Computer Security
"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.209 N04.452.910.200
|
Concept/Terms |
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in UAMS Profiles by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text, click here.
Year | Major Topic | Minor Topic | Total |
---|
2023 | 0 | 1 | 1 | 2021 | 1 | 0 | 1 | 2019 | 1 | 0 | 1 | 2016 | 1 | 0 | 1 | 2015 | 2 | 2 | 4 | 2014 | 2 | 1 | 3 | 2010 | 1 | 1 | 2 | 2009 | 1 | 0 | 1 | 2003 | 0 | 1 | 1 |
To return to the timeline, click here.
Below are the most recent publications written about "Computer Security" by people in Profiles over the past ten years.
-
Marsolo K, Kiernan D, Toh S, Phua J, Louzao D, Haynes K, Weiner M, Angulo F, Bailey C, Bian J, Fort D, Grannis S, Krishnamurthy AK, Nair V, Rivera P, Silverstein J, Zirkle M, Carton T. Assessing the impact of privacy-preserving record linkage on record overlap and patient demographic and clinical characteristics in PCORnet?, the National Patient-Centered Clinical Research Network. J Am Med Inform Assoc. 2023 02 16; 30(3):447-455.
-
Cuningkin V, Riley E, Rainey L. Preventing Medjacking. Am J Nurs. 2021 10 01; 121(10):46-50.
-
Hare N, Bansal P, Bajowala SS, Abramson SL, Chervinskiy S, Corriel R, Hauswirth DW, Kakumanu S, Mehta R, Rashid Q, Rupp MR, Shih J, Mosnaim GS. Work Group Report: COVID-19: Unmasking Telemedicine. J Allergy Clin Immunol Pract. 2020 09; 8(8):2461-2473.e3.
-
Desjardins B, Mirsky Y, Ortiz MP, Glozman Z, Tarbox L, Horn R, Horii SC. DICOM Images Have Been Hacked! Now What? AJR Am J Roentgenol. 2020 04; 214(4):727-735.
-
Yuan J, Malin B, Modave F, Guo Y, Hogan WR, Shenkman E, Bian J. Towards a privacy preserving cohort discovery framework for clinical research networks. J Biomed Inform. 2017 02; 66:42-51.
-
Middaugh DJ. Do Security Flaws Put Your Patients' Health at Risk? Medsurg Nurs. 2016 Mar-Apr; 25(2):131-2.
-
Koru G, Alhuwail D, Topaz M, Norcio AF, Mills ME. Investigating the Challenges and Opportunities in Home Care to Facilitate Effective Information Technology Adoption. J Am Med Dir Assoc. 2016 Jan; 17(1):53-8.
-
Choudhri AF, Chatterjee AR, Javan R, Radvany MG, Shih G. Security Issues for Mobile Medical Imaging: A Primer. Radiographics. 2015 Oct; 35(6):1814-24.
-
Moore SM, Maffitt DR, Smith KE, Kirby JS, Clark KW, Freymann JB, Vendt BA, Tarbox LR, Prior FW. De-identification of Medical Images with Retention of Scientific Research Value. Radiographics. 2015 May-Jun; 35(3):727-35.
-
O'Keeffe DT, Maraka S, Basu A, Keith-Hynes P, Kudva YC. Cybersecurity in Artificial Pancreas Experiments. Diabetes Technol Ther. 2015 Sep; 17(9):664-6.
|
People People who have written about this concept. _
Similar Concepts
People who have written about this concept.
_
Top Journals
Top journals in which articles about this concept have been published.
|