These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
224 related articles for article (PubMed ID: 11951384)
1. Including Internet insurance as part of a hospital computer network security plan. Riccardi K J Healthc Prot Manage; 2002; 18(1):119-22. PubMed ID: 11951384 [TBL] [Abstract][Full Text] [Related]
3. Information security strategy: questions you wish the CEO would ask. Ennis JB J Healthc Inf Manag; 2003; 17(3):5-8. PubMed ID: 12858586 [No Abstract] [Full Text] [Related]
4. e-health rises from the ashes. Briggs B Health Data Manag; 2003 Jan; 11(1):40-1, 44, 46 passim. PubMed ID: 12561737 [No Abstract] [Full Text] [Related]
5. Watch dog sniffs out weak links. Briggs B Health Data Manag; 2003 Feb; 11(2):38-40, 42. PubMed ID: 12602284 [No Abstract] [Full Text] [Related]
6. Strengthening system security to prepare for HIPAA. Shehata A Health Manag Technol; 2002 Sep; 23(9):14-5, 19. PubMed ID: 12232896 [No Abstract] [Full Text] [Related]
7. Are you safe from cyber-attacks? Chyna JT Healthc Exec; 2001; 16(1):65-6. PubMed ID: 11151648 [No Abstract] [Full Text] [Related]
8. Build your Website on a budget. Rogoski RR Health Manag Technol; 2001 May; 22(5):48-9. PubMed ID: 11351822 [No Abstract] [Full Text] [Related]
9. Boosting IT immunity. Expanding computer networks and widespread use of the Internet leave healthcare systems highly vulnerable to viral attacks. Morrissey J Mod Healthc; 2004 Feb; 34(8):40-1, 56-8. PubMed ID: 15015397 [No Abstract] [Full Text] [Related]
10. From tangled webs to network integrity: computer security in hospital management. Part II. Ravella JA; Gravel JL Hosp Mater Manage; 1987 Feb; 12(2):6-9. PubMed ID: 10301534 [TBL] [Abstract][Full Text] [Related]
11. Small fix reaps big rewards. Goedert J Health Data Manag; 2002 Aug; 10(8):24-6, 28, 30. PubMed ID: 12222004 [No Abstract] [Full Text] [Related]
12. Figuring ROI: how much is your site worth to your organization? Internet Healthc Strateg; 2003 Sep; 5(9):9-12. PubMed ID: 14552048 [TBL] [Abstract][Full Text] [Related]
13. The final security rule. Compliance begins with risk analysis. Adler MP Healthc Inform; 2003 Oct; 20(10):74-6. PubMed ID: 14598463 [No Abstract] [Full Text] [Related]
14. New uses, new dangers. Hospital data infrastructures expand as information security gains importance. Hoppszallern S Health Facil Manage; 2002 Nov; 15(11):28-9. PubMed ID: 12449091 [No Abstract] [Full Text] [Related]
15. [Study on network architecture of a tele-medical information sharing platform]. Pan L; Yu L; Chen JX Zhongguo Yi Liao Qi Xie Za Zhi; 2006 Jul; 30(4):293-5. PubMed ID: 17039943 [TBL] [Abstract][Full Text] [Related]
16. Remote control. North Carolina IDN chooses SSL access to ensure HIPAA compliance. Kluttz J Health Manag Technol; 2003 Aug; 24(8):24-5. PubMed ID: 12924056 [No Abstract] [Full Text] [Related]
17. Determining the right level for your IT security investment. Claunch D; McMillan M Healthc Financ Manage; 2013 May; 67(5):100-3. PubMed ID: 23678697 [TBL] [Abstract][Full Text] [Related]
18. [The realigation of hospital computer network system based on Intranet/Internet]. Xu H; Xin HY Zhongguo Yi Liao Qi Xie Za Zhi; 2000 Sep; 24(5):295-9. PubMed ID: 12583028 [TBL] [Abstract][Full Text] [Related]
19. Making a commitment to IT. Greene J Trustee; 2005 Feb; 58(2):10-4, 19, 3. PubMed ID: 15926355 [TBL] [Abstract][Full Text] [Related]