Author of the publication

Neither panacea nor black box: Responding to three Journal of Biomedical Informatics papers on computerized physician order entry systems.

, , , and . J. Biomed. Informatics, 38 (4): 267-269 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case Report: Identifying and Quantifying Medication Errors: Evaluation of Rapidly Discontinued Medication Orders Submitted to a Computerized Physician Order Entry System., , , , , and . JAMIA, 15 (4): 461-465 (2008)Implications of an emerging EHR monoculture for hospitals and healthcare systems., and . JAMIA, 22 (2): 465-471 (2015)Role of Healthcare Information Technology in Handoffs., and . ITCH, volume 183 of Studies in Health Technology and Informatics, page 21-27. IOS Press, (2013)Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users., , , and . WSF@SOUPS, USENIX Association, (2016)Ethics and informatics in the age of COVID-19: challenges and recommendations for public health organization and public policy., , , , , , , , , and 4 other author(s). J. Am. Medical Informatics Assoc., 28 (1): 184-189 (2021)Usability Across Health Information Technology Systems: Searching for Commonalities and Consistency., and . MedInfo, volume 264 of Studies in Health Technology and Informatics, page 649-653. IOS Press, (2019)Technology transfer from biomedical research to clinical practice: measuring innovation performance., , and . AMIA, AMIA, (2014)Collaborative Pharming., , , and . AMIA, AMIA, (2017)Learning from Colleagues about Healthcare IT Implementation and Optimization: Lessons from a Medical Informatics Listserv., , , , , and . J. Medical Systems, 39 (1): 157 (2015)Circumvention of Security: Good Users Do Bad Things., , and . IEEE Secur. Priv., 11 (5): 80-83 (2013)