+ Site Statistics
+ Search Articles
+ PDF Full Text Service
How our service works
Request PDF Full Text
+ Follow Us
Follow on Facebook
Follow on Twitter
Follow on LinkedIn
+ Subscribe to Site Feeds
Most Shared
PDF Full Text
+ Translate
+ Recently Requested

Managing the security of computerized records

Managing the security of computerized records

Nursing Spectrum 6(23): 5

Please choose payment method:

(PDF emailed within 1 workday: $29.90)

Accession: 046619161

Download citation: RISBibTeXText

PMID: 9434373

Related references

Preparing for the computerized patient. Record and managing its security. Journal 14(3): 38-39, 1995

The need for security with computerized records. Mcn. American Journal of Maternal Child Nursing 20(6): 299, 1995

Computerized records security: problems of policy, not technology. Pennsylvania Medicine 99(3): 22-23, 1996

American Psychiatric Association resource document on computerized records: a guide to security. Journal of the American Academy of Psychiatry and the Law 25(4): 561-564, 1997

Appraisal of computerized medical histories comparisons between computerized and conventional records. Computers & Biomedical Research 19(6): 551-564, 1986

Factorscan to COSTAR, linkage of a computerized factor infusion log to a computerized medical records database. Clinical Research 41(3): 701A, 1993

How DHI Dairy Herd Improvement cow records are calculated Milk production management, computerized records. 1982

Long distance records. Requesting and managing the records of foreign nationals. Journal of Ahima 83(4): 32-33, 2012

The accuracy of survey-reported marital status: evidence from survey records matched to Social Security records. Demography 37(3): 395-399, 2000

Managing contract security. Occupational Health and Safety 71(10): 82-84, 2002

The computerized patient record: privacy and security. M.D. Computing 11(2): 69-73, 1994

Managing security risks with 80001. Biomedical Instrumentation and Technology Suppl: 27-32, 2011

Managing the Food Security Act of 1985. 1987

Managing a security contract: the LMIPS way. Journal of Healthcare Protection Management 31(1): 98, 2015

Managing computer system security. Healthcare Financial Management 41(5): 101, 1987