Towards a practical healthcare information security model for healthcare institutions
暂无分享,去创建一个
Meletis A. Belsis | Rajeev K. Bali | Raouf N. G. Naguib | A. Dwivedi | R. Bali | A. Dwivedi | R. Naguib | N. S. Nassar | P. Every | P. Every
[1] R. Perrin. Biometrics technology adds innovation to healthcare organization security systems. , 2002, Healthcare financial management : journal of the Healthcare Financial Management Association.
[2] Anne E. James,et al. Telehealth systems: considering knowledge management and ICT issues , 2001, 2001 Conference Proceedings of the 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[3] Y Etheridge. PKI (public key infrastructure)--how and why it works. , 2001, Health management technology.
[4] J T Lynch,et al. Mega enterprise chooses smart cards. , 2000, Health management technology.
[5] Cox Jl. Security impacts physicians ... as well as developers. How software companies are coping with EMR security needs. , 2000 .
[6] A Vecchio. More alphabet soup? No, thank you, I'm full. , 2000, Health management technology.
[7] T. Hemmings. PKI: up close and personal. , 2000, Health management technology.
[8] M. Cross. Europe's wrestling with electronic patient record , 2000 .
[9] K. Guenther. Wanted: a new healthcare E-dentity. , 1999, Health management technology.
[10] J. Harney. Virtual document management , 1999 .