Search Results

= Members only

Current search

886 results.

<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>

Historical Data Analysis of Hospital Discharges Related to the Amerithrax Attack in Florida

Author: Burke, Lauralyn K; Brown, C. Perry; Johnson, Tammie M

Source: Perspectives in Health Information Management

Publication Date: October 2016


Abstract


Interrupted time-series analysis (ITSA) can be used to identify, quantify, and evaluate the magnitude and direction of an event on the basis of time-series data. This study evaluates the impact of the bioterrorist anthrax attacks (“Amerithrax”) on hospital inpatient disch....

Access to Health Information: It Takes a Village

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: December 2015




Obtaining access to one’s written or electronic medical records in a timely manner is one of the guarantees listed in AHIMA’s “Consumer Health Information Bill of Rights.” Yet, for one consumer, Amanda Michelle Jones, MS, AM, being on a first-name basis with medical records depa....

Tips for Preventing and Responding to a Ransomware Attack

Author: Butler, Mary

Source: Journal of AHIMA - website

Publication Date: April 01, 2016

As predicted, 2016 is proving to be the year of ransomware, with multiple reported incidents making news as we approach April. As they become startlingly more common, it’s important that HIM professionals be aware of how preventable they are, says Tom Walsh, CISSP, founder and managing partner of tw-Security. Just as with other types of data breaches, ransomware attacks are the result of human intervention—that’s also where they end.

<< 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 >>