These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


PUBMED FOR HANDHELDS

Journal Abstract Search


1468 related items for PubMed ID: 18487824

  • 1. The adoption of IT security standards in a healthcare environment.
    Gomes R, Lapão LV.
    Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824
    [Abstract] [Full Text] [Related]

  • 2. Information technologies need to protect patient confidentiality.
    Pendrak RF, Ericson RP.
    Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618
    [Abstract] [Full Text] [Related]

  • 3. Towards dynamic access control for healthcare information systems.
    Røstad L, Nytrø O.
    Stud Health Technol Inform; 2008 Oct; 136():703-8. PubMed ID: 18487814
    [Abstract] [Full Text] [Related]

  • 4. Security, safety, and related technology - the triangle of eHealth service provision.
    Savastano M, Hovsto A, Pharow P, Blobel B.
    Stud Health Technol Inform; 2008 Oct; 136():709-14. PubMed ID: 18487815
    [Abstract] [Full Text] [Related]

  • 5.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 6.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 7. Specific interoperability problems of security infrastructure services.
    Pharow P, Blobel B.
    Stud Health Technol Inform; 2006 Oct; 121():349-63. PubMed ID: 17095833
    [Abstract] [Full Text] [Related]

  • 8.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 9. Protecting individual privacy: a pothole on the information superhighway?
    Patrikas EO.
    Top Health Inf Manage; 1996 May; 16(4):1-12. PubMed ID: 10157655
    [Abstract] [Full Text] [Related]

  • 10.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 11. Data security: how much is enough?
    Anderson HJ.
    Med Claims Manag; 1993 May; 1(5):38-45. PubMed ID: 10143650
    [No Abstract] [Full Text] [Related]

  • 12. High level security policies for health: from theory to practice.
    Defteraios S, Lambrinoudakis C, Gritzalis D.
    Stud Health Technol Inform; 2004 May; 103():416-23. PubMed ID: 15747949
    [Abstract] [Full Text] [Related]

  • 13. Use of the ISO/IEC 17799 framework in healthcare information security management.
    Posthumus L.
    Stud Health Technol Inform; 2004 May; 103():447-52. PubMed ID: 15747954
    [Abstract] [Full Text] [Related]

  • 14. The impact of technology on the confidentiality of health information.
    White AW, Wager KA, Lee FW.
    Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
    [Abstract] [Full Text] [Related]

  • 15.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 16.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 17. Keeping records private.
    Cross M.
    Health Data Manag; 1995 Oct; 3(9):18, 20. PubMed ID: 10156237
    [No Abstract] [Full Text] [Related]

  • 18.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 19. Anti-malware software and medical devices.
    Health Devices; 2010 Oct; 39(10):360-5. PubMed ID: 21306047
    [Abstract] [Full Text] [Related]

  • 20.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]


    Page: [Next] [New Search]
    of 74.