504 related articles for article (PubMed ID: 12440310)
1. Instant virtual extranets. A new breed of technology offers another alternative for secure, remote data access.
Matlof J
Healthc Inform; 2002 Oct; 19(10):80. PubMed ID: 12440310
[No Abstract] [Full Text] [Related]
2. No boundaries. Advanced telecom solutions enable secure storage and transfer of electronic medical records over great distances.
Parker B; Harman A
Health Manag Technol; 2003 Aug; 24(8):37-8. PubMed ID: 12924061
[No Abstract] [Full Text] [Related]
3. Issues impacting health care in the new millennium: privacy, electronic medical records, and the internet.
Torrey CO
J Nurs Law; 2001 Mar; 7(4):7-13. PubMed ID: 12545990
[No Abstract] [Full Text] [Related]
4. Organizational repertoires and rites in health information security.
Cooper T; Collmann J; Neidermeier H
Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
[No Abstract] [Full Text] [Related]
5. New technology enables high-speed, secure access for service.
Faure P
Radiol Manage; 2002; 24(5):16-7. PubMed ID: 12422658
[No Abstract] [Full Text] [Related]
6. Remote access security.
Stevens RA; O'Loughlin-Cahill K
Healthc Exec; 2002; 17(3):66-7. PubMed ID: 12014155
[No Abstract] [Full Text] [Related]
7. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
8. Network liability: a new frontier for healthcare risk management.
Switzer DP
J Healthc Risk Manag; 2001; 21(2):3-13. PubMed ID: 11411063
[No Abstract] [Full Text] [Related]
9. The future of card technology in health care.
Kelly B
Health Data Manag; 2002 May; 10(5):64-8. PubMed ID: 12017105
[No Abstract] [Full Text] [Related]
10. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
11. Web distribution of diagnostic images requires new security efforts.
Keese JM; Johnson G
Radiol Manage; 2002; 24(1):40-1. PubMed ID: 11857995
[No Abstract] [Full Text] [Related]
12. HIM on the front lines of change. Marching toward the National Health Information Infrastructure.
Rollins G
J AHIMA; 2003 Jan; 74(1):22-6. PubMed ID: 12530343
[No Abstract] [Full Text] [Related]
13. What will stop data breaches?
Goedert J
Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
[No Abstract] [Full Text] [Related]
14. Understanding West Virginia's Records Confidentiality Act on the implementation of electronic health records.
Curtis C
W V Med J; 2007; 103(2):54. PubMed ID: 17557539
[No Abstract] [Full Text] [Related]
15. Keep tabs on who sees what.
Toth CL
Med Econ; 2002 Dec; 79(23):27-8. PubMed ID: 12510614
[No Abstract] [Full Text] [Related]
16. Data security regulations on the way.
Morrissey J
Mod Healthc; 1999 Jun; 29(25):16. PubMed ID: 10538588
[No Abstract] [Full Text] [Related]
17. Surviving in a post-HIPAA environment by creating a culture of privacy and security.
Watson A
AHIP Cover; 2005; 46(4):26-30. PubMed ID: 16149657
[No Abstract] [Full Text] [Related]
18. Privacy and personal health data in cyberspace.
Day J
J Contemp Dent Pract; 2001 Feb; 2(1):45-56. PubMed ID: 12167943
[TBL] [Abstract][Full Text] [Related]
19. Health care and privacy law in electronic commerce.
Wright B
Healthc Financ Manage; 1994 Jan; 48(1):66, 68-70. PubMed ID: 10145935
[TBL] [Abstract][Full Text] [Related]
20. When technology and health care collide: issues with electronic medical records and electronic mail.
Jurevic AM
UMKC Law Rev; 1998; 66(4):809-36. PubMed ID: 16273691
[No Abstract] [Full Text] [Related]
[Next] [New Search]