Healthcare Information Management Systems pp 193-212 | Cite as
The Legacy of Advancing Technology: Ethical Issues and Healthcare Information Management Systems
Chapter
Abstract
“Ethical issues are not founded on whether technology is acceptable to humankind, but rather on whether people have the humanity with which to make technology a true instrument of man’s will.” (Levine, 1980, p. 194)
Keywords
Ethical Issue Personal Information Information Privacy Ethical Principle Moral Obligation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- American Health Information Management Association. ( 1992, July). A position statement on the confidentiality of the computer-based patient record. Chicago: Author.Google Scholar
- American Heritage Dictionary (2nd ed.). (1985). Boston: Houghton Mifflin.Google Scholar
- American Medical Association. (1984). Current opinions of the Judicial Council of the American Medical Association. Chicago: Author.Google Scholar
- American Nurses’ Association. (1985). Code for nurses with interpretive statements. Kansas City, MO: Author.Google Scholar
- Beauchamp, T.L., & Childress, J.F. (1989). Principles of biomedical ethics ( 3rd ed. ). New York: Oxford University Press.Google Scholar
- Beauchamp, T.L., & Childress, J.F. (1994). Principles of biomedical ethics ( 4th ed. ). New York: Oxford University Press.Google Scholar
- Benn, S.I. (1971). Privacy, freedom, and respect for persons. In J.R. Pennock & J.W. Chapman (Eds.), Privacy (pp. 1–26 ). New York: Atherton Press.Google Scholar
- Bennett, C.J. (1991). Computers, personal data, and theories of technology: Comparative approaches to privacy protection in the 1990s. Science, Technology, & Human Values, 16 (1), 51–69.CrossRefGoogle Scholar
- Bialorucki, T., & Blaine, M.J. (1992). Protecting patient confidentiality in the pursuit of the ultimate computerized information system. Journal of Nursing Care Quality, 7 (1), 53–56.PubMedCrossRefGoogle Scholar
- Bloustein, E.J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39, 962–1007.Google Scholar
- Brannigan, V.M. (1992). Protecting the privacy of patient information in clinical networks: Regulatory effectiveness analysis. In D.F. Parsons, C.M. Fleischer, & R.A. Greenes (Vol. Eds.), Annals of the New York Academy of Science: Vol. 670. Extended clinical consulting by hospital computer networks, (670th ed., pp. 191–201 ). New York: The New York Academy of Sciences.Google Scholar
- Brooks, G.M., Semenuk, T., & Vaughan, V.S. (1988). Controlling information: Who, what, how? Computers in Healthcare, 9 (1), 16–18.PubMedGoogle Scholar
- Brown, G. (1990). The information game: Ethical issues in a microchip world. Atlantic Highlands, NJ: Humanities Press International.Google Scholar
- Bruce, J.A.C. (1988). Privacy and confidentiality of health care information ( 2nd ed. ). Chicago: American Hospital Publishing.Google Scholar
- Chlapowski, F.S. (1991). The constitutional protection of informational privacy. Boston University Law Review, 71, 133–160.Google Scholar
- Curran, M., & Curran, K. (1991). The ethics of information. JONA, 21 (1), 47–49.CrossRefGoogle Scholar
- Doroszewski, J. (1988). Ethical and methodological aspects of medical computer data bases and knowledge bases. Theoretical Medicine, 9, 117–128.PubMedCrossRefGoogle Scholar
- Faaoso, N. (1992). Automated patient care systems: The ethical impact. Nursing Management, 23 (7), 46–48.PubMedCrossRefGoogle Scholar
- Fishman, D. (1994). Confidentiality. Computers in Nursing, 12 (2), 73–77.PubMedGoogle Scholar
- Frankena, W.K. (1973). Ethics ( 2nd ed. ). Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
- Fry, S.T. (1994). Ethics in nursing practice: A guide to ethical decision making. Geneva, Switzerland: International Council of Nurses.Google Scholar
- Giger, J.N., & Davidhizar, R.E. (1991). Transcultural nursing. St. Louis, MO: Mosby Year Book.Google Scholar
- Gostin, L.O., Turek-Brezina, J., Powers, M., Kozloff, R., Faden, R., & Steinauer, D.D. (1993). Privacy and security of personal information in a new health care system. JAMA, 270, 2487–2493.PubMedCrossRefGoogle Scholar
- Griesser, G. (1985). The issue of data protection in computer-aided health care information systems. In K.J. Hannah, E.J. Guillemin, & D.N. Conklin (Eds.), Nursing uses of computer and information science, (pp. 113–117 ). North-Holland, Amsterdam: Elsevier Science.Google Scholar
- Griesser, G. (1989). Data protection in hospital information systems: 1. Definition and overview. In H.F. Orthner & B.I. Blum (Eds.), Implementing health care information systems, (pp. 222–253 ). New York: Springer-Verlag.CrossRefGoogle Scholar
- Griswold v. Connecticut,381 U.S. 479 (1965).Google Scholar
- Harris, L. and Associates, & Westin, A.F. (1993). Health information privacy survey: 1993. Atlanta, GA: Equifax.Google Scholar
- Hiller, M.D., & Beyda, V. (1981). Computers, medical records, and the right to privacy. Journal of Health, Politics, and Law, 6, 463–487.CrossRefGoogle Scholar
- Hiller, M.D., & Seidel, L.F. (1982). Patient care management systems, medical records, and privacy: A balancing act. Public Health Reports, 97, 332–345.PubMedGoogle Scholar
- Hirshleifer, J. (1980). Privacy: Its origin, function, and future. The Journal of Legal Studies, 9, 649–664.CrossRefGoogle Scholar
- Jameton, A. (1984). Nursing practice: The ethical issues. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
- Levine, M.E. (1980). The ethics of computer technology in health care. Nursing Forum, XIX (2), 193–198.CrossRefGoogle Scholar
- Locke, J. (1764). Two treatises of government (6th printing). London, England: A. Millar, H. Woodfall, I. Whiston and B. White, I. Rivington, L. Davis and C. Reyners, R. Baldwin, H. Clarke and Collins; W. Johnston, W. Owen, I. Richardson, S. Crowder, T. Longman, B. Law, C. Rivington, E. Dilly, R. Withy, C. and R. Ware, S. Baker, T. Payne, A. Shuckburgh, and I. Hinxman. (Original work published 1689 )Google Scholar
- Maciorowski, L.F. (1991). The enduring concerns of privacy and confidentiality. Holistic Nursing Practice, 5 (3), 51–56.PubMedGoogle Scholar
- Mason, R.O. (1986). Four ethical issues of the information age. MIS Quarterly, 10 (1), 5–12.CrossRefGoogle Scholar
- Milholland, D.K. (1994). Privacy and confidentiality of patient information: Challenges for nursing. JONA, 24 (2), 19–24.CrossRefGoogle Scholar
- Miller, A.R. (1971). The assault on privacy: Computers, data banks, and dossiers. Ann Arbor, MI: The University of Michigan Press.Google Scholar
- Peck, R.S. (1984). Extending the constitutional right to privacy in the new technological age. Hofstra Law Review, 12, 893–912.Google Scholar
- Pheby, D.F.H. (1982). Changing practice on confidentiality: A cause for concern. Journal of Medical Ethics, 8, 12–24.PubMedCrossRefGoogle Scholar
- Romano, C.A. (1987). Privacy, confidentiality, and security of computerized systems: The nursing responsibility. Computers in Nursing, 5 (3), 99–104.Google Scholar
- Schmaus, D. (1991). Computer security and data confidentiality. AORN Journal, 54, 885–890.PubMedCrossRefGoogle Scholar
- Schoeman, F.D. (1992). Privacy and social freedom. Cambridge, England: Cambridge University Press.CrossRefGoogle Scholar
- Simmel, A. (1971). Privacy is not an isolated freedom. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 71–87 ). New York: Atherton Press.Google Scholar
- Smith, H.J. (1994). Managing privacy: Information technology and corporate America. Chapel Hill, NC: The University of North Carolina Press.Google Scholar
- Van Den Haag, E. (1971). On privacy. In J.R. Pennock & J.W. Chapman (Eds.), Privacy, (pp. 149–168 ). New York: Atherton Press.Google Scholar
- Veatch, R.M., & Fry, S.T. (1987). Case studies in nursing ethics. Philadelphia: J.B. Lippincott.Google Scholar
- Westin, A.F. (1976). Computers, health records and citizens rights, (NBS Monograph No. 157 ). Washington, DC: Government Printing Office.Google Scholar
- Winslade, W.J. (1982). Confidentiality of medical records: An overview of concepts and legal policies. The Journal of Legal Medicine, 3, 497–533.PubMedCrossRefGoogle Scholar
Copyright information
© Springer Science+Business Media New York 1995