In fact, healthcare educators should provide healthcare professionals with effective methodology of application of ethical norms and principles in their healthcare practice. In other words, healthcare educators should teach healthcare professionals to apply ethical norms and principles in real life situations. In this respect, it is very important to make these norms and principles really understandable for healthcare professionals in practical terms because the inability to apply theoretical knowledge often results in unethical behavior and decisions taken by healthcare professional that produce a negative impact on patients (Ascension Health, 2005). Basically, it is important to make ethical codes more oriented on practical application.
At the same time, the work of healthcare educators should not be a one-sided process. Instead, they need to receive feedback from healthcare professionals who work on direct with patients and it is healthcare professionals that actually apply ethical norms and principles in their work (Margolin, et al., 2005). This is why healthcare educators need to get information about problems healthcare professionals face, while applying ethical norms and principles in their regular work.
Privacy and confidentiality are extremely important in the contemporary healthcare system, especially in relation to family and child counseling. Basically, the problem of privacy and confidentiality refers not only to ethical but also legal issues since healthcare professionals are obliged to maintain the confidentiality and protect private information of patients from breaches. In this respect, it is often very difficult to distinguish the border between privacy and confidentiality of a patient and family interests because often children need confidentiality, while parents traditionally tend to get the maximum information about their children, their health and current physical and psychological state. In such a situation, healthcare professionals may face a dilemma between preserving privacy and confidentiality of children counseling and treatment and the natural desire of parents to get all information about the treatment and the state of their children.
In the contemporary health care and business environment, the protection of the hardware solely is not enough to ensure the high level of safety of the private information of patients. As it has been already mentioned above, it is necessary to develop the effective information system that should focus on four key factors that define the reliability of the system and its effectiveness: encryption standards; networks access security standards; software firewalls; usage protocols. Basically, all of the four factors are of the utmost importance for the information security but the information system should be able to combine the four factors to maximize its effectiveness.
The establishment of severe and effective encryption standards helps to encrypt data that makes it quite difficult for hackers to decipher the information and steal the private information of patients. In addition, the establishment of the network access standards can raise barriers to access the network from the part of external users, who are not member of the organization, for instance, who are not health care professionals. Finally, software firewalls and usage protocols also need a substantial protection. They cannot be ignored in the course of the development of the information system. Instead, they should raise unsurpassable barrier to any attempts of information breaches. With the help of protected software firewalls and usage protocols, it is possible to control the WLAN and actions of users and minimize the risk of information breaches.
Thus, the information security standards established by the HIPPA are consistently higher to standards existing in the past. Modern organizations, such as hospitals, need to develop new information systems that are fully protected from any attempts of the external interference or information breaches. In actuality, the development of the effective information system should be backed up with the protection of the hardware and other devices that can be used to get an unauthorized access to the private information of patients.
Adams, G. (1997). TUANZ Special Report: Business-to-Business E-Business – a New Zealand Status Report, Nov. 97.
Anderson, C. (2006). In Search of Perfect Market. The Economist, vol. 343.
Alpers, A. (1999, May). “Commentary: Respect for patients should dominate health care decisions.” Western Journal of Medicine 170, (5), 291.
Andrew, S. (2003). Computer Networks. (4th Ed), Prentice Hall.
Benoff, M., & Grauman, D. M. (1997). Mastering the physician integration challenge. Healthcare Financial Management; Westchester; Jan 1997.
Bloch, M., Peigneur Y. and Segev A. (2000). “Leveraging Electronic Commerce for Competitive Advantage: a Business Value Framework.” The Ninth International Conference on EDI-IOS, Bled, Slovenia.
Boyle, M. and William, J. The Emerging International Tax Environment For Electronic Commerce. Tax Management International Journal, vol. 28(6), 1999.
Coyle, T. Surveys and Trends. America’s Community Banker, 8(9), 1999.
Elger, B. S. & Chevorlet, J.C. (2000, Jan/Feb). “Beneficence today, or autonomy (maybe) tomorrow?” The Hastings Center Report 30, (1), 18.
Jennings, L. (1998, November). “Rx for health professionals:
Honesty, fairness, respect.” The Futurist 32 (8), 10.
King, J. Shipping Firms to Exploit IT to Deliver E-Commerce Goods. Computerworld, vol. 33, 1999.
Limentani, A. E. (1999, October). The role of ethical principles in health care and the implications for ethical codes. Journal of Medical Ethics 25 (5), 394-399.
Lucas, H. and Baroudi, J. (2002). “The role of Information Technology in Organization Design.” Journal of Management Information Systems, vol. 10(4), 45-52.
Margolin, J., Chien, D., Duman, S. E. and Fauchier, A. (2005). “Ethical Issues in Couple and Family Research.” Journal of Family Psychology 19 (1), pg. 157.
Mica, D. Why E-Commerce? Credit Union Magazine, vol. 65(11), 1999.
Pomeroy, B. “Networking: There’s Still Cream in the Middle “Infomediaries” Find a Niche on the Net”. High Technology Careers Magazine, 02 March 2001.
Quinn, J., Hilmer B., and Frederic, G. Strategic Outsourcing. Sloan Management Review, Summer, 1994.
Quinn, J., Hilmer B., and Frederic, G. Technologies in Services: Rethinking Strategic Focus. Sloan Management Review, Winter, 1992.
Rasmussen, E. The Death of Retail? Sales and Marketing Management, vol. 151(3), 1999.
Walter, C. Web Commerce Means E-service. Information week, vol. 743, 1999.
Welanetz, R. The Threat of Virtual Retail. Mortgage Banking, vol. 59(12), 1999.
Whitely, D. E-Commerce: Strategies, Technologies and Applications. 1st ed. Berkshire, England, McGrawl Hill International (UK) Limited, 2000.