We have located links that may give you full text access.
Journal Article
Review
Business process design. Securing computerized health information files.
AAOHN Journal : Official Journal of the American Association of Occupational Health Nurses 1998 December
1. With technological advances, nurses in the workplace are challenged to continue the protection of confidential health records. 2. The security of health records can be viewed in three distinct categories: securing files from outside intrusion, maintaining the internal data security, and providing for recovery from disasterous events. 3. Common techniques for securing data include authenication, electronic firewalls, and data encryption.
Full text links
Related Resources
Trending Papers
Challenges in Septic Shock: From New Hemodynamics to Blood Purification Therapies.Journal of Personalized Medicine 2024 Februrary 4
Molecular Targets of Novel Therapeutics for Diabetic Kidney Disease: A New Era of Nephroprotection.International Journal of Molecular Sciences 2024 April 4
The 'Ten Commandments' for the 2023 European Society of Cardiology guidelines for the management of endocarditis.European Heart Journal 2024 April 18
A Guide to the Use of Vasopressors and Inotropes for Patients in Shock.Journal of Intensive Care Medicine 2024 April 14
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app
All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.
By using this service, you agree to our terms of use and privacy policy.
Your Privacy Choices
You can now claim free CME credits for this literature searchClaim now
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app