Coming to grips with security gaps. 1998

K Titus

UI MeSH Term Description Entries
D007753 Laboratories Facilities equipped to carry out investigative procedures. Laboratory
D003219 Confidentiality The privacy of information and its protection against unauthorized disclosure. Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications
D006801 Humans Members of the species Homo sapiens. Homo sapiens,Man (Taxonomy),Human,Man, Modern,Modern Man
D012637 Security Measures Regulations to assure protection of property and equipment. National Security,Measure, Security,Measures, Security,Security Measure,Security, National
D016347 Medical Records Systems, Computerized Computer-based systems for input, storage, display, retrieval, and printing of information contained in a patient's medical record. Automated Medical Records Systems,Computerized Medical Records Systems,Automated Medical Record System,Automated Medical Record Systems,Automated Medical Records System,Computerized Medical Record System,Computerized Medical Record Systems,Computerized Medical Records System,Computerized Patient Medical Records,Medical Record System, Automated,Medical Record System, Computerized,Medical Record Systems, Automated,Medical Record Systems, Computerized,Medical Records System, Automated,Medical Records System, Computerized,Medical Records Systems, Automated
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer

Related Publications

K Titus
January 2014, Biomedical instrumentation & technology,
K Titus
February 1996, Journal of psychosocial nursing and mental health services,
K Titus
February 2012, Occupational health & safety (Waco, Tex.),
K Titus
October 2001, The Journal of experimental medicine,
K Titus
October 1983, Canadian journal of comparative medicine : Revue canadienne de medecine comparee,
K Titus
September 2013, Occupational health & safety (Waco, Tex.),
K Titus
December 1998, Science (New York, N.Y.),
K Titus
September 2004, Science (New York, N.Y.),
K Titus
July 1990, Military medicine,
K Titus
March 1981, Contemporary administrator for long-term care,
Copied contents to your clipboard!