Skip to main content
Log in

On protecting & preserving personal privacy in interoperable global healthcare venues

  • Original Paper
  • Published:
Health and Technology Aims and scope Submit manuscript

Abstract

Worldwide, Information Technology (IT) use in healthcare systems is rapidly increasing for the purposes of realizing higher quality, and reducing overall costs. This escalation in healthcare IT use is simultaneously fueling a brisk rise in institutional demands for more Information. Associatedly, with IT proliferation and the escalation of informational demands within healthcare Systems, is an ever-present loss risk of Patient’s Privacy. Therefore, all efforts undertaken to protect Privacy must effectively identify conceivable threat trajectories - against which - pathways to assure protections need exist, and to which, knowledge and resources must be mustered in a timely manner. More fundamentally, however, to identify, prevent, and safeguard against encroachments upon Privacy in healthcare, there is a need for an a priori comprehension by all in healthcare that nothing can be protected adequately if the value of that which is to be protected, and/or the consequences related to the loss - are not well understood. Yet, that which is eminently clear is, in the field of healthcare, many Medical Staff have neither the understanding, an appreciation for the importance, nor the worth of Privacy of those Patients in their care. Even with the threat of official/legal action looming, Privacy violations and compromises of Protected Health Information (PHI) by Medical Staff occur routinely. How could Medical Staff make perverse errors in judgement regarding Patient“s Privacy so often? The aim of this article is to provide a reasonable familiarization to fundamental activities and correlated behaviors that compel risks, which are responsible for Information and Privacy Compromises. Furthermore, by way of such familiarization, necessary actions to be undertaken - to prevent the loss of Personal Privacy in Interoperable global healthcare venues can be suitably employed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. Emphasis is provided by the Author, and does not appear in the original

  2. [Resources Provided For Background Reading] Chapter 3: “Privacy and Security Concerns Regarding Electronic Health Information,” In, “For the Record Protecting Electronic Health Information,” Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, D.C., 1997; Tolkoff, Marcy [JD]; “Patients Keeping Secrets From You?; EHR Graph Mistakes; More,” Medscape Business of Medicine, June 18, 2015 http://www.medscape.com/viewarticle/845791 AND McCann, Erin; “Deaths by medical mistakes hit records,” HealthcareIT News, Washington, D.C., July 18, 2014 http://www.healthcareitnews.com/news/deaths-by-medical-mistakes-hit-records AND Schuman, Evan; “CDC on EHR errors: Enough’s enough,“ HealthcareIT News Washington, D.C., July 8, 2014 http://www.healthcareitnews.com/news/cdc-ehr-errors-enoughs-enough

  3. Part of an Information Life Cycle Management (ILcM) System

  4. ”The Toxic Terabyte: How Data-Dumping Threatens Business Efficiency,“ IBM - Global Technology Services,

    London, UK., July 2006

  5. The Digital Universe

  6. “The Digital Universe Opportunities: Rich Data and Increasing Value of The Internet things” [White Paper], IDC Research, Framingham, MA, 2014

  7. 1 ExaByte = 1018 Bytes of Data.

  8. 1.1 ZettaBytes/Year, or 88.4 ExaBytes (~1 Billion GB/Month)

  9. “The Zettabyte Era: Trends and Analysis,” CISCO White Paper, San Jose, California, May 2015.

  10. ”The Toxic Terabyte: How Data-Dumping Threatens Business Efficiency,“ IBM - Global Technology Services, London, UK., July 2006

  11. Ibid

  12. Interoperability” is defined as that capability by which, all operating elements of interdependent and interconnected systems are able to operate and perform synchronously and optimally, to achieve objectives, or mission success. Synchronous operations here infers to an operational requirement for all components/sub-systems of interconnected and interdependent systems, to be properly oriented, skillfully aligned, and reliably available – across geographic and organizational boundaries - to achieve mission objectives. See In: Mathews, R; “Uninteroperability at The United Nations: The Case of a Runaway World Body (On Overcoming Leadership Vacuum, Structural Failures & High Risks to Human Development)” J. Health & Technology, Vol. 4, No. 2, 2014

  13. The statement is often attributed to Computer Scientist, Clifford Stoll. However, it represents a condensation of his writing on the matter. “Data isnt informationInformation, unlike data, is useful. While theres a gulf between data and information, theres a wide ocean between information and knowledge. What turns the gears in our brains isnt information, but ideas, inventions, and inspiration. Knowledgenot informationimplies understanding. And beyond knowledge lies what we should be seeking: wisdom.” — Clifford Stoll, In, High-Tech Heretic: Reflections of a Computer Contrarian, Anchor Books, New York, NY (2000), 185–186.

  14. The notion of competition is framed around more than mere economic trajectories. Public and Private institutions that collect data may very well be governed by different legal authorities. Just the same, the collectors of information find value in letting it, or selling it entirely. The laws covering collections, and the sale of information collected - may vary for Public and Private entities. Regardless, the end-result in terms of Privacy is the same; the public is largely unaware of those ways in which the data is collected and used, and that both Public and Private Information sellers stem revenue streams from such sales.

  15. “Report of the National Task Force on Privacy, Technology, and Criminal Justice Information -- Law and policy Change drivers Recommendations,” Office of Justice Programs - Bureau of Justice Statistics, U.S. Department of Justice (SEARCH Group, Incorporated, The National Consortium for Justice Information and Statistics, under CA# 96-BJ-CX-K010), Sacramento, CA, August 2001.

  16. OECD Member States Participating in the Global Privacy Enforcement Network (GPEN)

  17. “Children’s Privacy: insufficient protection on the websites“ – CNIL (National Commission on Informatics and Liberties – the French National Data Protection Authority), September 2, 2015 [audit of 1494 websites and Applications. http://www.cnil.fr/linstitution/actualite/article/article/vie-privee-des-enfants-une-protection-insuffisante-sur-les-sites-internet/

  18. Digital Universe

  19. See “The Digital Universe Opportunities” 2013, Supra, note 6

  20. “The Big Data Refinery: distilling intelligence from Big Data,” Database and Network Journal, Vol. 42, No.4, August 2012

  21. “Disruptive Impact of IoT on Business” (The Gartner Symposium/ITxpo 2014), Barcelona, Spain, November 11, 2014. [https://www.gartner.com/newsroom/id/2905717

  22. Ibid

  23. ISACA identifies itself as “the world’s leading independent, nonprofit association in governing, managing and assuring trust in an evolving digital world.”

  24. “Keeping a Lock on Privacy: How Enterprises Are Managing Their Privacy Function,” ISACA, Rolling Meadows, IL, September 2015

  25. Ibid

  26. “The State of Data Sharing For Healthcare Analytics 2015–2016: Change, Challenges and Choice,” Privacy Analytics, Ottawa - Ontario, Canada, November 2015.

  27. “Identity Thief Sentenced for Filing Tax Returns in the Names of the Attorney General and Others,” FBI Atlanta Division/U.S. Attorney’s Office - Northern District of Georgia, March 12, 2014 https://www.fbi.gov/atlanta/press-releases/2014/identity-thief-sentenced-for-filing-tax-returns-in-the-names-of-the-attorney-general-and-others AND Williams, Pete and Black, Jeff; ‘“Sophisticated’ ID thieves swipe info on Michelle Obama, Beyonce’, Ashton Kutcher and others,” NBC News (US-News), Tuesday Mar 12, 2013 http://usnews.nbcnews.com/_news/2013/03/12/17287204-sophisticated-id-thieves-swipe-info-on-michelle-obama-beyonce-ashton-kutcher-and-others

  28. Vaas, Lisa; “Data-stealing botnets found in major data brokers’ servers,” Naked-Security By SOPHOS (Computer Security News), 26 Sep 2013 https://nakedsecurity.sophos.com/2013/09/26/data-stealing-botnets-found-in-major-public-record-holders-servers/ and Krebs, Brian; “Data Broker Giants Hacked by ID Theft Service,” Krebs on Security, September 13, 2013 http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/

  29. “ChoicePoint Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” The Federal Trade Commission (FTC), Washington, D.C., January 26, 2006 https://www.ftc.gov/news-events/press-releases/2006/01/choicepoint-settles-data-security-breach-charges-pay-10-million

  30. “Consumer Data Broker ChoicePoint Failed to Protect Consumers’ Personal Data, Left Key Electronic Monitoring Tool Turned Off for Four Months New Settlement Imposes Stricter Compliance Regimen,“ The Federal Trade Commission (FTC), Washington, D.C., October 19, 2009 https://www.ftc.gov/news-events/press-releases/2009/10/consumer-data-broker-choicepoint-failed-protect-consumers

  31. References a “Fort Knox“ for Information

  32. “Holman v. Experian Information Solutions Inc., et al.,” Case No. 4:11-cv-00180, in the U.S. District Court for The Northern District of California, USA, January 12, 2011

  33. “Patton et al. v. Experian Data Corp.,” Case No. 8:15-cv-01142, in the U.S. District Court for the Central District of California, July 17, 2015

  34. “LifeLock Will Pay $12 Million to Settle Charges by the FTC and 35 States That Identity Theft Prevention and Data Security Claims Were False,” Federal Trade Commission, Washington, D.C., March 9, 2010 https://www.ftc.gov/news-events/press-releases/2010/03/lifelock-will-pay-12-million-settle-charges-ftc-35-states

  35. “FTC Takes Action Against LifeLock for Alleged Violations of 2010 Order: FTC Asserts LifeLock Failed to Institute Security

    Program And Misled Consumers About Its Identity Protection Services,” Federal Trade Commission, Washington, D.C., July

    21, 2015 https://www.ftc.gov/news-events/press-releases/2015/07/ftc-takes-action-against-lifelock-alleged-violations-2010-order

  36. “Above All, Do No Harm” has also appeared in texts in different ways.

  37. Hereafter referred to herein, as “The Oath”

  38. The Hippocratic Oath: Text, Translation, and Interpretation, by Ludwig Edelstein. The Johns Hopkins University Press, Baltimore, MD, USA, 1943 http://guides.library.jhu.edu/c.php?g=202502&p=1335752 AND “The Hippocratic Oath,” Translated by Michael North, US National Library of Medicine, Bethesda, MD, USA, 2002 https://www.nlm.nih.gov/hmd/greek/greek_oath.html [presented as a secondary reference to clarify modifications from original]

  39. Hereafter referred to as “The Principle”

  40. See reference to Adverse Drug Events (ADEs) under: “Preservation of Personal Privacy in Healthcare Practice – A Sector Primer”

  41. In his address, Holmes’ announced that he had “firmly” believed in the need to offer the rebuke

  42. The author has chosen to refer to “Regular Medicine” as it was presented exactly, in the original text. However, adjacently and contextually presented here is Thomas Kuhn’s idea of “Normal Science.” Kuhn’s expressions on “Normal Science” is not presented here as a 1:1 meaning for “Regular Medicine.” The reference is to demonstrate the proclivity to prefer a “persistent” practice, in terms of Kuhn and “Normal Science,” nothing more. Kuhn, Thomas S; “The Structure of Scientific Revolutions” [Third Edition], University of Chicago Press, Chicago, IL, USA, 1996 Additionally, see: “Kuhn describes normal science aspuzzle-solving’ (1962/1970a, 3542). While this term suggests that normal science is not dramatic, its main purpose is to convey the idea that like someone doing a crossword puzzle or a chess problem or a jigsaw, the puzzle-solver expects to have a reasonable chance of solving the puzzle, that his doing so will depend mainly on his own ability, and that the puzzle itself and its methods of solution will have a high degree of familiarity. A puzzle-solver is not entering completely uncharted territory. Because its puzzles and their solutions are familiar and relatively straightforward, normal science can expect to accumulate a growing stock of puzzle-solutions.” -- Thomas Kuhn In: “2. The Development of Science,” Stanford Encyclopedia of Philosophy, Stanford, CA, First published August 13 2004; Substantive Revision - August 11, 2011 http://plato.stanford.edu/entries/thomas-kuhn/

  43. Just so that we are clear, ‘a’ Trillion has, 12 zeros – following a 1.

  44. “National Health Expenditure Projections 2008–2018,” Office of the Actuary - U.S. Centers for Medicare and Medicaid Services, Department of Health & Human Services, Washington, D.C., February 19, 2009

  45. The article in question, pre-dates the Information Age; the rise of The Internet, and all Social-Media applications and platforms.

  46. The subject of “Confidentiality,” as Siegler has discussed in his article - is relationally discussed herein as equal to - the requirement to extend, assure and maintain “Personal Privacy” of Patients in, and surrounding all medical encounters

  47. Online Privacy Alliance [http://www.privacyalliance.org/]

  48. Sprenger, Polly; “Sun on Privacy: ‘Get Over It,’ WIRED Magazine, January 26 1999 http://archive.wired.com/politics/law/news/1999/01/17538

  49. See Siegler, Mark, Supra, ref. [22]

  50. Emphasis not in the original

  51. The act of conveying Healthcare Patient information to persons (Medical or Non-Medical personnel)

    that do not have a ‘Professional Need-To-Know’

  52. Emphasis not in the original

  53. Emphasis not in the original

  54. Alan Davidson - Director of Digital Economy; “Commerce Department Digital Economy Agenda 2015,” U.S. Department of Commerce, Washington, D.C., June 25, 2015

  55. Background Reading: Two-Thirds of OECD Member participants surveyed stated they were more concerned about their online privacy than a year ago. More than half feared monitoring by government agencies. -- “OECD Digital Economy Outlook 2015,” OECD Publishing, Paris, France, July 2015 http://dx.doi.org/10.1787/9789264232440-en and 54 % of Millennials surveyed in the UK & US expressed that failure of companies and governments to adequately protect identities, and data, would result in public distrust of goods and services. 70 % expressed belief that the risk to online safety will increase, and 31 % were of the opinion that the risk will increase dramatically. 80 % of those surveyed stated that it either very important or vital that their PII, financial, and/or medical data be shared only with authorized parties. -- Privacy Survey of Millennials, Intercede/Atomik Research, October 2015 https://www.intercede.com/latest-news-from-intercede/millennials-protest-against-ineffective-security-practices/ and 90 % of all Top World industries have suffered Protected Health Information Breaches. -- Widup, Suzanne; Bassett, Gabriel; Hylender, Dave; Rudis, Bob; Spitler, Marc; “2015 Protected Health Information Data Breach Report,” Verizon Enterprise Solutions, Basking Ridge, NJ, December 2015 http://www.verizonenterprise.com/resources/reports/rp_2015-protected-health-information-data-breach-report_en_xg.pdf

  56. One of the first foreign policy actions that U.S. President Barak Obama undertook after inauguration was to “reset” U.S. relations with Russia. The task would fall to the U.S. Secretary of State, as the Chief U.S. Diplomatic Officer, and Senior Cabinet Official. The U.S. Secretary of State sits at the helm of a Government Department that is highly specialized in the art of Statecraft. Additionally, in terms of National Security, the U.S. Department of State is the most important U.S. Government Department, next only to the Department of Defense, whose operations c/would be severely impacted or curtailed - when dealing with foreign nations, if language proficiency was not present or exercised. For this purpose, both Departments are highly resourced to meet mission requirements and challenges pertaining to languages. Yet, remarkably, shameful events result, as the example below amply demonstrates. Instead of canned proprieties, gauche and tactless statements, and fabricated chuckles being end products, the 'Joint Policy' purposes of two nations (a “reset” in this case) could have been better fulfilled, if required competencies were duly asserted, when it was warranted. -- “U.S. Gift to Russia Lost in Translation,” The Associated Press, March 6, 2009 https://www.youtube.com/watch?v=0GdLClHAMB0

  57. Online Trust Audit – 2016 Presidential Candidates, Online Trust Alliance, Bellevue, WA, September 2015.

  58. “2015 Protected Health Information Data Breach Report,” Verizon Enterprise Solutions, Basking Ridge, NJ, December 2015

  59. See section on: “Rise of Information Demand, & Its Effect Upon Privacy”

  60. Author attributes the term to Brenton C. Greene, Former DoD Select Commissioner to the President’s Commission on Critical Infrastructure Protection (PCCIP). By the term “Cyber-Fluency,” Captain Greene (Ret.) proposed a personal/institutional expression in the degrees of expertise, dexterity, talent and skill to exert efficiency, and effectiveness in one’s interactions with information technologies, and in the directing or controlling of its use to effect impact as desired. The author extends Cyber-Fluency to include such personal qualities as Critical Observation, Inquiry, Analysis, and Application, all of which drives Cognitive Presence. The Author defines Cognitive Presence in relation to Cyber-Fluency, as that ability which a person who interacts with Information Technologies possesses, enabling that person to structure relevance, meaning and emphasis among other things.

  61. Ibid

  62. “Where Are The Ethics? Surgeon Posts Pictures of Patient’s Internal Organs on Facebook,’ FirstPost - India, March 30 2015 http://www.firstpost.com/india/ethics-surgeon-posts-pictures-patients-internal-organs-facebook-2179891.html

  63. Reducing and Preventing Adverse Drug Events To Decrease Hospital Costs. Research in Action, Issue 1, AHRQ Publication Number 01–0020, U.S. Agency for Healthcare Research and Quality, Rockville, MD., March 2001 http://archive.ahrq.gov/research/findings/factsheets/errors-safety/aderia/ade.html

  64. Facebook Reports - Third Quarter (2015), Menlo Park, CA, November 4, 2015 [Data as of September 30, 2015] http://investor.fb.com/releasedetail.cfm?ReleaseID=940609

  65. “Has Big Data Made Anonymity Impossible?” In: “Big Data Gets Personal,” MIT Technology Review - Business Report, Cambridge, MA, June 2013

  66. See Sidebar in Introduction.

  67. Ibid

  68. Fundamentally, this implies, a combination of literacy and numeracy skills composite (ability to determine relevance, make comparisons, evaluations, justifications etc.) that aid one in thought processes associated with problem solving and decision-making. Background reading: Wheeler, Patricia and Haertel, Geneva D; “Resource Handbook on Performance Assessment and Measurement,” The Owl Press, Berkeley, CA., 1993

  69. Former University of Louisville (Kentucky, US) Nursing Student Nina Yoder’s Post on her MySpace.com Blog with the title: “How I Witnessed the Miracle of Life,” February 2, 2009

  70. Memorandum Opinion. Yoder v. University of Louisville [Nina Yoder, Plaintiff, v. University of Louisville, et al., Defendants.], Civil Action No. 3:09-CV-00205, United States District Court, W.D. Kentucky, Louisville, KY., USA, March 30, 2012

  71. “Facebook Nurse Banned For Inappropriate Postings,” [Katie Grant, Ed.] The Telegraph (UK), 04 Sep 2013 http://www.telegraph.co.uk/news/health/10285422/Facebook-nurse-banned-for-inappropriate-postings.html AND Keogh, Kat; “Nurses Warned of Disciplinary Risk Over Improper Facebook Postings,” Nursing Standard, Vol. 27, No. 52, August 28 2013

  72. “Nursing Students Kicked out for Placenta Photos,” CBS-News/AP, January 3, 2011 http://www.cbsnews.com/news/nursing-students-kicked-out-for-placenta-photos/

  73. “You’re so vain: Study links social media use and narcissism,” ScienceDaily, June 11, 2013 http://www.sciencedaily.com/releases/2013/06/130611122111.htm

  74. Buffardi, Laura E and Campbell, Keith W; “Narcissism and Social Networking Web Sites,” Personality & Social Psychology Bulletin, Vol. 34, No. 10, October 2008 [First Published - July 3, 2008] AND Mehdizadeh, Soraya; ‘Self-Presentation 2.0: Narcissism and Self-Esteem on Facebook,’ Cyberpsychology, Behavior, and Social Networking, Volume 13, Number 4, 2010

  75. Not to be confused with ‘laws of nature’

  76. The Chief Enemy of Privacy In Modern Life is That Interest In Other People and Their Affairs Known As Curiosity, Which In The Days Before Newspapers, Created Personal Gossip.” -- E. L. Godkin, in: “The Rights of The Citizen: IV - To His Own Reputation,” Scribners, July 1890

  77. Ibid

  78. Rubberneck: To look about or stare with great curiosity, as by craning the neck or turning the head. As in: “The tieup was due to drivers rubbernecking an accident.” http://dictionary.reference.com/browse/rubberneck

References

  1. Post RC. Three concepts of privacy, faculty scholarship series – paper 185. New Haven: Yale Law School; 2001.

    Google Scholar 

  2. Flaherty DH. Visions of privacy: past, present, and future. In: Bennett CJ, Grant R, editors. Visions of privacy: policy choices for the digital age. Toronto: University of Toronto Press; 1999.

    Google Scholar 

  3. Gray T. Ode on a distant prospect of Eton College, Tully’s head. London: Pall-Mall; 2000. 1747 [Found In The Thomas Gray Archive, 2000], http://www.thomasgray.org/cgi-bin/display.cgi?text=odec.

  4. Anderla G. The future of information: a challenge for governments and society. Paris: OECD Observer; 1973. #63.

    Google Scholar 

  5. Wilson RA. The map is not the territory: the future is not the past [Alfred Korzybski Memorial Lecture 1997], In: General Semantics Bulletin Nos. 65, 66, 67 & 68 (1998–2001); 2001.

  6. Kaul HK. Public libraries as knowledge centres. In: HK Kaul, IV Malhan, editors. Knowledge. Library and Information Networking, Proceedings pf the National Convention on Knowledge, Library and Information Networking (NACLIN 2006) @ University of Jammu, September 27–30, DELNET, Delhi; 2006.

  7. Regalado A. The data made me do it: the next frontier for big data is the individual. Cambridge: MIT Technology Review; 2013. http://www.technologyreview.com/news/514346/the-data-made-me-do-it/.

    Google Scholar 

  8. Rodenberg HAMJ. Competitive intelligence and senior management – the best solution to place the office of competitive intelligence is on a par with functions that directly report to the board. Delft: Eburon; 2007.

    Google Scholar 

  9. Simon S. The big biz of spying on little kids, POLITICO, May 15 (updated May 17); 2014 http://www.politico.com/story/2014/05/data-mining-your-children-106676.

  10. Stewart TA. Wealth of knowledge: intellectual capital and the twenty-first century organization. New York: Currency/Random House; 2001.

    Google Scholar 

  11. Manyika J, Chui M, et al. Open data: unlocking innovation and performance with liquid information. London: McKinsey Global Institute; 2013. [ http://www.mckinsey.com/insights/business_technology/open_data_unlocking_innovation_and_performance_with_liquid_information.

  12. Beckett L. Everything we know about what data brokers know about you: the companies that sell information about how much money you make — and whether you’re pregnant, divorced, or trying to lose weight — are facing new scrutiny, ProPublica; 2014 https://www.propublica.org/article/everything-we-know-about-what-data-brokers-know-about-you.

  13. Stanley J. Data brokers release information about their operations in response to congressional inquiry. New York: The ACLU; 2012. https://www.aclu.org/blog/data-brokers-release-information-about-their-operations-response-congressional-inquiry.

    Google Scholar 

  14. Smith CM, [MD, FCP]. Origin and uses of Primum Non Nocere—above all, do no harm!. J Clin Pharmacol. 2005 45(4).

  15. Singer P. A companion to ethics – blackwell companion to philosophy. Oxford: Blackwell Publishers; 1993.

    Google Scholar 

  16. Holmes OW. Currents and counter-currents in medical science, (Annual Address Before The Massachusetts Medical Society). In: Isaac Hayes MD, editor. The american journal of the medical sciences, Vol. 40. Philadelphia: Blanchard & Lea; 1860.

    Google Scholar 

  17. James JT. A new, evidence-based estimate of patient harms associated with hospital care. J Patient Safety. 2013 9(3). [Supplementally, see, Kun, Luis; “Interoperability: The Cure For What Ails Us,” Engineering & Medicine In Biology Magazine (IEEE-EMBS), January 2007].

  18. Andel C, Davidow SL, Hollander M, Moreno DA. The economics of health care quality and medical errors. J Health Care Finan. 2012 39(1).

  19. DesRoches CM, Rao SR et al. Physicians’ perceptions, preparedness for reporting, and experiences related to impaired and incompetent colleagues. JAMA. 2010 304(2).

  20. Wynia MK. The role of professionalism and self-regulation in detecting impaired or incompetent physicians [Editorial], JAMA. 2010 304(2).

  21. Seabury SA, Chandra A, Lackdawalla DN, Jena AB. On average, physicians spend nearly 11 percent of their 40-year careers with an open, unresolved malpractice claim. Health Affairs. 2013 32(1).

  22. Siegler M. Confidentiality in medicine — a decrepit concept. New England J Med. 1982 307.

  23. Ferenstein G. Google’s Cerf Says “Privacy may be an Anomaly”. Historically, He’s Right, TechCrunch; 2013 http://techcrunch.com/2013/11/20/googles-cerf-says-privacy-may-be-an-anomaly-historically-hes-right/.

  24. Burns, ME. Defining the limits of confidentiality in the patient-physician relationship. AMA J Ethics (Formerly Virtual Mentor). 2012 14.

  25. Anesi GL. The “Decrepit Concept” of confidentiality, 30 years later. AMA J Ethics (Formerly Virtual Mentor). 2012 14(9). [Emphasis not in the original]

  26. Macara AW. Confidentiality--a decrepit concept? Discussion paper. J R Soc Med. 1984 77(7).

  27. Macchi M, Berthon B, Robinson M, et al. Digital density index - guiding digital transformation. Oxford: Accenture Strategy & Oxford Economics; 2015. https://www.accenture.com/us-en/insight-digital-density-index-guiding-digital-transformation.aspx?c=strat_digidens_10000001&n=otc_0315.

    Google Scholar 

  28. Garfinkel S. Database nation: the death of privacy in the 21st century. Sebastopol: O’Reilly & Associates; 2000.

    Google Scholar 

  29. Office of Technology Assessment. Protecting privacy in computerized medical information, OTA-TCT-576. Washington: U.S. Congress, U.S. Government Printing Office; 1993.

    Google Scholar 

  30. Newman M. Candidate faces issue of suicide. New York Times; 1992 http://www.nytimes.com/1992/10/10/nyregion/candidate-faces-issue-of-suicide.html.

  31. The Future of Public Health. Committee for the study of the future of public health - division of health care services. Washington: Institute of Medicine, National Academy Press; 1988.

    Google Scholar 

  32. The Future of the Public’s Health In The 21st Century. Committee on Assuring the Health of the Public in the 21st Century, Institute of Medicine, The National Academies Press, Washington; 2002 [Emphasis not in the original].

  33. Sample Case Reference: Sbicca JA, Wesson SK. The Dermatologist and social media: the challenges of friending and tweeting. In: Bercovitch L, Perlis C editors. Dermatoethics, Springer-Verlag, London; 2012 http://www.springerlink.com/content/j64m6213w5115873/fulltext.html.

  34. Kinsey MJ. What happens in the hospital doesn’t stay in the hospital: some doctors and nurses use social media to share embarrassing photos of and information about patients, Slate; 2014 http://www.slate.com/articles/technology/future_tense/2014/01/doctors_on_social_media_share_embarrassing_photos_details_of_patients.html.

  35. Borland S. The nurses who gossip about patients on facebook and how they are spying on their loved ones, The Daily Mail; 2011 http://www.dailymail.co.uk/news/article-2054436/The-nurses-gossip-patients-Facebook-spying-loved-ones.html.

  36. Keers RN, Williams SD, Cooke J, Ashcroft DM. Causes of medication administration errors in hospitals: a systematic review of quantitative and qualitative evidence. Drug Safety 36(11) Springer-Verlag; 2013.

  37. Gurwitz JH, Field TS, Judge J et al. The incidence of adverse drug events in two large academic long-term care facilities. Am J Med. 2005 118(3).

  38. Gross R, Acquisti A. Information revelation and privacy in online social networks (The Facebook Case). In: Workshop on Privacy in the Electronic Society (WPES). Alexandria: ACM; 2005 [Author adds: Same condition applies for all Social Network Sites].

    Google Scholar 

  39. Burke M, Marlow C, Lento T. Feed me: motivating newcomer contribution in social network sites. In CHI ’09 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, New York; 2009.

  40. Kramer ADI, Guillory JE, Hancock JT. Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academies of Science, Issue # 24, Washington; 2014 (First Published June 2; 2014).

  41. Moubarak G, Guiot A et al. Facebook activity of residents and fellows and its impact on the doctor–patient relationship. J Med Ethics. 2011 37(2).

  42. Bosslet GT, Torke AM et al. The patient–doctor relationship and online social networks: results of a national survey. J Gen Intern Med. 2011 26(10).

  43. Clayton RB, Nagurney A, Smith JR. Cheating, Breakup, and Divorce: is Facebook use to blame? Cyberpsychology. Behav Soc Network. 2013 16(10).

  44. Mukesh M, Gonçalves D. The curse of online friends: the detrimental effects of online social network usage on well-being. Madrid: IE Business School – IE University; 2013.

    Google Scholar 

  45. Panek ET, Nardis Y, Konrath S. Mirror or Megaphone? How relationships between narcissism and social networking site use differ on Facebook and Twitter. Comput Human Behav. 2013 29(5).

  46. Bergman SM, Fearrington ME, Davenport SW, Bergman JZ. Millennials, Narcissism, and social networking: what narcissists do on social networking sites and why. Pers Individ Differ. 2011 50(5).

  47. College Students’ Narcissistic Personality Inventory Scores, 1982–2006, from 31 Campuses Across the U.S. Cited in: Twenge J, Campbell WK. The narcissism epidemic: living in the age of entitlement, Free Press, New York; 2009.

  48. Supplemental Reading: Twenge JM, Konrath S, Foster JD, Campbell WK, Bushman BJ. Egos inflating over time: a cross-temporal meta-analysis of the narcissistic personality inventory. J Pers. 2008 76(4).

  49. Fried C. An anatomy of values: problems of personal and social choice. Cambridge: Harvard University Press; 1970.

    Book  Google Scholar 

  50. Rachels J. Can ethics provide answers? And other essays in moral philosophy. Lanham: Rowman & Littlefield Publishers Inc.; 1997.

    Google Scholar 

  51. Belsey A. ‘Privacy, Publicity and Politics’. In: Belsey A, Chadwick R, editors. Ethical issues in journalism and the media. London: Routledge; 1992.

    Google Scholar 

  52. Hoffmaster B. A holistic approach to judicial justification. Erkenntnis. 1980 15(2).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Mathews.

Ethics declarations

Conflict of interest

The author declares that he has no conflicts of interest.

Additional information

This article is part of the Topical Collection on Social Implications of Technologies

Editor’s Note

This treatise is a truncated exposition of a wider-angled deliberation of "Privacy," and of those required abilities to assure and maintain, safe and secure healthcare transactions everywhere. To comprehend the importance of Privacy, and to apply that comprehension to the creation of safer healthcare Privacy practices, a proper relating and interpreting of Privacy influencers causing confusion for those protecting the Personal Privacy of others must first occur. Therefore, this article is aimed at providing readers with greater clarity into the subject of Privacy by inspecting various Safety and Security significations in Healthcare.

Additionally, the views expressed in this monograph are solely that of the author, and do not reflect the official policy or position of the University of Hawai'i, the Office of Scientific Inquiry & Applications (OSIA), or the United States Government.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mathews, R. On protecting & preserving personal privacy in interoperable global healthcare venues. Health Technol. 6, 53–73 (2016). https://doi.org/10.1007/s12553-016-0126-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12553-016-0126-6

Keywords

Navigation