Journal of AHIMA > page-comments
AHIMA Journal
Login Archives
  • Revenue Cycle
  • Health Data
  • Workforce Development
  • Privacy and Security
  • Regulatory and Health Industry
  • From AHIMA
    • Under the Dome
    • Profiles
    • Resources
Lock icon - gated content
Team Approach to Managing an Information Security Program
May 01, 1997 · Archive · 1997 Team Approach to Managing an Information Security Program Zakoworotny, Cindy; Rutz, Cheryl; Zwingman-Bagley, Cheryl
Lock icon - gated content
Holistic Approach to Network System Security
May 01, 1997 · Archive · 1997 Holistic Approach to Network System Security Nelson, Doug
Lock icon - gated content
Telemedical Records 1997
April 01, 1997 · Archive · 1997 Telemedical Records 1997 Fletcher, Donna M.
Lock icon - gated content
Document Imaging and Workflow Technology in Healthcare Today
April 01, 1997 · Archive · 1997 Document Imaging and Workflow Technology in Healthcare Today Mahoney, Mary Ellen
Lock icon - gated content
Fraud and Abuse Implications for the HIM Professional
April 01, 1997 · Archive · 1997 Fraud and Abuse Implications for the HIM Professional Prophet, Sue
FirstPrevious1093109410951096109710981099110011011102NextLast

JOURNAL of AHIMA—the official publication of the American Health Information Management Association—delivers best practices in health information management and keeps readers current on emerging issues that affect the accuracy, timeliness, privacy, and security of patient health information.

© Copyright AHIMA . All Rights Reserved

ABOUT
MAGAZINE ABOUT US AWARDS SUBMISSION GUIDELINES ADVERTISING
STAY CONNECTED
 Twitter  Facebook  LinkedIn  RSS
Login
Search