These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Translating the language of security. Amatayakul M; J AHIMA; 2003 Jun; 74(6):16A-16D. PubMed ID: 12822390 [No Abstract] [Full Text] [Related]
3. The six safety first principles of health information systems: a programme of implementation. Part 1. Safety and security. Barber B; Jensen OA; Lamberts H; Roger-France F; De Schouwer P; Zöllner H Stud Health Technol Inform; 1991; 1():296-301. PubMed ID: 10164074 [No Abstract] [Full Text] [Related]
5. Building a secure home: protecting individually identifiable patient information. Keese JM Radiol Manage; 2001; 23(6):50-1. PubMed ID: 11793563 [No Abstract] [Full Text] [Related]
6. AHIMA's satellite conference: finding the keys to information security. Rippa C J AHIMA; 1997 Mar; 68(3):66-70. PubMed ID: 10165184 [No Abstract] [Full Text] [Related]
7. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
8. Preparing for the computerized patient. Record and managing its security. Pierce S J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443 [No Abstract] [Full Text] [Related]
9. The impact of technology on the confidentiality of health information. White AW; Wager KA; Lee FW Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657 [TBL] [Abstract][Full Text] [Related]
11. Standards for confidentiality, privacy, access, and data security. Hanken MA Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660 [TBL] [Abstract][Full Text] [Related]
13. Info-vigilance or safety in health information systems. Barber B; Allaert FA; Kluge EH Stud Health Technol Inform; 2001; 84(Pt 2):1229-33. PubMed ID: 11604924 [TBL] [Abstract][Full Text] [Related]
14. Fundamentals and trade-offs of IT security. LaRochelle B Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984 [No Abstract] [Full Text] [Related]
15. Data security: how much is enough? Anderson HJ Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650 [No Abstract] [Full Text] [Related]
16. Security standards for medical information systems. Humphreys T Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728 [TBL] [Abstract][Full Text] [Related]
17. New standards focus on information security. Hanken MA J AHIMA; 1998 Mar; 69(3):45. PubMed ID: 10177482 [No Abstract] [Full Text] [Related]
18. Cold front. Whittle S Health Serv J; 2003 Jul; 113(5865):suppl 13-5. PubMed ID: 12899001 [No Abstract] [Full Text] [Related]
19. Health data security: a new priority. Siwicki B Health Data Manag; 1997 Sep; 5(9):46-50, 52-4, 56-8 passim. PubMed ID: 10169997 [TBL] [Abstract][Full Text] [Related]
20. Information security: how safe is your system? Brandt M Healthc Inform; 1995 Oct; 12(10):24-6, 28, 30-2. PubMed ID: 10152279 [No Abstract] [Full Text] [Related] [Next] [New Search]