You are on page 1of 6

Blurring the boundaries: technology

and the nurse-patient relationship


Marion Aylott

their providers until they met face-to-face. Now, patients


Abstract can use WBSN to background-check staff and vice versa.
Nurses, like the rest of the world’s population are increasingly Anonymity, privacy, and boundaries are at risk in cyberspace
participating in online social media. Nurses must be mindful to avoid (Behnke, 2008). This article will explore the issues raised
situations that could ultimately compromise past, present and future today by WBSNs that impact the nurse-patient relationship.
patient health and wellbeing, as well as their professional identities and The terms ‘nurse’ and ‘patient’ will be used and are intended
reputations and that of the nursing profession. Unprofessional uses to include midwives and those receiving care who may not
of social networking tools are common. This article aims to inform normally be referred to as patients.
nurses of the public accessibility to professionally inappropriate online
behaviour and activities. It asks nurses to carefully consider the risks Online social networking
posed by online social media with a focus on boundary crossing in an Although you might be quick to share moments from your
e-society. Forethought is required to ensure that private information private life on WBSNs, you might hesitate if you think
stays private and that the nature of the professional relationship about who is going to see this. You might share a post, a
between nurse and patient continues to be respected. link or a video with 50 friends. Each of those friends has the
Key words: Boundaries n Nurse n Patient n Relationship n Personal ability to share what you have posted with their 50 friends
n Professional n Internet n Social networking
and so on. In a matter of hours, over 100 000 people could
be reading it. This is called going viral (Graham and Moore,

T
2008). Scientists consider internet privacy (or the lack of
he internet has been touted as enabling unlimited it) one of today’s serious social issues (Beal and Strauss,
access to information, irrespective of an individual’s 2010), forcing consideration of the question: has it become
social situation and pervades many aspects of necessary to constantly be on guard?
life (Lyytinen and Yoo, 2002). People can now Problems can arise when nurses intentionally or
communicate and interact through web-based social unintentionally fail to maintain the professional boundaries
networks (WBSNs) to have different, interesting and (PB) that define the nurse-patient relationship (Doel et al,
worldwide experiences (Marriott, 2007). WBSN refers to 2010). WBSNs increase the means by which nurse-patient
various, loosely-connected types of applications that allow boundaries can be crossed. Like changing the sails of a ship
individuals to communicate with one another, and to track at sea changes the destination, blurring of PBs can change
discussions across the web as they happen (Tepper, 2003). the course of the nurse-patient relationship.
These applications include internet forums, blogs, wikis,
podcasts, picture-sharing, news-sharing, dating websites, Professional boundaries
weblogs, pictures and video. Three of the most popular In terms of professionalism, the maintenance of boundaries
WBSNs are Facebook®, MySpace®, Twitter® (Brockett, is important to maintaining order, rationality and
2007), all of which now store large volumes of data about predictability within nurse-patient relationship (Holder and
their users. Latest reports estimate that ‘Facebook and Schenthal, 2007). Boundaries are constantly being crossed
MySpace now carry details of around 12 million people in or renegotiated by a variety of procedures, people and
the UK alone’ (Nuttall and Gelles, 2010). technologies. Therefore, the boundary is a ‘live thing’. But
With increasing use of the WBSNs by patients and WBSNs give an appearance of separation, where in fact an
providers alike, it is not unexpected that their real-world ambiguous continuity exists (Chen and Nath, 2005). PBs
and online lives would someday intersect. Before the define the limits of accountability, reliability and efficiency
days of internet search engines, patients knew little about and protect the space between the professional’s power and
the patient’s vulnerability (Nancarrow and Borthwick, 2005)
and should always be based on the patient’s needs (Peterson,
1992). A nurse’s power comes from their professional
Marion Aylott is Senior Lecturer, Department of Nursing & Midwifery,
position and knowledge of private details about the
University of the West of England, Glenside Campus, Bristol
patient. Therefore, maintenance of PBs remains the nurse’s
Accepted for publication: June 2011
responsibility and is essential to delivering safe, ethical and
quality nursing care which is a fundamental element of the
therapeutic relationship (Sheets, 2001).

810 British Journal of Nursing, 2011, Vol 20, No 13


TECHNOLOGY

Research informs us that boundary violations occur Key:


in increments. They begin with thoughts or fantasy, and
then crossings (Greenwood, 2009; Guseh et al, 2009). Brief Rr VP = violation potential
VP = RF x Vu
boundary crossings can be intentional for therapeutic RF = risk factors
reasons, or inadvertent and thoughtless. Crossings generally A
Vu = vulnerabilities
produce no long-term effects but should be evaluated
for potential long-term consequences or implications for A = accoountability
the patient and nurse. Unchallenged, these crossings may R = resistance
become more frequent until a violation is committed c
which could potentially harm a patient (Sheets, 2001). C = catalyst
BV
Violations often result from confusion between the needs BV = boundary violation
of the nurse and those of the patient. A violation is usually
characterized by: Figure 1. Boundary Violation Formula
■■ Excessive disclosure
■■ Role reversal
Submitted by Anonymous (not verified) on 1 December 2010 - 10:18am.
■■ Secretive behaviour
Some people may be members of specific groups that have an online presence
■■ Super-nurse behaviour
(e.g. Cancer support, Mental health support, age-specific sites). These groups
■■ Singles-out patient for treatment/attention
typically expect that only members who join that group will have access to
■■ Selective communication information posted and shared amongst members of the group. These groups
■■ Flirtations might include Cancer support groups - aiming to support people with cancer and
■■ ‘You and me against the world’ behaviour recovering from illnesses, and encouraging people to share their experiences in
■■ Failure to protect the patient (Tariman, 2010). a safe, supportive environment. I am aware that students and staff have divulged
Everyone has the potential to violate a boundary. This information obtained from those sites to other students thereby breaching the
Violation Potential (VP) fluctuates over time, in response privacy of the individual.
to life events and can be represented by the formula in Figure 2. Post submitted to cancer self-help website on privacy and online materials
Figure 1. VPs are more likely to occur in situations where
the nurse’s vulnerabilities are high, such as in cases of application of common sense and careful consideration
unresolved childhood traumas and shame-based injuries, or of the potential for harm to self and others. Yet, ongoing
when external risk factors are high, such as work setting, media reports indicate that perhaps more specific guidance
patient type, and lack of experience. Risk factors and is required.
vulnerabilities multiply and magnify each other. At the
same time, the nurse’s resistance may be low. This might be The case for more guidance
exhibited as denial or refusal to see possible vulnerabilities The internet is a communication medium that has changed
or risk factors (Thomas et al, 2001), a kind of psycho-social perceptions of information sharing and interpersonal
‘blind spot’.The presence of a catalyst such as divorce, interactions (Lazer et al, 2009). WBSNs have radically
and/or a provocative patient may cause the VP to increase redefined the nature of personal privacy. Figure 2 is
quickly. Indeed, a catalyst may cause an ethical nurse to an anonymous comment posted on a cancer self-help
cross a boundary they would normally not cross. Personal website. This is not to say that health professionals should
accountability of the nurse to a supervisor or manager avoid using social media as their use can be personally
divides the risks, thereby reducing the VP. The higher a and professionally beneficial. Still, traditional expectations
nurse’s perception of accountability, the lower their VP regarding the conduct of health professions apply equally to
(McGuigan, 2007). this non-traditional context; student and health professionals
have a duty to patients and the community to maintain
Boundary protection professional standards at all times, including time spent
The Nursing and Midwifery Council (NMC) ‘Code’ online (Joinson, 2003). While there is a paucity of research
(2008) alludes to boundary issues stipulating that the nurse evidence in the literature about this, there is significant
must always act in the best interests of the patient and evidence available in public electronic and newspaper
not engage in behaviours that can harm the reputation of reports. These indicate that WBSNs have created a ‘virtual’
colleagues or the profession. However, with regards to PBs, space where professional boundary violations occur.
the Council only focuses specific attention on sexually
inappropriate behaviour (NMC, 2009a). While there are Assuring patient confidentiality
very few cases of inappropriate sexual relationships between Consider this scenario: a nurse makes a comment on a
nurses and patients or their family members, they happen WBSN site about an adverse outcome of one of their
nonetheless In the majority of cases, sexual misconduct patients. They are careful not to name the patient or
is not a one-time event but rather the culmination of a the hospital. However, they mentioned the name of the
long process which may even begin online (Council for hospital they are working at in a post the previous week.
Healthcare Regulatory Excellence (CHRE), 2008). Meanwhile, a relative of the patient searches the internet
Shutt (2009) asks why students are going to the NMC for the hospital’s name in order to find its contact phone
for guidance on WBSNs when all that is required is the number. In the search results, the patient’s relative is

British Journal of Nursing, 2011, Vol 20, No 13 811


presented with the nurse’s posting mentioning the hospital. the floor were all presented as evidence of negligence in
The relative then sees the subsequent posting regarding the the popular press about a hospital fighting a clostridium
adverse outcome involving their loved one. difficile outbreak (Cohen, 2009; Dolan, 2010). It is worth
Nurses and other health professionals have an ethical remembering that status and interest in online data changes
and legal responsibility to maintain their patients’ over time.
confidentiality (Montgomery, 2003). This still applies when
the communication is online. The anonymity potentially Online professionalism and the privacy illusion
afforded online is no excuse for unprofessional behaviour; Individuals believe actions online are private (Greysen et al,
the NMC advises avoiding misuse of the internet and social 2010). Disassociation or privacy paradox around perceived
networking sites (NMC, 2010). anonymity of the internet is problematic. There is an
Before putting patient information online, it is essential ongoing need for online professionalism, even when ‘off the
that due thought is given first to intention and rationale. clock’. Nurses need to be aware of a constant, professional
Secondly, express consent must be obtained and documented presence. They cannot afford to think that it does not
as such in any online posts. If it is thought appropriate matter what they do in their personal, online time. This is a
to discuss a patient case, for example, to further that dangerous disconnect.
patient’s care or the care of future patients, care must be Privacy is not just about hiding things but also self–
taken to ensure that the patient is properly de-identified. possession, autonomy, and integrity (Sheets, 2001). It is also
Anonymizing through use of a pseudonym is not always people’s right to control what details about their lives remain
enough. Case information may need to be changed or the unknown ‘outside’. WBSNs provide what are misconstrued
discussion delayed. The accessibility and index ability of to be ‘private spaces’. In reality. however, these are public or
online information means that although a single posting ‘nested utopic’ spaces (Bassett and O’Riordan, 2002). For
may be sufficiently de-identified in its own right, this may example, a lack of awareness led to the suspension of nurses;
be compromised by other postings online. In maintaining they shared photographs of patients undergoing surgery
confidentiality, it must be ensured that any patient or (Mackinnon, 2010; Pullin, 2010) and caused offence by
situation cannot be identified (NMC, 2010) by the sum of commenting on a WBSN that they had been ‘messing about
information available online. with dead bodies’ (Cooksey, 2010).
This illusion of privacy creates boundary problems. Nurse
Humour at work interpreted as ‘negligent’ fraternities probably do not expect ‘external others’ to use
Protection of harm online is perhaps more difficult to their pledging photographs as evidence to reprimand their
anticipate in advance, but is open to judgement in hindsight. behaviour. Unprofessional content and behaviour also led
The risks of self-disclosure might reveal themselves after the to the suspension of staff who were playing the ‘lying down
fact. Ucok (2006) identifies five types of self-disclosure; game’ where they are photographed lying prone, arms by
1. Deliberate their sides, in unusual places such as ward floors, gurneys
2. Non-deliberate and air ambulance helipads. In another instance, a nurse
3. Accidental was reprimanded after posting a picture of herself at work,
4. Inappropriate or counter clinical topless, and another (clothed this time) with an identifiable
5. Initiated by a patients’ deliberate actions patient in the background (Britten, 2008).
Consider this situation: a nurse posted a photograph. In WBSN exchanges between friends have now become a
it, he or she is asleep during a nightshift in a chair next way for trusts, universities and others to monitor behaviour
to a four-month old infant. This infant died 11 days later (Brown, 2008). Personal data about individuals are collected,
after accidentally being given a fatal dose of strong sodium processed, stored and retrieved without their knowledge or
chloride by the same nurse. Having experienced the risks of consent. This threatens their information security or right
self-disclosure online, this same nurse posted messages after to determine what information about themselves they want
the inquest about what had happened and asked friends for shared. In reality, much of the erosion of individual privacy
‘luck’ in the inquiry. The day after being allowed back to occurs with the consent of the individual as they have
work from suspension, the nurse posted: ‘Had a fantastic voluntarily posted information about themselves (Greysen et
day! goin 2 treat myself 2 bottle wine!’ (Balen, 2010; al, 2010). Such information is then available to ‘data miners’
Daily Mail, 2010). Humour can be hard to interpret when including future employers. According to a study conducted
conveyed in writing. And what you consider as a funny, by Paton (2007), 22% of 31  000 employers surveyed said
harmless anecdote or sarcastic comment may be understood they search WBSN to screen candidates despite lobbying
differently by others. This one event included four types of antagonists. One third of those said they found information
disclosure occurred with what appears to have been little that eliminated candidates from consideration. Figure 3
insight or experiential learning after the first, second and summarizes the top 10 areas of concern for potential
third error of judgment. employers (Ceridian Corporation, 2010).
‘Innocent’ photographs posted on a WBSN are open While students are notorious for antics during university,
to re-interpretation. For example, photographs of a nurse the use of WBSNs make it ‘viral’, publicizing material that can
flicking a V-sign over a patient during surgery, nurses negatively impact an individual’s educational, employment,
eating pizza in a hospital corridor, nurses’ naked bottoms financial and personal security. Although some of the
and a nurse posing while cleaning a pool of blood off incidents identified in online surveys, such as photographs

812 British Journal of Nursing, 2011, Vol 20, No 13


a less favourable light by others. Nurses must also consider
1. Information about alcohol or drug use (41%)
whether their online activities violate NMC regulations or
2. Inappropriate photos or information (40%)
hospital trust policies relating to online behaviour, as this
3. Poor communication skills (29%)
4. Bad-mouthing of former employers or fellow employees (28%) could form the basis for disciplinary action (NMC, 2009b).
5. Inaccurate qualifications (27%)
6. Unprofessional screen names (22%) Entering the grey zone
7. Notes showing links to criminal behavior (21%) Casual privacy settings have caused nurses to overlook
8. Confidential information about past employers (19%) signs that they are crossing PBs. This has been identified
9. Prejudiced language, links, activities (15%) as a particular risk in home healthcare and long-term care
10. Negative statements regarding the profession (12%) settings. For example, in cancer care it might be common
practice to receive emails from patients or their families
Figure 3. Top 10 areas of concern employers found on social networking sites during their regular work hours (Avery and Baker, 2002).
When this leads to out-of-hours email correspondence, it
depicting intoxication and sexually suggestive material, could arguably interfere with the patient/family’s ability to
appear to be clear-cut lapses in professionalism, others fall develop independence. Equally, in intervention-related chat
into more ambiguous categories (Berry, 2007; Greenwood, rooms such as smoking cessation programmes, caution is
2009). Such behaviour may serve important coping and required, as the parameters of such health settings are blurred
stress-release functions but once disseminated, carries the (Bean and Eisenberg, 2006). The limits of the therapeutic
potential for significant public impact (Coutu, 2007). nurse-patient relationship in such settings must be openly
Hempel and Lehman (2005) suggest that new graduates negotiated and agreed upon (Wilson and Greenhill, 2004).
who have grown up online often do not differentiate Often, boundary crossings start with good intentions.
between personal and professional. This can lead to them Accepting e-friendship with a former patient or from their
unwittingly jeopardizing their careers. Instruction on how grateful family members might not seem like a big deal. But
to elect privacy settings can result in an 80% decrease in what if this sets a precedent? Online boundary crossings
publicly accessible accounts (Foster, 2007). can be a slippery slope. Accepting that first invite could
make it easier to accept invites in the future. The idea that
Free speech and the right to privacy (or lack because nothing went wrong, everything is all right is both
thereof) on the internet seductive and dangerous. Individuals flirt with the boundaries
Offensive comments and jokes, sharing information about of danger all the time; it is one way of discovering where
unprofessional activities involving alcohol or drugs, and boundaries are (Wright, 2006). But repeated exposure to
joining or creating groups that might be considered potential hazards without obvious adverse consequences
derogatory or prejudiced can cause problems. Although leads to a numbing of the sense that a boundary has been
online groups or web-rings may seem innocuous, others crossed, called ‘normalization of deviance’ (Reamer, 2001).
may not always treat these groups with the same humour. Repeated trespasses without visible consequences lead people
Patients’ searches for information about their health to embrace substandard practices as normal and boundary
professionals and vice versa may vary from normal curiosity crossing as acceptable. Thus, individuals come to behave in
or due diligence to a thorough or even intrusive search. ways that are more risky than they realize or would desire
They may pay for online services to gather information; (Browne and Russell, 2005). Accidents in such a climate are
this is known as ‘cyber-stalking’ (Zur, 2010). Patients can not aberrant events but rather, the normal outcomes of an
also access WBSN sites in order to strike up inappropriate individual’s learnt behaviour.
relationships. This threatens the nurse-patient relationship The internet blurs professional boundaries and technology
and confidentiality is breached (Behnke, 2008). It is raises different ways in which boundary violations can occur:
important to explain to patients that WBSNs are not ■■ Difficulty in applying nursing professionalism to WBSNs
an appropriate channel for the therapeutic relationship. ■■ WBSNs give the illusion of anonymity, encouraging many
Additionally, it is inappropriate to post patients’ or colleagues’ to do or say things they would never do in person
names, images, or any other identifying details on blogs or ■■ An online slip can be far reaching, magnified or distorted
personal webpages without first obtaining permission. as it gets forwarded and commented on.
Always respect privacy and safeguard confidential and Modern digital technologies have raised many complex
proprietary information (NMC, 2009b). clinical, ethical and legal issues. One of the more potent
Many individuals are unaware of how easily accessible questions is whether it is acceptable for nurses to Google
and durable their online information is despite the most their clients and if so, should they seek consent? Are we
stringent privacy settings. Deleting information is not sure- violating patient trust if we start searching for them online?
fire protection. It is almost certainly still stored somewhere
in cyberspace, and theoretically permanently accessible Recommendations: be an online-savvy
(Thomas et al, 2001). Nurses must consciously manage their practitioner
online images by avoiding putting anything online that they Adopt a proactive approach to controlling information
do not want certain people to see. WBSN actions leave a online. Establish clear professional boundaries about who
digital footprint that can have a negative impact; online you connect with, and be judicious in disclosing personal
behaviour passed off by some as ‘exuberance’ may be seen in details. Be aware of privacy settings. Many sites offer control

814 British Journal of Nursing, 2011, Vol 20, No 13


TECHNOLOGY

geotrac/iStockphoto.com
Web-based social networks (WBSNs) offer resources to nurses but have also introduced hazards to nursing professionalism

to members regarding how much information they make If unsure, check with a colleague or supervisor. Managers
available to the public. Be discriminative and restrict your have a role to play in encouraging an environment where
privacy settings, but do not rely on that alone. Privacy setting these issues are discussed openly and nurses are supported
options can be changed by site owners without your prior and helped by colleagues rather than criticized. Discussing
knowledge (Facebook, 2010). In this case, aspects of your boundary issues can be part of an orientation programme in
profile you have restricted may suddenly be available for all professional development or the topic of clinical supervision
to see. or in-service education. Nurses can use these avenues to
Some online information is not under your control. explore their relationships with patients and if a problem is
Friends can ‘tag’ pictures of someone on Facebook and suspected, the manager can intervene immediately.
although options to ‘untag’ do exist, sometimes there is a time The professionalism curriculum in pre-registration
lapse between the posting of a picture and the ‘un-tagging’ education should include a digital media component,
of the photo by the individual. Thus, it is impossible to say with instruction on managing the ‘digital footprint.’ There
how many people have already viewed the picture. This year are no overarching guidelines for nurses that define (un)
I cycled in a charity race and a friend took a picture of me professional online behaviour. However, in the wake of
crossing the finish line for the website of my local cycling the above media articles, many trusts and universities are
club. When students and patients Google me, they not only drafting policies. Nevertheless, defining appropriate WBSN
get my professional credentials, but also a photograph of a conduct will be challenging regardless of policy guidance.
dishevelled me in sweaty cycling shorts.This is not necessarily Trusts and universities are in the position to exemplify
a bad thing. Still, it highlights the blurred line between online professionalism by using consensus-oriented dialogue
professional and private spheres and raises important ethical involving staff, students, patients, and educators to develop
dilemmas for the nursing professional that have no clear-cut standards for social media that reflect the positive values of
solutions. the nursing profession.
As we tread through the web, we must be aware that Finally, be your own ‘data miner’; periodically search
we leave a visible footprint and that our actions reflect the yourself, as others’ postings can also reflect poorly on you.
nursing profession at large. Before you publish anything Enter your name into a search engine and see what surfaces.
to a WBSN site, take a moment to reflect. Review your Remove unprofessional posts and monitor your profile
submission using this simple PCA test: going forward. Check the photographs in which you are
Pause and process (recognize potential for boundary crossings) ‘tagged’. Ensure they are appropriate, un-tag yourself from
Choices (evaluate the situation and options) any embarrassing or unprofessional photographs or even skip
Act accountably (professional conduct) tagging photographs altogether. Be vigilant about checking

British Journal of Nursing, 2011, Vol 20, No 13 815


others’ posts for offensive or otherwise inappropriate elements nursing team at C.diff scandal hospital. http://tinyurl.com/3n7vs9s
and choose your ‘friends’ carefully. (accessed 28 June 2011)
Cooksey K (2010) Outrage at ‘dead people’ comment. http://tinyurl.
Use your WBSN proactively, and remember: com/3b95qgr (accessed 28 June 2011)
1. You have no control over what is forwarded by others Coutu D (2007) ‘We Googled You’. Harvard Business Review 85(6): 37–47
Daily Mail (2010) Nurse who gave baby lethal dose of salt caught FAST
2. What is on the web can live forever. ASLEEP in damning picture taken beside tragic tot’s cot 11 days before
her fatal error. Daily Mail (online), 27 Dec 2010
Doel M, Allmark P, Conway P et al (2010) Professional Boundaries: Crossing
Conclusion a Line or Entering the Shadows? British Journal of Social Work 40(6):
WBSN sites have brought new hazards to nursing 1866–89
Dolan A (2010) Captured on Facebook, the food-fighting nurses at hospital
professionalism. PBs must be a priority. When nurses are where 1,200 died. http://tinyurl.com/26vubfy (accessed 28 June 2011)
clear about their roles, their judgment is less likely to become Facebook’s Privacy Policy (2010). http://tinyurl.com/zx6ny (accessed 28
June 2011)
clouded. This will allow them to deliver the best care and Foster P (2007) Caught on camera – and found on Facebook. http://tinyurl.
make objective clinical decisions. com/5th48hh (accessed 28 June 2011)
Graham N, Moore P (2008) The Dangers of Facebook. Stud BMJ 8(10):354-
While WBSNs are formally public, there is a need to 355
respect conventions of privacy. Be especially sensitive to Greenwood B (2009) Facebook: The Next Great Vetting Tool? http://
tinyurl.com/5sqsgpy (accessed 28 June 2011)
context as this generates a unique set of ethical issues that Greysen SR, Kind T, Chretien KC (2010) Online Professionalism and the
make it more difficult to gauge what is appropriate. Privacy Mirror of Social Media. J Gen Intern Med 25(11): 1227–9
Guseh JS 2nd, Brendel RW, Brendel DH (2009). Medical professionalism in
online is closely related to how the internet is governed the age of online social networking. J Med Ethics 35(9): 584–6
and there are challenges in devising a code of practice in Hempel J, Lehman P (2005) The MySpace generation. http://tinyurl.
com/7kewc (accessed 28 June 2011)
a global context. Data can be reconceptualized in new Holder KV, Schenthal SJ (2007) Watch your step: nursing and professional
settings by others. Our perceptions and regulations regarding boundaries. Nurs Manage 38(2): 24–30
Joinson AN (2003) Understanding the Psychology of Internet Behaviour: Virtual
professional behaviour must continually evolve to encompass Worlds, Real Lives. Palgrave Macmillan, Basingstoke
these new and changing forms of media. BJN Lazer D, Pentland A, Adamic L et al (2009) Life in the network: the coming
age. Science 323(5915): 721-23
of computational social science, Lyytinen K, Yoo Y (2002) Research
Conflict of Interest: None commentary: The next wave of nomadic
computing. Information Systems Research 13(4): 377–88
Avery GC, Baker E (2002) Reframing the infomated household-workplace. Marriot C (2007) The Tangled Web We Weave. People Management 13(15): 25
Information and Organization 12(2): 109–34 Nancarrow SA, Borthwick AM (2005) Dynamic professional boundaries in
Balen P (2010) Baby dies after massive overdose. http://tinyurl.com/6cbu9gd the healthcare workforce. Sociol Health Illn 27(7): 897–919
(accessed 29 June 2011) Mackinnon L (2010) Exclusive: Nurse suspended for putting photographs
Bassett EH & O’Riordan K (2002) Ethics of Internet Research: Contesting of patients taken during operations on Facebook. http://tinyurl.com/
the Human Subjects Research Model. Ethics and Information Technology yd6r6bu (accessed 28 June 2011)
4(3): 233-247 McGuigan A (2007) The Social Worker as Shopper: Applying a Model for
Beal A, Strauss J (2010) Radically Transparent: Monitoring and Managing Ethical Decision Making to a Dilemma in Resource Mgmt. http://
Reputations Online. Wiley Pub, New York tinyurl.com/42gvv3a (accessed 28 June 2011)
Bean CJ, Eisenberg EM (2006) Employee sensemaking in the transition to Montgomery J (2003) Health Care Law 2nd edn. Oxford University Press,
nomadic work. Journal of Organizational Change Management 19(2): 210–22 Oxford
Behnke S (2008) Ethics in the age of the internet. Monitor on Psychology Nursing and Midwifery Council (2008) The code: Standards of conduct,
39(7): 74–7 performance and ethics for nurses and midwives. http://tinyurl.
Berry M (2007) Employers use ‘internet reputations’ to make decisions com/28lwadt (accessed 28 June 2011)
about job applicants. http://tinyurl.com/677rtc9 (accessed 28 June 2011) Nursing and Midwifery Council (2009a) Guidance on professional conduct
Britten N (2008) Facebook ban for nurses after online flashing. http:// For nursing and midwifery students. http://tinyurl.com/38qm5c2
tinyurl.com/3u836tz (accessed 28 June 2011) (accessed 28 June 2011)
Brockett J (2007) Face to face with social networking. People Management Nursing and Midwifery Council (2009b) Clear sexual boundaries. http://
7: 15–7 tinyurl.com/5wf3s59 (accessed 28 June 2011)
Brown L (2008) Student faces Facebook consequences. http://tinyurl. Nursing and Midwifery Council (2010) Guidance on professional conduct
com/3kud6ur (accessed 28 June 2011) For nursing and midwifery students. http://tinyurl.com/6fe8bpd (accessed
Browne J, Russell S (2005) My home, your workplace: People with physical 28 June 2011)
disability negotiate their sexual health without crossing professional Nuttal C, Gelles D (2010) Facebook Becomes a Bigger Hit than Google.
boundaries. Disability & Society 20(4): 375–88 http://tinyurl.com/6gkfomq (accessed 29 June 2011)
Ceridian Corporation (2010) Social Networking and recruitment http:// Paton N (2007) Cyber-vetting managers face backlash. http://tinyurl.
tinyurl.com/yelkkql (accessed 28 June 2011) com/5vsugjw (accessed 29 June 2011)
Chen LD, Nath R (2005) Nomadic culture: Cultural support for working Peterson M (1992) At Personal Risk: Boundary Violations in Professional-Client
anytime anywhere. Information Systems Management 22(4): 56–64 Relationships. WW Norton & Company, New York
Council for Healthcare Regulatory Excellence (2008) Clear sexual Pullin A (2010) Nurse suspended for sharing patient’s surgery pics on
boundaries between health professionals and patients. http://tinyurl. Facebook. http://tinyurl.com/42gttd4 (accessed 28 June 2011)
com/64gln3o (accessed 29 June 2011) Reamer FG (2001) Tangled Relationships: Managing Boundary Issues in the
Cohen T (2009) Innocent or Negligent? Pictured on Facebook, the dedicated Human Services. Columbia University Press, New York
Sheets V (2001) Professional boundaries: staying in the lines. Dimens Crit Care
Nurs 20(5): 36–40
Shutt C (2009) The answer is to use your common sense: Caroline Shutt asks
Key points why students are going to the NMC for guidance on social networking
sites. Nurs Stand 23(35): 28
n The nursing profession requires that you wear the mantel of Tariman JD (2010) Where to draw the line Professional boundaries in Social
Networking. http://tinyurl.com/68yt4a7 (accessed 29 June 2011)
professionalism at all times - your online presence is no exception Tepper M (2003) The rise of social software. netWorker 7(3): 18–23
Thomas JC, Kellogg WA, Erickson T (2001) The knowledge management
n Anything you post online is public and visible to anyone puzzle: human and social factors in knowledge management. IBM Systems
Journal 40(4): 863-84
n Protect the rights of others - do not publish patient information Ucok O (2006) Transparency, communication and mindfulness. Journal of
Management Development 25(10): 1024–8.
n Be mindful of your audience and communicate with sensitivity Wilson M, Greenhill A (2004) Gender and teleworking identities in the
risk society: a research agenda. New Technology, Work & Employment 19(3):
n Do not add patients as ‘friends’ on social networking sites 207–21
Wright LD (2006) Violating professional boundaries. Nursing 36(3): 52–4
Zur O (2010) The Google Factor: Psychotherapists’ Intentional and
n Stop, think, and if necessary consult before posting online Unwitting Self-Disclosure on the Net. http://tinyurl.com/ckxgkq
(accessed 28 June 2011)

816 British Journal of Nursing, 2011, Vol 20, No 13

You might also like