Search Results

= Members only

Current search

211 results.

<< 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 21 22

Internal Audit Model for Information Security

Author: Mead, Kevin

Source: In Confidence (newsletter)

Publication Date: July 02, 2000


Internal auditors are found within many organizations, and have traditionally concerned themselves with the protection of assets. In the past, this manifested itself by the placing of asset tags on furniture and equipment and verifying the presence of the asset each year. Recently, however, i....

Informatics in Managed Care: HIM Adds Value to Data

Author: Stratton, Scott D.

Source: Journal of AHIMA

Publication Date: September 2001

The third installment of the Journal of AHIMA’s special series on managed care focuses on informatics-methods that add value to data, turning it into useful information. How do informatics and managed care fit together, and what is HIM’s role in this picture?

The HIM professional’s knowl....

Informatics Harnesses Healthcare’s Wild, Rich Data

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: October 2014



Healthcare has become a data-rich field, and any data rich environment requires the ability to analyze large, complex data sets. The field of informatics provides tools to integrate data, information, knowledge, and wisdom when processing data. Good informatics includes many functions, and....

<< 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 21 22