379 related articles for article (PubMed ID: 14571553)
1. Practice brief. Security risk analysis and management: an overview.
Amatayakul M;
J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
[No Abstract] [Full Text] [Related]
2. Too much of a good thing? CIOs strive to increase security while decreasing the 'obstacles' between users and data.
Gillespie G
Health Data Manag; 2001 Sep; 9(9):42-6, 48-50. PubMed ID: 11565145
[No Abstract] [Full Text] [Related]
3. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
4. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
5. The computer-based patient record: risks, security, and the HIM role.
Picukaric JM
J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259
[No Abstract] [Full Text] [Related]
6. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
7. Down the beaten HIPAA path.
Goedert J
Health Data Manag; 2004 Feb; 12(2):64-6, 68, 70. PubMed ID: 14971100
[No Abstract] [Full Text] [Related]
8. The HIPAA prescription for healthcare--why isn't it working?
Gue DG; Upham R
Health Manag Technol; 2004 Sep; 25(9):34-7. PubMed ID: 15460307
[No Abstract] [Full Text] [Related]
9. Privacy and security become financial concern under HITECH Act.
McDavid JP
Revenue-cycle Strateg; 2010; 7(7):6-7. PubMed ID: 20632690
[No Abstract] [Full Text] [Related]
10. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
11. An IT contingency plan to meet HIPAA security standards.
Nutten S; Mansueti C
J AHIMA; 2004 Feb; 75(2):30-7; quiz 39-40. PubMed ID: 14981853
[No Abstract] [Full Text] [Related]
12. Beyond HIPAA: the complexities of electronic record management.
Kahn RA
J AHIMA; 2003 Apr; 74(4):31-6; quiz 37-8. PubMed ID: 12698938
[TBL] [Abstract][Full Text] [Related]
13. Sounding the alarm. Knowing when to notify patients of a data breach can be unclear.
Dimick C
J AHIMA; 2009 Feb; 80(2):20-4; quiz 25-6. PubMed ID: 19245055
[No Abstract] [Full Text] [Related]
14. Translating the language of security.
Amatayakul M;
J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390
[No Abstract] [Full Text] [Related]
15. New data security regs to pose challenge to healthcare administrators.
Hosp Secur Saf Manage; 2000 Sep; 21(5):9-10. PubMed ID: 11186791
[No Abstract] [Full Text] [Related]
16. Final HIPAA security regulations: a review.
Garner JC
Manag Care Q; 2003; 11(3):15-27. PubMed ID: 14983648
[TBL] [Abstract][Full Text] [Related]
17. Practice brief. Redisclosure of patient health information.
American Information Management Association
J AHIMA; 2001 Sep; 72(8):72A-72B; quiz 75-6. PubMed ID: 15714649
[No Abstract] [Full Text] [Related]
18. Final security regulations present challenges, opportunities for HIM.
Rode D
J AHIMA; 2003 May; 74(5):14, 16, 18. PubMed ID: 12793446
[No Abstract] [Full Text] [Related]
19. Patient privacy and security of electronic medical information for radiologists: the basics.
Andriole KP; Khorasani R
J Am Coll Radiol; 2010 Jun; 7(6):397-9. PubMed ID: 20522391
[No Abstract] [Full Text] [Related]
20. What will stop data breaches?
Goedert J
Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
[No Abstract] [Full Text] [Related]
[Next] [New Search]