An ethical assessment model for digital disease detection technologies

نویسنده

  • Kerstin Denecke
چکیده

Digital epidemiology, also referred to as digital disease detection (DDD), successfully provided methods and strategies for using information technology to support infectious disease monitoring and surveillance or understand attitudes and concerns about infectious diseases. However, Internet-based research and social media usage in epidemiology and healthcare pose new technical, functional and formal challenges. The focus of this paper is on the ethical issues to be considered when integrating digital epidemiology with existing practices. Taking existing ethical guidelines and the results from the EU project M-Eco and SORMAS as starting point, we develop an ethical assessment model aiming at providing support in identifying relevant ethical concerns in future DDD projects. The assessment model has four dimensions: user, application area, data source and methodology. The model supports in becoming aware, identifying and describing the ethical dimensions of DDD technology or use case and in identifying the ethical issues on the technology use from different perspectives. It can be applied in an interdisciplinary meeting to collect different viewpoints on a DDD system even before the implementation starts and aims at triggering discussions and finding solutions for risks that might not be acceptable even in the development phase. From the answers, ethical issues concerning confidence, privacy, data and patient security or justice may be judged and weighted.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Competencies Of Teachers In The Transformation Of The Educational Environment

The purpose of this study is to determine the main directions of development of digital competencies of teachers to ensure a quality educational process in the transformation of the educational environment. The relevance of this study is due to the need to determine the main directions of development of the education system for adaptation in the context of digitalization of society. It is estab...

متن کامل

Effect of digital elevation model’s resolution in producing flood hazard maps

Flooding is one of the most devastating natural disasters occurring annually in the Philippines. A call for a solution for this malady is very challenging as well as crucial to be addressed. Mapping flood hazard is an effective tool in determining the extent and depth of floods associated with hazard level in specified areas that need to be prioritized during flood occurrences. Precedent to the...

متن کامل

Designing, Fabricating, and Testing the Validity and Reliability of the Digital Headband for Cervical Proprioception Assessment: A Descriptive Study

Background and Objectives: Accuracy of proprioceptive input plays an important role in cervical motor control. Several methods have been used to evaluate the accuracy of proprioceptive input as a factor of cervical injury prevention or rehabilitation. The aim of this study was to introduce a new tool for evaluating the accuracy of cervical proprioception and determine its validity and reliabili...

متن کامل

A survey on Alzheimer’s disease detection using gait analysis

Introduction: Early detection of Alzheimer's disease (AD), as a neurodegenerative disease and the most common cause of dementia in the elderly people, using gait analysis have been particularly noted by researcher in recent years. Because this novel method is non-invasive, less cost, and feasible in non-clinical and laboratory environments. Therefore, in this Meta-Analysis review article, detec...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2017