"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text,
click here.
Year | Major Topic | Minor Topic | Total |
---|
2007 | 0 | 1 | 1 |
2011 | 1 | 0 | 1 |
2013 | 0 | 1 | 1 |
2014 | 0 | 2 | 2 |
2015 | 1 | 0 | 1 |
2016 | 1 | 0 | 1 |
2019 | 1 | 0 | 1 |
To return to the timeline,
click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
Resilience of clinical text de-identified with "hiding in plain sight" to hostile reidentification attacks by human readers. J Am Med Inform Assoc. 2020 07 01; 27(9):1374-1382.
-
The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight. J Am Med Inform Assoc. 2019 12 01; 26(12):1536-1544.
-
Researching the Appropriateness of Care in the Complementary and Integrative Health Professions Part 5: Using Patient Records: Selection, Protection, and Abstraction. J Manipulative Physiol Ther. 2019 06; 42(5):327-334.
-
The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income. Med Care. 2016 08; 54(8):772-9.
-
Data breaches of protected health information in the United States. JAMA. 2015 Apr 14; 313(14):1471-3.
-
Secure e-mailing between physicians and patients: transformational change in ambulatory care. J Ambul Care Manage. 2014 Jul-Sep; 37(3):211-8.
-
Patient-powered research networks: building capacity for conducting patient-centered clinical outcomes research. J Am Med Inform Assoc. 2014 Jul-Aug; 21(4):583-6.
-
Clinical research data warehouse governance for distributed research networks in the USA: a systematic review of the literature. J Am Med Inform Assoc. 2014 Jul-Aug; 21(4):730-6.
-
Normalization and standardization of electronic health records for high-throughput phenotyping: the SHARPn consortium. J Am Med Inform Assoc. 2013 Dec; 20(e2):e341-8.
-
Confounding adjustment in comparative effectiveness research conducted within distributed research networks. Med Care. 2013 Aug; 51(8 Suppl 3):S4-10.