Format
Sort by

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 184

1.

Balancing access to patient data/security.

Hoppszallern S.

Hosp Health Netw. 2013 Feb;87(2):24. No abstract available.

PMID:
23513668
2.

Advances and current state of the security and privacy in electronic health records: survey from a social perspective.

Tejero A, de la Torre I.

J Med Syst. 2012 Oct;36(5):3019-27. doi: 10.1007/s10916-011-9779-x. Epub 2011 Sep 21.

PMID:
21947856
3.
4.

Examining the impact of electronic care records on confidentiality and nursing practice.

Moore R, Stonham G.

Nurs Times. 2010 Apr 13-19;106(14):16-8.

PMID:
20446631
5.

Risk assessment of integrated electronic health records.

Bjornsson BT, Sigurdardottir G, Stefansson SO.

Stud Health Technol Inform. 2010;155:78-84.

PMID:
20543313
6.

A study on agent-based secure scheme for electronic medical record system.

Chen TL, Chung YF, Lin FY.

J Med Syst. 2012 Jun;36(3):1345-57. doi: 10.1007/s10916-010-9595-8. Epub 2010 Sep 21.

PMID:
20857325
7.

Leveraging the cloud for electronic health record access.

Coats B, Acharya S.

Perspect Health Inf Manag. 2014 Jan 1;11:1g. eCollection 2014.

8.

Meeting EHR security requirements: SeAAS approach.

Katt B, Trojer T, Breu R, Schabetsberger T, Wozak F.

Stud Health Technol Inform. 2010;155:85-91.

PMID:
20543314
9.

A hospital imperative: enterprisewide IT security.

Page D.

Hosp Health Netw. 2010 Dec;84(12):45-6. No abstract available.

PMID:
21268504
10.

The privacy and security of occupational health records.

Burton B, Cothran C, Davis N, Dooling J, Dunn R, Jensen J, Odia G, Rose AD, Twiggs M.

J AHIMA. 2013 Apr;84(4):52-6. No abstract available.

PMID:
23781608
11.

Adopting confidentiality principles for electronic health records in iran: a delphi study.

Farzandipour M, Ahmadi M, Sadoughi F, Karimi Irajk I.

J Med Syst. 2011 Jun;35(3):333-43. doi: 10.1007/s10916-009-9370-x. Epub 2009 Sep 3.

PMID:
20703556
12.

A secure cryptographic scheme: protecting stored and transmitted mHealth patient data.

Velez D, Shanblatt M.

Biomed Instrum Technol. 2013 Jan-Feb;47(1):46-53. doi: 10.2345/0899-8205-47.1.46. No abstract available.

PMID:
23432561
13.

Maintaining EMR security and confidentiality.

[No authors listed]

MGMA Connex. 2010 May-Jun;10(5):27. No abstract available.

PMID:
20572489
14.

Protecting patient information. Much work remains to be done on the data security front.

Degaspari J.

Healthc Inform. 2011 Mar;28(3):32-3. No abstract available.

PMID:
21446261
15.

Balancing access and security.

Berkowitz L, Brostoff G.

Behav Healthc. 2007 Dec;27(12):30-2. No abstract available.

PMID:
18429590
16.

Secure Dynamic access control scheme of PHR in cloud computing.

Chen TS, Liu CH, Chen TL, Chen CS, Bau JG, Lin TC.

J Med Syst. 2012 Dec;36(6):4005-20. doi: 10.1007/s10916-012-9873-8. Epub 2012 Aug 28.

PMID:
22926919
17.

Proctecting patient medical data. The C-suite's role.

Birk S.

Healthc Exec. 2013 Sep-Oct;28(5):20-2, 24, 26 passim. No abstract available.

PMID:
24143839
18.

ROUND TABLE: HOW TO PROTECT PATIENT DATA. A panel of hospital security experts sheds light on the biggest threats to patient privacy and what they're doing to safeguard medical records.

Kass EM, Skvarenina M, Syed H, Mertz J, Houston J, Dunn G, Rhodes R, Hughes K.

Health Data Manag. 2015 Apr;23(4):30, 33-4, 36 passim. No abstract available.

PMID:
26199974
19.

Is the biggest security threat to medical information simply a lack of understanding?

Williams PA.

Stud Health Technol Inform. 2011;168:179-87.

PMID:
21893927
20.

2013 most wired.

Weinstock M.

Hosp Health Netw. 2013 Jul;87(7):26-37.

PMID:
23961586
Items per page

Supplemental Content

Write to the Help Desk