Patients, Pacemakers, and Implantable Defibrillators: Human Values - - PowerPoint PPT Presentation

patients pacemakers and
SMART_READER_LITE
LIVE PREVIEW

Patients, Pacemakers, and Implantable Defibrillators: Human Values - - PowerPoint PPT Presentation

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices Tamara Denning 1 , Alan Borning 1 , Batya Friedman 1 , Brian Gill 2 , Tadayoshi Kohno 1 , William H. Maisel 3 Implantable


slide-1
SLIDE 1

Patients, Pacemakers, and Implantable Defibrillators:

Human Values and Security for Wireless Implantable Medical Devices

Tamara Denning1, Alan Borning1, Batya Friedman1, Brian Gill2, Tadayoshi Kohno1, William H. Maisel3

slide-2
SLIDE 2

Implantable Medical Devices

2

Over 25 million US citizens depend upon them for life critical functions (2001) Pacemakers, ICDs, Neurostimulators, Drug Pumps Wireless

slide-3
SLIDE 3

Unique Characteristics

3

Physicality External Device External Environment Embodied Opt-Out Yes – Turn it off Yes – Leave the environment No – Implanted in the body Usage At will When present Always – Even when unconscious

slide-4
SLIDE 4

Unique Characteristics

4

Physicality External Device External Environment Embodied Opt-Out Yes – Turn it off Yes – Leave the environment No – Implanted in the body Usage At will When present Always – Even when unconscious

slide-5
SLIDE 5

Unique Characteristics

5

Physicality External Device External Environment Embodied Opt-Out Yes – Turn it off Yes – Leave the environment No – Implanted in the body Usage At will When present Always – Even when unconscious

slide-6
SLIDE 6

Unique Characteristics

6

Physicality External Device External Environment Embodied Opt-Out Yes – Turn it off Yes – Leave the environment No – Implanted in the body Usage At will When present Always – Even when unconscious

slide-7
SLIDE 7

Access Control: System Goals

Authorized Clinical Access Emergency Access Security

7

slide-8
SLIDE 8

8

Is security necessary?

slide-9
SLIDE 9

Unauthorized Wireless Changes: Can Someone Do It?

(Halperin et al. [2008])

  • Obtain serial number,

patient name, diagnosis

  • Turn off therapies
  • Induce cardiac fibrillation

9

Unauthorized wireless communications using custom hardware at short range (centimeters):

(Risk to patients today is low)

slide-10
SLIDE 10

Unauthorized Wireless Changes: Would Someone Do It?

10

March 28, 2008

Hackers Assault Epilepsy Patients via Computer

“RyAnne Fultz, 33, says she suffered her worst epileptic attack in a year when she clicked on the wrong post at a forum run by the nonprofit Epilepsy Foundation.”

January 11, 2008

Polish teen derails tram after hacking train network: Turns city network into Hornby set

“He treated it like any other schoolboy might a giant train set, but it was lucky nobody was killed. Four trams were derailed, and others had to make emergency stops that left passengers hurt.”

slide-11
SLIDE 11

11

Technical Approaches

(Cherukuri et al. [2003], Denning et al. [2008], Gupta et al. [2006], Rasmussen et al. [2009], Schechter [2010])

  • Passwords
  • Physical Tokens (e.g., key card)
  • Fail-Open
  • Proximity-Based Authentication
  • Physiological Keying
  • Criticality-Aware
slide-12
SLIDE 12

How do we decide?

12

slide-13
SLIDE 13

The Human Factor

Real people in their daily lives

13

http://www.flickr.com/photos/dharmasphere/ http://www.flickr.com/photos/walkingthedeepfield/

slide-14
SLIDE 14

Value Sensitive Design

(Friedman et al. [2006], Miller et al. [2007])

Methodology to incorporate human values into design

14

Methodologies

Value Dams and Flows

Values

Sustainability Affordability Equality Aesthetics Autonomy Solitude

slide-15
SLIDE 15

13 interviews with pacemaker and ICD patients (+3 pilot interviews)

  • 8 male, 5 female
  • Age 67.9
  • 9 pacemakers, 4 ICDs
  • ~2nd device
  • 7.8 years with IMD

15

Semi-structured Interview

  • Would you say that you like any of

these systems?

  • Would you say that you dislike any of

these systems?

  • If you were given a choice of systems,

which system or system would you choose?

  • Value questions (e.g., privacy,

autonomy, safety, security, health)

QUESTIONS DEMOGRAPHICS

slide-16
SLIDE 16

16

System Mockups

Security Approach Mockup System Password & Body Modification Patient Behavior Change Patient- Passive

slide-17
SLIDE 17

Passwords + Body Modifications: Medical Alert Bracelet

17

Medical alert bracelet with engraved password – using password gives access to IMD

slide-18
SLIDE 18

18

Passwords + Body Modifications: Tattoo

Tattoo with password as scannable 2D barcode – scanning barcode gives access to IMD

slide-19
SLIDE 19

19

Passwords + Body Modifications: UV-Visible Tattoo

Tattoo with password as scannable 2D barcode, tattooed with ink that is only visible under a UV light – scanning barcode password gives access to IMD

(Schechter [2010])

slide-20
SLIDE 20

20

Passwords + Body Modifications: UV-Visible Tattoo

Tattoo with password as scannable 2D barcode, tattooed with ink that is only visible under a UV light – scanning barcode password gives access to IMD

(Schechter [2010])

slide-21
SLIDE 21

Regular Emergency and Warning Patient-Specified Functionality

Wristband acts as access control – remove wristband for emergency access

21

Patient Behavior Change: Wristbands

(Denning et al. [2008])

slide-22
SLIDE 22

22

Passive with Respect to the Patient: Criticality-Aware IMD

IMD auto-detects emergency situations (GPS location; patient position, e.g. prone; pulse rate) and allows access in emergencies

(Gupta et al. [2006])

slide-23
SLIDE 23

23

Passive with Respect to the Patient: Proximity-Based Authentication

Equipment carried by medical personnel (in ambulances and emergency rooms) is placed on patient to gain access

(Cherukuri et al. [2003], Rasmussen et al. [2009])

slide-24
SLIDE 24

24

Values that Were Important to Patients

 Security  Safety  Privacy  Aesthetics  Psychological Welfare  Convenience  Cultural and Historical Associations  Self-Image and Public Persona  Autonomy and Notification

slide-25
SLIDE 25

25

Values that Were Important to Patients

 Security  Safety  Privacy  Aesthetics  Psychological Welfare  Convenience  Cultural and Historical Associations  Self-Image and Public Persona  Autonomy and Notification

“I don’t like the idea

  • f wearing the

wristband...I already have a defibrillator. Why do I have to wear something on my hand...to show that I have-, that I have a defibrillator, that there’s something wrong with me. No.”

slide-26
SLIDE 26

26

Values that Were Important to Patients

 Security  Safety  Privacy  Aesthetics  Psychological Welfare  Convenience  Cultural and Historical Associations  Self-Image and Public Persona  Autonomy and Notification

“It would make me feel like an invalid...That I had this thing, like the Scarlet Letter or [laughs].”

slide-27
SLIDE 27

27

Values that Were Important to Patients

 Security  Safety  Privacy  Aesthetics  Psychological Welfare  Convenience  Cultural and Historical Associations  Self-Image and Public Persona  Autonomy and Notification

“Well, I mean for-, because I’m Jewish it-, I’m not-, a tattoo

  • n the arm to me

means a concentration camp. So right away that’s the immediate horror.”

slide-28
SLIDE 28

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

28

Mockup Evaluation: Results

slide-29
SLIDE 29

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

29

Mockup Evaluation: Results

slide-30
SLIDE 30

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

30

Mockup Evaluation: Results

slide-31
SLIDE 31

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

31

Mockup Evaluation: Results

slide-32
SLIDE 32

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

32

Mockup Evaluation: Results

slide-33
SLIDE 33

Security Approach Mockup System Liked (n=11) Disliked (n=11) Would choose (n=11) Password & Body Modification Medical Alert Bracelet

0% 27% 0%

Visible Tattoo

9% 55% 9%

UV-Visible Tattoo

18% 27% 18%

Patient Behavior Change Regular

0% 36% 0%

Emergency and Warning

45% 27% 27%

Patient-Selected Functionality

0% 36% 9%

Patient- Passive Criticality-Aware IMD

27% 18% 27%

Proximity-Based Authentication

27% 0% 27%

33

Mockup Evaluation: Results

slide-34
SLIDE 34

Achieving Coverage: 3 Systems

The Least Disliked: Proximity-Based Authentication The Most Liked: Emergency and Warning Wristband Satisfying the Stragglers: UV-Visible Tattoo

34

slide-35
SLIDE 35

Multiple System Options: Revisiting the Idea

  • Decreased Usability Means Decreased Safety
  • Cost of FDA Approval
  • Burden of Training
  • Expense of Providing, Acquiring, and Maintaining

Equipment

  • Mental Stress and Complications of Choice

35

slide-36
SLIDE 36

Contributions

New HCI problem domain: Implantable Medical Devices Interviews with implantable medical device patients Qualitative suggestions for security systems for wireless cardiac implantable medical devices Adaptation of value dams and flows method for choosing complementary systems to maximize patient satisfaction/minimize patient dissatisfaction

36

slide-37
SLIDE 37

Questions?

37