Statements in which the resource exists as a subject.
PredicateObject
rdf:type
lifeskim:mentions
pubmed:issue
4
pubmed:dateCreated
1998-6-24
pubmed:abstractText
Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.
pubmed:language
eng
pubmed:journal
pubmed:citationSubset
H
pubmed:status
MEDLINE
pubmed:month
Jun
pubmed:issn
0731-3381
pubmed:author
pubmed:issnType
Print
pubmed:volume
16
pubmed:owner
NLM
pubmed:authorsComplete
Y
pubmed:pagination
28-34
pubmed:dateRevised
2004-11-17
pubmed:meshHeading
pubmed:year
1998
pubmed:articleTitle
Security in the management of information systems.
pubmed:affiliation
School of Business and Administration, Saint Louis University, MO, USA.
pubmed:publicationType
Journal Article