164 related articles for article (PubMed ID: 16097123)
1. Destroying data the DoD way.
Keating AS
J AHIMA; 2005; 76(7):54-5, 62; quiz 65-6. PubMed ID: 16097123
[No Abstract] [Full Text] [Related]
2. Completing the HIPAA compliance journey: security standards.
Pieper SK
Healthc Exec; 2003; 18(5):20-5. PubMed ID: 14503075
[No Abstract] [Full Text] [Related]
3. Military maneuvers. DoD moves ahead with integrated clinical records.
Hudson T
Hospitals; 1993 Feb; 67(4):28-9. PubMed ID: 8428736
[No Abstract] [Full Text] [Related]
4. Practice brief. Security risk analysis and management: an overview.
Amatayakul M;
J AHIMA; 2003 Oct; 74(9):72A-72G; quiz 77-8. PubMed ID: 14571553
[No Abstract] [Full Text] [Related]
5. Building a secure home: protecting individually identifiable patient information.
Keese JM
Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563
[No Abstract] [Full Text] [Related]
6. EPHI crib notes. With proper security, safeguards and tools in place, the threat of a looming audit may not be so scary.
Lukes S
Healthc Inform; 2007 Sep; 24(9):54, 56. PubMed ID: 17927069
[No Abstract] [Full Text] [Related]
7. The computer-based patient record: risks, security, and the HIM role.
Picukaric JM
J AHIMA; 1992 Mar; 63(3):78-84. PubMed ID: 10118259
[No Abstract] [Full Text] [Related]
8. Translating the language of security.
Amatayakul M;
J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390
[No Abstract] [Full Text] [Related]
9. Information security at the Fifteenth Medical Group.
Yeager RA; Kindle M
Healthc Inf Manage; 1998; 12(1):39-50. PubMed ID: 10179266
[No Abstract] [Full Text] [Related]
10. Electronic record, electronic security.
Hagland M
J AHIMA; 2004 Feb; 75(2):18-22. PubMed ID: 14981851
[No Abstract] [Full Text] [Related]
11. Supporting CPR development with the commercial off-the-shelf systems evaluation technique: defining requirements, setting priorities, and evaluating choices.
Celli M; Ryberg DE; Leaderman AV
J Healthc Inf Manag; 1998; 12(4):11-9. PubMed ID: 10345829
[TBL] [Abstract][Full Text] [Related]
12. What is security auditing?
Amatayakul M
J AHIMA; 2004; 75(10):58-9. PubMed ID: 15559842
[No Abstract] [Full Text] [Related]
13. The proof is in the policy.
Walsh T
J AHIMA; 2004 Feb; 75(2):24-8. PubMed ID: 14981852
[No Abstract] [Full Text] [Related]
14. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
15. The first steps toward security.
Goedert J
Health Data Manag; 2001 Jul; 9(7):26-32, 34. PubMed ID: 11464723
[No Abstract] [Full Text] [Related]
16. Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler AB; Fehn AK
Mich Health Hosp; 2003; 39(6):32-3. PubMed ID: 14628331
[TBL] [Abstract][Full Text] [Related]
17. EHR trends and challenges. MRI's survey finds workflow and record access among top IT-manager concerns.
Blair J
Healthc Inform; 2003 Nov; 20(11):56-8. PubMed ID: 14649092
[No Abstract] [Full Text] [Related]
18. AHIMA's satellite conference: finding the keys to information security.
Rippa C
J AHIMA; 1997 Mar; 68(3):66-70. PubMed ID: 10165184
[No Abstract] [Full Text] [Related]
19. Achieving nirvana through an electronic medical record system: a military surgeon's perspective.
Tetteh HA
Mil Med; 2010 May; 175(5):295-7. PubMed ID: 20486497
[No Abstract] [Full Text] [Related]
20. Protecting your paperless medical record system requires addressing risks.
Sokol PE
QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360
[No Abstract] [Full Text] [Related]
[Next] [New Search]