These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
299 related articles for article (PubMed ID: 15460243)
1. Data protection and confidentiality. Bakker A Stud Health Technol Inform; 2002; 65():450-64. PubMed ID: 15460243 [No Abstract] [Full Text] [Related]
2. Security standards for medical information systems. Humphreys T Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728 [TBL] [Abstract][Full Text] [Related]
3. Ensuring confidentiality on computer networks. Smith JP Diagn Imaging (San Franc); 1995 Jul; 17(7):43-4, 47. PubMed ID: 10150605 [No Abstract] [Full Text] [Related]
4. Medical database security. Biskup J Stud Health Technol Inform; 1991; 1():214-30. PubMed ID: 10164069 [No Abstract] [Full Text] [Related]
5. Computerized medical data. Uzych L Nebr Med J; 1995 Nov; 80(11):332-3. PubMed ID: 8524438 [No Abstract] [Full Text] [Related]
6. Management and staff issues in data protection. Peterson HE Stud Health Technol Inform; 1991; 1():315-23. PubMed ID: 10164075 [No Abstract] [Full Text] [Related]
7. Dialogue: will the increased integration of information systems necessitate lowering standards for patient confidentiality and data privacy? Balancing individual and societal needs: micro- vs. macro-ethics. Gulbinat W Behav Healthc Tomorrow; 1994; 3(1):32, 39-41. PubMed ID: 10142496 [No Abstract] [Full Text] [Related]
8. Fundamentals and trade-offs of IT security. LaRochelle B Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984 [No Abstract] [Full Text] [Related]
9. Data protection in networks. Rihaczek K Stud Health Technol Inform; 1991; 1():249-70. PubMed ID: 10164071 [TBL] [Abstract][Full Text] [Related]
10. New security rules aim to tighten up access to data. Carrington C Diagn Imaging (San Franc); 1999 Feb; 21(2):51-4. PubMed ID: 10351549 [No Abstract] [Full Text] [Related]
11. Info-vigilance or safety in health information systems. Barber B; Allaert FA; Kluge EH Stud Health Technol Inform; 2001; 84(Pt 2):1229-33. PubMed ID: 11604924 [TBL] [Abstract][Full Text] [Related]
12. Impact of enterprisewide data. Frey LA; Bloomrosen M Top Health Inf Manage; 1995 May; 15(4):31-43. PubMed ID: 10142452 [TBL] [Abstract][Full Text] [Related]
13. UAMS unit charts course to paperless office. Gardner N J Ark Med Soc; 1999 Aug; 96(3):92-4. PubMed ID: 10483151 [No Abstract] [Full Text] [Related]
14. Data protection and security within TANIT. Corbeel LJ; Corbeel IL; Hortmann M Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731 [TBL] [Abstract][Full Text] [Related]
15. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania. Marshall GF; Gillespie W; Fox SJ J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739 [TBL] [Abstract][Full Text] [Related]
16. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation]. Stehle W Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659 [TBL] [Abstract][Full Text] [Related]
17. Privacy and security for electronic health records. Sharpe VA Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204 [No Abstract] [Full Text] [Related]
18. Security threats and solutions in distributed, interoperable health information systems using middleware. Blobel B; Holena M Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374 [TBL] [Abstract][Full Text] [Related]
19. A formal, mathematics oriented method for identifying security risks in information systems. van Piggelen HU Stud Health Technol Inform; 1997; 43 Pt A():191-5. PubMed ID: 10179535 [TBL] [Abstract][Full Text] [Related]
20. Security in medical networks. Pfitzmann A; Pfitzmann B Stud Health Technol Inform; 1991; 1():231-48. PubMed ID: 10164070 [No Abstract] [Full Text] [Related] [Next] [New Search]