Search

Your search keyword '"Protected health information"' showing total 672 results

Search Constraints

Start Over You searched for: Descriptor "Protected health information" Remove constraint Descriptor: "Protected health information" Language undetermined Remove constraint Language: undetermined
672 results on '"Protected health information"'

Search Results

1. Analysing the impact of private health insurance on inequities in health care utilization: a longitudinal study from China

3. Privacy Risks in Prenatal Aneuploidy and Carrier Screening

4. Sharing and Selling Images: Ethical and Regulatory Considerations for Radiologists

5. Cybersecurity threats to cardiac implantable devices: room for improvement

6. Spot the difference: comparing results of analyses from real patient data and synthetic derivatives

7. All It Takes Is One: Securing your practice against cybercriminals

8. Association between NSAID Exposure and Kidney Function Decline in Primary Care Patients

9. An explainable artificial intelligence approach for predicting cardiovascular outcomes using electronic health records

10. N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets

11. Regulatory, Legal, and Ethical Considerations of Telemedicine

12. Cinebot: Creation of Movies and Animated GIFs Directly from PACS—Efficiency in Presentation and Education

13. A review of Automatic end-to-end De-Identification: Is High Accuracy the Only Metric?

14. To Infinity and Beyond

15. Cybersecurity: Nurses on the Front Line of Prevention and Education

16. Federated analysis of neuroimaging data: A review of the field

17. Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

18. The OpenDeID corpus for patient de-identification

19. A cross-platform informatics system for the Gut Cell Atlas: integrating clinical, anatomical and histological data

20. Clinical de-identification using sub-document analysis and ELECTRA

21. A Perceptron Mixture Model of Intrusion Detection for Safeguarding Electronic Health Record System

22. Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach

23. HIPAA-based Analysis on the Awareness Level of Medical Personnel in Indonesia to Secure Electronic Protected Health Information (ePHI)

24. Pseudonymization of PHI Items in German Clinical Reports

25. An Atomic Approach to the Design and Implementation of a Research Data Warehouse

26. Preparing for an American College of Surgeons Virtual Trauma Reverification Site Visit: One Center's Experience

27. Important Considerations for the Institutional Review Board When Granting Health Insurance Portability and Accountability Act Authorization Waivers

28. Review of HIPAA, Part 2: Limitations, Rights, Violations, and Role for the Imaging Technologist

30. DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION PHI FROM FREE TEXT IN MEDICAL RECORDS

31. Patients, pictures, and privacy: managing clinical photographs in the smartphone era

32. US‐Pro: An Application Enabling Efficient, High‐Throughput Ultrasound Video Processing

33. Clinical Cybersecurity Training Through Novel High-Fidelity Simulations

34. Should Immigration Status Information Be Considered Protected Health Information?

35. Enhanced privacy governance in Health Information Systems throughbusiness process modelling and HL7

36. Improving domain adaptation in de-identification of electronic health records through self-training

37. Blockchain Based Smart Healthcare System for Chronic –Illness Patient Monitoring

38. Data Science and Natural Language Processing to Extract Information from Clinical Narratives

39. Investigating Protected Health Information Leakage from Android Medical Applications

40. Healthcare Security: Usage of Generative Models for Malware Adversarial Attacks and Defense

41. Medical Records and Confidentiality: Evolving Liability Issues Inherent in the Electronic Health Record, HIPAA, and Cybersecurity

42. Healthcare Sector Security Analysis

43. Challenges and Future Directions for Privacy Dashboard Design of Electronic Health Systems

44. Smart Secure Telerehabilitation Apps for Personalized Autism Home Intervention Using Blockchain System

45. Cybersecurity in Medical Private Practice: Results of a Survey in Audiology

46. Patient-Initiated Data: Our Experience with Enabling Patients to Initiate Incorporation of Heart Rate Data into the Electronic Health Record

47. Towards Dynamic Access Control for Privacy

48. Detecting Protected Health Information with an Incremental Learning Ensemble: A Case Study on New Zealand Clinical Text

49. Public Health Informatics Workforce Skills and Needs: A Descriptive Analysis using the 2017 PH WINS

50. Financial risk protection of individuals with private health insurance

Catalog

Books, media, physical & digital resources