These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
137 related articles for article (PubMed ID: 18782976)
1. Healthcare organizations must have an identity theft policy: FACTA or fiction? Alexander J Healthc Financ Manage; 2008 Sep; 62(9):38, 40. PubMed ID: 18782976 [No Abstract] [Full Text] [Related]
2. The need for a security policy in health care institutions. Katsikas SK; Gritzalis DA Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425 [TBL] [Abstract][Full Text] [Related]
3. How red flags, policies and technology can catch medical identity theft. Rhodes R Health Manag Technol; 2015 Apr; 36(4):28-9. PubMed ID: 26357777 [No Abstract] [Full Text] [Related]
4. Securing information on the Internet. Opel DD Healthc Exec; 1998; 13(6):46-7. PubMed ID: 10186220 [No Abstract] [Full Text] [Related]
5. Responding to identity theft. One organization's effort to turn a negative event into a positive result. O'Brien J J AHIMA; 2008 Apr; 79(4):40-1. PubMed ID: 18517048 [No Abstract] [Full Text] [Related]
6. Seven layers of security to help protect biomedical research facilities. Mortell N Lab Anim (NY); 2010 Apr; 39(4):118-23. PubMed ID: 20305635 [TBL] [Abstract][Full Text] [Related]
7. Facilities' smoking dilemma: clamp down or lighten up? Centers address positives, perils of smoking bans. Defino T Behav Healthc Tomorrow; 2004 Oct; 13(5):14-8. PubMed ID: 15518381 [No Abstract] [Full Text] [Related]
8. Possibilities and pitfalls of outsourcing. Hazelwood SE; Hazelwood AC; Cook ED Healthc Financ Manage; 2005 Oct; 59(10):44-8. PubMed ID: 16245617 [TBL] [Abstract][Full Text] [Related]
9. Trend: security and privacy. Perfect storm. Rapidly evolving technology, policy developments and consolidation are putting new security demands on provider organizations. Degaspari J Healthc Inform; 2014 Mar; 31(2):34-6. PubMed ID: 24812991 [No Abstract] [Full Text] [Related]
11. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem. Degaspari J Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950 [No Abstract] [Full Text] [Related]
12. Lack of built-in security shouldn't inhibit PDA use. Goodman T Health Manag Technol; 2003 Nov; 24(11):58, 57. PubMed ID: 14608717 [No Abstract] [Full Text] [Related]
13. Healthcare identity theft: prevention and response. Center for Healthcare Environmental Management Healthc Hazard Manage Monit; 2005 Sep; 19(1):1-8. PubMed ID: 16187575 [No Abstract] [Full Text] [Related]
14. Strategic decision making: it's time for healthcare organizations to get serious. Young DW Healthc Financ Manage; 2005 Nov; 59(11):86-90, 92. PubMed ID: 16323814 [TBL] [Abstract][Full Text] [Related]
15. Popularity of mobile devices brings risk. Yudkin R Health Manag Technol; 2012 Apr; 33(4):32. PubMed ID: 22558677 [No Abstract] [Full Text] [Related]
16. The rise and fall of the futility movement. Schneiderman LJ N Engl J Med; 2000 Nov; 343(21):1575; author reply 1576-7. PubMed ID: 11184758 [No Abstract] [Full Text] [Related]
17. Getting personal. Biometric security devices gain access to health care facilities. Moss B Health Facil Manage; 2002 Sep; 15(9):20-4. PubMed ID: 12373934 [No Abstract] [Full Text] [Related]
18. Left to their own devices how healthcare organizations are tackling the BYOD trend. Williams J Biomed Instrum Technol; 2014; 48(5):327-39. PubMed ID: 25244198 [No Abstract] [Full Text] [Related]
19. The rise and fall of the futility movement. Heilig S N Engl J Med; 2000 Nov; 343(21):1575; author reply 1576-7. PubMed ID: 11184759 [No Abstract] [Full Text] [Related]
20. Why information security belongs on the CFO's agenda. Quinnild J; Fusile J; Smith C Healthc Financ Manage; 2006 Feb; 60(2):56-9. PubMed ID: 16519212 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]