Information security: how safe is your system? 1995

M Brandt
American Health Information Management Association, Chicago, USA.

UI MeSH Term Description Entries
D010557 Personnel Administration, Hospital Management activities concerned with hospital employees. Hospital Personnel Administration,Personnel Management, Hospital,Personnel, Hospital, Organization and Administration,Administration, Hospital Personnel,Hospital Personnel Management,Hospital Personnel Organization and Administration,Management, Hospital Personnel
D010934 Planning Techniques Procedures, strategies, and theories of planning. Planning Theories,Methodology, Planning,Planning Methodology,Planning Technic,Planning Methodologies,Planning Technics,Planning Technique,Planning Theory,Technic, Planning,Technique, Planning,Theory, Planning
D003219 Confidentiality The privacy of information and its protection against unauthorized disclosure. Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications
D006751 Hospital Information Systems Integrated, computer-assisted systems designed to store, manipulate, and retrieve information concerned with the administrative and clinical aspects of providing medical services within the hospital. Multi-Hospital Information Systems,Information System, Hospital,Information System, Multihospital,Information Systems, Hospital,Information Systems, Multihospital,Multihospital Information Systems,Hospital Information System,Information System, Multi-Hospital,Information Systems, Multi-Hospital,Multi Hospital Information Systems,Multi-Hospital Information System,Multihospital Information System
D014481 United States A country in NORTH AMERICA between CANADA and MEXICO.
D016347 Medical Records Systems, Computerized Computer-based systems for input, storage, display, retrieval, and printing of information contained in a patient's medical record. Automated Medical Records Systems,Computerized Medical Records Systems,Automated Medical Record System,Automated Medical Record Systems,Automated Medical Records System,Computerized Medical Record System,Computerized Medical Record Systems,Computerized Medical Records System,Computerized Patient Medical Records,Medical Record System, Automated,Medical Record System, Computerized,Medical Record Systems, Automated,Medical Record Systems, Computerized,Medical Records System, Automated,Medical Records System, Computerized,Medical Records Systems, Automated
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer

Related Publications

M Brandt
January 1985, Dimensions in health service,
M Brandt
November 1975, Veterinary medicine, small animal clinician : VM, SAC,
M Brandt
April 2021, The American journal of cardiology,
M Brandt
January 1991, Nursing times,
M Brandt
October 1987, RDH,
M Brandt
November 1972, Dental management,
M Brandt
September 1995, The American journal of nursing,
M Brandt
February 1986, Dental lab management today,
M Brandt
January 2003, Consumer reports,
Copied contents to your clipboard!