scholarly journals Impact of Information Technology on Patient Confidentiality Rights

Author(s):  
Abba Amsami Elgujja

Advances in information technology, be it by way of social media or use of the electronic medical information systems, has changed the way we deal with patient confidential information. The hitherto clear professional relationship with the patient has been blurred using social media, just like the unprecedented rate at which electronic health information is used to access and share patient's confidential information among healthcare professionals. However, given the special professional relationship of confidence which traditionally bonds the healthcare practitioner with the patient, use of these technologies by the healthcare professionals portends the risk of breach of that duty of confidentiality. Although the patient's right to demand confidentiality of his information is not absolute, an unlawful breach could result in a crime, actionable tort, or become a subject of disciplinary action. This chapter undertakes a general review of the benefits and dangers of embracing these new information technologies and their impact on the confidentiality of sensitive health data.

Author(s):  
Linda L. Brennan

While many organizations and individuals use social media and information technologies (IT) to overcome the limitations of time and space, they often experience unintended consequences from increased immediacy and access. How can they achieve the desirable changes and address the negative effects that can result? This article presents a systematic framework that managers can use to proactively identify ways to either leverage or mitigate the increased immediacy and access. Specific examples are used as illustrations to demonstrate how these issues can be anticipated and used for competitive advantage. They are not offered as specific “prescriptions” for any one organization. Rather, they show how the framework can inform managers as they evaluate proposals for, and implementation plans of, new information systems in their organizations.


2014 ◽  
Vol 25 (2) ◽  
pp. 29-51 ◽  
Author(s):  
Robin S. Poston ◽  
William J. Kettinger

In many companies the process of new Information Technology (IT) identification and assessment lacks the rigor associated with experimentation. The realities of maintaining daily operations and the expense and expertise involved distract firms from conducting experiments. The authors explore cases of how companies introduce a new IT for the business use of digital social media. Because social media technologies are new, interest in its use is broad and diffused leading organizations to be unsure about how best to implement social media, prompting organizations to follow a mindful process of experimenting with these technologies. The cases illustrate that the extent of mindfulness influences how new technology implementations are introduced, supporting wider boundaries in assessments, richer interpretations of the IT's usefulness, multi-level foci concerning benefits and costs, persistence to continue exploration, and a greater use of fact-based decision-making. The authors observe that following a mindful introduction process reaps some of the benefits of experimentation, such as greater stakeholder satisfaction and organization-wide learning and understanding of the technology's potential.


2014 ◽  
Vol 5 (1) ◽  
pp. 16-30 ◽  
Author(s):  
Haya Ajjan ◽  
Stefanie Beninger ◽  
Rania Mostafa ◽  
Victoria L. Crittenden

Cyberfeminism is a woman-centered perspective that advocates women’s use of new information and communications technologies for empowerment. This paper explores the role of information technologies, in particular the role of social media, in empowering women entrepreneurship in emerging economies via increased social capital and improved self-efficacy. A conceptual model is offered and propositions are explicated.


2021 ◽  
Vol 16 (2) ◽  
pp. 14-18
Author(s):  
Aneesa Abdul Rashid ◽  
Ahmed Kamarulzaman ◽  
Sakinah Sulong ◽  
Suhazeli Abdullah

Online activities have become the norm. From searching for new information to conducting business meetings, social media’s role in daily life continues to grow in prominence. It is estimated that the majority of the population uses social media, and users include doctors and other healthcare professionals. It is critical for primary care doctors to note how social media can substantially influence one’s healthcare behaviour and decision making. Because primary care doctors are usually the first line of contact for patients, they are the most easily accessible and most instrumental in using social media to steer the public toward proper information on healthcare.


2019 ◽  
Vol 36 (6) ◽  
pp. 570-590
Author(s):  
Cyanne E Loyle ◽  
Samuel E Bestvater

How have rebel communication strategies been shaped by the increasingly social nature of the internet and the constant changes of information and communication technology in a Web 2.0 world? Rebel groups’ ability to disseminate a message has previously been constrained by the size of the audience they could reach through traditional technologies and the costs of those technologies. Emerging social internet platforms change this dynamic by providing rebel groups with new opportunities to build and communicate to an audience. Scholars have theorized about how rebel groups adapt to these new opportunities, but to date, little systematic analysis into the phenomenon has been conducted. In this project, we present a new dataset on rebel group Twitter use and use the data to examine how armed groups use social media to communicate, the topics contained in those communications, and the audiences that consume them. Through a richer understanding of the ways in which rebel groups communicate we are better able to measure the impact of new information technologies on armed conflict in the future.


1996 ◽  
Vol 16 ◽  
pp. 3-13 ◽  
Author(s):  
David R. Olson

With the ascendance of new information technologies, the significance of writing has, it seems, slipped from view, in spite of the fact that the conceptual and cognitive implications of the newer technologies is a matter of enthusiastic speculation rather that serious research. On the other hand, it is now reasonably well established that the invention of the first “information” technology, namely writing, has had a profound effect on the ways in which we think about language, the mind, and the world, effects which have taken millenia to unfold. “Effects” is perhaps too strong a term as it is less a matter of how technology affects people than a matter of the ways in which people in different cultures have used and applied the technology and the ways they have altered the technology to suit their purposes. In the West, some of these uses have involved institutional change; thus, to make use of a technology such as writing requires the development of monasteries, schools, and other institutions. Indeed, some of the cognitive effects we usually attribute to schooling are better thought of as consequences or implications of literacy.


Author(s):  
E. Borodina ◽  
A. Hafiiak ◽  
O. Shefer ◽  
S. Alyoshin

The article is devoted to the analysis and research of information technologies and mobile applications for the preparation of university students. Analyzed the actual problems of preparing students in terms of mobile devices. The versatility of the use of mobile devices in the educational process allows you to change the traditional form of teaching material, while applying innovative technologies. Various Google Apps services are explored with the help of which you can get wide opportunities for information education. Applying educational information technologies, it can be noted that learning becomes interactive, enhances the intensity of the learning process. Thus, the introduction of new information technologies and mobile applications in the educational process introduces completely new components of educational content necessary for the preparation of competitive specialists.


1997 ◽  
Vol 78 (1) ◽  
pp. 60-64
Author(s):  
L. Yu. Emaletdinova ◽  
A. N. Korneenko ◽  
E. V. Miller ◽  
R. K. Fazdalov

The use of computer medical information technology is one of the important factors of a rise of medical service quality in medical institutions. The formation of electronical maps of examination and treatment of patients will allow to improve the documents quality, to teach young specialists fast, to provide the high level of examination organization and to create the data base of all patients. The data base of patients is the basis for fast and thorough scientific research due to full and objective information about patients. The functions of subsystems promoted into the cardiology department of the city many profile hospital are described.


2021 ◽  
Vol 10 (41) ◽  
pp. 131-140
Author(s):  
Mykhailo Dumchikov ◽  
Oleksandr Yunin ◽  
Nataliia Nestor ◽  
Andrii Borko ◽  
Oleksandr Yermenchuk

The article's purpose is the criminological and forensic characteristics of the forms of embezzlement of funds by the use of information technology and international and foreign experience in combating this destructive phenomenon. The object of this article is the relationship that arises in connection with the implementation and counteraction to theft in the field of information technology. The authors used various methods of scientific cognition to write this work. In particular, historical, observation, generalization, comparison and analogy, statistical, analytical, and others. The article emphasizes that the emergence and rapid development of new information technologies do not always positively affect criminals because criminals can transform positive qualities into crime. In particular, crimes of embezzlement through the use of information technology are now widespread. This article has tried to provide a criminological description of the three main forms of cybercrime against money: carding, phishing, and embezzlement committed using NFC technology. In addition, emphasis was placed on the importance, role, tasks of computer and technical expertise in the investigation of embezzlement dedicated through the use of information technology. The importance of implementing international conventions and the positive experience of foreign countries in combating the embezzlement of funds committed through the use of information technology.


2020 ◽  
Vol 6 ◽  
pp. 00002
Author(s):  
Ellyn Sugeng Desyanty

Parenting activities in young families at this time have experienced a very fast development that is from activities that are offline to online. This is due to the development of information technology that presents a variety of new information can be spread very quickly. Social media was chosen as a source of learning for young families in providing learning experiences, especially about child development and answers to various problems that arise in the process of forming a family. the findings show that social media which later became a discussion forum in cyberspace has been considered as a more credible media for discussion, exchanging experiences. Social media has become one of the most popular sources of learning among young families.


Sign in / Sign up

Export Citation Format

Share Document