374 related articles for article (PubMed ID: 16515213)
1. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.
Becker C
Mod Healthc; 2006 Feb; 36(8):6-7, 16, 1. PubMed ID: 16515213
[TBL] [Abstract][Full Text] [Related]
2. Privacy fear factor arises. The public sees benefits to be had from healthcare IT but concerns about misuse of data emerge in survey.
Robeznieks A
Mod Healthc; 2005 Nov; 35(46):6-7, 16, 1. PubMed ID: 16334811
[TBL] [Abstract][Full Text] [Related]
3. Health data security: a new priority.
Siwicki B
Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
[TBL] [Abstract][Full Text] [Related]
4. Securing electronic health records without impeding the flow of information.
Agrawal R; Johnson C
Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
[TBL] [Abstract][Full Text] [Related]
5. The health information system security threat lifecycle: an informatics theory.
Fernando JI; Dawson LL
Int J Med Inform; 2009 Dec; 78(12):815-26. PubMed ID: 19783203
[TBL] [Abstract][Full Text] [Related]
6. Health information privacy: why trust matters.
Mancilla D; Biedermann S
Health Care Manag (Frederick); 2009; 28(1):71-4. PubMed ID: 19225339
[TBL] [Abstract][Full Text] [Related]
7. Prevention of HIPAA security breaches.
Fesko H; McGuigan P
Health Care Law Mon; 2007 May; ():3-9. PubMed ID: 17590913
[No Abstract] [Full Text] [Related]
8. Data breaches. Final rule.
Department of Veterans Affairs
Fed Regist; 2008 Apr; 73(71):19747-8. PubMed ID: 18464350
[TBL] [Abstract][Full Text] [Related]
9. On IT, privacy is the priority. Ideas for a data security plan that can win essential public trust.
Findlay S; Rein A
Mod Healthc; 2007 Jan; 37(3):22. PubMed ID: 18441672
[No Abstract] [Full Text] [Related]
10. Electronic Health Care Records in Europe: confidentiality issues from an American perspective.
Petrisor AI; Close JM
Stud Health Technol Inform; 2002; 87():44-6. PubMed ID: 15458041
[TBL] [Abstract][Full Text] [Related]
11. Not so confidential. Patients have reasons to be so worried about who is seeing their medical records.
Sloane T
Mod Healthc; 2005 Nov; 35(46):22. PubMed ID: 16334818
[No Abstract] [Full Text] [Related]
12. Panel calls for improved security for medical records.
AIDS Policy Law; 1997 Mar; 12(5):3. PubMed ID: 11364165
[TBL] [Abstract][Full Text] [Related]
13. AMA group issues ethical principles for trustees of personal health information.
Patient Acc; 2001 Jun; 24(6):1, 5. PubMed ID: 12966759
[No Abstract] [Full Text] [Related]
14. Think a privacy breach couldn't happen at your facility? Think again.
Amatayakul M
Healthc Financ Manage; 2008 May; 62(5):100-1. PubMed ID: 18546975
[No Abstract] [Full Text] [Related]
15. Maintaining confidentiality: health care's ongoing dilemma.
Dowd SB; Dowd LP
Health Care Superv; 1996 Sep; 15(1):24-31. PubMed ID: 10159637
[TBL] [Abstract][Full Text] [Related]
16. Privacy warning. GAO finds fault with HHS' IT efforts.
DoBias M
Mod Healthc; 2007 Feb; 37(6):8-9. PubMed ID: 17315294
[No Abstract] [Full Text] [Related]
17. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.
Yang CM; Lin HC; Chang P; Jian WS
Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852
[TBL] [Abstract][Full Text] [Related]
18. A computer science approach to managing security in health care.
Asirelli P; Braccini G; Caramella D; Coco A; Fabbrini F
Radiol Med; 2002 Sep; 104(3):203-12. PubMed ID: 12471368
[TBL] [Abstract][Full Text] [Related]
19. What will stop data breaches?
Goedert J
Health Data Manag; 2008 Jun; 16(6):12. PubMed ID: 18551865
[No Abstract] [Full Text] [Related]
20. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].
Viviani R; Fischer J; Spitzer M; Freudenmann RW
Gesundheitswesen; 2004 Apr; 66(4):232-9. PubMed ID: 15100939
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]