These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
269 related articles for article (PubMed ID: 21055999)
1. Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Quantin C; Jaquet-Chiffelle DO; Coatrieux G; Benzenine E; Allaert FA Int J Med Inform; 2011 Feb; 80(2):e6-11. PubMed ID: 21055999 [TBL] [Abstract][Full Text] [Related]
2. The challenge to the medical record. Foote RS JAMA Intern Med; 2013 Jul; 173(13):1171-2. PubMed ID: 23712375 [No Abstract] [Full Text] [Related]
3. AAMT (American Association for Medical Transcription) speaks out on confidentiality, privacy, and patient care documentation. J Am Assoc Med Transcr; 1995; 14(4):42, 44-7. PubMed ID: 10143813 [TBL] [Abstract][Full Text] [Related]
4. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
5. Preparing for the computerized patient. Record and managing its security. Pierce S J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443 [No Abstract] [Full Text] [Related]
6. Data security: how much is enough? Anderson HJ Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650 [No Abstract] [Full Text] [Related]
7. Legal review: protecting the confidentiality and integrity of patient records. McKenzie DJ Top Health Inf Manage; 1997 May; 17(4):62-71. PubMed ID: 10168994 [TBL] [Abstract][Full Text] [Related]
8. Giving patients secure << Google-like >> access to their medical record. Quantin C; Fassa M; Coatrieux G; Breton V; Boire JY; Allaert FA Stud Health Technol Inform; 2008; 137():61-7. PubMed ID: 18560069 [TBL] [Abstract][Full Text] [Related]
9. Protecting your paperless medical record system requires addressing risks. Sokol PE QRC Advis; 2000 Apr; 16(6):1-5. PubMed ID: 11010360 [No Abstract] [Full Text] [Related]
11. Identity-management factors in e-health and telemedicine applications. Savastano M; Hovsto A; Pharow P; Blobel B J Telemed Telecare; 2008; 14(7):386-8. PubMed ID: 18852323 [TBL] [Abstract][Full Text] [Related]
12. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records. Barrows RC; Clayton PD Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447 [TBL] [Abstract][Full Text] [Related]
13. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium. France FH; Bangels M; De Clercq E Int J Med Inform; 2007; 76(2-3):84-8. PubMed ID: 17126596 [TBL] [Abstract][Full Text] [Related]
14. EHR in the perspective of security, integrity and ethics. Nordberg R Stud Health Technol Inform; 2006; 121():291-8. PubMed ID: 17095827 [TBL] [Abstract][Full Text] [Related]
15. Medical record: systematic centralization versus secure on demand aggregation. Quantin C; Jaquet-Chiffelle DO; Coatrieux G; Benzenine E; Auverlot B; Allaert FA BMC Med Inform Decis Mak; 2011 Mar; 11():18. PubMed ID: 21426535 [TBL] [Abstract][Full Text] [Related]
16. How secure is the Internet for healthcare applications? Campbell LA Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332 [TBL] [Abstract][Full Text] [Related]
17. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
18. Information security: how safe is your system? Brandt M Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279 [No Abstract] [Full Text] [Related]