Abstract
This chapter introduces and reviews scholarship on ethical issues in health information technology. It identifies the ethical foundations of health informatics and then addresses a suite of key challenges, issues and controversies. These include the question of appropriate use and users, including “The Standard View”; standards for education and system developers; system evaluation; privacy and confidentiality; human subjects research; bioinformatics; vendors of electronic health records and their duties; managed care and traditional relationships; consumer health informatics and personal health records; and legal and regulatory matters, including the question of regulation and governance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alpert, S. A. (1998). Health care information: Access, confidentiality, and good practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 75–101). Cambridge: Cambridge University Press.
Anderson, J. G., & Aydin, C. E. (1994). Overview: Theoretical perspectives and methodologies for the evaluation of health care information systems. In J. G. Anderson, C. E. Aydin, & S. J. Jay (Eds.), Evaluating health care information systems: Methods and applications (pp. 346–354). Thousand Oaks: Sage.
Anderson, J. G., & Aydin, C. E. (1998). Evaluating medical information systems: Social contexts and ethical challenges. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 57–74). Cambridge: Cambridge University Press.
Atreya, R. V., Smith, J. C., McCoy, A. B., Malin, B., & Miller, R. A. (2013). Reducing patient re-identification risk for laboratory results within research datasets. Journal of the American Medical Informatics Association, 20, 95–101.
Benitez, K., & Malin, B. (2010). Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17, 169–177.
Blois, M. S. (1980). Judgement and computers. New England Journal of Medicine, 303, 192–197.
Blumenthal, D. (2010). Launching HITECH. New England Journal of Medicine, 362(5), 382–385.
Brennan, P. F., Downs, S., & Casper, G. (2010). Project HealthDesign: Rethinking the power and potential of personal health records. Journal of Biomedical Informatics, 43(5 Suppl), S3–S5.
Brody, B. A. (1989). The ethics of using ICU scoring systems in individual patient management. Problems in Critical Care, 3, 662–670.
Classen, D. C., Avery, A. J., & Bates, D. W. (2007). Evaluation and certification of computerized provider order entry systems. Journal of the American Medical Informatics Association: JAMIA, 14(1), 48–55.
Curran, W. J., Stearns, B., & Kaplan, H. (1969). Privacy, confidentiality, and other legal considerations in the establishment of a centralized health-data system. New England Journal of Medicine, 281, 241–248.
Cushman, R., Froomkin, M. A., Cava, A., Abril, P., & Goodman, K. W. (2010). Ethical, legal and social issues for personal health records and applications. Journal of Biomedical Informatics, 43, S51–S55.
de Dombal, F. T. (1987). Ethical considerations concerning computers in medicine in the 1980s. Journal of Medical Ethics, 13, 179–184.
Duda, R. O., & Shortliffe, E. H. (1983). Expert systems research. Science, 220, 261–268.
FDA (U.S. Food and Drug Administration). (2011). Infusion pump software safety research at FDA. Retrieval 18 November 2020: http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/GeneralHospitalDevicesandSupplies/InfusionPumps/ucm202511.htm.
FDASIA. (2014). FDASIA health IT report: Proposed strategy and recommendations for a risk-based framework. Retrieval 18 November 2020: https://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/UCM391521.pdf
Friedman, C. P. (2009). A “fundamental theorem” of biomedical informatics. Journal of the American Medical Informatics Association, 16(2), 169–170.
Geissbuhler, A. J., & Miller, R. A. (1997). Desiderata for product labeling of medical expert systems. International Journal of Medical Informatics, 47(3), 153–163.
Glaser, J. (2010). HITECH lays the foundation for more ambitious outcomes-based reimbursement. The American Journal of Managed Care, 16(12), SP19–SP23.
Goodman, K. W. (1996). Ethics, genomics and information retrieval. Computers in Biology and Medicine, 26, 223–229.
Goodman, K. W. (1998). Outcomes, futility, and health policy research. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 116–138). Cambridge: Cambridge University Press.
Goodman, K. W. (2016a). Ethics, medicine, and information technology: Intelligent machines and the transformation of health care. Cambridge: Cambridge University Press.
Goodman, K. W. (2017). Health information technology as a universal donor to bioethics education. Cambridge Quarterly of Healthcare Ethics, 26(2), 342–347.
Goodman, K. W., & Cava, A. (2008). Bioethics, business ethics, and science: Bioinformatics and the future of healthcare. Cambridge Quarterly of Healthcare Ethics, 17(4), 361–372.
Goodman, K. W., Berner, E. S., Dente, M. A., Kaplan, B., Koppel, R., Rucker, D., Sands, D. Z., & Winkelstein, P. (2010). Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients. Journal of the American Medical Informatics Association, 18(1), 77–81.
Halamka, J. D., & Tripathi, M. (2017). The HITECH era in retrospect. New England Journal of Medicine, 310, 907–909.
Hartzband, P., & Groopman, J. (2008). Off the record—Avoiding the pitfalls of going electronic. New England Journal of Medicine, 358(16), 1656–1658.
Holroyd-Leduc, J. M., Lorenzetti, D., Straus, S. E., Sykes, L., & Quan, H. (2011). The impact of the electronic medical record on structure, process and outcomes within primary care: A systematic review of the evidence. Journal of the American Medical Informatics Association, 18, 732–737.
Ienca, M., & Vayena, E. (2020). On the responsible use of digital data to tackle the COVID-19 pandemic. Nature Medicine, 26, 463–464.
IOM (Institute of Medicine). (2012a). Health IT and patient safety: Building safer systems for better care. Washington, DC: The National Academies Press.
Kaplan, B., & Harris-Salamone, K. D. (2009). Health IT success and failure: Recommendations from literature and an AMIA workshop. Journal of the American Medical Informatics Association, 16, 291–299.
Knaus, W. A., Wagner, D. P., & Lynn, J. (1991). Short-term mortality predictions for critically ill hospitalized adults: Science and ethics. Science, 254, 389–394.
Koppel, R., & Kreda, D. (2009). Health care information technology vendors’ “hold harmless” clause: Implications for patients and clinicians. JAMA, 301, 1276–1278.
Kuperman, G. J., & Gibson, R. F. (2003). Computer physician order entry: Benefits, costs, and issues. Annals of Internal Medicine, 139(1), 31–39.
Lane, W. A. (1936). What the mouth reveals. New Health, 11, 34–35.
Levis, J. (Ed.). (2014). H.I.T. or miss: Lessons learned from health information technology implementations. Chicago: American Health Information Management Association.
Macklin, R. (1992). Privacy and control of genetic information. In G. J. Annas & S. Elias (Eds.), Gene mapping: Using law and ethics as guides (pp. 157–172). New York: Oxford University Press.
Majchrowski, B. (2010). Medical software’s increasing impact on healthcare and technology management. Biomedical Instrumentation and Technology, 44(1), 70–74.
Malin, B., & Goodman, K. W. (2018). Between access and privacy: Challenges in sharing health data. IMIA Yearbook of Medical Informatics, 27, 55–59.
Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37, 179–192.
Malin, B., Loukides, G., Benitez, K., & Clayton, E. W. (2011). Identifiability in biobanks: Models, measures, and mitigation strategies. Human Genetics, 130, 383–392.
McNeer, J. F., Wallace, A. G., Wagner, G. S., Starmer, C. F., & Rosati, R. A. (1975). The course of acute myocardial infarction: Feasibility of early discharge of the uncomplicated patient. Circulation, 51, 410–413.
Miller, R. A. (1989). Legal issues related to medical decision support systems. International Journal of Clinical Monitoring and Computing, 6, 75–80.
Miller, R. A. (1990a). Why the standard view is standard: People, not machines, understand patients’ problems. The Journal of Medicine and Philosophy, 15, 581–591.
Miller, R. A. (1997). Predictive models for primary caregivers: Risky business? Annals of Internal Medicine, 127(7), 565–567.
Miller, R. A., & Gardner, R. M. (1997a). Summary recommendations for the responsible monitoring and regulation of clinical software systems. Annals of Internal Medicine, 127(9), 842–845.
Miller, R. A., & Gardner, R. M. (1997b). Recommendations for responsible monitoring and regulation of clinical software systems. Journal of the American Medical Informatics Association, 4, 442–457.
Miller, R. A., & Goodman, K. W. (1998). Ethical challenges in the use of decision-support software in clinical practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 102–115). Cambridge: Cambridge University Press.
Miller, R. A., & Miller, S. M. (2007). Legal and regulatory issues related to the use of clinical software in health care delivery. In R. A. Greenes (Ed.), Clinical decision support: The road ahead (pp. 423–444). Boston: Elsevier.
Miller, R. A., Schaffner, K. F., & Meisel, A. (1985a). Ethical and legal issues related to the use of computer programs in clinical medicine. Annals of Internal Medicine, 102, 529–536.
National Research Council. (1997). For the record: Protecting electronic health information. Washington, D.C.: National Academy Press.
Palfrey, J., & Gasser, U. (2010). Born digital: Understanding the first generation of digital natives. New York: Basic Books.
Pugh, J., Pycroft, L., Sandberg, A., Aziz, T., & Savulescu, J. (2018). Brainjacking in deep brain stimulation and autonomy. Ethics and Information Technology, 20(3), 219–232.
Robertson, J. (2011). Insulin pumps, monitors vulnerable to hacking. Associated Press via various media, e.g., The Washington Times, August 4. Retrieval November 17, 2020: http://www.washingtontimes.com/news/2011/aug/4/insulin-pumps-monitors-vulnerable-to-hacking/?page=all.
Sackner-Bernstein, J. (2017). Design of hack-resistant diabetes devices and disclosure of their cyber safety. Journal of Diabetes Science and Technology, 11(2), 198–202.
Shih, S. C., McCullough, C. M., Wang, J. J., Singer, J., & Parsons, A. S. (2011). Health information systems in small practices. Improving the delivery of clinical preventive services. American Journal of Preventive Medicine, 6, 603–609.
Shortliffe, E. H. (1993). Doctors, patients, and computers: Will information technology dehumanize health-care delivery? Proceedings of the American Philosophical Society, 137(3), 390–398.
Shortliffe, E. H. (1994). Dehumanization of patient care. Are computers the problem or the solution? Journal of the American. Medical Informatics Association, 1, 76–78.
Sittig, D. F., Krall, M., Kaalaas-Sittig, J., & Ash, J. S. (2005). Emotional aspects of computer-based provider order entry: A qualitative study. Journal of the American Medical Informatics Association, 12(5), 561–567.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied Clinical Informatics, 7(2), 624–632.
Slayton, T. B. (2018). Ransomware: The virus attacking the healthcare industry. Journal of Legal Medicine, 38(2), 287–311.
Sweeney, L. (1997). Weaving technology and policy together to maintain confidentiality. The Journal of Law, Medicine Ethics, 25, 98–110.
Szolovits, P., & Pauker, S. G. (1979). Computers and clinical decision making: Whether, how much, and for whom? Proceedings of the IEEE, 67, 1224–1226.
Tamersoy, A., Loukides, G., Nergiz, M. E., Saygin, Y., & Malin, B. (2012). Anonymization of longitudinal electronic medical records. IEEE Transactions on Information Technology in Biomedicine, 16, 413–423.
Truog, R. D., Mitchell, C., & Daley, G. Q. (2020). The toughest triage — Allocating ventilators in a pandemic. New England Journal of Medicine, 382, 1973–1975.
Tysyer, D. A. (1997). Database legal protection. Bitlaw. Retrieval 18 November 2020: http://www.bitlaw.com/copyright/database.html
Vergese, A., Shah, N. H., & Harrington, R. A. (2018). What this computer needs is a physician. Journal of the American Medical Association, 319(1), 19–20.
Wright, A., Sittig, D. F., Ash, J. S., Sharma, S., Pang, J. E., & Middleton, B. (2009). Clinical decision support capabilities of commercially-available clinical information systems. Journal of the American Medical Informatics Association, 16(5), 637–644.
Youngner, S. J. (1988). Who defines futility? JAMA, 260, 2094–2095.
Acknowledgments
Reid Cushman, PhD, contributed to this chapter in an earlier edition. His comments are gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Goodman, K.W., Miller, R.A. (2021). Ethics in Biomedical and Health Informatics: Users, Standards, and Outcomes. In: Shortliffe, E.H., Cimino, J.J. (eds) Biomedical Informatics. Springer, Cham. https://doi.org/10.1007/978-3-030-58721-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-58721-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58720-8
Online ISBN: 978-3-030-58721-5
eBook Packages: MedicineMedicine (R0)