Hostname: page-component-cd9895bd7-fscjk Total loading time: 0 Render date: 2024-12-25T13:42:52.613Z Has data issue: false hasContentIssue false

Commentary: Quality, Costs, Privacy and Electronic Medical Data

Published online by Cambridge University Press:  01 January 2021

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Article
Copyright
Copyright © American Society of Law, Medicine and Ethics 1997

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Bates, D.W., Kuperman, G., and Teich, J.M., “Computerized Physician Order Entry and Quality of Care,” Quality Management of Health Care, 2 (1994): 1827.Google Scholar
Johnston, M.E. et al., “Effects of Computer-Based Clinical Decision Support Systems on Clinician Performance and Patient Outcome. A Critical Appraisal of Research,” Annals of Internal Medicine, 120 (1994): 135–42.Google Scholar
Tierney, W.M. et al., “Physician Inpatient Order Writing on Microcomputer Workstations. Effects on Resource Utilization,” JAMA, 269 (1993): 379–83.CrossRefGoogle Scholar
Rind, D.M. et al., “Effect of Computer-Based Alerts on the Treatment and Outcomes of Hospitalized Patients,” Archives of Internal Medicine, 154 (1994): 1511–17.Google Scholar
Tate, K.E. and Gardner, R.M., “Computers, Quality, and the Clinical Laboratory: A Look at Critical Value Reporting,” Proceedings of the Annual Symposium of Computer Applied Medical Care, 17 (1993): 193–97.Google Scholar
See Johnston, et al., supra note 2.Google Scholar
Wennberg, J. and Gittelsohn, J., “Small Area Variations in Health Care Delivery,” Science, 182 (1973): 1102–08.Google Scholar
Weissman, J.S. et al., “Delayed Access to Health Care: Risk Factors, Reasons, and Consequences,” Annals of Internal Medicine, 114 (1991): 325–31.Google Scholar
Kumar, S. and Lucey, C., “Patient Privacy and Secondary Use of Administrative Databases,” JAMA, 276 (1996): 1137–38.Google Scholar
Sweeney, L., “Weaving Technology and Policy Together to Maintain Confidentiality,” Journal of Law, Medicine & Ethics, 25 (1997): 98110.Google Scholar
Woodward, B., “The Computer-Based Patient Record and Confidentiality,” N. Engl. J. Med., 333 (1995): 1419–22.CrossRefGoogle Scholar
Rind, D.M. et al., “Maintaining the Confidentiality of Medical Records Shared over the Internet and the World Wide Web,” Annals of Internal Medicine, 127 (1997): 138–41.CrossRefGoogle Scholar