Everyone wants to prevent illness before it starts. Everyone wants more time and energy for the activities they enjoy most. In other words, everyone wants to be healthy and feel good all the time, automatically. The vision laid out in Imagining the Future of Medicine could enable just that. But underpinning this compelling vision is ubiquitous connectivity where every connection, every interface, and every transmission of data represents a security challenge.
In Imagining the Future of Medicine, life-affecting decisions regarding a person’s health will be made automatically on the basis of collected information. Any alteration of data, intentional or not, could put that person’s life at risk through the resulting decisions that are executed. Therefore, upholding the C.I.A. (confidentiality, integrity and availability) of data security within this envisioned ecosystem is critical.
Imagine this scenario: Sam’s glucose monitor and his insulin pump are connected. This closed loop system takes readings and provides insulin dosing based on those readings. Sam has an artificial pancreas, the “holy grail” of diabetes management. While the device monitors Sam’s physiology, it is itself being monitored externally by Sam’s doctors. Collected information is uploaded automatically into Sam’s electronic health record (EHR). When Sam’s supply of insulin is low, a prescription is automatically ordered and shipped. Such benign and passive monitoring unintentionally provides an electronic gateway into Sam’s artificial pancreas. Imagine that connection is exploited by a “black hat” hacker, who alters the data to indicate that Sam’s glucose level is hyperglycemic. Sam’s device compensates and delivers a dose of insulin far greater than it should be, causing a potentially fatal hypoglycemic episode.
This level of system integration will be obtainable in the near future. And while the scenario seems implausible, it will be possible.
More immediate is the threat of confidentiality breach in health records. Disturbingly, numerous incidents have been reported in the past two years, shaking the public’s faith in the security of our health care system. It’s not hard to imagine scenarios in which a person’s health data could be held hostage, with a demand to pay ransom or risk having the health information go public. Health identities could also be stolen outright and used to commit insurance or other fraud similar to credit card crimes. It’s fairly simple to get a new credit card number, but a person only has one identity, and if it is stolen it is much more difficult to recover. Too many incidents like this could turn public sentiment to fear and distrust, hindering the adoption of an integrated, connected system for our records and data.
So what can be done to reap the powerful benefits envisioned in Imagining the Future of Medicine? An important first step is to mindfully identify, analyze, mitigate and control the risks to the extent possible. By acknowledging the risks, we can offset and move past them—by architecting smart and secure solutions from the start of concept development, by placing safeguards around the critical aspects of connected systems and isolating them appropriately and by fostering collaborations of the right expertise at every developmental step.
Together, let’s design well to be well.
Disclosure
The author declares that she has no competing interests as defined by Bioelectronic Medicine, or other interests that might be perceived to influence the results and discussion reported in this paper.
Author information
Affiliations*
Battelle Memorial Institute, Columbus, Ohio, USA
Melissa Masters
Authors* Melissa Masters
View author publications
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Melissa Masters.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, and provide a link to the Creative Commons license. You do not have permission under this license to share adapted material derived from this article or parts of it.
The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
To view a copy of this license, visit (https://doi.org/creativecommons.org/licenses/by-nc-nd/4.0/)
Reprints and Permissions
About this article
Cite this article
Masters, M. Melissa Masters’s Response to “Imagining the Future of Medicine” Commentary. Bioelectron Med 2,53–54 (2015). https://doi.org/10.15424/bioelectronmed.2015.00009
Download citation
*
Received: 17 June 2015
*
Accepted: 01 July 2015
*
Published: 17 August 2015
*
Issue Date: June 2015
*
DOI: https://doi.org/10.15424/bioelectronmed.2015.00009
Keywords
* Advancement Of Medical Instrumentation (AAMI)
* International Regulatory Requirements
* Medical Device Development
* Device Mass
* Voting Members
Response to Commentary
Open Access
Published:17 August 2015 [/RAW_REF_TEXT] Melissa Masters’s Response to “Imagining the Future of Medicine” Commentary [RAW_REF_TEXT] Melissa Masters 1 [/RAW_REF_TEXT] Bioelectronic Medicine volume 2, pages 53–54 (2015)Cite this article [RAW_REF_TEXT] 563 Accesses
Metrics details
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2015. This work is licensed under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
Abstract
Ms. Masters is Director of Electrical, Software and Systems Engineering at Battelle and heads Battelle’s DeviceSecure Services. Ms. Masters has more than 15 years of experience in product development as a project manager, systems engineer and design engineer, serving as the project manager and lead systems engineer on medical device development and sustaining engineering programs. Ms. Masters is a voting member of the Association for the Advancement of Medical Instrumentation (AAMI) working group on cybersecurity for medical devices and contributed to the vulnerability model for AAMI’s TIR 57. She has given conference presentations, been published and widely quoted on a variety of medical cybersecurity topics in AAMI Horizons, Mass Device, ExecutiveGov.com, and Fierce Medical Devices. In addition, Ms. Masters holds a Regulatory Affairs Certification (RAC) and has a working knowledge of domestic and international regulatory requirements for medical devices.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer