"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text,
click here.
Year | Major Topic | Minor Topic | Total |
---|
1996 | 0 | 1 | 1 |
2004 | 1 | 0 | 1 |
2008 | 0 | 1 | 1 |
2010 | 0 | 1 | 1 |
2011 | 1 | 1 | 2 |
2016 | 0 | 2 | 2 |
2018 | 0 | 1 | 1 |
2020 | 0 | 1 | 1 |
To return to the timeline,
click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
Khin NA, Francis G, Mulinde J, Grandinetti C, Skeete R, Yu B, Ayalew K, Cho SJ, Fisher A, Kleppinger C, Ayala R, Bonapace C, Dasgupta A, Kronstein PD, Vinter S. Data Integrity in Global Clinical Trials: Discussions From Joint US Food and Drug Administration and UK Medicines and Healthcare Products Regulatory Agency Good Clinical Practice Workshop. Clin Pharmacol Ther. 2020 11; 108(5):949-963.
-
Desai V, Flanders A, Zoga AC. Leveraging Technology to Improve Radiology Workflow. Semin Musculoskelet Radiol. 2018 Nov; 22(5):528-539.
-
Lee CI, Langlotz CP, Elmore JG. Implications of Direct Patient Online Access to Radiology Reports Through Patient Web Portals. J Am Coll Radiol. 2016 Dec; 13(12 Pt B):1608-1614.
-
Armon BD, Bayus K, Kelly BD. Be Prepared: Phase 2 HIPAA Audits Set to Begin. Del Med J. 2016 Jun; 88(6):188.
-
Bercaw DM. Planes, trains, and automobiles...and HIT. Del Med J. 2011 Mar; 83(3):73-4.
-
Jaron D. Re: Web site registration. IEEE Pulse. 2011 Jan-Feb; 2(1):5.
-
Malin B, Karp D, Scheuermann RH. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med. 2010 Jan; 58(1):11-8.
-
Stieb JA. A critique of positive responsibility in computing. Sci Eng Ethics. 2008 Jun; 14(2):219-33.
-
Parekh SG, Nazarian DG, Lim CK. Adoption of information technology by resident physicians. Clin Orthop Relat Res. 2004 Apr; (421):107-11.
-
Kopelman PG, Sanderson AJ. Application of database systems in diabetes care. Med Inform (Lond). 1996 Oct-Dec; 21(4):259-71.