Switch to: Citations

Add references

You must login to add references.
  1. Principles of Biomedical Ethics.Ezekiel J. Emanuel, Tom L. Beauchamp & James F. Childress - 1995 - Hastings Center Report 25 (4):37.
    Book reviewed in this article: Principles of Biomedical Ethics. By Tom L. Beauchamp and James F. Childress.
    Download  
     
    Export citation  
     
    Bookmark   2269 citations  
  • Methods for Practising Ethics in Research and Innovation: A Literature Review, Critical Analysis and Recommendations.Wessel Reijers, David Wright, Philip Brey, Karsten Weber, Rowena Rodrigues, Declan O’Sullivan & Bert Gordijn - 2018 - Science and Engineering Ethics 24 (5):1437-1481.
    This paper provides a systematic literature review, analysis and discussion of methods that are proposed to practise ethics in research and innovation. Ethical considerations concerning the impacts of R&I are increasingly important, due to the quickening pace of technological innovation and the ubiquitous use of the outcomes of R&I processes in society. For this reason, several methods for practising ethics have been developed in different fields of R&I. The paper first of all presents a systematic search of academic sources that (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Review of Ruth R. Faden and Tom L. Beauchamp: A History and Theory of Informed Consent[REVIEW]William G. Bartholome - 1988 - Ethics 98 (3):605-606.
    Download  
     
    Export citation  
     
    Bookmark   421 citations  
  • A Critique of Principlism.K. D. Clouser & B. Gert - 1990 - Journal of Medicine and Philosophy 15 (2):219-236.
    The authors use the term “principlism” to refer to the practice of using “principles” to replace both moral theory and particular moral rules and ideals in dealing with the moral problems that arise in medical practice. The authors argue that these “principles” do not function as claimed, and that their use is misleading both practically and theoretically. The “principles” are in fact not guides to action, but rather they are merely names for a collection of sometimes superficially related matters for (...)
    Download  
     
    Export citation  
     
    Bookmark   142 citations  
  • Balancing Good Intentions: Protecting the Privacy of Electronic Health Information.Kitty McClanahan - 2008 - Bulletin of Science, Technology and Society 28 (1):69-79.
    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy of the information they contain. This article discusses related U.S. legislation, policy, and law—including the Health Insurance Portability and Accountability Act of 1996. This article offers an inclusive, equilibrium model to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Anatomy of Values: Problems of Personal and Social Choice. [REVIEW]Jordan Howard Sobel - 1974 - Philosophical Review 83 (1):131-135.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity.Marcello Ienca & Pim Haselager - 2016 - Ethics and Information Technology 18 (2):117-129.
    Brain–computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentially vulnerable to cybercriminality. This opens the prospect of “neurocrime”: extending the range of computer-crime to neural devices. This paper explores a type of neurocrime that we call brain-hacking as it aims at the illicit access to and manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   205 citations  
  • What is the outcome of applying principlism?Kristen Hine - 2011 - Theoretical Medicine and Bioethics 32 (6):375-388.
    The four principles approach to bioethics, an approach most associated with the work of Tom Beauchamp and James Childress, is supposed to provide a framework for reasoning through moral issues in medicine. One might wonder, if one were to guide one’s thinking by the method suggested by principlism, will one identify and perform the objectively morally right action? Will one’s decision making be justified, and consequently, will the action that flows from that decision itself be justified? In this paper, I (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Ethical Challenges of Telemedicine and Telehealth.Bonnie Kaplan & Sergio Litewka - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):401-416.
    As healthcare institutions expand and vertically integrate, healthcare delivery is less constrained by geography, nationality, or even by institutional boundaries. As part of this trend, some aspects of the healthcare process are shifted from medical centers back into the home and communities. Telehealth applications intended for health promotion, social services, and other activitiesprovide services outside clinical settings in homes, schools, libraries, and other governmental and community sites. Such developments include health information web sites, on-line support groups, automated telephone counseling, interactive (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Solidarity and justice as guiding principles in genomic research.Rogeer Hoedemaekers, Bert Gordijn & Martien Pijnenburg - 2007 - Bioethics 21 (6):342–350.
    ABSTRACT In genomic research the ideal standard of free, informed, prior and explicit consent is sometimes difficult to apply. This has raised concern that important genomic research will be restricted. Different consent procedures have therefore been proposed. This paper explicitly examines the question how, in genomic research, the principles of solidarity and justice can be used to justify forms of diminished individual control over personal data and bio‐samples. After a discussion of the notions of solidarity and justice and how they (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • An anatomy of values.Charles Fried - 1970 - Cambridge,: Harvard University Press.
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  • Ethical and legal implications of whole genome and whole exome sequencing in African populations.Galen E. B. Wright, Pieter G. J. Koornhof, Adebowale A. Adeyemo & Nicki Tiffin - 2013 - BMC Medical Ethics 14 (1):21.
    Rapid advances in high throughput genomic technologies and next generation sequencing are making medical genomic research more readily accessible and affordable, including the sequencing of patient and control whole genomes and exomes in order to elucidate genetic factors underlying disease. Over the next five years, the Human Heredity and Health in Africa (H3Africa) Initiative, funded by the Wellcome Trust (United Kingdom) and the National Institutes of Health (United States of America), will contribute greatly towards sequencing of numerous African samples for (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Caught you: threats to confidentiality due to the public release of large-scale genetic data sets. [REVIEW]Matthias Wjst - 2010 - BMC Medical Ethics 11 (1):1-4.
    BackgroundLarge-scale genetic data sets are frequently shared with other research groups and even released on the Internet to allow for secondary analysis. Study participants are usually not informed about such data sharing because data sets are assumed to be anonymous after stripping off personal identifiers.DiscussionThe assumption of anonymity of genetic data sets, however, is tenuous because genetic data are intrinsically self-identifying. Two types of re-identification are possible: the "Netflix" type and the "profiling" type. The "Netflix" type needs another small genetic (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Critical Theory as an Approach to the Ethics of Information Security.Bernd Carsten Stahl, Neil F. Doherty, Mark Shaw & Helge Janicke - 2014 - Science and Engineering Ethics 20 (3):675-699.
    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Challenges of ethical and legal responsibilities when technologies' uses and users change: social networking sites, decision-making capacity and dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations