skip to main content
10.1145/1753326.1753462acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices

Published: 10 April 2010 Publication History

Abstract

Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices to inform the design of computer security for wireless IMDs. We interviewed 13 individuals with implanted cardiac devices. Key questions concerned the evaluation of 8 mockups of IMD security systems. Our results suggest that some systems that are technically viable are nonetheless undesirable to patients. Patients called out a number of values that affected their attitudes towards the systems, including perceived security, safety, freedom from unwanted cultural and historical associations, and self-image. In our analysis, we extend the Value Sensitive Design value dams and flows technique in order to suggest multiple, complementary systems; in our discussion, we highlight some of the usability, regulatory, and economic complexities that arise from offering multiple options. We conclude by offering design guidelines for future security systems for IMDs.

References

[1]
A. Adams. Multimedia Information Changes the Whole Privacy Ballgame. In Conference on Computers, Freedom, and Privacy. ACM, 2000.
[2]
V. Bellotti and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. In ECSCW. Kluwer Academic, 1993.
[3]
S. Cherukuri, K. Venkatasubramanian, and S. Gupta. BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. In ICPP Workshops, 2003.
[4]
L. F. Cranor and S. Garfinkle, editors. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005.
[5]
C. A. Curran. Nurse Tracking Systems: Do the Benefits to Nurse Managers Outweigh Risks to Nurses' Privacy? Writing for the CON Position. American Journal of Maternal Child Nursing, 27, 2002.
[6]
T. Denning, K. Fu, and T. Kohno. Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. In HotSec, 2008.
[7]
P. Ehn and M. Kyng. Cardboard computers: Mocking-it-up or hands-on the future. In Greenbaum and M. Kyng, editors, Design at Work: Cooperative Design of Computer Systems. 1992.
[8]
B. Ertl. Hooligans Attack Epilepsy Patients During Epilepsy Awareness Month. http://www.pr.com/press-release/60959, 2007.
[9]
B. Friedman, P. H. Kahn Jr., and A. Borning. Value Sensitive Design and information systems: Three case studies. In P. Zhang and D. Galletta, editors, Human-Computer Interaction and Management Information Systems: Foundations. 2006.
[10]
S. K. S. Gupta, T. Mukherjee, and K. Venkatasubramanian. Criticality Aware Access Control Model for Pervasive Applications. In PERCOM, 2006.
[11]
D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel. Security and Privacy for Implantable Medical Devices. IEEE Pervasive Computing, 7, 2008.
[12]
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In IEEE Symposium on Security and Privacy, 2008.
[13]
K. Hanna, F. Manning, P. Bouxsein, and A. Pope, editors. Innovation and Invention in Medical Devices: Workshop Summary. 2001. National Academy of Sciences, http://www.nap.edu/catalog/10225.html.
[14]
J. I. Hong and J. A. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Mobile Systems, Applications and Services. ACM, 2004.
[15]
X. Jiang, J. I. Hong, and J. A. Landay. Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing. In Ubicomp, 2002.
[16]
X. Jiang and J. A. Landay. Modeling Privacy Control in Context-Aware Systems. IEEE Pervasive Computing, 1, 2002.
[17]
M. Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In Ubicomp. Springer-Verlag LNCS, 2002.
[18]
J. Miller, B. Friedman, G. Jancke, and B. Gill. The Value Sensitive Design, Development, and Appropriation of a Corporation's Groupware System. In GROUP, 2007.
[19]
G. Myles, A. Friday, and N. Davies. Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computer, 2, 2003.
[20]
L. Palen and P. Dourish. Unpacking "Privacy" for a Networked World. In Conference on Human Factors in Computing Systems. ACM, 2003.
[21]
K. Poulsen. Hackers Assault Epilepsy Patients via Computer. http://www.wired.com/politics/security/news/2008/03/epilepsy, 2008.
[22]
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun. Proximity-based Access Control for Implantable Medical Devices. In CCS, 2009.
[23]
M. Tentori, J. Favela, and V. M. Gonzàlez. Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications. Journal of Universal Computer Science, 12, 2006.
[24]
M. Tentori, J. Favela, and M. D. Rodrìguez. Privacy-Aware Autonomous Agents for Pervasive Healthcare. IEEE Intelligent Systems, 21, 2006.
[25]
E. Yu and L. M. Cysneiros. Designing for Privacy in a Multi-agent World. In Trust, Reputation, and Security, 2002.

Cited By

View all
  • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
  • (2024)Advocating Values through Meaningful Participation: Introducing a Method to Elicit and Analyze Values for Enriching Data Donation Practices in HealthcareProceedings of the ACM on Human-Computer Interaction10.1145/36372938:CSCW1(1-32)Online publication date: 26-Apr-2024
  • (2024)AI ethics unwrapped: an empirical investigation of ethical principles in collaborative ideation processesAI and Ethics10.1007/s43681-024-00638-9Online publication date: 27-Dec-2024
  • Show More Cited By

Index Terms

  1. Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2010
    2690 pages
    ISBN:9781605589299
    DOI:10.1145/1753326
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 April 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. defibrillators
    2. embodied technologies
    3. implantable medical devices
    4. medical device security
    5. safety
    6. security
    7. value dams and flows

    Qualifiers

    • Research-article

    Conference

    CHI '10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)100
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
    • (2024)Advocating Values through Meaningful Participation: Introducing a Method to Elicit and Analyze Values for Enriching Data Donation Practices in HealthcareProceedings of the ACM on Human-Computer Interaction10.1145/36372938:CSCW1(1-32)Online publication date: 26-Apr-2024
    • (2024)AI ethics unwrapped: an empirical investigation of ethical principles in collaborative ideation processesAI and Ethics10.1007/s43681-024-00638-9Online publication date: 27-Dec-2024
    • (2023)Toward Diabetes Device Development That Is Mindful to the Needs of Young People Living With Type 1 Diabetes: A Data- and Theory-Driven Qualitative StudyJMIR Diabetes10.2196/433778(e43377)Online publication date: 25-Jan-2023
    • (2023)Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System SecurityACM Computing Surveys10.1145/361022556:2(1-35)Online publication date: 21-Jul-2023
    • (2023)The participatory value-sensitive design (VSD) of a mHealth app targeting citizens with dementia in a Danish municipalityAI and Ethics10.1007/s43681-023-00274-94:2(375-401)Online publication date: 13-Apr-2023
    • (2022)Exploring Secondary Teachers’ Needs and Values in Culturally Responsive TeachingCompanion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3500868.3559473(140-144)Online publication date: 8-Nov-2022
    • (2022)A value sensitive design approach for designing AI-based worker assistance systems in manufacturingProcedia Computer Science10.1016/j.procs.2022.01.248200(505-516)Online publication date: 2022
    • (2022)Biometric Data Capture as a Way to Identify Lack of Physical Activity in Daily LifeSmart Objects and Technologies for Social Good10.1007/978-3-030-91421-9_2(18-26)Online publication date: 1-Jan-2022
    • (2021)Hybrid Body Craft: Toward Culturally and Socially Inclusive Design for On-Skin InterfacesIEEE Pervasive Computing10.1109/MPRV.2021.307932120:3(41-50)Online publication date: 1-Jul-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media