{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T19:11:01Z","timestamp":1717182661385},"reference-count":68,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JICES"],"published-print":{"date-parts":[[2019,5,13]]},"abstract":"\nPurpose<\/jats:title>\nCybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nThis paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nWith respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity.<\/jats:p>\n<\/jats:sec>\n\nResearch limitations\/implications<\/jats:title>\nHowever, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nIn terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jices-12-2018-0095","type":"journal-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T05:51:04Z","timestamp":1560145864000},"page":"229-245","source":"Crossref","is-referenced-by-count":16,"title":["Cybersecurity in health \u2013 disentangling value tensions"],"prefix":"10.1108","volume":"17","author":[{"given":"Michele","family":"Loi","sequence":"first","affiliation":[]},{"given":"Markus","family":"Christen","sequence":"additional","affiliation":[]},{"given":"Nadine","family":"Kleine","sequence":"additional","affiliation":[]},{"given":"Karsten","family":"Weber","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2019090408143062100_ref001","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1109\/ACCESS.2016.2521727","article-title":"Security tradeoffs in cyber physical systems: a case study survey on implantable medical devices","volume":"4","year":"2016","journal-title":"IEEE Access"},{"key":"key2019090408143062100_ref002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2458(08)60506-9","article-title":"Information security in a multi-user computer environment","volume":"12","year":"1972","journal-title":"Advances in Computers"},{"issue":"12","key":"key2019090408143062100_ref003","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1136\/emj.2008.070557","article-title":"Accessibility versus confidentiality of information in the emergency department","volume":"26","year":"2009","journal-title":"Emergency Medicine Journal"},{"issue":"4","key":"key2019090408143062100_ref004","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1177\/0034355210368867","article-title":"Ethics and the use of technology in rehabilitation counseling","volume":"53","year":"2010","journal-title":"Rehabilitation Counseling Bulletin"},{"issue":"2","key":"key2019090408143062100_ref005","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","article-title":"Privacy, confidentiality, and electronic medical records","volume":"3","year":"1996","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"2","key":"key2019090408143062100_ref006","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10676-012-9286-x","article-title":"Challenges of ethical and legal responsibilities when technologies\u2019 uses and users change: social networking sites, decision-making capacity and dementia","volume":"14","year":"2012","journal-title":"Ethics and Information Technology"},{"key":"key2019090408143062100_ref007","volume-title":"Principles of Biomedical Ethics","year":"2013","edition":"7th ed."},{"key":"key2019090408143062100_ref008","volume-title":"Individual and Group Privacy","year":"2003"},{"key":"key2019090408143062100_ref009","first-page":"767","article-title":"Information systems and patients\u2019 empowerment around patients\u2019 pathways: the French and the Portuguese scenarios","volume":"4","year":"2015","journal-title":"Qualitative and Quantitative Methods in Libraries"},{"issue":"2","key":"key2019090408143062100_ref010","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1136\/jamia.1999.0060122","article-title":"Driving toward guiding principles: a goal for confidentiality, and security of health information","volume":"6","year":"1999","journal-title":"Journal of the American Medical Informatics Association"},{"key":"key2019090408143062100_ref011","unstructured":"Caldicott, D.F. and Manning, K. (2013), \u201cA guide to confidentiality in health and social care: treating confidential information with respect\u201d, Health and Social Care In-formation Center, available at: http:\/\/content.digital.nhs.uk\/media\/12822\/Guide-to-confidentialityin-health-and-socialcare\/pdf\/HSCIC-guide-to-confidentiality.pdf"},{"key":"key2019090408143062100_ref012","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007","article-title":"Security and privacy issues in implantable medical devices: a comprehensive survey","volume":"55","year":"2015","journal-title":"Journal of Biomedical Informatics"},{"issue":"2","key":"key2019090408143062100_ref013","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1183\/09031936.00165006","article-title":"Trends in ethical and legal frameworks for the use of human biobanks","volume":"30","year":"2007","journal-title":"European Respiratory Journal"},{"issue":"3","key":"key2019090408143062100_ref014","first-page":"430","article-title":"Research ethics recommendations for whole-genome research: consensus statement","volume":"6","year":"2008","journal-title":"PLoS Biology"},{"issue":"6","key":"key2019090408143062100_ref015","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1197\/jamia.M1535","article-title":"Bridging the digital divide: reaching vulnerable populations","volume":"11","year":"2004","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"2","key":"key2019090408143062100_ref016","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1093\/jmp\/15.2.219","article-title":"A critique of principlism","volume":"15","year":"1990","journal-title":"Journal of Medicine and Philosophy"},{"key":"key2019090408143062100_ref017","first-page":"41","article-title":"Ageing, well-being and technology: from quality of life improvement to digital rights management: a French perspective","year":"2016"},{"key":"key2019090408143062100_ref018","first-page":"195","article-title":"Challenges in eHealth: from enabling to enforcing privacy","volume-title":"Foundations of Health Informatics Engineering and Systems","year":"2012"},{"key":"key2019090408143062100_ref019","unstructured":"ENISA (2016), \u201cSmart hospitals. Security and resilience for smart health service and infrastructures\u201d, European Union Agency for Network and Information Security, available at: www.enisa.europa.eu\/publications\/cyber-security-and-resilience-for-smart-hospitals"},{"key":"key2019090408143062100_ref020","volume-title":"A History and Theory of Informed Consent","year":"1986"},{"key":"key2019090408143062100_ref021","volume-title":"An Anatomy of Values: Problems of Personal and Social Choice","year":"1970"},{"issue":"12","key":"key2019090408143062100_ref022","article-title":"Genomics and privacy: implications of the new reality of closed data for the field","volume":"7","year":"2011","journal-title":"PLoS Computational Biology"},{"issue":"3","key":"key2019090408143062100_ref023","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s00439-011-1031-8","article-title":"Children and biobanks: a review of the ethical and legal discussion","volume":"130","year":"2011","journal-title":"Human Genetics"},{"issue":"6","key":"key2019090408143062100_ref024","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s11017-011-9185-x","article-title":"What is the outcome of applying principlism?","volume":"32","year":"2011","journal-title":"Theoretical Medicine and Bioethics"},{"issue":"6","key":"key2019090408143062100_ref025","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1111\/j.1467-8519.2007.00562.x","article-title":"Solidarity and justice as guiding principles in genomic research","volume":"21","year":"2007","journal-title":"Bioethics"},{"issue":"2","key":"key2019090408143062100_ref026","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10676-016-9398-9","article-title":"Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity","volume":"18","year":"2016","journal-title":"Ethics and Information Technology"},{"key":"key2019090408143062100_ref027","article-title":"Ethical assessment in the design of ambient assisted living","year":"2008"},{"issue":"4","key":"key2019090408143062100_ref028","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1017\/S0963180108080535","article-title":"Ethical challenges of telemedicine and telehealth","volume":"17","year":"2008","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"key":"key2019090408143062100_ref029","first-page":"148","article-title":"E-Health promises and challenges: some ethical considerations","volume-title":"International Perspectives in Health Informatics. Studies in Health Technology and Informatics 164","year":"2011"},{"key":"key2019090408143062100_ref030","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.procs.2015.09.120","article-title":"E-Therapy: the ethics behind the process","volume":"65","year":"2015","journal-title":"Procedia Computer Science"},{"key":"key2019090408143062100_ref031","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1111\/j.1475-6773.2010.01141.x","article-title":"Balancing access to health data and privacy: a review of the issues and approaches for the future","volume":"45","year":"2010","journal-title":"Health Services Research"},{"key":"key2019090408143062100_ref032","first-page":"2","article-title":"Introduction","volume-title":"Transforming Health Care through Information","year":"2005","edition":"2nd ed."},{"key":"key2019090408143062100_ref033","unstructured":"Lowrance, W.W. (2006), \u201cPrivacy, confidentiality, and identifiability in genomic research: discussion document for workshop convened by the national human Ge-nome research institute, Bethesda, 3-4 October\u201d, available at: www.genome.gov\/pages\/about\/od\/reportspublications\/identifiabilityworkshopwhitepaper.pdf"},{"issue":"4","key":"key2019090408143062100_ref034","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1080\/13691058.2014.920528","article-title":"Quantified sex: a critical analysis of sexual and reproductive self-tracking using apps","volume":"17","year":"2015","journal-title":"Culture Health and Sexuality"},{"issue":"1","key":"key2019090408143062100_ref035","first-page":"69","article-title":"Balancing good intentions: protecting the privacy of electronic health information","volume":"28","year":"2007","journal-title":"Bulletin of Science, Technology and Society"},{"issue":"2","key":"key2019090408143062100_ref036","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1377\/hlthaff.28.2.416","article-title":"Privacy as an enabler, not an impediment: building trust into health information exchange","volume":"28","year":"2009","journal-title":"Health Affairs"},{"issue":"6","key":"key2019090408143062100_ref037","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1038\/ejhg.2014.197","article-title":"International charter of principles for sharing bio-specimens and data","volume":"23","year":"2015","journal-title":"European Journal of Human Genetics"},{"key":"key2019090408143062100_ref038","first-page":"231","article-title":"Users\u2019 privacy concerns about wearables: impact of form factor, sensors and type of data collected","volume-title":"Financial Cryptography and Data Security (FC 2015), 8976","year":"2015"},{"issue":"4","key":"key2019090408143062100_ref039","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1162\/DAED_a_00116","article-title":"Doctrine for cybersecurity","volume":"140","year":"2011","journal-title":"Daedalus"},{"issue":"16","key":"key2019090408143062100_ref040","article-title":"eRegistries: governance for electronic maternal and child health registries","volume":"279","year":"2016","journal-title":"BMC Pregnancy and Childbirth"},{"issue":"1","key":"key2019090408143062100_ref041","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s00779-014-0811-2","article-title":"What consumers want in personal health applications: findings from project HealthDesign","volume":"19","year":"2015","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"key2019090408143062100_ref042","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/S1532-0464(02)00527-0","article-title":"Ethical issues in public health informatics: implications for system design when sharing geographic information","volume":"35","year":"2002","journal-title":"Journal of Biomedical Informatics"},{"issue":"2","key":"key2019090408143062100_ref043","doi-asserted-by":"crossref","first-page":"73","DOI":"10.4103\/2229-3485.153997","article-title":"Ethical issues in electronic health records: a general overview","volume":"6","year":"2015","journal-title":"Perspectives in Clinical Research"},{"key":"key2019090408143062100_ref044","volume-title":"Privacy and Progress in Whole Genome Sequencing","author":"Presidential Commission for the Study of Bioethical Issues","year":"2012"},{"key":"key2019090408143062100_ref045","first-page":"504","article-title":"Information privacy concerns in electronic healthcare records: a systematic literature review","year":"2013"},{"issue":"5","key":"key2019090408143062100_ref046","first-page":"1437","article-title":"Methods for practising ethics in research and innovation: a literature review, critical analysis and recommendations","volume":"24","year":"2017","journal-title":"Science and Engineering Ethics"},{"key":"key2019090408143062100_ref047","first-page":"320","article-title":"Health users\u2019 perception of biometric authentication technologies","volume-title":"2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)","year":"2013"},{"key":"key2019090408143062100_ref048","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.jbi.2017.01.005","article-title":"Navigation in the electronic health record: a review of the safety and usability literature","volume":"67","year":"2017","journal-title":"Journal of Biomedical Informatics"},{"key":"key2019090408143062100_ref049","first-page":"219","article-title":"Privacy concerns in a remote monitoring and social networking platform for assisted living","volume-title":"Privacy and Identity Management for Life","year":"2011"},{"issue":"1\/2","key":"key2019090408143062100_ref050","first-page":"29","article-title":"Determinants of the intention to use telemedicine: evidence from primary care physicians","volume":"32","year":"2016","journal-title":"International Journal of Technology Assessment in Health Care"},{"issue":"3","key":"key2019090408143062100_ref051","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3414\/ME12-01-0021","article-title":"Potential and requirements of IT for ambient assisted living technologies: results of a Delphi study","volume":"52","year":"2013","journal-title":"Methods of Information in Medicine"},{"issue":"3","key":"key2019090408143062100_ref052","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1007\/s11948-013-9496-6","article-title":"Critical theory as an approach to the ethics of information security","volume":"20","year":"2014","journal-title":"Science and Engineering Ethics"},{"key":"key2019090408143062100_ref053","unstructured":"The Academy of Medical Sciences (2017), \u201cPersonal data for public good: using health information in medical research\u201d, available at: https:\/\/acmedsci.ac.uk\/policy\/policy-projects\/personal-data"},{"issue":"2","key":"key2019090408143062100_ref054","first-page":"56","article-title":"Facilitating secure sharing of personal health data in the cloud","volume":"4","year":"2016","journal-title":"JMIR Medical Informatics"},{"issue":"12","key":"key2019090408143062100_ref055","doi-asserted-by":"crossref","first-page":"e275","DOI":"10.2196\/jmir.4847","article-title":"Barriers and facilitators to online portal use among patients and caregivers in a safety net health care system: a qualitative study","volume":"17","year":"2015","journal-title":"Journal of Medical Internet Research"},{"issue":"6","key":"key2019090408143062100_ref056","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1037\/a0025278","article-title":"Critical incidents in the marriage of psychology and technology: a discussion of potential ethical issues in practice, education, and policy","volume":"42","year":"2011","journal-title":"Professional Psychology-Research and Practice"},{"issue":"3","key":"key2019090408143062100_ref057","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.ijmedinf.2008.06.013","article-title":"Inter-organizational future proof EHR systems: a review of the security and privacy related issues","volume":"78","year":"2009","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"key2019090408143062100_ref058","first-page":"420","article-title":"Elements of a new ethical framework for big data research","volume":"72","year":"2016","journal-title":"Washington and Lee Law Review"},{"issue":"2","key":"key2019090408143062100_ref059","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/356909.356913","article-title":"Security mechanisms in high-level network protocols","volume":"15","year":"1983","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"key2019090408143062100_ref060","first-page":"58","article-title":"Is patient confidentiality compromised with the electronic health record? A position paper","volume":"33","year":"2015","journal-title":"CIN: Computers, Informatics, Nursing"},{"issue":"4","key":"key2019090408143062100_ref061","first-page":"287","article-title":"A research on security and privacy issues for patient related data in medical organization system","volume":"7","year":"2013","journal-title":"International Journal of Security and Its Applications"},{"key":"key2019090408143062100_ref062","volume-title":"Privacy and Freedom","year":"1967","edition":"1st ed"},{"issue":"4","key":"key2019090408143062100_ref063","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.istr.2008.10.009","article-title":"In a \u2018trusting\u2019 environment, everyone is responsible for information security","volume":"13","year":"2008","journal-title":"Information Security Technical Report"},{"issue":"11","key":"key2019090408143062100_ref064","article-title":"Caught you: threats to confidentiality due to the public release of Large-Scale genetic data sets","volume":"11","year":"2010","journal-title":"BMC Medical Ethics"},{"key":"key2019090408143062100_ref065","article-title":"Ethical and legal implications of whole genome and whole exome sequencing in African populations","volume":"14","year":"2013","journal-title":"BMC Medical Ethics"},{"key":"key2019090408143062100_ref066","article-title":"Developing a security protocol for a distributed decision support system in a healthcare environment","year":"2008"},{"key":"key2019090408143062100_ref067","unstructured":"Yaghmaei, E., van de Poel, I., Christen, M., Gordijn, B., Kleine, N., Loi, M., Morgan, G. and Weber, K. (2017), \u201cCybersecurity and ethics, CANVAS white paper 1\u201d, available at: https:\/\/ssrn.com\/abstract=3091909"},{"issue":"2","key":"key2019090408143062100_ref068","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1177\/1460458213486906","article-title":"Willing but unwilling\u2019: attitudinal barriers to adoption of home-based health information technology among older adults","volume":"20","year":"2014","journal-title":"Health Informatics Journal"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2018-0095\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2018-0095\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T08:57:38Z","timestamp":1567587458000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-12-2018-0095\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":68,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,5,13]]}},"alternative-id":["10.1108\/JICES-12-2018-0095"],"URL":"https:\/\/doi.org\/10.1108\/jices-12-2018-0095","relation":{},"ISSN":["1477-996X","1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"},{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2019,5,13]]}}}