Skip to main content

The Legacy of Advancing Technology: Ethical Issues and Healthcare Information Management Systems

  • Chapter
Healthcare Information Management Systems

Part of the book series: Computers in Health Care ((HI))

  • 214 Accesses

Abstract

“Ethical issues are not founded on whether technology is acceptable to humankind, but rather on whether people have the humanity with which to make technology a true instrument of man’s will.” (Levine, 1980, p. 194)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • American Health Information Management Association. ( 1992, July). A position statement on the confidentiality of the computer-based patient record. Chicago: Author.

    Google Scholar 

  • American Heritage Dictionary (2nd ed.). (1985). Boston: Houghton Mifflin.

    Google Scholar 

  • American Medical Association. (1984). Current opinions of the Judicial Council of the American Medical Association. Chicago: Author.

    Google Scholar 

  • American Nurses’ Association. (1985). Code for nurses with interpretive statements. Kansas City, MO: Author.

    Google Scholar 

  • Beauchamp, T.L., & Childress, J.F. (1989). Principles of biomedical ethics ( 3rd ed. ). New York: Oxford University Press.

    Google Scholar 

  • Beauchamp, T.L., & Childress, J.F. (1994). Principles of biomedical ethics ( 4th ed. ). New York: Oxford University Press.

    Google Scholar 

  • Benn, S.I. (1971). Privacy, freedom, and respect for persons. In J.R. Pennock & J.W. Chapman (Eds.), Privacy (pp. 1–26 ). New York: Atherton Press.

    Google Scholar 

  • Bennett, C.J. (1991). Computers, personal data, and theories of technology: Comparative approaches to privacy protection in the 1990s. Science, Technology, & Human Values, 16 (1), 51–69.

    Article  Google Scholar 

  • Bialorucki, T., & Blaine, M.J. (1992). Protecting patient confidentiality in the pursuit of the ultimate computerized information system. Journal of Nursing Care Quality, 7 (1), 53–56.

    Article  PubMed  CAS  Google Scholar 

  • Bloustein, E.J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39, 962–1007.

    Google Scholar 

  • Brannigan, V.M. (1992). Protecting the privacy of patient information in clinical networks: Regulatory effectiveness analysis. In D.F. Parsons, C.M. Fleischer, & R.A. Greenes (Vol. Eds.), Annals of the New York Academy of Science: Vol. 670. Extended clinical consulting by hospital computer networks, (670th ed., pp. 191–201 ). New York: The New York Academy of Sciences.

    Google Scholar 

  • Brooks, G.M., Semenuk, T., & Vaughan, V.S. (1988). Controlling information: Who, what, how? Computers in Healthcare, 9 (1), 16–18.

    PubMed  CAS  Google Scholar 

  • Brown, G. (1990). The information game: Ethical issues in a microchip world. Atlantic Highlands, NJ: Humanities Press International.

    Google Scholar 

  • Bruce, J.A.C. (1988). Privacy and confidentiality of health care information ( 2nd ed. ). Chicago: American Hospital Publishing.

    Google Scholar 

  • Chlapowski, F.S. (1991). The constitutional protection of informational privacy. Boston University Law Review, 71, 133–160.

    Google Scholar 

  • Curran, M., & Curran, K. (1991). The ethics of information. JONA, 21 (1), 47–49.

    Article  CAS  Google Scholar 

  • Doroszewski, J. (1988). Ethical and methodological aspects of medical computer data bases and knowledge bases. Theoretical Medicine, 9, 117–128.

    Article  PubMed  CAS  Google Scholar 

  • Faaoso, N. (1992). Automated patient care systems: The ethical impact. Nursing Management, 23 (7), 46–48.

    Article  PubMed  CAS  Google Scholar 

  • Fishman, D. (1994). Confidentiality. Computers in Nursing, 12 (2), 73–77.

    PubMed  CAS  Google Scholar 

  • Frankena, W.K. (1973). Ethics ( 2nd ed. ). Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Fry, S.T. (1994). Ethics in nursing practice: A guide to ethical decision making. Geneva, Switzerland: International Council of Nurses.

    Google Scholar 

  • Giger, J.N., & Davidhizar, R.E. (1991). Transcultural nursing. St. Louis, MO: Mosby Year Book.

    Google Scholar 

  • Gostin, L.O., Turek-Brezina, J., Powers, M., Kozloff, R., Faden, R., & Steinauer, D.D. (1993). Privacy and security of personal information in a new health care system. JAMA, 270, 2487–2493.

    Article  PubMed  CAS  Google Scholar 

  • Griesser, G. (1985). The issue of data protection in computer-aided health care information systems. In K.J. Hannah, E.J. Guillemin, & D.N. Conklin (Eds.), Nursing uses of computer and information science, (pp. 113–117 ). North-Holland, Amsterdam: Elsevier Science.

    Google Scholar 

  • Griesser, G. (1989). Data protection in hospital information systems: 1. Definition and overview. In H.F. Orthner & B.I. Blum (Eds.), Implementing health care information systems, (pp. 222–253 ). New York: Springer-Verlag.

    Chapter  Google Scholar 

  • Griswold v. Connecticut,381 U.S. 479 (1965).

    Google Scholar 

  • Harris, L. and Associates, & Westin, A.F. (1993). Health information privacy survey: 1993. Atlanta, GA: Equifax.

    Google Scholar 

  • Hiller, M.D., & Beyda, V. (1981). Computers, medical records, and the right to privacy. Journal of Health, Politics, and Law, 6, 463–487.

    Article  CAS  Google Scholar 

  • Hiller, M.D., & Seidel, L.F. (1982). Patient care management systems, medical records, and privacy: A balancing act. Public Health Reports, 97, 332–345.

    PubMed  CAS  Google Scholar 

  • Hirshleifer, J. (1980). Privacy: Its origin, function, and future. The Journal of Legal Studies, 9, 649–664.

    Article  Google Scholar 

  • Jameton, A. (1984). Nursing practice: The ethical issues. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Levine, M.E. (1980). The ethics of computer technology in health care. Nursing Forum, XIX (2), 193–198.

    Article  Google Scholar 

  • Locke, J. (1764). Two treatises of government (6th printing). London, England: A. Millar, H. Woodfall, I. Whiston and B. White, I. Rivington, L. Davis and C. Reyners, R. Baldwin, H. Clarke and Collins; W. Johnston, W. Owen, I. Richardson, S. Crowder, T. Longman, B. Law, C. Rivington, E. Dilly, R. Withy, C. and R. Ware, S. Baker, T. Payne, A. Shuckburgh, and I. Hinxman. (Original work published 1689 )

    Google Scholar 

  • Maciorowski, L.F. (1991). The enduring concerns of privacy and confidentiality. Holistic Nursing Practice, 5 (3), 51–56.

    PubMed  CAS  Google Scholar 

  • Mason, R.O. (1986). Four ethical issues of the information age. MIS Quarterly, 10 (1), 5–12.

    Article  Google Scholar 

  • Milholland, D.K. (1994). Privacy and confidentiality of patient information: Challenges for nursing. JONA, 24 (2), 19–24.

    Article  CAS  Google Scholar 

  • Miller, A.R. (1971). The assault on privacy: Computers, data banks, and dossiers. Ann Arbor, MI: The University of Michigan Press.

    Google Scholar 

  • Peck, R.S. (1984). Extending the constitutional right to privacy in the new technological age. Hofstra Law Review, 12, 893–912.

    Google Scholar 

  • Pheby, D.F.H. (1982). Changing practice on confidentiality: A cause for concern. Journal of Medical Ethics, 8, 12–24.

    Article  PubMed  CAS  Google Scholar 

  • Romano, C.A. (1987). Privacy, confidentiality, and security of computerized systems: The nursing responsibility. Computers in Nursing, 5 (3), 99–104.

    Google Scholar 

  • Schmaus, D. (1991). Computer security and data confidentiality. AORN Journal, 54, 885–890.

    Article  PubMed  CAS  Google Scholar 

  • Schoeman, F.D. (1992). Privacy and social freedom. Cambridge, England: Cambridge University Press.

    Book  Google Scholar 

  • Simmel, A. (1971). Privacy is not an isolated freedom. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 71–87 ). New York: Atherton Press.

    Google Scholar 

  • Smith, H.J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: The University of North Carolina Press.

    Google Scholar 

  • Van Den Haag, E. (1971). On privacy. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 149–168 ). New York: Atherton Press.

    Google Scholar 

  • Veatch, R.M., & Fry, S.T. (1987). Case studies in nursing ethics. Philadelphia: J.B. Lippincott.

    Google Scholar 

  • Westin, A.F. (1976). Computers, health records and citizens rights, (NBS Monograph No. 157 ). Washington, DC: Government Printing Office.

    Google Scholar 

  • Winslade, W.J. (1982). Confidentiality of medical records: An overview of concepts and legal policies. The Journal of Legal Medicine, 3, 497–533.

    Article  PubMed  CAS  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer Science+Business Media New York

About this chapter

Cite this chapter

Havens, G.A.D. (1995). The Legacy of Advancing Technology: Ethical Issues and Healthcare Information Management Systems. In: Ball, M.J., Simborg, D.W., Albright, J.W., Douglas, J.V. (eds) Healthcare Information Management Systems. Computers in Health Care. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-2402-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-2402-8_16

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4757-2404-2

  • Online ISBN: 978-1-4757-2402-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics