These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
216 related articles for article (PubMed ID: 28710061)
1. NHS patient data security is to be tightened after cyberattack. O'Dowd A BMJ; 2017 Jul; 358():j3412. PubMed ID: 28710061 [No Abstract] [Full Text] [Related]
2. e-novation: managing with new technology. Mad scramble. Mathieson S Health Serv J; 2001 May; 111(5756):suppl 4-7. PubMed ID: 11398660 [No Abstract] [Full Text] [Related]
3. Cyberattack on Britain's National Health Service - A Wake-up Call for Modern Medicine. Clarke R; Youngstein T N Engl J Med; 2017 Aug; 377(5):409-411. PubMed ID: 28591519 [No Abstract] [Full Text] [Related]
4. EMR confidentiality and information security. Kurtz G J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596 [TBL] [Abstract][Full Text] [Related]
5. Major global cyber-attack hits NHS and delays treatment. O'Dowd A BMJ; 2017 May; 357():j2357. PubMed ID: 28507019 [No Abstract] [Full Text] [Related]
6. 'A healthy dose of data'. Stretton J J (Inst Health Rec Inf Manag); 2008 Jul; 49(2):28. PubMed ID: 19536955 [No Abstract] [Full Text] [Related]
7. Tips from the field.... How to prepare for HIPAA's arrival. Biomed Instrum Technol; 2003; 37(3):157. PubMed ID: 12792942 [No Abstract] [Full Text] [Related]
8. 3 keys to security. Joch A Hosp Health Netw; 2004 Jan; 78(1):40-4, 2. PubMed ID: 14768450 [TBL] [Abstract][Full Text] [Related]
9. Big brother. Cross M Health Serv J; 1993 Apr; 103(5348):20-2. PubMed ID: 10126013 [TBL] [Abstract][Full Text] [Related]
10. Keys to securing data as a practitioner. Rey J; Douglass K J Med Pract Manage; 2012; 27(4):203-5. PubMed ID: 22413592 [TBL] [Abstract][Full Text] [Related]
11. Posturing for the unknown: the future of HIS security standards. Brown L; Speir J Infocare; 1994 Sep; ():12-4, 16, 18. PubMed ID: 10138463 [No Abstract] [Full Text] [Related]
12. Clinical system security: interim guidelines. Anderson R BMJ; 1996 Jan; 312(7023):109-11. PubMed ID: 8555896 [No Abstract] [Full Text] [Related]
14. The adoption of IT security standards in a healthcare environment. Gomes R; LapĆ£o LV Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824 [TBL] [Abstract][Full Text] [Related]
15. Information age requires strategic security plans. Baldwin G Health Data Manag; 1999 Oct; 7(10):98. PubMed ID: 10622931 [No Abstract] [Full Text] [Related]
16. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
17. Data protection and security within TANIT. Corbeel LJ; Corbeel IL; Hortmann M Stud Health Technol Inform; 1996; 27():162-7. PubMed ID: 10163731 [TBL] [Abstract][Full Text] [Related]
18. Data security: keeping a lid on Pandora's box. Health Estate; 2008 May; 62(5):51-6. PubMed ID: 18552103 [TBL] [Abstract][Full Text] [Related]
19. Can chief security officers protect data from prying eyes? Siwicki B Health Data Manag; 1998 Oct; 6(10):54-6, 58, 60 passim. PubMed ID: 10185885 [TBL] [Abstract][Full Text] [Related]
20. Are medical secrets up for grabs? Coombes R BMJ; 2007 Jan; 334(7583):16-7. PubMed ID: 17204794 [No Abstract] [Full Text] [Related] [Next] [New Search]