-
Frontiers in Surgery 2022The legal and ethical issues that confront society due to Artificial Intelligence (AI) include privacy and surveillance, bias or discrimination, and potentially the... (Review)
Review
The legal and ethical issues that confront society due to Artificial Intelligence (AI) include privacy and surveillance, bias or discrimination, and potentially the philosophical challenge is the role of human judgment. Concerns about newer digital technologies becoming a new source of inaccuracy and data breaches have arisen as a result of its use. Mistakes in the procedure or protocol in the field of healthcare can have devastating consequences for the patient who is the victim of the error. Because patients come into contact with physicians at moments in their lives when they are most vulnerable, it is crucial to remember this. Currently, there are no well-defined regulations in place to address the legal and ethical issues that may arise due to the use of artificial intelligence in healthcare settings. This review attempts to address these pertinent issues highlighting the need for algorithmic transparency, privacy, and protection of all the beneficiaries involved and cybersecurity of associated vulnerabilities.
PubMed: 35360424
DOI: 10.3389/fsurg.2022.862322 -
Cureus Oct 2022The use of electronic health records (EHRs) has grown significantly in the past decade. Health information databases contain sensitive patient information, including... (Review)
Review
The use of electronic health records (EHRs) has grown significantly in the past decade. Health information databases contain sensitive patient information, including their names and addresses, tests, diagnoses, treatment, and medical history. This information should be secured and protected from manipulation and fraudulent use by third parties. EHRs are expected to increase efficiency in healthcare delivery, improve healthcare quality, and relieve increased financial pressure. Despite these expected benefits, EHRs are potentially vulnerable to security concerns that may affect the confidentiality and privacy of patients' personal information. This paper presents a literature review of EHRs, factors that support the security and safety of health records, potential security breaches, and solutions to inherent security concerns. The study collects data through a systematic review of past studies that have addressed the topic of EHRs and security issues, and other relevant publications on EHR systems, and procedures that help safeguard health records databases. A total of 30 sources are analyzed for all pertinent information regarding security concerns of health records databases. These sources were obtained through an internet search on credible databases, including Google Scholar, PubMed, and CINAHL databases. The results of the current study reveal the perceived vulnerability of EHRs to security concerns, common security issues, the nature of these common security concerns, Health Insurance Portability and Accountability Act rules, provider responsibilities, and recommendations for reducing EHR security risks. This paper also reveals effective strategies such as privacy-protection awareness and staff training to enhance the security of health records databases.
PubMed: 36397924
DOI: 10.7759/cureus.30168 -
Journal of Medical Internet Research Aug 2023ChatGPT has promising applications in health care, but potential ethical issues need to be addressed proactively to prevent harm. ChatGPT presents potential ethical...
ChatGPT has promising applications in health care, but potential ethical issues need to be addressed proactively to prevent harm. ChatGPT presents potential ethical challenges from legal, humanistic, algorithmic, and informational perspectives. Legal ethics concerns arise from the unclear allocation of responsibility when patient harm occurs and from potential breaches of patient privacy due to data collection. Clear rules and legal boundaries are needed to properly allocate liability and protect users. Humanistic ethics concerns arise from the potential disruption of the physician-patient relationship, humanistic care, and issues of integrity. Overreliance on artificial intelligence (AI) can undermine compassion and erode trust. Transparency and disclosure of AI-generated content are critical to maintaining integrity. Algorithmic ethics raise concerns about algorithmic bias, responsibility, transparency and explainability, as well as validation and evaluation. Information ethics include data bias, validity, and effectiveness. Biased training data can lead to biased output, and overreliance on ChatGPT can reduce patient adherence and encourage self-diagnosis. Ensuring the accuracy, reliability, and validity of ChatGPT-generated content requires rigorous validation and ongoing updates based on clinical practice. To navigate the evolving ethical landscape of AI, AI in health care must adhere to the strictest ethical standards. Through comprehensive ethical guidelines, health care professionals can ensure the responsible use of ChatGPT, promote accurate and reliable information exchange, protect patient privacy, and empower patients to make informed decisions about their health care.
Topics: Humans; Artificial Intelligence; Reproducibility of Results; Data Collection; Disclosure; Patient Compliance
PubMed: 37566454
DOI: 10.2196/48009 -
BMC Medical Ethics Feb 2020Sharing de-identified individual-level health research data is widely promoted and has many potential benefits. However there are also some potential harms, such as...
BACKGROUND
Sharing de-identified individual-level health research data is widely promoted and has many potential benefits. However there are also some potential harms, such as misuse of data and breach of participant confidentiality. One way to promote the benefits of sharing while ameliorating its potential harms is through the adoption of a managed access approach where data requests are channeled through a Data Access Committee (DAC), rather than making data openly available without restrictions. A DAC, whether a formal or informal group of individuals, has the responsibility of reviewing and assessing data access requests. Many individual groups, consortiums, institutional and independent DACs have been established but there is currently no widely accepted framework for their organization and function.
MAIN TEXT
We propose that DACs, should have the role of both promotion of data sharing and protection of data subjects, their communities, data producers, their institutions and the scientific enterprise. We suggest that data access should be granted by DACs as long as the data reuse has potential social value and provided there is low risk of foreseeable harms. To promote data sharing and to motivate data producers, DACs should encourage secondary uses that are consistent with the interests of data producers and their own institutions. Given the suggested roles of DACs, there should be transparent, simple and clear application procedures for data access. The approach to review of applications should be proportionate to the potential risks involved. DACs should be established within institutional and legal frameworks with clear lines of accountability, terms of reference and membership. We suggest that DACs should not be modelled after research ethics committees (RECs) because their functions and goals of review are different from those of RECs. DAC reviews should be guided by the principles of public health ethics instead of research ethics.
CONCLUSIONS
In this paper we have suggested a framework under which DACs should operate, how they should be organised, and how to constitute them.
Topics: Access to Information; Confidentiality; Ethics Committees, Research; Ethics, Research; Humans; Information Dissemination; Social Responsibility
PubMed: 32013947
DOI: 10.1186/s12910-020-0453-z -
Journal of Bioethical Inquiry Jun 2023The recently passed Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022 (Cth) introduced important changes to the Australian Privacy Act 1988 (Cth)... (Review)
Review
The recently passed Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022 (Cth) introduced important changes to the Australian Privacy Act 1988 (Cth) which increase penalties for serious and repeated interferences with privacy and strengthen the investigative and enforcement powers of the Information Commissioner. The amendments were made subsequent to a number of high profile data breaches and represent the first set of changes to the Privacy Act following the review of the Act commenced by the Attorney-General in October 2020. The submissions made to the review emphasized the need for more effective enforcement mechanisms to increase individuals' control over their personal information and as a form of deterrence. This article reviews the recent amendments to the Privacy Act and explains their effect. It comments upon the relevance of the amendments for health and medical data and other data collected in the context of healthcare, and refers to the Attorney-General's Department's review of the Privacy Act regarding other proposals relating to enforcement which have not as yet been put into effect in legislation.
Topics: Humans; Privacy; Australia; Personally Identifiable Information; Confidentiality
PubMed: 37432509
DOI: 10.1007/s11673-023-10249-4 -
Australian Journal of General Practice Jul 2022In the era of socially distanced clinical and medical research practices, the use of electronic communication has flourished. The Australian Information Commissioner...
BACKGROUND
In the era of socially distanced clinical and medical research practices, the use of electronic communication has flourished. The Australian Information Commissioner recently ordered a Victorian general practice to pay $16,400 in compensation following a breach of privacy. This is the largest award of compensation made by the Commissioner in the context of a medical or healthcare privacy matter. The practice had inadvertently sent an email containing sensitive information to an incorrect email address. The email included information concerning the human immunodeficiency virus status of the complainants.
OBJECTIVE
The aim of this article is to provide an overview of this important case in Australian information and privacy law, which relates to the operation of an Australian general practice and research activity undertaken within the practice context.
DISCUSSION
In an era marked by a great increase in the use of electronic communication in the medical setting, it is essential that practices both manage electronic communication well and respond appropriately when an error arises.
Topics: Australia; Communication; Electronics; Family Practice; Humans; Privacy
PubMed: 35773159
DOI: 10.31128/AJGP-05-21-6008 -
Sensors (Basel, Switzerland) Sep 2022The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement... (Review)
Review
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
Topics: Blockchain; Computer Security; Delivery of Health Care; Humans; Internet of Things
PubMed: 36236531
DOI: 10.3390/s22197433 -
EPJ Data Science 2021Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the...
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be concealed in tabulated data. In disciplines like medicine and the social sciences, where collected data include sensitive information about study participants, the sharing and publication of individual-level records is controlled by data protection laws and ethico-legal norms. Thus, as data visualizations - such as graphs and plots - may be linked to other released information and used to identify study participants and their personal attributes, their creation is often prohibited by the terms of data use. These restrictions are enforced to reduce the risk of breaching data subject confidentiality, however they limit analysts from displaying useful descriptive plots for their research features and findings. Here we propose the use of anonymization techniques to generate privacy-preserving visualizations that retain the statistical properties of the underlying data while still adhering to strict data disclosure rules. We demonstrate the use of (i) the well-known -anonymization process which preserves privacy by reducing the granularity of the data using suppression and generalization, (ii) a novel deterministic approach that replaces individual-level observations with the centroids of each nearest neighbours, and (iii) a probabilistic procedure that perturbs individual attributes with the addition of random stochastic noise. We apply the proposed methods to generate privacy-preserving data visualizations for exploratory data analysis and inferential regression plot diagnostics, and we discuss their strengths and limitations.
PubMed: 33442528
DOI: 10.1140/epjds/s13688-020-00257-4 -
Sensors (Basel, Switzerland) Jan 2023Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging... (Review)
Review
Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging technologies such as universal machines, autonomous and self-driving robots, self-healing networks, cloud data analytics, etc., to supersede the limitations of Industry 4.0. To successfully pave the way for acceptance of these technologies, we must be bound and adhere to ethical and regulatory standards. Presently, with ethical standards still under development, and each region following a different set of standards and policies, the complexity of being compliant increases. Having vague and inconsistent ethical guidelines leaves potential gray areas leading to privacy, ethical, and data breaches that must be resolved. This paper examines the ethical dimensions and dilemmas associated with emerging technologies and provides potential methods to mitigate their legal/regulatory issues.
PubMed: 36772190
DOI: 10.3390/s23031151