Stoller, R. (1988). Patient's responses to their own case reports. J Amer Psychoanal Assn 36 : 371-392. Stolorow, R. & Atwood, G. (1997). Deconstructing the myth of the neutral analyst: An alternative from intersubjective systems theory. Psychoanal Q 66 : 431-449. Sundelson, D. Outing the victim : Breaches of confidentiality in an ethics procedure. In: Levin C, Furlong A, & O’Neil MK, editors. Confidentiality: Ethical Perspectives and Clinical Dilemmas , p. 183-198 . Hillsdale, N.J.: Analytic Press. Tanis, B. (2014). A escrita, o relato clínico y suas implicacoes éticas na cultura informatizada. Psicoanálise . 16 (1): 29-43. Thomas-Anttila, K. (2015). Confidentiality and Consent Issues in Psychotherapy Case Reports: The Wolf Man, Gloria and Jeremy. British Journal of Psychotherapy, 31 (3): 360-375. Tuckett, D. (2000). Commentary. Journal of the American Psychoanalytic Association, 48 : 403–411. Tuckett, D. (1993). Some thoughts on the presentation and discussion of the clinical material of psychoanalyis. Int J Psycho-Anal 74 : 1175-1188. Tuckett, D.A., Boulton, M., Olson, C., & Williams, A. J. (1985). Meetings between Experts: An Approach to Sharing Ideas in Medical Consultations . London: Routledge. Widlöcher, D. (2004). The third in mind. Psychoanal Q , 73: 197-213. Wajnbuch, S. (2013). Comentario sobre el artículo ‘Dilemas éticos en psicoanálisis’. Revista Uruguaya de Psicoanálisis . 116 : 143-148. Wilkinson, G. et al. ( 1995). Case reports and confidentiality. Brit. J. Psychiat. , 166 : 555558. Winnicott, D. W. (1977). The Piggle , ed. I. Ramzy. New York: Int. Univ. Press. Yao M & Brook, A. (2003). The moral framework of confidentiality and the electronic panopticon. . In: Confidential Relationships. Psychoanalytic, Ethical, and Legal Contexts , Amsterdam/New York: Editions Rodopi, pp 85-112. Further Reading for Section 4 Abelson, H. et al. (2015). Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications). MIT Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2015-026 (July 6, 2015). https://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf
56
Made with FlippingBook interactive PDF creator