The Legacy of Advancing Technology: Ethical Issues and Healthcare Information Management Systems

  • Gail Ann DeLuca Havens
Part of the Computers in Health Care book series (HI)


“Ethical issues are not founded on whether technology is acceptable to humankind, but rather on whether people have the humanity with which to make technology a true instrument of man’s will.” (Levine, 1980, p. 194)


Ethical Issue Personal Information Information Privacy Ethical Principle Moral Obligation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. American Health Information Management Association. ( 1992, July). A position statement on the confidentiality of the computer-based patient record. Chicago: Author.Google Scholar
  2. American Heritage Dictionary (2nd ed.). (1985). Boston: Houghton Mifflin.Google Scholar
  3. American Medical Association. (1984). Current opinions of the Judicial Council of the American Medical Association. Chicago: Author.Google Scholar
  4. American Nurses’ Association. (1985). Code for nurses with interpretive statements. Kansas City, MO: Author.Google Scholar
  5. Beauchamp, T.L., & Childress, J.F. (1989). Principles of biomedical ethics ( 3rd ed. ). New York: Oxford University Press.Google Scholar
  6. Beauchamp, T.L., & Childress, J.F. (1994). Principles of biomedical ethics ( 4th ed. ). New York: Oxford University Press.Google Scholar
  7. Benn, S.I. (1971). Privacy, freedom, and respect for persons. In J.R. Pennock & J.W. Chapman (Eds.), Privacy (pp. 1–26 ). New York: Atherton Press.Google Scholar
  8. Bennett, C.J. (1991). Computers, personal data, and theories of technology: Comparative approaches to privacy protection in the 1990s. Science, Technology, & Human Values, 16 (1), 51–69.CrossRefGoogle Scholar
  9. Bialorucki, T., & Blaine, M.J. (1992). Protecting patient confidentiality in the pursuit of the ultimate computerized information system. Journal of Nursing Care Quality, 7 (1), 53–56.PubMedCrossRefGoogle Scholar
  10. Bloustein, E.J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39, 962–1007.Google Scholar
  11. Brannigan, V.M. (1992). Protecting the privacy of patient information in clinical networks: Regulatory effectiveness analysis. In D.F. Parsons, C.M. Fleischer, & R.A. Greenes (Vol. Eds.), Annals of the New York Academy of Science: Vol. 670. Extended clinical consulting by hospital computer networks, (670th ed., pp. 191–201 ). New York: The New York Academy of Sciences.Google Scholar
  12. Brooks, G.M., Semenuk, T., & Vaughan, V.S. (1988). Controlling information: Who, what, how? Computers in Healthcare, 9 (1), 16–18.PubMedGoogle Scholar
  13. Brown, G. (1990). The information game: Ethical issues in a microchip world. Atlantic Highlands, NJ: Humanities Press International.Google Scholar
  14. Bruce, J.A.C. (1988). Privacy and confidentiality of health care information ( 2nd ed. ). Chicago: American Hospital Publishing.Google Scholar
  15. Chlapowski, F.S. (1991). The constitutional protection of informational privacy. Boston University Law Review, 71, 133–160.Google Scholar
  16. Curran, M., & Curran, K. (1991). The ethics of information. JONA, 21 (1), 47–49.CrossRefGoogle Scholar
  17. Doroszewski, J. (1988). Ethical and methodological aspects of medical computer data bases and knowledge bases. Theoretical Medicine, 9, 117–128.PubMedCrossRefGoogle Scholar
  18. Faaoso, N. (1992). Automated patient care systems: The ethical impact. Nursing Management, 23 (7), 46–48.PubMedCrossRefGoogle Scholar
  19. Fishman, D. (1994). Confidentiality. Computers in Nursing, 12 (2), 73–77.PubMedGoogle Scholar
  20. Frankena, W.K. (1973). Ethics ( 2nd ed. ). Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  21. Fry, S.T. (1994). Ethics in nursing practice: A guide to ethical decision making. Geneva, Switzerland: International Council of Nurses.Google Scholar
  22. Giger, J.N., & Davidhizar, R.E. (1991). Transcultural nursing. St. Louis, MO: Mosby Year Book.Google Scholar
  23. Gostin, L.O., Turek-Brezina, J., Powers, M., Kozloff, R., Faden, R., & Steinauer, D.D. (1993). Privacy and security of personal information in a new health care system. JAMA, 270, 2487–2493.PubMedCrossRefGoogle Scholar
  24. Griesser, G. (1985). The issue of data protection in computer-aided health care information systems. In K.J. Hannah, E.J. Guillemin, & D.N. Conklin (Eds.), Nursing uses of computer and information science, (pp. 113–117 ). North-Holland, Amsterdam: Elsevier Science.Google Scholar
  25. Griesser, G. (1989). Data protection in hospital information systems: 1. Definition and overview. In H.F. Orthner & B.I. Blum (Eds.), Implementing health care information systems, (pp. 222–253 ). New York: Springer-Verlag.CrossRefGoogle Scholar
  26. Griswold v. Connecticut,381 U.S. 479 (1965).Google Scholar
  27. Harris, L. and Associates, & Westin, A.F. (1993). Health information privacy survey: 1993. Atlanta, GA: Equifax.Google Scholar
  28. Hiller, M.D., & Beyda, V. (1981). Computers, medical records, and the right to privacy. Journal of Health, Politics, and Law, 6, 463–487.CrossRefGoogle Scholar
  29. Hiller, M.D., & Seidel, L.F. (1982). Patient care management systems, medical records, and privacy: A balancing act. Public Health Reports, 97, 332–345.PubMedGoogle Scholar
  30. Hirshleifer, J. (1980). Privacy: Its origin, function, and future. The Journal of Legal Studies, 9, 649–664.CrossRefGoogle Scholar
  31. Jameton, A. (1984). Nursing practice: The ethical issues. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  32. Levine, M.E. (1980). The ethics of computer technology in health care. Nursing Forum, XIX (2), 193–198.CrossRefGoogle Scholar
  33. Locke, J. (1764). Two treatises of government (6th printing). London, England: A. Millar, H. Woodfall, I. Whiston and B. White, I. Rivington, L. Davis and C. Reyners, R. Baldwin, H. Clarke and Collins; W. Johnston, W. Owen, I. Richardson, S. Crowder, T. Longman, B. Law, C. Rivington, E. Dilly, R. Withy, C. and R. Ware, S. Baker, T. Payne, A. Shuckburgh, and I. Hinxman. (Original work published 1689 )Google Scholar
  34. Maciorowski, L.F. (1991). The enduring concerns of privacy and confidentiality. Holistic Nursing Practice, 5 (3), 51–56.PubMedGoogle Scholar
  35. Mason, R.O. (1986). Four ethical issues of the information age. MIS Quarterly, 10 (1), 5–12.CrossRefGoogle Scholar
  36. Milholland, D.K. (1994). Privacy and confidentiality of patient information: Challenges for nursing. JONA, 24 (2), 19–24.CrossRefGoogle Scholar
  37. Miller, A.R. (1971). The assault on privacy: Computers, data banks, and dossiers. Ann Arbor, MI: The University of Michigan Press.Google Scholar
  38. Peck, R.S. (1984). Extending the constitutional right to privacy in the new technological age. Hofstra Law Review, 12, 893–912.Google Scholar
  39. Pheby, D.F.H. (1982). Changing practice on confidentiality: A cause for concern. Journal of Medical Ethics, 8, 12–24.PubMedCrossRefGoogle Scholar
  40. Romano, C.A. (1987). Privacy, confidentiality, and security of computerized systems: The nursing responsibility. Computers in Nursing, 5 (3), 99–104.Google Scholar
  41. Schmaus, D. (1991). Computer security and data confidentiality. AORN Journal, 54, 885–890.PubMedCrossRefGoogle Scholar
  42. Schoeman, F.D. (1992). Privacy and social freedom. Cambridge, England: Cambridge University Press.CrossRefGoogle Scholar
  43. Simmel, A. (1971). Privacy is not an isolated freedom. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 71–87 ). New York: Atherton Press.Google Scholar
  44. Smith, H.J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: The University of North Carolina Press.Google Scholar
  45. Van Den Haag, E. (1971). On privacy. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 149–168 ). New York: Atherton Press.Google Scholar
  46. Veatch, R.M., & Fry, S.T. (1987). Case studies in nursing ethics. Philadelphia: J.B. Lippincott.Google Scholar
  47. Westin, A.F. (1976). Computers, health records and citizens rights, (NBS Monograph No. 157 ). Washington, DC: Government Printing Office.Google Scholar
  48. Winslade, W.J. (1982). Confidentiality of medical records: An overview of concepts and legal policies. The Journal of Legal Medicine, 3, 497–533.PubMedCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 1995

Authors and Affiliations

  • Gail Ann DeLuca Havens

There are no affiliations available

Personalised recommendations