| D007449 |
Investments |
Use for articles on the investing of funds for income or profit. |
Investment |
|
| D003219 |
Confidentiality |
The privacy of information and its protection against unauthorized disclosure. |
Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications |
|
| D003625 |
Data Collection |
Systematic gathering of data for a particular purpose from various sources, including questionnaires, interviews, observation, existing records, and electronic devices. The process is usually preliminary to statistical analysis of the data. |
Data Collection Methods,Dual Data Collection,Collection Method, Data,Collection Methods, Data,Collection, Data,Collection, Dual Data,Data Collection Method,Method, Data Collection,Methods, Data Collection |
|
| D004059 |
Diffusion of Innovation |
The broad dissemination of new ideas, procedures, techniques, materials, and devices and the degree to which these are accepted and used. |
Innovation Diffusion,Diffusion, Innovation |
|
| D014481 |
United States |
A country in NORTH AMERICA between CANADA and MEXICO. |
|
|
| D016347 |
Medical Records Systems, Computerized |
Computer-based systems for input, storage, display, retrieval, and printing of information contained in a patient's medical record. |
Automated Medical Records Systems,Computerized Medical Records Systems,Automated Medical Record System,Automated Medical Record Systems,Automated Medical Records System,Computerized Medical Record System,Computerized Medical Record Systems,Computerized Medical Records System,Computerized Patient Medical Records,Medical Record System, Automated,Medical Record System, Computerized,Medical Record Systems, Automated,Medical Record Systems, Computerized,Medical Records System, Automated,Medical Records System, Computerized,Medical Records Systems, Automated |
|
| D016494 |
Computer Security |
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer |
|
| D018907 |
Privacy |
The state of being free from intrusion or disturbance in one's private life or affairs. (Random House Unabridged Dictionary, 2d ed, 1993) |
Privacy Act,Public Law 93-579,PL 93-579,PL93-579,Act, Privacy,Law 93-579, Public,PL 93 579,PL93 579,Public Law 93 579 |
|