436 related articles for article (PubMed ID: 17941524)
1. [Information and communication technologies: a charter to protect individual liberties].
Lanzalavi A
Rev Infirm; 2007 Sep; (133):28-9. PubMed ID: 17941524
[No Abstract] [Full Text] [Related]
2. Provider automation. Earning the public trust.
Watson S
Health Data Manag; 1996 Jan; 4(1):26-7. PubMed ID: 10154353
[No Abstract] [Full Text] [Related]
3. Information security: how safe is your system?
Brandt M
Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279
[No Abstract] [Full Text] [Related]
4. Policy management and access control in practice.
Nordberg R
Stud Health Technol Inform; 2004; 103():428-33. PubMed ID: 15747951
[TBL] [Abstract][Full Text] [Related]
5. The adoption of IT security standards in a healthcare environment.
Gomes R; LapĆ£o LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
6. Keep electronic records safe!
Celia LM
RN; 2002 Jun; 65(6):69-71. PubMed ID: 12087602
[No Abstract] [Full Text] [Related]
7. Maintaining patient confidentiality in an electronic world.
Marr P
Int J Biomed Comput; 1994 Feb; 35 Suppl():213-7. PubMed ID: 8188417
[TBL] [Abstract][Full Text] [Related]
8. Charting new territory. Interview by Tyler L. Chin.
Borten K
Health Data Manag; 1998 Jan; 6(1):32-7. PubMed ID: 10177776
[No Abstract] [Full Text] [Related]
9. Health data security: a new priority.
Siwicki B
Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997
[TBL] [Abstract][Full Text] [Related]
10. High level security policies for health: from theory to practice.
Defteraios S; Lambrinoudakis C; Gritzalis D
Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
[TBL] [Abstract][Full Text] [Related]
11. AAMT (American Association for Medical Transcription) speaks out on confidentiality, privacy, and patient care documentation.
J Am Assoc Med Transcr; 1995; 14(4):42, 44-7. PubMed ID: 10143813
[TBL] [Abstract][Full Text] [Related]
12. Federal guidance outlines requirements for the use of portable devices.
Mancino PB; Gulick SL
J Am Coll Radiol; 2007 Aug; 4(8):523-4. PubMed ID: 17660113
[No Abstract] [Full Text] [Related]
13. Investment appraisal of the protection, confidentiality and security arrangements of patient data.
Loftus D; Carroll T
Stud Health Technol Inform; 1997; 43 Pt A():186-90. PubMed ID: 10179534
[TBL] [Abstract][Full Text] [Related]
14. Security of health information system in France: what we do will no longer be different from what we tell.
Allaert FA; Dusserre L
Int J Biomed Comput; 1994 Feb; 35 Suppl():201-4. PubMed ID: 8188415
[TBL] [Abstract][Full Text] [Related]
15. The challenge for security and privacy services in distributed health settings.
Katsikas S; Lopez J; Pernul G
Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
[TBL] [Abstract][Full Text] [Related]
16. Preserving the privacy of computerized patient records.
Miller DW
Healthc Inform; 1993 Oct; 10(10):72-4. PubMed ID: 10129483
[No Abstract] [Full Text] [Related]
17. Data protection and security within TANIT.
Corbeel LJ; Corbeel IL; Hortmann M
Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731
[TBL] [Abstract][Full Text] [Related]
18. Implementation of information security and confidentiality policies, procedures, and standards.
Perry JW
Top Health Inf Manage; 1996 May; 16(4):28-43. PubMed ID: 10157659
[TBL] [Abstract][Full Text] [Related]
19. New technologies raise concerns about protecting patient confidentiality.
Hosp Patient Relat Rep; 1991 Feb; 6(2):1-2. PubMed ID: 10109410
[No Abstract] [Full Text] [Related]
20. Charting a new course in privacy.
Chin TL
Health Data Manag; 1997 May; 5(5):51-2, 54. PubMed ID: 10167249
[No Abstract] [Full Text] [Related]
[Next] [New Search]