These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
22. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
24. Security requirements in EHR systems and archives. Ruotsalainen P Stud Health Technol Inform; 2004; 103():453-8. PubMed ID: 15747955 [TBL] [Abstract][Full Text] [Related]
25. Generalizing FDA guidance on clinical decision support. Hyman WA Biomed Instrum Technol; 2012; 46(6):438-42. PubMed ID: 23171184 [No Abstract] [Full Text] [Related]
26. Fundamentals and trade-offs of IT security. LaRochelle B Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984 [No Abstract] [Full Text] [Related]
27. Health care security chiefs share their predictions, tips. Interview by Bill Siwicki. Borten K; Hinton T; Krause M; Miaoulis WM; Sanovic R Health Data Manag; 1997 Sep; 5(9):52-4. PubMed ID: 10169998 [No Abstract] [Full Text] [Related]
28. Standardization of paperless health records. Mogli GD IHRIM; 1995 Feb; 36(1):10-2. PubMed ID: 10142964 [No Abstract] [Full Text] [Related]
29. Mobile health requires mobile security: challenges, solutions, and standardization. Pharow P; Blobel B Stud Health Technol Inform; 2008; 136():697-702. PubMed ID: 18487813 [TBL] [Abstract][Full Text] [Related]
30. What strategies can help us sensibly manage patient information? Skuteris LR Nurs Manage; 1999 Jan; 30(1):8. PubMed ID: 9987376 [TBL] [Abstract][Full Text] [Related]
32. Formal policies for flexible EHR security. Blobel B; Pharow P Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829 [TBL] [Abstract][Full Text] [Related]
33. The challenge to the medical record. Foote RS JAMA Intern Med; 2013 Jul; 173(13):1171-2. PubMed ID: 23712375 [No Abstract] [Full Text] [Related]
34. New standards focus on information security. Hanken MA J AHIMA; 1998 Mar; 69(3):45. PubMed ID: 10177482 [No Abstract] [Full Text] [Related]
35. Preparing for the computerized patient. Record and managing its security. Pierce S J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443 [No Abstract] [Full Text] [Related]
36. A chief security officer charts new territory. Miaoulis WM Health Data Manag; 1997 Jul; 5(7):92-6. PubMed ID: 10169485 [No Abstract] [Full Text] [Related]
38. Providing secure mAccess to medical information. Belsis MA; Dwivedi AN; Gritzalis S; Bali RK; Int J Electron Healthc; 2007; 3(1):51-71. PubMed ID: 18048261 [TBL] [Abstract][Full Text] [Related]
39. Data security, job security. Attendees at annual AHIMA conference turn attention to legal, staffing issues. Conn J Mod Healthc; 2007 Oct; 37(41):31. PubMed ID: 17972495 [No Abstract] [Full Text] [Related]
40. Towards dynamic access control for healthcare information systems. Røstad L; Nytrø O Stud Health Technol Inform; 2008; 136():703-8. PubMed ID: 18487814 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]