Nothing Special   »   [go: up one dir, main page]

Skip to main content

Ethics in Biomedical and Health Informatics: Users, Standards, and Outcomes

  • Chapter
  • First Online:
Biomedical Informatics

Abstract

This chapter introduces and reviews scholarship on ethical issues in health information technology. It identifies the ethical foundations of health informatics and then addresses a suite of key challenges, issues and controversies. These include the question of appropriate use and users, including “The Standard View”; standards for education and system developers; system evaluation; privacy and confidentiality; human subjects research; bioinformatics; vendors of electronic health records and their duties; managed care and traditional relationships; consumer health informatics and personal health records; and legal and regulatory matters, including the question of regulation and governance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Alpert, S. A. (1998). Health care information: Access, confidentiality, and good practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 75–101). Cambridge: Cambridge University Press.

    Google Scholar 

  • Anderson, J. G., & Aydin, C. E. (1994). Overview: Theoretical perspectives and methodologies for the evaluation of health care information systems. In J. G. Anderson, C. E. Aydin, & S. J. Jay (Eds.), Evaluating health care information systems: Methods and applications (pp. 346–354). Thousand Oaks: Sage.

    Google Scholar 

  • Anderson, J. G., & Aydin, C. E. (1998). Evaluating medical information systems: Social contexts and ethical challenges. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 57–74). Cambridge: Cambridge University Press.

    Google Scholar 

  • Atreya, R. V., Smith, J. C., McCoy, A. B., Malin, B., & Miller, R. A. (2013). Reducing patient re-identification risk for laboratory results within research datasets. Journal of the American Medical Informatics Association, 20, 95–101.

    Article  PubMed  PubMed Central  Google Scholar 

  • Benitez, K., & Malin, B. (2010). Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17, 169–177.

    Article  PubMed  PubMed Central  Google Scholar 

  • Blois, M. S. (1980). Judgement and computers. New England Journal of Medicine, 303, 192–197.

    Article  CAS  Google Scholar 

  • Blumenthal, D. (2010). Launching HITECH. New England Journal of Medicine, 362(5), 382–385.

    Article  CAS  Google Scholar 

  • Brennan, P. F., Downs, S., & Casper, G. (2010). Project HealthDesign: Rethinking the power and potential of personal health records. Journal of Biomedical Informatics, 43(5 Suppl), S3–S5.

    Article  PubMed  Google Scholar 

  • Brody, B. A. (1989). The ethics of using ICU scoring systems in individual patient management. Problems in Critical Care, 3, 662–670.

    Google Scholar 

  • Classen, D. C., Avery, A. J., & Bates, D. W. (2007). Evaluation and certification of computerized provider order entry systems. Journal of the American Medical Informatics Association: JAMIA, 14(1), 48–55.

    Article  PubMed  Google Scholar 

  • Curran, W. J., Stearns, B., & Kaplan, H. (1969). Privacy, confidentiality, and other legal considerations in the establishment of a centralized health-data system. New England Journal of Medicine, 281, 241–248.

    Article  CAS  Google Scholar 

  • Cushman, R., Froomkin, M. A., Cava, A., Abril, P., & Goodman, K. W. (2010). Ethical, legal and social issues for personal health records and applications. Journal of Biomedical Informatics, 43, S51–S55.

    Article  PubMed  Google Scholar 

  • de Dombal, F. T. (1987). Ethical considerations concerning computers in medicine in the 1980s. Journal of Medical Ethics, 13, 179–184.

    Article  PubMed  PubMed Central  Google Scholar 

  • Duda, R. O., & Shortliffe, E. H. (1983). Expert systems research. Science, 220, 261–268.

    Article  CAS  PubMed  Google Scholar 

  • FDA (U.S. Food and Drug Administration). (2011). Infusion pump software safety research at FDA. Retrieval 18 November 2020: http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/GeneralHospitalDevicesandSupplies/InfusionPumps/ucm202511.htm.

  • FDASIA. (2014). FDASIA health IT report: Proposed strategy and recommendations for a risk-based framework. Retrieval 18 November 2020: https://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/UCM391521.pdf

  • Friedman, C. P. (2009). A “fundamental theorem” of biomedical informatics. Journal of the American Medical Informatics Association, 16(2), 169–170.

    Article  PubMed  PubMed Central  Google Scholar 

  • Geissbuhler, A. J., & Miller, R. A. (1997). Desiderata for product labeling of medical expert systems. International Journal of Medical Informatics, 47(3), 153–163.

    Article  CAS  PubMed  Google Scholar 

  • Glaser, J. (2010). HITECH lays the foundation for more ambitious outcomes-based reimbursement. The American Journal of Managed Care, 16(12), SP19–SP23.

    PubMed  Google Scholar 

  • Goodman, K. W. (1996). Ethics, genomics and information retrieval. Computers in Biology and Medicine, 26, 223–229.

    Article  CAS  PubMed  Google Scholar 

  • Goodman, K. W. (1998). Outcomes, futility, and health policy research. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 116–138). Cambridge: Cambridge University Press.

    Google Scholar 

  • Goodman, K. W. (2016a). Ethics, medicine, and information technology: Intelligent machines and the transformation of health care. Cambridge: Cambridge University Press.

    Google Scholar 

  • Goodman, K. W. (2017). Health information technology as a universal donor to bioethics education. Cambridge Quarterly of Healthcare Ethics, 26(2), 342–347.

    Article  PubMed  Google Scholar 

  • Goodman, K. W., & Cava, A. (2008). Bioethics, business ethics, and science: Bioinformatics and the future of healthcare. Cambridge Quarterly of Healthcare Ethics, 17(4), 361–372.

    Article  PubMed  Google Scholar 

  • Goodman, K. W., Berner, E. S., Dente, M. A., Kaplan, B., Koppel, R., Rucker, D., Sands, D. Z., & Winkelstein, P. (2010). Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients. Journal of the American Medical Informatics Association, 18(1), 77–81.

    Article  PubMed  PubMed Central  Google Scholar 

  • Halamka, J. D., & Tripathi, M. (2017). The HITECH era in retrospect. New England Journal of Medicine, 310, 907–909.

    Article  Google Scholar 

  • Hartzband, P., & Groopman, J. (2008). Off the record—Avoiding the pitfalls of going electronic. New England Journal of Medicine, 358(16), 1656–1658.

    Article  CAS  Google Scholar 

  • Holroyd-Leduc, J. M., Lorenzetti, D., Straus, S. E., Sykes, L., & Quan, H. (2011). The impact of the electronic medical record on structure, process and outcomes within primary care: A systematic review of the evidence. Journal of the American Medical Informatics Association, 18, 732–737.

    Article  PubMed  PubMed Central  Google Scholar 

  • Ienca, M., & Vayena, E. (2020). On the responsible use of digital data to tackle the COVID-19 pandemic. Nature Medicine, 26, 463–464.

    Article  CAS  PubMed  Google Scholar 

  • IOM (Institute of Medicine). (2012a). Health IT and patient safety: Building safer systems for better care. Washington, DC: The National Academies Press.

    Google Scholar 

  • Kaplan, B., & Harris-Salamone, K. D. (2009). Health IT success and failure: Recommendations from literature and an AMIA workshop. Journal of the American Medical Informatics Association, 16, 291–299.

    Article  PubMed  PubMed Central  Google Scholar 

  • Knaus, W. A., Wagner, D. P., & Lynn, J. (1991). Short-term mortality predictions for critically ill hospitalized adults: Science and ethics. Science, 254, 389–394.

    Article  CAS  PubMed  Google Scholar 

  • Koppel, R., & Kreda, D. (2009). Health care information technology vendors’ “hold harmless” clause: Implications for patients and clinicians. JAMA, 301, 1276–1278.

    Article  CAS  PubMed  Google Scholar 

  • Kuperman, G. J., & Gibson, R. F. (2003). Computer physician order entry: Benefits, costs, and issues. Annals of Internal Medicine, 139(1), 31–39.

    Article  PubMed  Google Scholar 

  • Lane, W. A. (1936). What the mouth reveals. New Health, 11, 34–35.

    Google Scholar 

  • Levis, J. (Ed.). (2014). H.I.T. or miss: Lessons learned from health information technology implementations. Chicago: American Health Information Management Association.

    Google Scholar 

  • Macklin, R. (1992). Privacy and control of genetic information. In G. J. Annas & S. Elias (Eds.), Gene mapping: Using law and ethics as guides (pp. 157–172). New York: Oxford University Press.

    Google Scholar 

  • Majchrowski, B. (2010). Medical software’s increasing impact on healthcare and technology management. Biomedical Instrumentation and Technology, 44(1), 70–74.

    Article  PubMed  Google Scholar 

  • Malin, B., & Goodman, K. W. (2018). Between access and privacy: Challenges in sharing health data. IMIA Yearbook of Medical Informatics, 27, 55–59.

    Article  PubMed  Google Scholar 

  • Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics, 37, 179–192.

    Article  PubMed  Google Scholar 

  • Malin, B., Loukides, G., Benitez, K., & Clayton, E. W. (2011). Identifiability in biobanks: Models, measures, and mitigation strategies. Human Genetics, 130, 383–392.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  • McNeer, J. F., Wallace, A. G., Wagner, G. S., Starmer, C. F., & Rosati, R. A. (1975). The course of acute myocardial infarction: Feasibility of early discharge of the uncomplicated patient. Circulation, 51, 410–413.

    Article  CAS  PubMed  Google Scholar 

  • Miller, R. A. (1989). Legal issues related to medical decision support systems. International Journal of Clinical Monitoring and Computing, 6, 75–80.

    Article  CAS  PubMed  Google Scholar 

  • Miller, R. A. (1990a). Why the standard view is standard: People, not machines, understand patients’ problems. The Journal of Medicine and Philosophy, 15, 581–591.

    Article  CAS  PubMed  Google Scholar 

  • Miller, R. A. (1997). Predictive models for primary caregivers: Risky business? Annals of Internal Medicine, 127(7), 565–567.

    Article  CAS  PubMed  Google Scholar 

  • Miller, R. A., & Gardner, R. M. (1997a). Summary recommendations for the responsible monitoring and regulation of clinical software systems. Annals of Internal Medicine, 127(9), 842–845.

    Article  CAS  PubMed  Google Scholar 

  • Miller, R. A., & Gardner, R. M. (1997b). Recommendations for responsible monitoring and regulation of clinical software systems. Journal of the American Medical Informatics Association, 4, 442–457.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  • Miller, R. A., & Goodman, K. W. (1998). Ethical challenges in the use of decision-support software in clinical practice. In K. W. Goodman (Ed.), Ethics, computing, and medicine: Informatics and the transformation of health care (pp. 102–115). Cambridge: Cambridge University Press.

    Google Scholar 

  • Miller, R. A., & Miller, S. M. (2007). Legal and regulatory issues related to the use of clinical software in health care delivery. In R. A. Greenes (Ed.), Clinical decision support: The road ahead (pp. 423–444). Boston: Elsevier.

    Chapter  Google Scholar 

  • Miller, R. A., Schaffner, K. F., & Meisel, A. (1985a). Ethical and legal issues related to the use of computer programs in clinical medicine. Annals of Internal Medicine, 102, 529–536.

    Article  CAS  PubMed  Google Scholar 

  • National Research Council. (1997). For the record: Protecting electronic health information. Washington, D.C.: National Academy Press.

    Google Scholar 

  • Palfrey, J., & Gasser, U. (2010). Born digital: Understanding the first generation of digital natives. New York: Basic Books.

    Google Scholar 

  • Pugh, J., Pycroft, L., Sandberg, A., Aziz, T., & Savulescu, J. (2018). Brainjacking in deep brain stimulation and autonomy. Ethics and Information Technology, 20(3), 219–232.

    Article  PubMed  PubMed Central  Google Scholar 

  • Robertson, J. (2011). Insulin pumps, monitors vulnerable to hacking. Associated Press via various media, e.g., The Washington Times, August 4. Retrieval November 17, 2020: http://www.washingtontimes.com/news/2011/aug/4/insulin-pumps-monitors-vulnerable-to-hacking/?page=all.

  • Sackner-Bernstein, J. (2017). Design of hack-resistant diabetes devices and disclosure of their cyber safety. Journal of Diabetes Science and Technology, 11(2), 198–202.

    Article  PubMed  PubMed Central  Google Scholar 

  • Shih, S. C., McCullough, C. M., Wang, J. J., Singer, J., & Parsons, A. S. (2011). Health information systems in small practices. Improving the delivery of clinical preventive services. American Journal of Preventive Medicine, 6, 603–609.

    Article  Google Scholar 

  • Shortliffe, E. H. (1993). Doctors, patients, and computers: Will information technology dehumanize health-care delivery? Proceedings of the American Philosophical Society, 137(3), 390–398.

    PubMed  Google Scholar 

  • Shortliffe, E. H. (1994). Dehumanization of patient care. Are computers the problem or the solution? Journal of the American. Medical Informatics Association, 1, 76–78.

    Article  CAS  Google Scholar 

  • Sittig, D. F., Krall, M., Kaalaas-Sittig, J., & Ash, J. S. (2005). Emotional aspects of computer-based provider order entry: A qualitative study. Journal of the American Medical Informatics Association, 12(5), 561–567.

    Article  PubMed  PubMed Central  Google Scholar 

  • Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied Clinical Informatics, 7(2), 624–632.

    Article  PubMed  PubMed Central  Google Scholar 

  • Slayton, T. B. (2018). Ransomware: The virus attacking the healthcare industry. Journal of Legal Medicine, 38(2), 287–311.

    Article  Google Scholar 

  • Sweeney, L. (1997). Weaving technology and policy together to maintain confidentiality. The Journal of Law, Medicine Ethics, 25, 98–110.

    Article  CAS  PubMed  Google Scholar 

  • Szolovits, P., & Pauker, S. G. (1979). Computers and clinical decision making: Whether, how much, and for whom? Proceedings of the IEEE, 67, 1224–1226.

    Article  Google Scholar 

  • Tamersoy, A., Loukides, G., Nergiz, M. E., Saygin, Y., & Malin, B. (2012). Anonymization of longitudinal electronic medical records. IEEE Transactions on Information Technology in Biomedicine, 16, 413–423.

    Article  PubMed  PubMed Central  Google Scholar 

  • Truog, R. D., Mitchell, C., & Daley, G. Q. (2020). The toughest triage — Allocating ventilators in a pandemic. New England Journal of Medicine, 382, 1973–1975.

    Google Scholar 

  • Tysyer, D. A. (1997). Database legal protection. Bitlaw. Retrieval 18 November 2020: http://www.bitlaw.com/copyright/database.html

  • Vergese, A., Shah, N. H., & Harrington, R. A. (2018). What this computer needs is a physician. Journal of the American Medical Association, 319(1), 19–20.

    Article  Google Scholar 

  • Wright, A., Sittig, D. F., Ash, J. S., Sharma, S., Pang, J. E., & Middleton, B. (2009). Clinical decision support capabilities of commercially-available clinical information systems. Journal of the American Medical Informatics Association, 16(5), 637–644.

    Article  PubMed  PubMed Central  Google Scholar 

  • Youngner, S. J. (1988). Who defines futility? JAMA, 260, 2094–2095.

    Article  CAS  PubMed  Google Scholar 

Download references

Acknowledgments

Reid Cushman, PhD, contributed to this chapter in an earlier edition. His comments are gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kenneth W. Goodman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Goodman, K.W., Miller, R.A. (2021). Ethics in Biomedical and Health Informatics: Users, Standards, and Outcomes. In: Shortliffe, E.H., Cimino, J.J. (eds) Biomedical Informatics. Springer, Cham. https://doi.org/10.1007/978-3-030-58721-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58721-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58720-8

  • Online ISBN: 978-3-030-58721-5

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics