"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text,
click here.
Year | Major Topic | Minor Topic | Total |
---|
1997 | 0 | 1 | 1 |
1999 | 0 | 1 | 1 |
2005 | 1 | 0 | 1 |
2006 | 1 | 0 | 1 |
2008 | 1 | 0 | 1 |
2009 | 1 | 0 | 1 |
2012 | 0 | 1 | 1 |
2014 | 1 | 0 | 1 |
2016 | 2 | 1 | 3 |
2017 | 1 | 1 | 2 |
2018 | 2 | 3 | 5 |
2019 | 1 | 0 | 1 |
2020 | 0 | 1 | 1 |
2021 | 1 | 0 | 1 |
2022 | 0 | 1 | 1 |
To return to the timeline,
click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
How NFTs could transform health information exchange. Science. 2022 02 04; 375(6580):500-502.
-
How to Host a Virtual Educational Conference. Plast Reconstr Surg. 2021 12 01; 148(6):1401-1406.
-
Policies to Promote Shared Responsibility for Safer Electronic Health Records. JAMA. 2021 Oct 19; 326(15):1477-1478.
-
Data Sharing Under the General Data Protection Regulation: Time to Harmonize Law and Research Ethics? Hypertension. 2021 04; 77(4):1029-1035.
-
Guidelines on Setting Up Stations for Remote Viewing of Nuclear Medicine and Molecular Imaging Studies During COVID-19. J Nucl Med Technol. 2021 Mar; 49(1):2-6.
-
SCOR: A secure international informatics infrastructure to investigate COVID-19. J Am Med Inform Assoc. 2020 11 01; 27(11):1721-1726.
-
Ethical, Legal, and Social Issues (ELSI) of Responsible Data Sharing Involving Children in Genomics: A Systematic Literature Review of Reasons. AJOB Empir Bioeth. 2020 Oct-Dec; 11(4):233-245.
-
ARBoR: an identity and security solution for clinical reporting. J Am Med Inform Assoc. 2019 11 01; 26(11):1370-1374.
-
United States: law and policy concerning transfer of genomic data to third countries. Hum Genet. 2018 Aug; 137(8):647-655.
-
Key Implications of Data Sharing in Pediatric Genomics. JAMA Pediatr. 2018 05 01; 172(5):476-481.