These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
188 related articles for article (PubMed ID: 12528643)
41. Hospital turns to biometrics for patient registration and protection. Hosp Secur Saf Manage; 1999 Nov; 20(7):9-10. PubMed ID: 11184614 [No Abstract] [Full Text] [Related]
42. Speech recognition is finding its voice. Briggs B Health Data Manag; 2004 Feb; 12(2):56-8, 60, 62. PubMed ID: 14971099 [No Abstract] [Full Text] [Related]
43. Data security. You really put your finger on it. Kelly B Health Data Manag; 2000 May; 8(5):88, 90-2, 94. PubMed ID: 11183072 [No Abstract] [Full Text] [Related]
44. Recognizing and reducing risks: HIPAA privacy and security enforcement. Wachler AB; Fehn AK Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331 [TBL] [Abstract][Full Text] [Related]
45. Medical systems and malware. Kusche KP J Healthc Prot Manage; 2004; 20(1):74-83. PubMed ID: 15061102 [TBL] [Abstract][Full Text] [Related]
46. EMR confidentiality and information security. Kurtz G J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596 [TBL] [Abstract][Full Text] [Related]
48. Electronic medical records, chapter 2: the obstacles. Pentecost MJ J Am Coll Radiol; 2006 Mar; 3(3):167-8. PubMed ID: 17412033 [No Abstract] [Full Text] [Related]
49. EHR meltdown: how to protect your patient data. Schackow TE; Palmer T; Epperly T Fam Pract Manag; 2008 Jun; 15(6):A3-8. PubMed ID: 18595558 [No Abstract] [Full Text] [Related]
50. HIPAA update and other computer news. Lowes R Med Econ; 2003 May; 80(9):30, 33. PubMed ID: 12776614 [No Abstract] [Full Text] [Related]
51. Backing up data is forward-thinking. Lowes R Med Econ; 2003 Oct; 80(20):TCP15-6. PubMed ID: 14619073 [No Abstract] [Full Text] [Related]
52. Long-term planning for authentication solutions. Boon T Health Manag Technol; 2001 Dec; 22(12):52, 51. PubMed ID: 11766435 [No Abstract] [Full Text] [Related]
53. Strategies for complying with the HIPAA security rule. Pelletier A; Bresee SA; Hill JR J Healthc Inf Manag; 2003; 17(3):49-53. PubMed ID: 12858597 [TBL] [Abstract][Full Text] [Related]
54. Network security. Chang K J Med Pract Manage; 2006; Suppl():47-50. PubMed ID: 16579273 [TBL] [Abstract][Full Text] [Related]
55. Implementing MDA-based distributed, interoperable, flexible, scalable, portable, and secure EHR systems. Blobel B; Pharow P Stud Health Technol Inform; 2004; 103():394-9. PubMed ID: 15747946 [TBL] [Abstract][Full Text] [Related]
56. Security considerations when choosing an EMR system. Mendoza E Health Manag Technol; 2003 Oct; 24(10):48. PubMed ID: 14535124 [No Abstract] [Full Text] [Related]
57. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job. Conn J Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729 [No Abstract] [Full Text] [Related]
58. Bayesian analysis of fingerprint, face and signature evidences with automatic biometric systems. Gonzalez-Rodriguez J; Fierrez-Aguilar J; Ramos-Castro D; Ortega-Garcia J Forensic Sci Int; 2005 Dec; 155(2-3):126-40. PubMed ID: 16226150 [TBL] [Abstract][Full Text] [Related]
59. Body identification, biometrics and medicine: ethical and social considerations. Mordini E; Ottolini C Ann Ist Super Sanita; 2007; 43(1):51-60. PubMed ID: 17536154 [TBL] [Abstract][Full Text] [Related]
60. Patient privacy: the right to know versus the need to access. Grzybowski DM Health Manag Technol; 2005 Sep; 26(9):54, 53. PubMed ID: 16218281 [No Abstract] [Full Text] [Related] [Previous] [Next] [New Search]