These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
152 related articles for article (PubMed ID: 23505950)
1. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem. Degaspari J Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950 [No Abstract] [Full Text] [Related]
2. 5 steps to prevent a data breach in your practice. Rey J Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183 [No Abstract] [Full Text] [Related]
3. Time for an update: Health data breaches cited in GAO's call for fix. Conn J Mod Healthc; 2012 Aug; 42(32):8-9. PubMed ID: 22953491 [No Abstract] [Full Text] [Related]
4. Taking aim at medical identity theft. Document security key element to comply with government regulations. Raymond C J Med Pract Manage; 2010; 25(6):383-5. PubMed ID: 20695253 [TBL] [Abstract][Full Text] [Related]
5. Hackers, breaches and other threats to electronic records. Gupta A Health Data Manag; 2011 Sep; 19(9):54-5. PubMed ID: 21905520 [No Abstract] [Full Text] [Related]
6. Trends and characteristics of protected health information breaches in the United States. Hossain MM; Hong YA AMIA Annu Symp Proc; 2019; 2019():1081-1090. PubMed ID: 32308905 [TBL] [Abstract][Full Text] [Related]
7. Seizing the real opportunity presented by data breaches. Free J Health Manag Technol; 2015 Mar; 36(3):2. PubMed ID: 26204721 [No Abstract] [Full Text] [Related]
8. How safe is your patient data? Lowes R Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786 [No Abstract] [Full Text] [Related]
9. Unraveling data breaches. Goedert J Health Data Manag; 2011 Aug; 19(8):34-8, 40. PubMed ID: 21877637 [No Abstract] [Full Text] [Related]
10. Protecting health data in a troubling time. Understand who and what you're up against. Ropp R; Quammen B Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609 [No Abstract] [Full Text] [Related]
11. A new approach to IT security. Kruger D; Anschutz T Healthc Financ Manage; 2013 Feb; 67(2):104-6, 108. PubMed ID: 23413677 [TBL] [Abstract][Full Text] [Related]
12. What caused the breach? An examination of use of information technology and health data breaches. Wikina SB Perspect Health Inf Manag; 2014; 11(Fall):1h. PubMed ID: 25593574 [TBL] [Abstract][Full Text] [Related]
13. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data. Becker C Mod Healthc; 2006 Feb; 36(8):6-7, 16, 1. PubMed ID: 16515213 [TBL] [Abstract][Full Text] [Related]
16. Cyberthreats: A primer for healthcare professionals. Tin D; Hata R; Granholm F; Ciottone RG; Staynings R; Ciottone GR Am J Emerg Med; 2023 Jun; 68():179-185. PubMed ID: 37061434 [TBL] [Abstract][Full Text] [Related]
17. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records. Barrows RC; Clayton PD Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447 [TBL] [Abstract][Full Text] [Related]
18. Keeping data safe. The threat of security breaches can fuel preventive strategies. Rogoski RR Healthc Inform; 2014 Mar; 31(2):37-9. PubMed ID: 24812992 [No Abstract] [Full Text] [Related]
19. A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job. Conn J Mod Healthc; 2006 Oct; 36(40):26-8. PubMed ID: 17066729 [No Abstract] [Full Text] [Related]
20. Medical identity theft and telemedicine security. Terry M Telemed J E Health; 2009 Dec; 15(10):928-32. PubMed ID: 19908998 [No Abstract] [Full Text] [Related] [Next] [New Search]