218
Views
11
CrossRef citations to date
0
Altmetric
Original Articles

Managed care and the paradox of patient confidentiality: A case study analysis from a communication boundary management perspective

&
Pages 337-357 | Published online: 22 May 2009

References

  • Allen , A. 1998 . Exposed: Computer technology, managed health care and genetic science are all undermining the American tradition of medical privacy, in the name of progress. What can‐or should‐we do about it? . Washington Post , February 8 : W10
  • Allen , K. 1998 . Maintaining patient confidentiality in today's health care environment . Imprint , 45 (3) : 37 – 39 .
  • Allman , J. 1998 . Bearing the burden or baring the soul: Physicians’ self‐disclosure and boundary management regarding medical mistakes . Health Communication , 10 : 175 – 197 .
  • American Medical Association . 1999 . Principles of managed care , (4th ed.) , Chicago : Author .
  • Anderson , J. G. 1999 . The business of cyberhealth . MD Computing , 16 (6) : 23 – 25 .
  • Anderson , J. G. and Brann , M. 2000 . Security of medical information: The threat from within . MD Computing , 17 (2) : 15 – 17 .
  • Annas , G. J. 1992 . The rights of hospital patients: The basic ACLU guide to patient rights , Totowa, NJ : Humana Press .
  • Arneson , P. A. and Query , J. L. 2001 . “ The case study: Revitalizing a nonprofit health organization ” . In Qualitative research: Applications in organizational life , 2nd ed. , Edited by: Herdon , S. L. and Kreps , G. L. 151 – 169 . Cresskill, NJ : Hampton Press .
  • 1999 . Association cites confidentiality problems under managed care . Alcoholism & Drug Abuse Weekly , 11 (35) : 2 – 3 .
  • Bodenheimer , T. , Lo , B. and Casalino , L. 1999 . Primary care physicians should be coordinators, not gatekeepers . Journal of the American Medical Association , 281 : 2045 – 2049 .
  • Bollas , C. and Sundelson , D. 1995 . The new informants: The betrayal of confidentiality in psychotherapy and psychoanalysis , Northvale, NJ : Jason Aronson .
  • Bowling , J. 1997 . CSA calls for the general assembly to rewrite confidentiality statute: 1990 measure intended to bolster patient privacy instead grants broad access for doctors who face a legal claim . Daily Record , May 8 : 11
  • Brann , M. and Mattson , M. in press . Toward a typology of confidentiality breaches in health care communication: An ethic of care analysis of provider practices and patient perceptions . Health Communication ,
  • Cline , R. J. and McKenzie , N. J. 2000 . “ Dilemmas in disclosure in the age of HIV/AIDS: Balancing privacy and protection in the health care context ” . In Balancing the secrets of private disclosures , Edited by: Petronio , S. 71 – 82 . Mahwah, NJ : Lawrence Erlbaum .
  • Cummings , N. B. 1993 . Patient confidentiality . Second Opinion , 19 : 112 – 115 .
  • Davidson , J. R. and Davidson , T. 1996 . Confidentiality and managed care: Ethical and legal concerns . Health & Social Work , 21 : 208 – 215 .
  • Deetz , S. A. 1990 . “ Forward ” . In Case studies in organizational communication , Edited by: Sypher , B. D. viii – x . New York : Guilford .
  • Dejevsky , M. 1999 . Senator reveals all to prove his sanity . The London Independent , December 6 : 13
  • Dodek , D. Y. and Dodek , A. 1997 . From Hippocrates to facsimile: Protecting patient confidentiality is more difficult than ever before . Canadian Medical Association Journal , 156 : 847 – 852 .
  • Edwards , H. B. 1995 . Managed care and confidentiality . Behavioral Health Management , 15 : 25 – 27 .
  • Everstine , L. , Everstine , D. S. , Heymann , G. M. , True , R. H. , Frey , D. H. , Johnson , H. G. and Seiden , R. H. 1980 . Privacy and confidentiality in psychotherapy . American Psychologist , 35 : 828 – 840 .
  • Ferraro , S. 2000 . Bradley has slight risk of stroke . New York Daily News , February 23 : 36
  • Goldman , J. 1998 . Protecting privacy to improve health care . Health Affairs , 17 (6) : 47 – 60 .
  • Gostin , L. 1997 . Health care information and the protection of personal privacy: Ethical and legal considerations . Annals of Internal Medicine , 127 (8) : 683 – 690 .
  • Greene , K. 2000 . “ Disclosure of chronic illness varies by topic and target: The role of stigma and boundaries in willingness to disclose ” . In Balancing the secrets of private disclosures , Edited by: Petronio , S. 123 – 136 . Mahwah, NJ : Lawrence Erlbaum .
  • Grumbach , K. , Selby , J. V. , Damberg , C. , Bindman , A. B. , Quesenberry , C. , Truman , A. and Uratsu , C. 1999 . Resolving the gatekeeper conundrum: What patients value in primary care and referrals to specialists . Journal of the American Medical Association , 282 : 261 – 266 .
  • Hickey , M. E. 1995 . From managing access to managing care: The impact of primary care on health care delivery organizations . Physician Executive , 21 (10) : 7 – 9 .
  • Hodge , J. G. Jr. , Gostin , L. O. and Jacobsen , P. D. 1999 . Legal issues concerning electronic health information . Journal of the American Medical Association , 282 : 1466 – 1471 .
  • Inlander , C. 1999 . Marketplace morning report , (Cassette Recording No. MPM90819) Los Angeles, CA : National Public Radio .
  • Integrated Health Care Association . September 19 2000 . Managed health care‐A brief glossary September 19 , [On‐line]. Available: www.iha.org/gloss.htm
  • Kreps , G. L. 1990 . Organizational communication: Theory and practice , (2nd ed.) , New York : Longman .
  • Lazoritz , M. 1994 . Guarding patient confidentiality in a managed care setting . Behavioral Health Management , 14 : 46
  • Mier , D. 1982 . From concepts to practices: Student case study work in organizational communication . Communication Education , 31 : 151 – 154 .
  • Munson , C. E. 1996 . Autonomy and managed care in clinical social work practice . Smith College Studies in Social Work , 66 : 241 – 260 .
  • Parrott , R. , Duncan , V. and Duggan , A. 2000 . “ Promoting patients’ full and honest disclosure during conversations with health caregivers ” . In Balancing the secrets of private disclosures , Edited by: Petronio , S. 137 – 147 . Mahwah, NJ : Lawrence Erlbaum .
  • Patton , M. Q. 1990 . Qualitative evaluation and research methods , (2nd ed.) , Newbury Park, CA : Sage .
  • Pendrak , R. F. and Ericson , R. P. 1998 . Information technologies need to protect patient confidentiality . Healthcare Financial Management , 52 (10) : 66 – 68 .
  • Petronio , S. 1991 . Communication boundary management: A theoretical model of managing disclosure of private information between marital couples . Communication Theory , 1 : 311 – 335 .
  • Petronio , S. 2000 . “ The boundaries of privacy: Praxis of everyday life ” . In Balancing the secrets of private disclosures , Edited by: Petronio , S. 37 – 50 . Mahwah, NJ : Lawrence Erlbaum .
  • Petronio , S. , Ellemers , N. , Giles , H. and Gallois , C. 1998 . (Mis)communicating across boundaries: Interpersonal and intergroup considerations . Communication Research , 25 : 571 – 595 .
  • Petronio , S. , Reeder , H. M. , Hecht , M. L. and Mon't Ros‐Mendoza , T. 1996 . Disclosure of sexual abuse by children and adolescents . Journal of Applied Communication Research , 24 : 181 – 199 .
  • Rock , B. and Congress , E. 1999 . The new confidentiality for the 21st century in a managed care environment . Social Work , 44 : 253 – 262 .
  • Rosenfeld , L. B. 2000 . “ Overview of the ways privacy, secrecy, and disclosure are balanced in today's society ” . In Balancing the secrets of privacy disclosures , Edited by: Petronio , S. 3 – 18 . Mahwah, NJ : Lawrence Erlbaum .
  • Serovich , J. M. and Greene , K. 1993 . Perceptions of family boundaries: The case of disclosure of HIV testing information . Family Relations , 42 : 193 – 197 .
  • Serovich , J. M. , Greene , K. and Parrott , R. 1992 . Boundaries and AIDS testing: Privacy and the family system . Family Relations , 41 : 104 – 109 .
  • Serovich , J. M. , Kimberly , J. A. and Greene , K. 1998 . Perceived family member reaction to women's disclosure of HIV‐positive information . Family Relations , 47 : 15 – 22 .
  • Shalala , D. 1998 . Healthcare information and privacy . Health Matrix: Journal of Law and Medicine , 8 : 223 – 232 .
  • Stake , R. E. 2000 . “ Case studies ” . In Handbook of qualitative research , 2nd ed. , Edited by: Denzin , N. K. and Lincoln , Y. S. 435 – 454 . Thousand Oaks, CA : Sage .
  • Sutherland , P. K. and Yarbough , G. 1996 . High‐tech gossip: Physician‐patient confidentiality and computerized managed care . Trial , 32 : 58 – 63 .
  • University of California . 1999 . Managed care glossary of terms , (2nd ed.) , San Francisco : Author .
  • Valentine , P. W. 1995 . Medicaid bribery is alleged; workers for HMOs and Md. implicated . The Washington Post , June 14 : B01
  • Warner v. Lerner. (1997). 1368 Md. (Md. Ct. Sp. App.).
  • Warner v. Lemer. (1998). 69 Md. (Md. Ct. App.).
  • Weingarten , J. 1992 . Can confidential patient information be kept private in high‐tech medicine? . MD Computing , 9 (2) : 79 – 82 .
  • Wilson , L. L. , Roloff , M. E. and Carey , C. M. 1998 . Boundary rules: Factors that inhibit expressing concerns about another's romantic relationship . Communication Research , 25 : 618 – 640 .
  • Wynia , M. K. , Cummins , D. S. , VanGeest , J. B. and Wilson , I. B. 2000 . Physician manipulation of reimbursement rules for patients . Journal of the American Medical Association , 283 : 1858 – 1865 .
  • Yeo , M. 1991 . Concepts and cases in nursing ethics , Lewiston, NY : Broadview .
  • Yep , G. A. 2000 . “ Disclosure of HIV infection in interpersonal relationships: A communication boundary management approach ” . In Balancing the secrets of private disclosures , Edited by: Petronio , S. 83 – 96 . Mahwah, NJ : Lawrence Erlbaum .
  • Yin , R. K. 1993 . Applications of case study research , Newbury Park, CA : Sage .
  • Yin , R. K. 1994 . Case study research: Design and methods , Thousand Oaks, CA : Sage .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.