Format
Sort by
Items per page

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 83

1.

Insider threats: the myths, truths and tactics for mitigation.

Brill A, Lapidus B.

J Healthc Prot Manage. 2012;28(2):122-4.

PMID:
22970632
2.

Five ways to deal with information security incidents under HIPAA.

[No authors listed]

Hosp Secur Saf Manage. 2001 Feb;21(10):1-3. No abstract available.

PMID:
11260852
3.

Security in the management of information systems.

Huston TL, Huston JL.

Health Care Superv. 1998 Jun;16(4):28-34.

PMID:
10179427
4.

The health information system security threat lifecycle: an informatics theory.

Fernando JI, Dawson LL.

Int J Med Inform. 2009 Dec;78(12):815-26. doi: 10.1016/j.ijmedinf.2009.08.006. Epub 2009 Sep 26.

PMID:
19783203
5.

Fighting the internal I.T. threat.

Goedert J.

Health Data Manag. 2012 Aug;20(8):28, 30, 32 passim. No abstract available.

PMID:
22916362
6.

Security breaches: tips for assessing and limiting your risks.

Coons LR.

J Med Pract Manage. 2011 May-Jun;26(6):385-8.

PMID:
21815558
7.

The first steps toward security.

Goedert J.

Health Data Manag. 2001 Jul;9(7):26-32, 34. No abstract available.

PMID:
11464723
8.

Health data security: a new priority.

Siwicki B.

Health Data Manag. 1997 Sep;5(9):46-50, 52-4, 56-8 passim.

PMID:
10169997
9.

A risk management approach to the security of hospital information systems.

Warnock-Matheron A, Gruending DL, Hannah KJ.

Can J Nurs Adm. 1993 May-Jun;6(2):22-4, 30.

PMID:
8347652
10.

The adoption of IT security standards in a healthcare environment.

Gomes R, LapĆ£o LV.

Stud Health Technol Inform. 2008;136:765-70.

PMID:
18487824
11.

Controlling your high-tech security shopping list.

Amatayakul M.

Healthc Financ Manage. 2004 Feb;58(2):86-7. No abstract available.

PMID:
14997724
12.

Security versus access: trade-offs are only part of the story.

Shea S.

J Am Med Inform Assoc. 1994 Jul-Aug;1(4):314-5. No abstract available.

13.

Mitigating risk: IT disaster recovery.

Chang K.

J Med Pract Manage. 2006 Jan-Feb;Suppl:51-4. No abstract available.

PMID:
16579274
14.

An ounce of prevention for the healthcare IT network.

Paquette M.

Health Manag Technol. 2006 Dec;27(12):18, 20-1. No abstract available.

PMID:
17256647
15.

HIPAA security standards: is your facility ready?

[No authors listed]

Hosp Peer Rev. 2000 May;25(5):64-5.

PMID:
11184101
17.

Compliance with HIPAA security standards in U.S. Hospitals.

Davis D, Having K.

J Healthc Inf Manag. 2006 Spring;20(2):108-15.

PMID:
16669594
18.

How to avoid a HIPAA horror story.

Withrow SC.

Healthc Financ Manage. 2010 Aug;64(8):82-8.

PMID:
20707266
19.

Encryption and the loss of patient data.

Miller AR, Tucker CE.

J Policy Anal Manage. 2011 Summer;30(3):534-56.

PMID:
21774164
20.

An in-depth discussion on risk management.

McMillan M, Green A, Finney S, Free J.

Health Manag Technol. 2014 Jun;35(6):18-9. No abstract available.

PMID:
25058978

Supplemental Content

Support Center