TITLE

Coded wristbands prompt confidentiality concerns

PUB. DATE
December 2008
SOURCE
Healthcare Risk Management;Dec2008, Vol. 30 Issue 12, p139
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the usage of color-coded wristbands in hospitals for patients in an attempt to improve safety by alerting anyone nearby of patients' conditions.
ACCESSION #
35816857

 

Related Articles

  • AN EFFICIENT ALGORITHM FOR PRIVACY PRESERVING TEMPORAL PATTERN MINING. ARUMUGAM, S. S.; PALANISAMY, V. // Journal of Theoretical & Applied Information Technology;12/20/2013, Vol. 58 Issue 2, p471 

    Pattern mining increases extra awareness due to its practical relevance in many fields, such as, biology, medicine and so on. Recently, a few researches have been presented in the literature about the mining of privacy preserving patterns. There are more number of data mining techniques...

  • Looking for a PIM for all reasons. Machrone, Bill // PC Week;8/21/95, Vol. 12 Issue 33, p61 

    Opinion. Focuses on the use of personal information managers (PIMs). Complex programs that demand devotion and study; Dissatisfaction of users with PIM products; Publication of a manifesto by the NYPC PIM Power Users.

  • Privacy Provisions.  // Business NH Magazine;Feb2003, Vol. 20 Issue 2, p8 

    Reports on the establishment of limitations on the use of personal identity information by policy makers in New Hampshire. Restrictions on the display of social security numbers; Effort to mitigate the increasing incidence of identity theft; Prohibition of storing personal information on a...

  • The Licencing of Our Personal Information: Is It a Solution to Internet Privacy? Basho, Kalinda // California Law Review;Oct2000, Vol. 88 Issue 5, p1507 

    Proposes the use of an online licensing system based on the Uniform Computer Information Transaction Act (UCITA) to protect online privacy in the United States. Commercial and individual interests on online personal information; Effectiveness of privacy protection systems; Analysis of the...

  • Identity theft can be stopped with proper use of personal info. Ahalt, Arthur M. // New Orleans CityBusiness (1994 to 2008);7/7/2003, Vol. 24 Issue 1, p18 

    Focuses on the prevention of identity theft through the proper management of personal information. Positive identification; Proposals to eliminate Social Security numbers; Hysteria surrounding identity theft and privacy.

  • Make the switch. Telesco, Annette // Secretary;Jan97, Vol. 57 Issue 1, p15 

    Presents information on personal information manager (PIMs) systems, which will be helpful in scheduling appointments and tracking projects. Ability of PIMs; Important features of PIMs; What to look for when choosing a PIM.

  • A fresh start.  // Scholastic Action;12/13/99, Vol. 23 Issue 6, p18 

    Provides tips for an organized year 2000. Importance of keeping a daily planner; Outline of daily schedule; Creation of/or buying a planner.

  • Computer adoption levels of Iowa dailies and weeklies. Niebauer Jr., Walter E.; Abbott, Eric; Corbin, Lorena; Neibergall, John // Newspaper Research Journal;Spring2000, Vol. 21 Issue 2, p84 

    Large Iowa dailies have reached a computer adoption level of 50 percent in all but one of 27 areas. Small dailies have adopted computers for most uses, while weeklies lag in production and business uses.

  • A low-cost way to start computerizing. Patterson, David // Nursing Homes: Long Term Care Management;Jun96, Vol. 45 Issue 6, p84 

    Focuses on the applications of personal information management (PIM) software. Specifications; Functions; PIM software for contact management.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics