Search

Your search keyword '"health information security"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "health information security" Remove constraint Descriptor: "health information security"
23 results on '"health information security"'

Search Results

1. Enabling secure health information sharing among healthcare organizations by public blockchain.

2. The adoption of a cybersecurity framework in a healthcare, surgical and oncological environment: Synergy-net a Campania FESR-POR (European Fund of Regional Development-Regional Operative Program) research project.

3. Modular Encryption Standard to Improve Security of Health Information in Mobile Cloud Computing

4. برآورد آينده نظام اطالعاتی سالمت الکترونیک در جامعه.

5. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

6. An investigation of the status and maturity of hospitals' health information governance in Victoria, Australia.

8. Prosocial rule breaking on health information security at healthcare organisations in South Korea.

9. The Security of Information Systems in Greek Hospitals

10. Ransomware in Healthcare Facilities: A Harbinger of the Future?

11. Cyber hygiene concepts for nursing education.

12. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

13. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

14. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

15. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

16. Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases.

17. A consumer-centered security framework for sharing health data in social networks.

18. BYOD usage and security behaviour of hospital clinical staff: An Australian survey.

19. Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing

21. Robust Lossless Watermarking based on Circular Interpretation of Bijective Transformations for the Protection of Medical Databases

22. Trusted interoperability and the patient safety issues of parasitic health care software

23. Trusted interoperability and the patient safety issues of parasitic health care software

Catalog

Books, media, physical & digital resources