Search Results

= Members only

Current search

211 results.

<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22

Statewide Data Systems: Entering a New Era

Author: Love, Denise

Source: Journal of AHIMA

Publication Date: November 2001




Statewide data systems are the mainstay of many state and federal data systems and of many quality assessment, research, and policy initiatives. The author gives an overview of the different kinds of systems available and looks at opportunities for growth in the future, as well as for....

Cybersecurity 101

Author: Lucci, Susan; Walsh, Tom

Source: Journal of AHIMA

Publication Date: November 2015



One of the most alarming statistics in the news, which is growing with intent and severity, is the prevalence of cyber-attacks, particularly in healthcare. It is an alarming trend that has gained a good deal of attention. For example, in July 2015, UCLA reported that up to 4.5 million pati....

Automation for Privacy and Security Compliance

Author: McLendon, Kelly

Source: Journal of AHIMA

Publication Date: March 2012


There has been a lack of enforcement of the privacy and security rules ever since HIPAA's inception. As such the adoption of comprehensive HIPAA compliance programs has lagged behind EHR development and implementation.

This in turn has caused little funding to be budgeted by provide....

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

<< 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22