406 related articles for article (PubMed ID: 12017105)
1. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
2. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
3. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
4. Is the future in the cards?
Dakins DR
Health Data Manag; 2001 Jul; 9(7):44-8. PubMed ID: 11464725
[TBL] [Abstract][Full Text] [Related]
5. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
Watson A
AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
[No Abstract] [Full Text] [Related]
6. When technology and health care collide: issues with electronic medical records and electronic mail.
Jurevic AM
UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
[No Abstract] [Full Text] [Related]
7. The HIPAA prescription for healthcare--why isn't it working?
Gue DG; Upham R
Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
[No Abstract] [Full Text] [Related]
8. Juggling skills a must for health care CSOs.
Gillespie G
Health Data Manag; 2001 Jan; 9(1):50-2, 54, 56. PubMed ID: 11209207
[No Abstract] [Full Text] [Related]
9. Can chief security officers protect data from prying eyes?
Siwicki B
Health Data Manag; 1998 Oct; 6(10):54-6, 58, 60 passim. PubMed ID: 10185885
[TBL] [Abstract][Full Text] [Related]
10. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.
Marshall GF; Gillespie W; Fox SJ
J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739
[TBL] [Abstract][Full Text] [Related]
11. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
12. No alteration without authorization. Configuration management can select and arrange data as desired--while also protecting its content.
Brown CL; Gentles IM
Healthc Inform; 2004 Apr; 21(4):41-3. PubMed ID: 15116516
[No Abstract] [Full Text] [Related]
13. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
14. Instant virtual extranets. A new breed of technology offers another alternative for secure, remote data access.
Matlof J
Healthc Inform; 2002 Oct; 19(10):80. PubMed ID: 12440310
[No Abstract] [Full Text] [Related]
15. Smart cards knock at healthcare's door.
Hagland M
Healthc Inform; 2000 Oct; 17(10):77-8, 80, 82. PubMed ID: 11141749
[No Abstract] [Full Text] [Related]
16. Tales from the front.
Briggs B
Health Data Manag; 2001 May; 9(5):34-8, 42, 44. PubMed ID: 11372455
[No Abstract] [Full Text] [Related]
17. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
18. The informatics nurse specialist as privacy officer.
Malloy NP
J Healthc Inf Manag; 2003; 17(3):54-8. PubMed ID: 12858598
[TBL] [Abstract][Full Text] [Related]
19. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
20. Hospital looks for data security, also gets improved productivity.
Data Strateg Benchmarks; 2001 Jul; 5(7):107-10, 97. PubMed ID: 11499087
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]