Skip to main content
    • Aa
    • Aa
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 5
  • Cited by
    This article has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Ivarsson, Bodil Wiinberg, Stig and Svensson, Martin 2016. Information and/or medical technology staff experience with regulations for medical information systems and medical devices. Health Policy and Technology,

    Xafis, Vicki 2016. Why respecting all human beings' privacy matters. Journal of Paediatrics and Child Health, Vol. 52, Issue. 3, p. 256.

    Brumen, Bostjan Heričko, Marjan Sevčnikar, Andrej Završnik, Jernej and Hölbl, Marko 2013. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?. Journal of Medical Internet Research, Vol. 15, Issue. 12, p. e283.

    Vasalou, Asimina Gill, Alastair J. Mazanderani, Fadhila Papoutsi, Chrysanthi and Joinson, Adam 2011. Privacy dictionary: A new resource for the automated content analysis of privacy. Journal of the American Society for Information Science and Technology, Vol. 62, Issue. 11, p. 2095.

    Doyle, Tony 2009. Privacy and perfect voyeurism. Ethics and Information Technology, Vol. 11, Issue. 3, p. 181.


The Priority of Privacy for Medical Information

  • Judith Wagner DeCew (a1)
  • DOI:
  • Published online: 01 January 2009

Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for abuse is much greater than ever before. At every stage in the process of collection and storage, dangers can arise, including entry errors, improper access, exploitation, and unauthorized disclosure. Secondary use and aggregation of data are all far easier, faster, and less expensive, and thus pose additional threats to an individual's control over the disposition of medical information.

Linked references
Hide All

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

James Moor , “Towards a Theory of Privacy in the Information Age,” Computers and Society 27, no. 3 (091997): 2732

Charles Culver , James Moor , William Duerfeldt , Marshall Kapp , and Mark Sullivan , “Privacy,” Professional Ethics 3, nos. 3 and 4 (Fall/Winter 1994): 425

Randolph C. Barrows Jr., and Paul D. Clayton , “Privacy, Confidentiality, and Electronic Medical Records,” Journal of the American Medical Informatics Association 3, no. 2 (03/041996): 139–48.

Ruth Gavison , “Privacy and the Limits of Law,” Yale Law Journal 89, no. 3 (011980): 421–71

Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Social Philosophy and Policy
  • ISSN: 0265-0525
  • EISSN: 1471-6437
  • URL: /core/journals/social-philosophy-and-policy
Please enter your name
Please enter a valid email address
Who would you like to send this to? *