These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
89 related articles for article (PubMed ID: 3638901)
1. Confidentiality and security of automated health information. Harper W AARN News Lett; 1986 Jun; 42(6):22-3. PubMed ID: 3638901 [No Abstract] [Full Text] [Related]
2. Alberta mental health information system: Part I--Conceptualization, design and implementation. Scott P Can Ment Health; 1978 Mar; 26(1):2-6. PubMed ID: 10307250 [No Abstract] [Full Text] [Related]
3. [Are computers more human than physicians?. Interview by Viveka Holmertz]. Josefson I Vardfacket; 1986 Sep; 10(16):4-6. PubMed ID: 3642926 [No Abstract] [Full Text] [Related]
4. Privacy, confidentiality, and security in clinical information systems: dilemmas and opportunities for the nurse executive. Styffe EJ Nurs Adm Q; 1997; 21(3):21-8. PubMed ID: 9215003 [TBL] [Abstract][Full Text] [Related]
5. Security Audit Center--a suggested model for effective audit strategies in health care informatics. Hayam A Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404 [TBL] [Abstract][Full Text] [Related]
6. Privacy and security requirements of distributed computer based patient records. Moehr JR Int J Biomed Comput; 1994 Feb; 35 Suppl():57-64. PubMed ID: 8188423 [TBL] [Abstract][Full Text] [Related]
7. Health information, privacy, confidentiality and ethics. Kluge EH Int J Biomed Comput; 1994 Feb; 35 Suppl():23-7. PubMed ID: 8188418 [TBL] [Abstract][Full Text] [Related]
8. Patient care management systems, medical records, and privacy: a balancing act. Hiller MD; Seidel LF Public Health Rep; 1982; 97(4):332-45. PubMed ID: 7111656 [No Abstract] [Full Text] [Related]
9. Computer security: a necessary element of integrated information systems. Butzen F; Furler F Bull Med Libr Assoc; 1986 Jul; 74(3):210-6. PubMed ID: 3742113 [TBL] [Abstract][Full Text] [Related]
10. Are computers on a collision course with confidentiality?. Interview by Diana Madden. Frawley K Internist; 1994 Oct; 35(9):16-8, 21. PubMed ID: 10137810 [No Abstract] [Full Text] [Related]
11. The six safety first principles of health information systems: a programme of implementation. Part 1. Safety and security. Barber B; Jensen OA; Lamberts H; Roger-France F; De Schouwer P; Zöllner H Stud Health Technol Inform; 1991; 1():296-301. PubMed ID: 10164074 [No Abstract] [Full Text] [Related]
13. Health information privacy: without confidentiality. Robinson DM Int J Biomed Comput; 1994 Feb; 35 Suppl():97-104. PubMed ID: 8188428 [TBL] [Abstract][Full Text] [Related]
14. Smart cards--a security tool for health information systems. Klein GO Int J Biomed Comput; 1994 Feb; 35 Suppl():147-51. PubMed ID: 8188408 [TBL] [Abstract][Full Text] [Related]
15. [Problems with invasion of privacy from using computers in health care systems]. Nishi S Kango Tenbo; 1985 Nov; 10(12):1149-55. PubMed ID: 3853666 [No Abstract] [Full Text] [Related]
16. The need for a security policy in health care institutions. Katsikas SK; Gritzalis DA Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425 [TBL] [Abstract][Full Text] [Related]
18. Privacy, confidentiality, and security of computerized systems. The nursing responsibility. Romano CA Comput Nurs; 1987; 5(3):99-104. PubMed ID: 3649265 [No Abstract] [Full Text] [Related]