Abstract
After reading this chapter, you should know the answers to these questions:
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alpert, S. A. (1998). Health care information: Access, confidentiality, and good practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 75–101). Cambridge: Cambridge University Press.
Anderson, J. G., & Aydin, C. E. (1994). Overview: Theoretical perspectives and methodologies for the evaluation of health care information systems. In J. G. Anderson, C. E. Aydin, & S. J. Jay (Eds.), Evaluating health care information systems: Methods and applications (pp. 346–354). Thousand Oaks: Sage.
Anderson, J. G., & Aydin, C. E. (1998). Evaluating medical information systems: Social contexts and ethical challenges. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 57–74). Cambridge: Cambridge University Press.
Atreya, R. V., Smith, J. C., McCoy, A. B., Malin, B., & Miller, R. A. (2013). Reducing patient re-identification risk for laboratory results within research datasets. Journal of the American Medical Informatics Association: JAMIA, 20, 95–101.
Benitez, K., & Malin, B. (2010). Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association: JAMIA, 17, 169–177.
Blumenthal, D. (2010). Launching HITECH. The New England Journal of Medicine, 362(5), 382–385.
Brody, B. A. (1989). The ethics of using ICU scoring systems in individual patient management. Problems in Critical Care, 3, 662–670.
Classen, D. C., Avery, A. J., & Bates, D. W. (2007). Evaluation and certification of computerized provider order entry systems. Journal of the American Medical Informatics Association: JAMIA, 14(1), 48–55.
Curran, W. J., Stearns, B., & Kaplan, H. (1969). Privacy, confidentiality, and other legal considerations in the establishment of a centralized health-data system. The New England Journal of Medicine, 281, 241–248.
Cushman, R., Froomkin, M. A., Cava, A., Abril, P., & Goodman, K. W. (2010). Ethical, legal and social issues for personal health records and applications. Journal of Biomedical Informatics, 43, S51–S55.
de Dombal, F. T. (1987). Ethical considerations concerning computers in medicine in the 1980s. Journal of Medical Ethics, 13, 179–184.
Duda, R. O., & Shortliffe, E. H. (1983). Expert systems research. Science, 220, 261–268.
FDA (U.S. Food and Drug Administration). (2011). Infusion pump software safety research at FDA. Retrieval 1 Aug 2012: http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/GeneralHospitalDevicesandSupplies/InfusionPumps/ucm202511.htm
Friedman, C. P. (2009). A “fundamental theorem” of biomedical informatics. Journal of the American Medical Informatics Association: JAMIA, 16(2), 169–170.
Geissbuhler, A. J., & Miller, R. A. (1997). Desiderata for product labeling of medical expert systems. International Journal of Medical Informatics, 47(3), 153–163.
Glaser, J. (2010). HITECH lays the foundation for more ambitious outcomes-based reimbursement. The American Journal of Managed Care, 16(12), SP19–SP23.
Goodman, K. W. (1996). Ethics, genomics and information retrieval. Computers in Biology and Medicine, 26, 223–229.
Goodman, K. W. (1998b). Outcomes, futility, and health policy research. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 116–138). Cambridge: Cambridge University Press.
Goodman, K. W., & Cava, A. (2008). Bioethics, business ethics, and science: Bioinformatics and the future of healthcare. Cambridge Quarterly of Healthcare Ethics, 17(4), 361–372.
Goodman, K. W., Berner, E. S., Dente, M. A., Kaplan, B., Koppel, R., Rucker, D., Sands, D. Z., & Winkelstein, P. (2010). Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients. Journal of the American Medical Informatics Association: JAMIA, 18(1), 77–81.
Hartzband, P., & Groopman, J. (2008). Off the record—avoiding the pitfalls of going electronic. The New England Journal of Medicine, 358(16), 1656–1658.
Health Information Technology for Economic and Clinical Health (HITECH) Act, Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act of 2009 (ARRA).(2009).
Holroyd-Leduc, J. M., Lorenzetti, D., Straus, S. E., Sykes, L., & Quan, H. (2011). The impact of the electronic medical record on structure, process and outcomes within primary care: A systematic review of the evidence. Journal of the American Medical Informatics Association: JAMIA, 18, 732–737.
Kaplan, B., & Harris-Salamone, K. D. (2009). Health IT success and failure: Recommendations from literature and an AMIA workshop. Journal of the American Medical Informatics Association: JAMIA, 16, 291–299.
Knaus, W. A., Wagner, D. P., & Lynn, J. (1991). Short-term mortality predictions for critically ill hospitalized adults: Science and ethics. Science, 254, 389–394.
Koppel, R., & Kreda, D. (2009). Health care information technology vendors’ “hold harmless” clause: Implications for patients and clinicians. Journal of the American Medical Association, 301, 1276–1278.
Kuperman, G. J., & Gibson, R. F. (2003). Computer physician order entry: Benefits, costs, and issues. Annals of Internal Medicine, 139(1), 31–39.
Lane, W. A. (1936, November). What the mouth reveals. New Health, 11, 34–35.
Macklin, R. (1992). Privacy and control of genetic information. In G. J. Annas & S. Elias (Eds.), Gene mapping: Using law and ethics as guides (pp. 157–172). New York: Oxford University Press.
Majchrowski, B. (2010). Medical software’s increasing impact on healthcare and technology management. Biomedical Instrumentation and Technology, 44(1), 70–74.
Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37, 179–192.
Malin, B., Loukides, G., Benitez, K., & Clayton, E. W. (2011). Identifiability in biobanks: Models, measures, and mitigation strategies. Human Genetics, 130, 383–392.
McNeer, J. F., Wallace, A. G., Wagner, G. S., Starmer, C. F., & Rosati, R. A. (1975). The course of acute myocardial infarction: Feasibility of early discharge of the uncomplicated patient. Circulation, 51, 410–413.
Miller, R. A. (1989). Legal issues related to medical decision support systems. International Journal of Clinical Monitoring and Computing, 6, 75–80.
Miller, R. A. (1990). Why the standard view is standard: People, not machines, understand patients’ problems. The Journal of Medicine and Philosophy, 15, 581–591.
Miller, R. A. (1997). Predictive models for primary caregivers: Risky business? Annals of Internal Medicine, 127(7), 565–567.
Miller, R. A., & Gardner, R. M. (1997a). Summary recommendations for the responsible monitoring and regulation of clinical software systems. Annals of Internal Medicine, 127(9), 842–845.
Miller, R. A., & Gardner, R. M. (1997b). Recommendations for responsible monitoring and regulation of clinical software systems. Journal of the American Medical Informatics Association: JAMIA, 4, 442–457.
Miller, R. A., & Goodman, K. W. (1998). Ethical challenges in the use of decision-support software in clinical practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 102–115). Cambridge: Cambridge University Press.
Miller, R. A., & Miller, S. M. (2007). Legal and regulatory issues related to the use of clinical software in health care delivery. In R. A. Greenes (Ed.), Clinical decision support: The road ahead (pp. 423–444). Boston: Elsevier.
Miller, R. A., Schaffner, K. F., & Meisel, A. (1985). Ethical and legal issues related to the use of computer programs in clinical medicine. Annals of Internal Medicine, 102, 529–536.
National Research Council. (1997). For the record: Protecting electronic health information. Washington, D.C.: National Academy Press.
Palfrey, J., Gasser, U. (2010). Born digital: Understanding the first generation of digital natives. New York: Basic Books; Robertson, J. (2011). Insulin pumps, monitors vulnerable to hacking. Retrieval 15 Aug 2011: http://www.ap.org/
Robertson, J. (2011, August 4). Insulin pumps, monitors vulnerable to hacking. Associated Press via various media, e.g., The Washington Times. Retrieval 1 Aug 2012: http://www.washingtontimes.com/news/2011/aug/4/insulin-pumps-monitors-vulnerable-to-hacking/?page=all
Shih, S.C., McCullough, C.M., Wang, J.J., Singer, J., & Parsons, A.S. (2011). Health information systems in small practices. Improving the delivery of clinical preventive services. American Journal of Preventive Medicine, (6), 603–609.
Shortliffe, E. H. (1993). Doctors, patients, and computers: Will information technology dehumanize health-care delivery? Proceedings of the American Philosophical Society, 137(3), 390–398.
Shortliffe, E. H. (1994). Dehumanization of patient care. Are computers the problem or the solution? Journal of the American Medical Informatics Association: JAMIA, 1, 76–78.
Sittig, D. F., Krall, M., Kaalaas-Sittig, J., & Ash, J. S. (2005). Emotional aspects of computer-based provider order entry: A qualitative study. Journal of the American Medical Informatics Association: JAMIA, 12(5), 561–567.
Sweeney, L. (1997). Weaving technology and policy together to maintain confidentiality. The Journal of Law, Medicine & Ethics, 25, 98–110.
Szolovits, P., & Pauker, S. G. (1979). Computers and clinical decision making: Whether, how much, and for whom? Proceedings of the IEEE, 67, 1224–1226.
Tamersoy, A., Loukides, G., Nergiz, M. E., Saygin, Y., & Malin, B. (2012). Anonymization of longitudinal electronic medical records. IEEE Transactions on Information Technology in Biomedicine, 16, 413–423.
Tysyer, D.A. (1997). Database legal protection. Bitlaw. Retrieval 1 Aug 2012: http://www.bitlaw.com/copyright/database.html
Wright, A., Sittig, D. F., Ash, J. S., Sharma, S., Pang, J. E., & Middleton, B. (2009). Clinical decision support capabilities of commercially-available clinical information systems. Journal of the American Medical Informatics Association: JAMIA, 16(5), 637–644.
Youngner, S. J. (1988). Who defines futility? Journal of the American Medical Association, 260, 2094–2095.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Goodman, K.W., Cushman, R., Miller, R.A. (2014). Ethics in Biomedical and Health Informatics: Users, Standards, and Outcomes. In: Shortliffe, E., Cimino, J. (eds) Biomedical Informatics. Springer, London. https://doi.org/10.1007/978-1-4471-4474-8_10
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4474-8_10
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4473-1
Online ISBN: 978-1-4471-4474-8
eBook Packages: MedicineMedicine (R0)