Ethics and Information Technology: A Case-Based Approach to a Health Care System in Transition

[1]  Don E. Detmer,et al.  Commentary: A Progress Report on Computer-Based Patient Records in the United States , 1997 .

[2]  Marvin R Natowicz,et al.  Individual, family, and societal dimensions of genetic discrimination: A case study analysis , 1996, Science and engineering ethics.

[3]  J Goldman Protecting privacy to improve health care. , 1998, Health affairs.

[4]  Thomas C. Rindfleisch,et al.  Privacy, information technology, and health care , 1997, CACM.

[5]  L. K. Buehler,et al.  Bioinformatics Basics: Applications in Biological Science and Medicine , 1999 .

[6]  M. Siegler,et al.  Sounding Boards. Confidentiality in medicine--a decrepit concept. , 1982, The New England journal of medicine.

[7]  J. D. Kleinke Bleeding Edge: The Business of Health Care in the New Century , 1998 .

[8]  J. Weingarten Can confidential patient information be kept private in high-tech medicine? , 1992, M.D. computing : computers in medical practice.

[9]  D W Moran Health information policy: on preparing for the next war. , 1998, Health affairs.

[10]  Christoph Wilhelm Sensen Essentials of Genomics and Bioinformatics , 2002 .

[11]  Denise,et al.  Research Paper: Using Computer-based Medical Records to Predict Mortality Risk for Inner-city Patients with Reactive Airways Disease , 1997, J. Am. Medical Informatics Assoc..

[12]  Paul M. Schwartz,et al.  European Data Protection Law and Restrictions on International Data Flows , 1994 .

[13]  D. Willison,et al.  Privacy and Health Information Systems: a Guide to Protecting Patient Confidentiality: By J. Goldman and D. Mulligan. Foundation for Health Care Quality, Seattle, 1996, $25, 45pp. , 1999 .

[14]  Jo Metcalf Health care information and privacy. , 2002, Journal of law and medicine.

[15]  Sandor Suhai Genomics and Proteomics: Functional and Computational Aspects , 2000 .

[16]  R L Simpson Security threats are usually an inside job. , 1996, Nursing management.

[17]  Robert Gellman,et al.  Data privacy law: A study of United States data protection , 1997 .

[18]  Rupert Jarvis,et al.  Health Data in the Information Age: Use, Disclosure and Privacy , 1996 .

[19]  J D Kleinke,et al.  Release 0.0: clinical information technology in the real world. , 1998, Health affairs.

[20]  R F Pendrak,et al.  Information technologies need to protect patient confidentiality. , 1998, Healthcare financial management : journal of the Healthcare Financial Management Association.

[21]  P Szolovits,et al.  Against simple universal health-care identifiers. , 1994, Journal of the American Medical Informatics Association : JAMIA.