-
1
-
-
79952518913
-
10-step compliance program
-
March
-
Baumstein, A. 10-step compliance program. InformationWeek, 1222, (March 2009), 39-40.
-
(2009)
InformationWeek
, vol.1222
, pp. 39-40
-
-
Baumstein, A.1
-
2
-
-
18244382576
-
HIPAA security: Don't disband the committee just yet
-
May, (May 2005), 57, last accessed June, 2009
-
Brown, S.C. (2005, May) HIPAA security: Don't disband the committee just yet. Journal of the American Health Information Management Association, 76, 5 (May 2005), 53, 57. http://library.ahima.org/xpedio/groups/public/documents/ ahima/bok1-026973.hcsp?dDocName=bok1-026973, last accessed June, 2009.
-
(2005)
Journal of the American Health Information Management Association
, vol.76
, Issue.5
, pp. 53
-
-
Brown, S.C.1
-
3
-
-
33745005507
-
Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules
-
DOI 10.1007/s10916-006-7405-0
-
Choi, Y.B., Capitan, K.E., Krause, J.S., and Streeper, M.M. 2009. Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules. Journal of Medical Systems, 30, 1 (2006), 57-64. (Pubitemid 44124366)
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.1
, pp. 57-64
-
-
Choi, Y.B.1
Capitan, K.E.2
Krause, J.S.3
Streeper, M.M.4
-
5
-
-
33744995512
-
HIPAA, 10 years after
-
Aug. 2006
-
Conn, J. 2006. HIPAA, 10 years after. Modern Healthcare, 36, 31 (Aug. 2006), 26-28.
-
(2006)
Modern Healthcare
, vol.36
, Issue.31
, pp. 26-28
-
-
Conn, J.1
-
6
-
-
79952515325
-
HIPAA Security Rule 101: The Time to Act Is Now
-
Fitzgerald, T. 2003. HIPAA security rule 101: The time to act is now. Information Systems Security, 12, 1 (March 2003), 43. (Pubitemid 38214627)
-
(2003)
INFORMATION SYSTEMS SECURITY
, vol.12
, Issue.1
, pp. 43
-
-
Fitzgerald, T.1
-
7
-
-
0034565657
-
HIPAA security: Compliance in radiology - An academic radiology department's plan contrasted with a small private practice
-
last accessed June, 2009
-
Haramati, N. 2000. HIPAA security: Compliance in radiology - An academic radiology department's plan contrasted with a small private practice. Journal of Healthcare Information Management, 14, 4 (2009), 65-81. http://www.ncbi.nlm. nih.gov/pubmed/11190264, last accessed June, 2009.
-
(2000)
Journal of Healthcare Information Management
, vol.14
, Issue.4
, pp. 65-81
-
-
Haramati, N.1
-
8
-
-
79952516534
-
HIPAA compliance in U.S. hospitals: A self-report of progress toward the Security Rule
-
(2005), last accessed June, 2009
-
Having, K. & Davis, D.C.2005. HIPAA compliance in U.S. hospitals: A self-report of progress toward the Security Rule. Perspectives in Health Information Management, 2, 9 (2005), 1-12. http://www.pubmedcentral.nih.gov/ articlerender.fcgi?artid=2 047309, last accessed June, 2009.
-
(2005)
Perspectives in Health Information Management
, vol.2
, Issue.9
, pp. 1-12
-
-
Having, K.1
Davis, D.C.2
-
9
-
-
79952496375
-
The security rule
-
Wu, S.S. American Bar Association Publishing, Chicago
-
Jerbic, M., & Wu, S.S. The Security Rule. In Wu, S.S., A guide to HIPAA security and the law. American Bar Association Publishing, Chicago, 2007.
-
(2007)
A Guide to HIPAA Security and the Law
-
-
Jerbic, M.1
Wu, S.S.2
-
10
-
-
79952502574
-
Five steps to HITECH preparedness
-
(June 18, 2009), last accessed June, 2009
-
Kam, R. 2009. Five steps to HITECH preparedness. Computerworld, (June 18, 2009). http://www.computerworld.com/action/article.do?command= viewArticleBasic&taxonomyName=intellectual-property-and-drm&articleId= 9134549&taxonomyId=144&intsrc=kc-feat, last accessed June, 2009.
-
(2009)
Computerworld
-
-
Kam, R.1
-
11
-
-
79952530986
-
Use every avenue when implementing your HIPAA security awareness training
-
April 2000
-
Kuther, B. 2000. Use every avenue when implementing your HIPAA security awareness training. IT Health Care Strategist, 2, 4 (April, 2000), 10.
-
(2000)
IT Health Care Strategist
, vol.2
, Issue.4
, pp. 10
-
-
Kuther, B.1
-
12
-
-
0038562418
-
-
National Institute of Standards and Technology, last accessed June, 2009
-
National Institute of Standards and Technology. 1996. An introduction to computer security: The NIST handbook. http://csrc.nist.gov/publications/ nistpubs/800-12/handbook.pdf, last accessed June, 2009.
-
(1996)
An Introduction to Computer Security: The NIST Handbook
-
-
-
14
-
-
56649106031
-
-
Washington, DC: National Institute of Standards and Technology, Washington, D.C., last accessed June, 2009
-
Scholl, M., Stein, K., Hash, J., Bowen, P., Johnson, A., Smith, C., et al. An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Washington, DC: National Institute of Standards and Technology, Washington, D.C.,2008. http://csrc.nist.gov/publications/nistpubs/800-66- Rev1/SP-800-66-Revision1.pdf, last accessed June, 2009.
-
(2008)
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
-
-
Scholl, M.1
Stein, K.2
Hash, J.3
Bowen, P.4
Johnson, A.5
Smith, C.6
-
17
-
-
0004309411
-
-
National Institute of Standards and Technology, Washington, D.C., last accessed June, 2009
-
Swanson, M. & Guttman, B. Generally accepted principles and practices for securing information technology systems. National Institute of Standards and Technology, Washington, D.C., 1996. http://csrc.nist.gov/publications/ nistpubs/800- 14/800-14.pdf, last accessed June, 2009.
-
(1996)
Generally Accepted Principles and Practices for Securing Information Technology Systems
-
-
Swanson, M.1
Guttman, B.2
-
18
-
-
79952505448
-
What every business needs to know about HIPAA
-
2003
-
Swartz, N. 2003. What every business needs to know about HIPAA. Information Management Journal, 37, 2 (2003), 26-34.
-
(2003)
Information Management Journal
, vol.37
, Issue.2
, pp. 26-34
-
-
Swartz, N.1
-
19
-
-
84887417031
-
HIPAA certification and training guidelines for healthcare organizations: An IS 2002 model curriculum implementation
-
(2006), last accessed June, 2009
-
Sweatt, D., Longenecker, H.E., & Sweeney, R.B. 2006. HIPAA certification and training guidelines for healthcare organizations: An IS 2002 model curriculum implementation. Information Systems Education Journal, 4, 101 (2006), 3-13. http://isedj.org/4/101, last accessed June, 2009.
-
(2006)
Information Systems Education Journal
, vol.4
, Issue.101
, pp. 3-13
-
-
Sweatt, D.1
Longenecker, H.E.2
Sweeney, R.B.3
-
20
-
-
79952508290
-
HIPAA audit at hospital riles health care IT
-
(June 15, 2007), last accessed June, 2009
-
Vijayan, J. 2007. HIPAA audit at hospital riles health care IT. Computerworld, (June 15, 2007). http://www.computerworld.com/action/article.do? command=viewArticleBasic&articleId=9024921, last accessed June, 2009.
-
(2007)
Computerworld
-
-
Vijayan, J.1
-
21
-
-
79952491132
-
Feds finally put teeth into HIPAA enforcement
-
Sept. 2008
-
Vijayan, J. 2008. Feds finally put teeth into HIPAA enforcement. Computerworld, 42, 36 (Sept., 2008), 10-11.
-
(2008)
Computerworld
, vol.42
, Issue.36
, pp. 10-11
-
-
Vijayan, J.1
-
22
-
-
57649095360
-
In a 'trusting' environment, everyone is responsible for information security
-
2008
-
Williams, P. 2008. In a 'trusting' environment, everyone is responsible for information security. Information Security Technical Report, 13, (2008), 207-215.
-
(2008)
Information Security Technical Report
, vol.13
, pp. 207-215
-
-
Williams, P.1
|