Skip to main content

Exceptionalism Redux: How Different Is Health Care Informatics?

  • Chapter
Personal Medical Information
  • 91 Accesses

Abstract

[T]he tremendous growth of computerized health data, the development of huge data banks and the advancements in record linkage, pose an enormous threat to the privacy of medical information. The public is generally unaware of this threat or of the serious consequences of a loss of confidentiality in the health care system. Adequate measures to control medical privacy, in light of the electronic information processing, can and must be established….

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. American Medical Association, Code of Medical Ethics Current Opinions with Annotations (Chicago IL: American Medical Association, 1994).

    Google Scholar 

  2. American Medical Record Association, “Position Paper on the Confidentiality of Medical Information,” Medical Record News (December 1974).

    Google Scholar 

  3. Angell, Marcia, “The Doctor as Double Agent,” Kennedy Institute of Ethics Journal 3 (1993): 279–286.

    Article  Google Scholar 

  4. Arrow, Kenneth, J., “Uncertainty and the Welfare Economics of Medical Care,” American Economic Review 53 (1963): 941–973.

    Google Scholar 

  5. Barrows, Randolph, and Clayton, Paul, “Privacy, Confidentiality and Electronic Medical Records,” Journal of the American Medical Informatics Association 3 (1996): 139–148.

    Article  Google Scholar 

  6. Beauchamp, Tom L., and Childress, James F., Principles of Biomedical Ethics,Fourth Edition (Oxford: Oxford University Press, 1994).

    Google Scholar 

  7. Blaug, Mark, Economic Theory in Retrospect (Cambridge UK: Cambridge University Press, 3rd edition, 1978)

    Google Scholar 

  8. Ernst & Young, Third Annual Information Security Survey: Trends, Concerns and Practices (New York NY: Ernst & Young, 1995a).

    Google Scholar 

  9. Ernst & Young, Third Annual Information Security Survey: Trends, Concerns and Practices, A Focus on the Healthcare Industry (New York NY: Ernst & Young, 1995b).

    Google Scholar 

  10. General Accounting Office, Defense Achieves World-Wide Deployment of Composite Health Care System (Washington DC: US Government Printing Office, 1996).

    Google Scholar 

  11. Gostin, Lawrence O., et al, “The Public Health Information Infrastructure: A National Review of the Law on Health Information Privacy,”JAMA 275 (26 June 1996): 1921–27.

    Article  Google Scholar 

  12. Hiller, Marc. D. and Beyda, Vivian, “Computers, Medical Records and the Right to Privacy,” Journal of Health Politics, Policy and Law 6 (Fall 1981): 463–487.

    Google Scholar 

  13. Institute of Medicine, Modern Methods of Clinical Investigation (Washington DC: National Academy Press, 1990).

    Google Scholar 

  14. Institute of Medicine, The Computer-Based Patient Record: An Essential Technology for Health Care (Washington DC: National Academy Press, 1991).

    Google Scholar 

  15. Institute of Medicine, Health Data in the Information Age: Use,Disclosure and Privacy (Washington, DC: National Academy, Press, 1994).

    Google Scholar 

  16. Joint Commission on the Accreditation of Hospitals, Accreditation Manual for Hospitals (Chicago IL: Joint Commission on the Accreditation of Hospitals, 1976).

    Google Scholar 

  17. National Research Council, Information Technology in a Service Society (Washington DC: National Academy Press, 1994).

    Google Scholar 

  18. Office of Technology Assessment, Protecting Privacy in Computerized Medical Information (Washington, DC: US Government Printing Office, 1993).

    Google Scholar 

  19. Office of Technology Assessment, Identifying Health Technologies That Work: Searching for Evidence (Washington DC: US Government Printing Office, 1994).

    Google Scholar 

  20. Office of Technology Assessment, Issue Update on Information Security and Privacy in Network Environments (Washington DC: US Government Printing Office, 1995)

    Google Scholar 

  21. Pauly, Mark V., “Is Medical Care Really Different?” in Warren Greenberg, Ed., Competition in the Health Sector (Germantown MD: Aspen Systems, 1978).

    Google Scholar 

  22. Regan, Priscilla M., Legislating Privacy: Technology, Social Values, and Public Policy (Chapel Hill: University of North Carolina Press, 1995).

    Google Scholar 

  23. Riley, John, “Open Secrets: Changes in Technology, Health Insurance Making Privacy a Thing of the Past.” Newsday, 31 March 1996.

    Google Scholar 

  24. Schlesinger, Mark L. and Lee, T.K., “Is Health Care Different?” Journal of Health Politics,Policy and Law 18 (Fall 1993): 551–628.

    Google Scholar 

  25. Wald, Matthew, “Flight to Nowhere: Ambitious Update of Air Navigation Becomes a Fiasco,” New York Times, 29 January 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Cushman, R. (1997). Exceptionalism Redux: How Different Is Health Care Informatics?. In: Anderson, R. (eds) Personal Medical Information. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-59023-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-59023-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63244-3

  • Online ISBN: 978-3-642-59023-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics