121 related articles for article (PubMed ID: 8765774)
1. [The physician and the computer. Bedside].
Fällman H
Lakartidningen; 1996 Jul; 93(30-31):2640-1. PubMed ID: 8765774
[No Abstract] [Full Text] [Related]
2. Data security: how much is enough?
Anderson HJ
Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650
[No Abstract] [Full Text] [Related]
3. Point of care and patient privacy: who is in control?
Morgan JD
Top Health Inf Manage; 1994 May; 14(4):36-43. PubMed ID: 10134759
[TBL] [Abstract][Full Text] [Related]
4. [Reliable cryptology as a means for confidentiality and safety in medical communication and documentation].
Stehle W
Zentralbl Gynakol; 1998; 120(7):350-3. PubMed ID: 9703659
[TBL] [Abstract][Full Text] [Related]
5. The threat of hackers. The need to secure patient data & other important records on your agency's notebook computers.
Ott W
JEMS; 2008 Aug; 33(8):68-71. PubMed ID: 18692732
[No Abstract] [Full Text] [Related]
6. Electronic patient records for dental school clinics: more than paperless systems.
Atkinson JC; Zeller GG; Shah C
J Dent Educ; 2002 May; 66(5):634-42. PubMed ID: 12056768
[TBL] [Abstract][Full Text] [Related]
7. Ensuring confidentiality on computer networks.
Smith JP
Diagn Imaging (San Franc); 1995 Jul; 17(7):43-4, 47. PubMed ID: 10150605
[No Abstract] [Full Text] [Related]
8. Keeping records private.
Cross M
Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
[No Abstract] [Full Text] [Related]
9. Technological healing.
Stoneham L
Tex Med; 2001 Apr; 97(4):34-41. PubMed ID: 11344922
[No Abstract] [Full Text] [Related]
10. Privacy and efficiency in patients focused health care processes.
Morger O; Nitsche U; Teufel S
Stud Health Technol Inform; 1998; 52 Pt 2():1143-7. PubMed ID: 10384638
[TBL] [Abstract][Full Text] [Related]
11. Fundamentals and trade-offs of IT security.
LaRochelle B
Health Manag Technol; 1999 Aug; 20(7):18-21. PubMed ID: 10620984
[No Abstract] [Full Text] [Related]
12. Patient assessment systems using the World Wide Web.
Kohane IS
Behav Healthc Tomorrow; 1997 Feb; 6(1):77-9. PubMed ID: 10164823
[TBL] [Abstract][Full Text] [Related]
13. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
14. Three computational systems for disclosing medical data in the year 1999.
Sweeney L
Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634
[TBL] [Abstract][Full Text] [Related]
15. Attention for security now more needed than ever.
Pluyter-Wenting ES
Stud Health Technol Inform; 1997; 46():253-6. PubMed ID: 10175407
[TBL] [Abstract][Full Text] [Related]
16. The adoption of IT security standards in a healthcare environment.
Gomes R; Lapão LV
Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
[TBL] [Abstract][Full Text] [Related]
17. As networks multiply, privacy concerns grow.
Siwicki B
Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
[TBL] [Abstract][Full Text] [Related]
18. Analysis of security problems in a medical image encryption system.
Alvarez G; Li S; Hernandez L
Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
[TBL] [Abstract][Full Text] [Related]
19. Panel calls for improved security for medical records.
AIDS Policy Law; 1997 Mar; 12(5):3. PubMed ID: 11364165
[TBL] [Abstract][Full Text] [Related]
20. Promoting health information networks while protecting patient confidentiality.
Carey MH
QRC Advis; 1995 Feb; 11(4):7-8. PubMed ID: 10140295
[No Abstract] [Full Text] [Related]
[Next] [New Search]