Found: 20
Select item for more details and to access through your institution.
LETTERS.
- Published in:
- 1998
- By:
- Publication type:
- Letter
A PRELIMINARY STUDY OF SECURITY IN HEALTHCARE SYSTEMS ON THE INFORMATION SUPERHIGHWAY: THE MALAYSIAN PERSPECTIVE.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 223, doi. 10.1177/146045829800400314
- By:
- Publication type:
- Article
A COMPUTER SECURITY INCIDENT: A CASE HISTORY.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 233, doi. 10.1177/146045829800400316
- By:
- Publication type:
- Article
UNIQUE PATIENT IDENTIFIERS: WHY AND FOR WHAT?
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 227, doi. 10.1177/146045829800400315
- By:
- Publication type:
- Article
Managing security and privacy issues while re-engineering the healthcare enterprise.
- Published in:
- 1998
- By:
- Publication type:
- Journal Article
Diabetic registers: a practice survey of patients' attitudes.
- Published in:
- 1998
- By:
- Publication type:
- Journal Article
Digital patient assistants: privacy vs cost in compulsory health insurance.
- Published in:
- 1998
- By:
- Publication type:
- Journal Article
Diabetic registers: a practice survey of patients' attitudes.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 216, doi. 10.1177/146045829800400313
- By:
- Publication type:
- Article
Security of information in trusts.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 210, doi. 10.1177/146045829800400312
- By:
- Publication type:
- Article
Protecting the identity of doctors in drug prescription analysis.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 205
- By:
- Publication type:
- Article
How the healthcare industry should safeguard data: the view of privacy advocates and industry suggestions for progress.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 196, doi. 10.1177/146045829800400310
- By:
- Publication type:
- Article
Generic security policies for healthcare information systems.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 184, doi. 10.1177/146045829800400309
- By:
- Publication type:
- Article
From security to trust.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 167, doi. 10.1177/146045829800400306
- By:
- Publication type:
- Article
Managing security and privacy issues while re-engineering the healthcare enterprise.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 157, doi. 10.1177/146045829800400305
- By:
- Publication type:
- Article
PRIVACY, CONFIDENTIALITY AND SAFETY OF HEALTHCARE INFORMATION SYSTEMS: BETTER INFORMATION IS NEEDED.
- Published in:
- 1998
- By:
- Publication type:
- Editorial
The ISHTAR guidelines for healthcare security.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 179, doi. 10.1177/146045829800400308
- By:
- Publication type:
- Article
Implementing access control to protect the confidentiality of patient information in clinical information systems in the acute hospital.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 174, doi. 10.1177/146045829800400307
- By:
- Publication type:
- Article
Digital patient assistants: privacy vs cost in compulsory health insurance.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 138, doi. 10.1177/146045829800400304
- By:
- Publication type:
- Article
Health information systems, 'safety' and organizational learning.
- Published in:
- Health Informatics Journal, 1998, v. 4, n. 3/4, p. 128, doi. 10.1177/146045829800400303
- By:
- Publication type:
- Article
SAFETY AND PRIVACY IN CLINICAL SYSTEMS: THE STATE OF PLAY.
- Published in:
- 1998
- By:
- Publication type:
- Editorial