Welcome to the Pubget Medical Subject Headings (MeSH) browser.
Click on a topic or subtopic below to explore related papers. You'll find the most recent paper about the current MeSH term along with other related papers below.
Computer Security (0)
Articles on Computer Security
Building the informatics infrastructure for comparative effectiveness research (CER): a review of the literature.
Technological advances in clinical informatics have made large amounts of data accessible and potentially useful for research. As a result, a burgeoning literature addresses efforts to bridge the fields of health services research and biomedical informatics. The Electronic Data Metho...
Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies.
De-identification and anonymization are strategies that are used to remove patient identifiers in electronic health record data. The use of these strategies in multicenter research studies is paramount in importance, given the need to share electronic health record data across multip...
Cloud computing in biomedical research.
PCIEF: a policy conflict identification and evaluation framework
Information system security policies have grown in complexity and the emerging collaborative nature of business has created new challenges in creating and managing such policies. These policies address several domains ranging from access control to disaster recovery and depend not only on the busines...
Essential attributes identified in the design of a Laboratory Information Management System for a high throughput siRNA screening laboratory...
In recent years high throughput screening operations have become a critical application in functional and translational research. Although a seemingly unmanageable amount of data is generated by these high-throughput, large-scale techniques, through careful planning, an effective Lab...
The European cooperative approach to securing critical information infrastructure.
This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparednes...
The cyber threat, trophy information and the fortress mentality.
We got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and eff...
Preventing network breaches: trusted platform modules are the key.
Shortcomings and challenges of information system adoption.
The number of institutions implementing AIMS is increasing. Shortcomings in the design and implementation of EMRs have been associated with unanticipated consequences, including changes in workflow. These have often resulted from the carryover of paper-based documentation practices i...