EurekaMag
+ Most Popular
Cunninghamia lanceolata plantations in China
Mammalian lairs in paleo ecological studies and palynology
Studies on technological possibilities in utilization of anhydrous milk fat for production of recombined butter-like products
Should right-sided fibroelastomas be operated upon?
Large esophageal lipoma
Apoptosis in the mammalian thymus during normal histogenesis and under various in vitro and in vivo experimental conditions
Poissons characoides nouveaux ou non signales de l'Ilha do Bananal, Bresil
Desensitizing efficacy of Colgate Sensitive Maximum Strength and Fresh Mint Sensodyne dentifrices
Administration of fluid by subcutaneous infusion: revival of a forgotten method
Tundra mosquito control - an impossible dream?
Schizophrenia for primary care providers: how to contribute to the care of a vulnerable patient population
Geochemical pattern analysis; method of describing the Southeastern limestone regional aquifer system
Incidence of low birth weights in a hospital of Mexico City
Tabanidae
Graded management intensity of grassland systems for enhancing floristic diversity
Microbiology and biochemistry of cheese and fermented milk
The ember tetra: a new pygmy characid tetra from the Rio das Mortes, Brazil, Hyphessobrycon amandae sp. n. (Pisces, Characoidei)
Risk factors of contrast-induced nephropathy in patients after coronary artery intervention
Renovation of onsite domestic wastewater in a poorly drained soil
Observations of the propagation velocity and formation mechanism of burst fractures caused by gunshot
Systolic blood pressure in a population of infants in the first year of life: the Brompton study
Haematological studies in rats fed with metanil yellow
Studies on pasteurellosis. I. A new species of Pasteurella encountered in chronic fowl cholera
Dormancy breaking and germination of Acacia salicina Lindl. seeds
therapy of lupus nephritis. a two-year prospective study

Information security strategy: questions you wish the CEO would ask


Information security strategy: questions you wish the CEO would ask



Journal of Healthcare Information Management: Jhim 17(3): 5-8



ISSN/ISBN: 1099-811X

PMID: 12858586


Please choose payment method:






(PDF emailed within 1 workday: $29.90)

Accession: 049354379

Download citation: RISBibTeXText

Related references

The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran. Journal of Medical Systems 40(11): 241, 2016

An information security management strategy for healthcare institutions. Medinfo. Medinfo 8 Pt 1: 652-656, 1995

Building an information security strategy for EHR: guidelines for assessing the current situation. Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference 2010: 3919-3922, 2010

A security framework for nationwide health information exchange based on telehealth strategy. Journal of Medical Systems 39(5): 51, 2015

Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals. Healthcare Informatics Research 24(1): 61-68, 2018

Information security climate and the assessment of information security risk among healthcare employees. Health Informatics Journal 26(1): 461-473, 2020

Strategy and accuracy during information search on the Web: Effects of age and complexity of the search questions. Computers in Human Behavior 53: 305-315, 2015

US security strategy in Asia and the prospects for an Asian regional security regime. Asia Pacific Review 12(1): 64-86, 2005

Issues of security and network security in Health Care Information Systems. Studies in Health Technology and Informatics 27: 216-223, 1996

The electronic security partnership of safety/security and information systems departments. Journal of Healthcare Protection Management: Publication of the International Association for Hospital Security 28(1): 108-111, 2012

Government health information security standards. Beat the clock by developing security strategies now. Healthcare Informatics: the Business Magazine for Information and Communication Systems 14(11): 63, 1997

Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security. Journal of the American Medical Informatics Association: Jamia 14(2): 239-243, 2007

Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Applied Ergonomics 38(2): 143-154, 2007

Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24(6): 2799-2816, 2008

Health Information Security in Hospitals: the Application of Security Safeguards. Acta Informatica Medica: Aim: Journal of the Society for Medical Informatics of Bosnia and Herzegovina: Casopis Drustva Za Medicinsku Informatiku Bih 24(1): 47-50, 2016