These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
112 related articles for article (PubMed ID: 11809662)
1. Authorised clinical staff need access to clinical information. Hutchon D BMJ; 2002 Jan; 324(7331):240. PubMed ID: 11809662 [No Abstract] [Full Text] [Related]
2. AHIMA's satellite conference: finding the keys to information security. Rippa C J AHIMA; 1997 Mar; 68(3):66-70. PubMed ID: 10165184 [No Abstract] [Full Text] [Related]
3. Cold front. Whittle S Health Serv J; 2003 Jul; 113(5865):suppl 13-5. PubMed ID: 12899001 [No Abstract] [Full Text] [Related]
4. Translating the language of security. Amatayakul M; J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390 [No Abstract] [Full Text] [Related]
5. Fundamentals and trade-offs of IT security. LaRochelle B Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984 [No Abstract] [Full Text] [Related]
6. The six safety first principles of health information systems: a programme of implementation. Part 1. Safety and security. Barber B; Jensen OA; Lamberts H; Roger-France F; De Schouwer P; Zöllner H Stud Health Technol Inform; 1991; 1():296-301. PubMed ID: 10164074 [No Abstract] [Full Text] [Related]
8. Image integrity verification in medical information systems. Lenti J; Lovanyi I Stud Health Technol Inform; 2003; 95():286-91. PubMed ID: 14664001 [TBL] [Abstract][Full Text] [Related]
9. Security standards for medical information systems. Humphreys T Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728 [TBL] [Abstract][Full Text] [Related]
10. High level security policies for health: from theory to practice. Defteraios S; Lambrinoudakis C; Gritzalis D Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949 [TBL] [Abstract][Full Text] [Related]
11. Standards for confidentiality, privacy, access, and data security. Hanken MA Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660 [TBL] [Abstract][Full Text] [Related]
12. Confidentiality principles for medical records on the World Wide Web. Rind DM; Safran C Stud Health Technol Inform; 1998; 52 Pt 2():1148-50. PubMed ID: 10384639 [TBL] [Abstract][Full Text] [Related]
13. Info-vigilance or safety in health information systems. Barber B; Allaert FA; Kluge EH Stud Health Technol Inform; 2001; 84(Pt 2):1229-33. PubMed ID: 11604924 [TBL] [Abstract][Full Text] [Related]
14. A formal, mathematics oriented method for identifying security risks in information systems. van Piggelen HU Stud Health Technol Inform; 1997; 43 Pt A():191-5. PubMed ID: 10179535 [TBL] [Abstract][Full Text] [Related]
15. [Confidentiality of computerized medical records systems]. Eliasson G; Björgell P Lakartidningen; 1995 Jan; 92(1-2):59-60. PubMed ID: 7830466 [No Abstract] [Full Text] [Related]
16. A legal examination of format, signature and confidentiality aspects of computerized health information. Robinson DM Health Law Can; 1997 Feb; 17(3):80-6. PubMed ID: 10165693 [No Abstract] [Full Text] [Related]
19. Building a secure home: protecting individually identifiable patient information. Keese JM Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563 [No Abstract] [Full Text] [Related]
20. Privilege management and access control in Shared Care IS and EHR. Blobel B; Nordberg R Stud Health Technol Inform; 2003; 95():251-6. PubMed ID: 14663995 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]