164 related articles for article (PubMed ID: 23513668)
1. Balancing access to patient data/security.
Hoppszallern S
Hosp Health Netw; 2013 Feb; 87(2):24. PubMed ID: 23513668
[No Abstract] [Full Text] [Related]
2. How to prevent cyber-virus damage to your practice.
Rashbaum KN
Med Econ; 2012 Feb; 89(4):58-60. PubMed ID: 24417011
[No Abstract] [Full Text] [Related]
3. e-Consent design and implementation issues for health information managers.
Grain H
Health Inf Manag; 2004; 33(3):84-8. PubMed ID: 18490785
[TBL] [Abstract][Full Text] [Related]
4. Examining the impact of electronic care records on confidentiality and nursing practice.
Moore R; Stonham G
Nurs Times; 2010 Apr 13-19; 106(14):16-8. PubMed ID: 20446631
[TBL] [Abstract][Full Text] [Related]
5. Risk assessment of integrated electronic health records.
Bjornsson BT; Sigurdardottir G; Stefansson SO
Stud Health Technol Inform; 2010; 155():78-84. PubMed ID: 20543313
[TBL] [Abstract][Full Text] [Related]
6. ROUND TABLE: HOW TO PROTECT PATIENT DATA. A panel of hospital security experts sheds light on the biggest threats to patient privacy and what they're doing to safeguard medical records.
Kass EM; Skvarenina M; Syed H; Mertz J; Houston J; Dunn G; Rhodes R; Hughes K
Health Data Manag; 2015 Apr; 23(4):30, 33-4, 36 passim. PubMed ID: 26199974
[No Abstract] [Full Text] [Related]
7. Strategic Alignment: The Driving Force for Information Governance.
Washington L
J AHIMA; 2017 Jan; 88(1):40-3. PubMed ID: 29400937
[No Abstract] [Full Text] [Related]
8. The privacy and security of occupational health records.
Burton B; Cothran C; Davis N; Dooling J; Dunn R; Jensen J; Odia G; Rose AD; Twiggs M
J AHIMA; 2013 Apr; 84(4):52-6. PubMed ID: 23781608
[No Abstract] [Full Text] [Related]
9. Meeting EHR security requirements: SeAAS approach.
Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
[TBL] [Abstract][Full Text] [Related]
10. A hospital imperative: enterprisewide IT security.
Page D
Hosp Health Netw; 2010 Dec; 84(12):45-6. PubMed ID: 21268504
[No Abstract] [Full Text] [Related]
11. Leveraging the cloud for electronic health record access.
Coats B; Acharya S
Perspect Health Inf Manag; 2014; 11(Winter):1g. PubMed ID: 24808814
[TBL] [Abstract][Full Text] [Related]
12. Proctecting patient medical data. The C-suite's role.
Birk S
Healthc Exec; 2013; 28(5):20-2, 24, 26 passim. PubMed ID: 24143839
[No Abstract] [Full Text] [Related]
13. Protecting health data in a troubling time. Understand who and what you're up against.
Ropp R; Quammen B
Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609
[No Abstract] [Full Text] [Related]
14. Balancing access and security.
Berkowitz L; Brostoff G
Behav Healthc; 2007 Dec; 27(12):30-2. PubMed ID: 18429590
[No Abstract] [Full Text] [Related]
15. Advances and current state of the security and privacy in electronic health records: survey from a social perspective.
Tejero A; de la Torre I
J Med Syst; 2012 Oct; 36(5):3019-27. PubMed ID: 21947856
[TBL] [Abstract][Full Text] [Related]
16. 2013 most wired.
Weinstock M
Hosp Health Netw; 2013 Jul; 87(7):26-37. PubMed ID: 23961586
[TBL] [Abstract][Full Text] [Related]
17. Electronic health records: privacy, confidentiality, and security.
Harman LB; Flite CA; Bond K
Virtual Mentor; 2012 Sep; 14(9):712-9. PubMed ID: 23351350
[No Abstract] [Full Text] [Related]
18. Protecting patient information. Much work remains to be done on the data security front.
Degaspari J
Healthc Inform; 2011 Mar; 28(3):32-3. PubMed ID: 21446261
[No Abstract] [Full Text] [Related]
19. Incentivizing data donation.
Nat Biotechnol; 2015 Sep; 33(9):885. PubMed ID: 26348938
[No Abstract] [Full Text] [Related]
20. EMRlog method for computer security for electronic medical records with logic and data mining.
MartÃnez Monterrubio SM; Frausto Solis J; Monroy Borja R
Biomed Res Int; 2015; 2015():542016. PubMed ID: 26495300
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]