These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
Pubmed for Handhelds
PUBMED FOR HANDHELDS
Journal Abstract Search
270 related items for PubMed ID: 21055999
1. Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Quantin C, Jaquet-Chiffelle DO, Coatrieux G, Benzenine E, Allaert FA. Int J Med Inform; 2011 Feb; 80(2):e6-11. PubMed ID: 21055999 [Abstract] [Full Text] [Related]
2. The challenge to the medical record. Foote RS. JAMA Intern Med; 2013 Jul 08; 173(13):1171-2. PubMed ID: 23712375 [No Abstract] [Full Text] [Related]
3. AAMT (American Association for Medical Transcription) speaks out on confidentiality, privacy, and patient care documentation. J Am Assoc Med Transcr; 1995 Jul 08; 14(4):42, 44-7. PubMed ID: 10143813 [Abstract] [Full Text] [Related]
4. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE. Top Health Inf Manage; 1995 Nov 08; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
5. Preparing for the computerized patient. Record and managing its security. Pierce S. J Am Assoc Med Transcr; 1995 Nov 08; 14(3):38-9. PubMed ID: 10142443 [No Abstract] [Full Text] [Related]
6. Data security: how much is enough? Anderson HJ. Med Claims Manag; 1993 Nov 08; 1(5):38-45. PubMed ID: 10143650 [No Abstract] [Full Text] [Related]
7. Legal review: protecting the confidentiality and integrity of patient records. McKenzie DJ. Top Health Inf Manage; 1997 May 08; 17(4):62-71. PubMed ID: 10168994 [Abstract] [Full Text] [Related]
11. Identity-management factors in e-health and telemedicine applications. Savastano M, Hovsto A, Pharow P, Blobel B. J Telemed Telecare; 2008 Apr 08; 14(7):386-8. PubMed ID: 18852323 [Abstract] [Full Text] [Related]
12. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records. Barrows RC, Clayton PD. Behav Healthc Tomorrow; 1996 Feb 08; 5(1):38, 41, 43-4. PubMed ID: 10158447 [Abstract] [Full Text] [Related]
13. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium. France FH, Bangels M, De Clercq E. Int J Med Inform; 2007 Feb 08; 76(2-3):84-8. PubMed ID: 17126596 [Abstract] [Full Text] [Related]
14. EHR in the perspective of security, integrity and ethics. Nordberg R. Stud Health Technol Inform; 2006 Feb 08; 121():291-8. PubMed ID: 17095827 [Abstract] [Full Text] [Related]
15. Medical record: systematic centralization versus secure on demand aggregation. Quantin C, Jaquet-Chiffelle DO, Coatrieux G, Benzenine E, Auverlot B, Allaert FA. BMC Med Inform Decis Mak; 2011 Mar 22; 11():18. PubMed ID: 21426535 [Abstract] [Full Text] [Related]
16. How secure is the Internet for healthcare applications? Campbell LA. Radiol Manage; 1996 Mar 22; 18(1):28-32. PubMed ID: 10154332 [Abstract] [Full Text] [Related]
17. Information technologies need to protect patient confidentiality. Pendrak RF, Ericson RP. Healthc Financ Manage; 1998 Oct 22; 52(10):66-8. PubMed ID: 10187618 [Abstract] [Full Text] [Related]
18. Information security: how safe is your system? Brandt M. Healthc Inform; 1995 Oct 22; 12(10):24-6, 28, 30-2. PubMed ID: 10152279 [No Abstract] [Full Text] [Related]