252 related articles for article (PubMed ID: 21306047)
1. Anti-malware software and medical devices.
Health Devices; 2010 Oct; 39(10):360-5. PubMed ID: 21306047
[TBL] [Abstract][Full Text] [Related]
2. The adoption of IT security standards in a healthcare environment.
Gomes R; Lapão LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
3. [Computer viruses and computer network breakdowns threaten patient safety. Incident reports or Lex Maria reports required when the patient is at risk].
Boström U
Lakartidningen; 2007 Jul 11-24; 104(28-29):2082-6. PubMed ID: 17702382
[No Abstract] [Full Text] [Related]
4. Staving off big hack attack. Two delivery systems take different approaches to testing vulnerability.
Briggs B
Health Data Manag; 2003 Jun; 11(6):84-6. PubMed ID: 12825445
[No Abstract] [Full Text] [Related]
5. JCAHO publishes software specs for data extraction, transfer to indicator system.
Morrissey J
Mod Healthc; 1993 Nov; 23(46):49. PubMed ID: 10129909
[No Abstract] [Full Text] [Related]
6. As networks multiply, privacy concerns grow.
Siwicki B
Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
[TBL] [Abstract][Full Text] [Related]
7. Wireless network safe and secure.
Helgeson L
Health Data Manag; 2005 Feb; 13(2):110, 112, 114. PubMed ID: 15913103
[No Abstract] [Full Text] [Related]
8. Protecting and securing networked medical devices.
Riha C
Biomed Instrum Technol; 2004; 38(5):392-6. PubMed ID: 15521516
[TBL] [Abstract][Full Text] [Related]
9. The case for the HL7 standard.
Simborg DW
Comput Healthc; 1988 Jan; 9(1):39-40, 42. PubMed ID: 10285216
[TBL] [Abstract][Full Text] [Related]
10. Will new technology solve integration problems?
Hard R
Hospitals; 1991 Oct; 65(20):52, 54. PubMed ID: 1916716
[No Abstract] [Full Text] [Related]
11. Addressing security in the networking era.
Siwicki B
Health Data Manag; 1996 Nov; 4(11):62-3, 65, 67-8. PubMed ID: 10162226
[No Abstract] [Full Text] [Related]
12. Protect your net. Good policy + good technology = dependable security.
Schneider P
Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843
[No Abstract] [Full Text] [Related]
13. Challenges and opportunities in software-driven medical devices.
Gordon WJ; Stern AD
Nat Biomed Eng; 2019 Jul; 3(7):493-497. PubMed ID: 31278389
[No Abstract] [Full Text] [Related]
14. Protecting networked medical devices from worms and viruses.
Cadick R
Biomed Instrum Technol; 2004-2005; Suppl():21-2. PubMed ID: 18630416
[No Abstract] [Full Text] [Related]
15. Data security: how much is enough?
Anderson HJ
Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
[No Abstract] [Full Text] [Related]
16. Protecting computer-based medical devices: defending against viruses and other threats.
Health Devices; 2005 Jul; 34(7):229-43. PubMed ID: 17988070
[TBL] [Abstract][Full Text] [Related]
17. An SOS on Cybersecurity To protect patient data, hospitals beef up risk management programs. Hello, chief security officers and 'white hat hackers'.
Taylor M
Hosp Health Netw; 2015 Feb; 89(2):36-38. PubMed ID: 30277345
[No Abstract] [Full Text] [Related]
18. Understanding and implementing hospital information systems.
Health Devices; 1995 Feb; 24(2):71-83. PubMed ID: 7737881
[TBL] [Abstract][Full Text] [Related]
19. Medical systems and malware.
Kusche KP
J Healthc Prot Manage; 2004; 20(1):74-83. PubMed ID: 15061102
[TBL] [Abstract][Full Text] [Related]
20. Standards bearers. The standardization of healthcare information gains momentum.
Blair J
Healthc Inform; 1998 Feb; 15(2):113-20. PubMed ID: 10177668
[No Abstract] [Full Text] [Related]
[Next] [New Search]