These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
248 related articles for article (PubMed ID: 21306047)
1. Anti-malware software and medical devices. Health Devices; 2010 Oct; 39(10):360-5. PubMed ID: 21306047 [TBL] [Abstract][Full Text] [Related]
2. The adoption of IT security standards in a healthcare environment. Gomes R; Lapão LV Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824 [TBL] [Abstract][Full Text] [Related]
3. [Computer viruses and computer network breakdowns threaten patient safety. Incident reports or Lex Maria reports required when the patient is at risk]. Boström U Lakartidningen; 2007 Jul 11-24; 104(28-29):2082-6. PubMed ID: 17702382 [No Abstract] [Full Text] [Related]
4. Staving off big hack attack. Two delivery systems take different approaches to testing vulnerability. Briggs B Health Data Manag; 2003 Jun; 11(6):84-6. PubMed ID: 12825445 [No Abstract] [Full Text] [Related]
5. JCAHO publishes software specs for data extraction, transfer to indicator system. Morrissey J Mod Healthc; 1993 Nov; 23(46):49. PubMed ID: 10129909 [No Abstract] [Full Text] [Related]
6. As networks multiply, privacy concerns grow. Siwicki B Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841 [TBL] [Abstract][Full Text] [Related]
7. Wireless network safe and secure. Helgeson L Health Data Manag; 2005 Feb; 13(2):110, 112, 114. PubMed ID: 15913103 [No Abstract] [Full Text] [Related]
8. Protecting and securing networked medical devices. Riha C Biomed Instrum Technol; 2004; 38(5):392-6. PubMed ID: 15521516 [TBL] [Abstract][Full Text] [Related]
9. The case for the HL7 standard. Simborg DW Comput Healthc; 1988 Jan; 9(1):39-40, 42. PubMed ID: 10285216 [TBL] [Abstract][Full Text] [Related]
10. Will new technology solve integration problems? Hard R Hospitals; 1991 Oct; 65(20):52, 54. PubMed ID: 1916716 [No Abstract] [Full Text] [Related]
11. Addressing security in the networking era. Siwicki B Health Data Manag; 1996 Nov; 4(11):62-3, 65, 67-8. PubMed ID: 10162226 [No Abstract] [Full Text] [Related]
12. Protect your net. Good policy + good technology = dependable security. Schneider P Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843 [No Abstract] [Full Text] [Related]
13. Challenges and opportunities in software-driven medical devices. Gordon WJ; Stern AD Nat Biomed Eng; 2019 Jul; 3(7):493-497. PubMed ID: 31278389 [No Abstract] [Full Text] [Related]
14. Protecting networked medical devices from worms and viruses. Cadick R Biomed Instrum Technol; 2004-2005; Suppl():21-2. PubMed ID: 18630416 [No Abstract] [Full Text] [Related]
15. Data security: how much is enough? Anderson HJ Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650 [No Abstract] [Full Text] [Related]
16. Protecting computer-based medical devices: defending against viruses and other threats. Health Devices; 2005 Jul; 34(7):229-43. PubMed ID: 17988070 [TBL] [Abstract][Full Text] [Related]
17. An SOS on Cybersecurity To protect patient data, hospitals beef up risk management programs. Hello, chief security officers and 'white hat hackers'. Taylor M Hosp Health Netw; 2015 Feb; 89(2):36-38. PubMed ID: 30277345 [No Abstract] [Full Text] [Related]
18. Understanding and implementing hospital information systems. Health Devices; 1995 Feb; 24(2):71-83. PubMed ID: 7737881 [TBL] [Abstract][Full Text] [Related]
19. Medical systems and malware. Kusche KP J Healthc Prot Manage; 2004; 20(1):74-83. PubMed ID: 15061102 [TBL] [Abstract][Full Text] [Related]
20. Standards bearers. The standardization of healthcare information gains momentum. Blair J Healthc Inform; 1998 Feb; 15(2):113-20. PubMed ID: 10177668 [No Abstract] [Full Text] [Related] [Next] [New Search]