274 related articles for article (PubMed ID: 16596845)
1. Eight steps to integrating security standards.
Happ J;
Biomed Instrum Technol; 2006; Suppl():22-4. PubMed ID: 16596845
[No Abstract] [Full Text] [Related]
2. Managing security risks with 80001.
Mankovich N; Fitzgerald B
Biomed Instrum Technol; 2011; Suppl():27-32. PubMed ID: 21992042
[No Abstract] [Full Text] [Related]
3. Practice brief. Health informatics standards and information transfer: exploring the HIM role. American Health Information Management Association.
American Health Information Management Association.
J AHIMA; 2001 Jan; 72(1):68A-68D. PubMed ID: 11211403
[No Abstract] [Full Text] [Related]
4. How secure is secure?
Fotsch E
Healthc Financ Manage; 1996 Nov; 50(11):30, 32. PubMed ID: 10162344
[No Abstract] [Full Text] [Related]
5. Health IT Czar focuses on interoperability.
Brailer DJ
Biomed Instrum Technol; 2006; Suppl():6-7. PubMed ID: 16596841
[No Abstract] [Full Text] [Related]
6. Clinical system security: interim guidelines.
Anderson R
BMJ; 1996 Jan; 312(7023):109-11. PubMed ID: 8555896
[No Abstract] [Full Text] [Related]
7. New standards focus on information security.
Hanken MA
J AHIMA; 1998 Mar; 69(3):45. PubMed ID: 10177482
[No Abstract] [Full Text] [Related]
8. Keeping records private.
Cross M
Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
[No Abstract] [Full Text] [Related]
9. Data security: how much is enough?
Anderson HJ
Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
[No Abstract] [Full Text] [Related]
10. The adoption of IT security standards in a healthcare environment.
Gomes R; LapĆ£o LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
11. Understanding HIPAA transactions and code sets.
Rode D
J AHIMA; 2001 Jan; 72(1):26-32; quiz 33-4. PubMed ID: 11211394
[TBL] [Abstract][Full Text] [Related]
12. Protecting individual privacy: a pothole on the information superhighway?
Patrikas EO
Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
[TBL] [Abstract][Full Text] [Related]
13. Practice brief. Issue: E-mail security. American Health Information Management Association.
Rhodes HB
J AHIMA; 1997 Jun; 68(6):3 p. following 52; quiz 55-6. PubMed ID: 10167800
[No Abstract] [Full Text] [Related]
14. FDA issues reminder on cybersecurity for networked medical devices.
Biomed Instrum Technol; 2010; Suppl():4. PubMed ID: 20225707
[No Abstract] [Full Text] [Related]
15. Implementing HIPAA security standards--are you ready?
Fuller S
J AHIMA; 1999 Oct; 70(9):36-40, 42-4, quiz 47-8. PubMed ID: 10977404
[No Abstract] [Full Text] [Related]
16. How healthy are firewalls? Rating their resistance.
Holzbaur H
Healthc Inform; 1997 Jun; 14(6):30-2, 34, 36 passim. PubMed ID: 10168128
[No Abstract] [Full Text] [Related]
17. Safe and secure. Interview by Bill Siwicki.
Baker DB
Health Data Manag; 1998 Aug; 6(8):32-4, 36. PubMed ID: 10181946
[No Abstract] [Full Text] [Related]
18. Keeping data secure: protected health information and medical equipment.
Swim R
Biomed Instrum Technol; 2012; 46(4):278-80. PubMed ID: 22839985
[No Abstract] [Full Text] [Related]
19. Defending your data: minimizing risks in a networked environment.
McKenzie DJ
J AHIMA; 1996 Sep; 67(8):62-4; quiz 65-6. PubMed ID: 10159918
[No Abstract] [Full Text] [Related]
20. The impact of technology on the confidentiality of health information.
White AW; Wager KA; Lee FW
Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]