Ethics and Information Technology: A Case-Based Approach to a Health Care System in Transition
暂无分享,去创建一个
[1] Don E. Detmer,et al. Commentary: A Progress Report on Computer-Based Patient Records in the United States , 1997 .
[2] Marvin R Natowicz,et al. Individual, family, and societal dimensions of genetic discrimination: A case study analysis , 1996, Science and engineering ethics.
[3] J Goldman. Protecting privacy to improve health care. , 1998, Health affairs.
[4] Thomas C. Rindfleisch,et al. Privacy, information technology, and health care , 1997, CACM.
[5] L. K. Buehler,et al. Bioinformatics Basics: Applications in Biological Science and Medicine , 1999 .
[6] M. Siegler,et al. Sounding Boards. Confidentiality in medicine--a decrepit concept. , 1982, The New England journal of medicine.
[7] J. D. Kleinke. Bleeding Edge: The Business of Health Care in the New Century , 1998 .
[8] J. Weingarten. Can confidential patient information be kept private in high-tech medicine? , 1992, M.D. computing : computers in medical practice.
[9] D W Moran. Health information policy: on preparing for the next war. , 1998, Health affairs.
[10] Christoph Wilhelm Sensen. Essentials of Genomics and Bioinformatics , 2002 .
[11] Denise,et al. Research Paper: Using Computer-based Medical Records to Predict Mortality Risk for Inner-city Patients with Reactive Airways Disease , 1997, J. Am. Medical Informatics Assoc..
[12] Paul M. Schwartz,et al. European Data Protection Law and Restrictions on International Data Flows , 1994 .
[13] D. Willison,et al. Privacy and Health Information Systems: a Guide to Protecting Patient Confidentiality: By J. Goldman and D. Mulligan. Foundation for Health Care Quality, Seattle, 1996, $25, 45pp. , 1999 .
[14] Jo Metcalf. Health care information and privacy. , 2002, Journal of law and medicine.
[15] Sandor Suhai. Genomics and Proteomics: Functional and Computational Aspects , 2000 .
[16] R L Simpson. Security threats are usually an inside job. , 1996, Nursing management.
[17] Robert Gellman,et al. Data privacy law: A study of United States data protection , 1997 .
[18] Rupert Jarvis,et al. Health Data in the Information Age: Use, Disclosure and Privacy , 1996 .
[19] J D Kleinke,et al. Release 0.0: clinical information technology in the real world. , 1998, Health affairs.
[20] R F Pendrak,et al. Information technologies need to protect patient confidentiality. , 1998, Healthcare financial management : journal of the Healthcare Financial Management Association.
[21] P Szolovits,et al. Against simple universal health-care identifiers. , 1994, Journal of the American Medical Informatics Association : JAMIA.