of American Health Information Management Association. Issue: Confidential health information and the Internet.
J AHIMA; 1998 Jan; 69(1):suppl 2 p. following 8. PubMed ID: 10174716
[No Abstract] [Full Text] [Related]
33. Managing data security: developing a plan to protect patient data.
Waldo BH
Nurs Econ; 1999; 17(1):49-52. PubMed ID: 10335222
[No Abstract] [Full Text] [Related]
34. Protecting patient confidentiality.
Minard BF; Hofmann PB; James A
Healthc Exec; 1996; 11(2):12-6. PubMed ID: 10156288
[No Abstract] [Full Text] [Related]
35. Data security.
Morrissey J
Mod Healthc; 1996 Sep; 26(40):32-3, 35-8, 40. PubMed ID: 10161903
[No Abstract] [Full Text] [Related]
36. How safe are computerized patient records?
Kibbe D; Bard MR
Fam Pract Manag; 1997 May; 4(5):34-6, 41-4, 46 passim. PubMed ID: 10184800
[No Abstract] [Full Text] [Related]
37. A computer science approach to managing security in health care.
Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
[TBL] [Abstract][Full Text] [Related]
38. Policy management and access control in practice.
Nordberg R
Stud Health Technol Inform; 2004; 103():428-33. PubMed ID: 15747951
[TBL] [Abstract][Full Text] [Related]
39. How secure is your palm-top?
Hill DB
Fam Pract Manag; 2001; 8(7):13. PubMed ID: 11477946
[No Abstract] [Full Text] [Related]
40. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
[Previous] [Next] [New Search]