These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
150 related articles for article (PubMed ID: 15061098)
1. Safekeeping: some real-world advice on conducting a security assessment. Roll FG J Healthc Prot Manage; 2004; 20(1):39-44. PubMed ID: 15061098 [TBL] [Abstract][Full Text] [Related]
2. Stepping-->into security. Advice for facility managers overseeing the protection function. Crumbley JR Health Facil Manage; 2004 May; 17(5):26-9. PubMed ID: 15162558 [No Abstract] [Full Text] [Related]
3. Under surveillance: is it time to reexamine your facility's security model. Roll FG J Healthc Prot Manage; 2002; 18(2):49-54. PubMed ID: 12371248 [TBL] [Abstract][Full Text] [Related]
4. Seven layers of security to help protect biomedical research facilities. Mortell N Lab Anim (NY); 2010 Apr; 39(4):118-23. PubMed ID: 20305635 [TBL] [Abstract][Full Text] [Related]
9. Safe keeping. Some real-world advice on conducting a security assessment. Roll F Health Facil Manage; 2001 Nov; 14(11):24-7. PubMed ID: 11759193 [No Abstract] [Full Text] [Related]
10. Developing and implementing a security plan in a non-typical healthcare facility. Sandoval E J Healthc Prot Manage; 2012; 28(2):39-43. PubMed ID: 22970619 [TBL] [Abstract][Full Text] [Related]
11. If Disney ran your security department. Jones RF J Healthc Prot Manage; 2012; 28(2):114-21. PubMed ID: 22970631 [TBL] [Abstract][Full Text] [Related]
13. Getting personal. Biometric security devices gain access to health care facilities. Moss B Health Facil Manage; 2002 Sep; 15(9):20-4. PubMed ID: 12373934 [No Abstract] [Full Text] [Related]
15. A healthcare canine security program: the first year. Bagley GL J Healthc Prot Manage; 1994-1995 Winter; 11(1):57-64. PubMed ID: 10139277 [TBL] [Abstract][Full Text] [Related]
16. Team dynamics and the management of assaultive behavior. Johnson JW J Healthc Prot Manage; 2005; 21(1):34-44. PubMed ID: 16535932 [TBL] [Abstract][Full Text] [Related]
17. The amazing evolution of an industry: the past, present, and future of healthcare security. Michelman BS J Healthc Prot Manage; 2004; 20(1):34-8. PubMed ID: 15061097 [TBL] [Abstract][Full Text] [Related]
18. The "body of knowledge" in healthcare security. Colling R J Healthc Prot Manage; 2004; 20(2):1-7. PubMed ID: 15457913 [TBL] [Abstract][Full Text] [Related]
19. More than conventional wisdom--the better way to make and justify security choices. Bates ND J Healthc Prot Manage; 2013; 29(2):69-73. PubMed ID: 24020322 [TBL] [Abstract][Full Text] [Related]
20. Healthcare identity theft: prevention and response. Center for Healthcare Environmental Management Healthc Hazard Manage Monit; 2005 Sep; 19(1):1-8. PubMed ID: 16187575 [No Abstract] [Full Text] [Related] [Next] [New Search]