2015
DOI: 10.22215/timreview903
|View full text |Cite
|
Sign up to set email alerts
|

A Value Blueprint Approach to Cybersecurity in Networked Medical Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 1 publication
(1 reference statement)
0
5
0
Order By: Relevance
“…The goal of this framework is to integrate stakeholder identification (Tanev et al, 2015) and value-sensitive design (Denning et al, 2014) to a security risk assessment designed specifically for medical devices (MDPC, 2014). With this framework, we aim to produce a reproducible process for stakeholders to effectively address cybersecurity concerns while maximizing stakeholder value.…”
Section: Choose Risk Controls Using Value-sensitive Designmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal of this framework is to integrate stakeholder identification (Tanev et al, 2015) and value-sensitive design (Denning et al, 2014) to a security risk assessment designed specifically for medical devices (MDPC, 2014). With this framework, we aim to produce a reproducible process for stakeholders to effectively address cybersecurity concerns while maximizing stakeholder value.…”
Section: Choose Risk Controls Using Value-sensitive Designmentioning
confidence: 99%
“…In the case of an insulin pump manufacturer, five key stakeholders were identified based on traditional stakeholders in a medical device ecosystem (Tanev et al, 2015):…”
Section: A Identify Stakeholders and Their Ecosystem Relationshipsmentioning
confidence: 99%
“…The course assignments required significant analysis of published work, as well as synthesis of new results (Alvesson & Sandberg, 2011;Le Pine & Wilcox King, 2010) and evaluation and judgment to develop actionable recommendations and effectively communicate those recommendations to others. Two of the articles in this issue of the Technology Innovation Management Review were developed from these assignments (Payette et al, 2015;Tanev et al, 2015), and we expect more publications in the future. The graduate students varied widely in demographics, including a mix of mid-career and early-career work experience, of working professionals and full-time students, and of careers in the security domain and in other areas.…”
Section: Lessons From Graduate Student Assignmentsmentioning
confidence: 99%
“…The effective assessment and communication of cybersecurity risks should take a "wide lens" perspective on the network, supply chain, and surrounding ecosystem (e.g., Adner, 2012;Muegge, 2013;Tanev et al, 2015). A product-centric focus is inadequate.…”
Section: Lessons From Graduate Student Assignmentsmentioning
confidence: 99%
See 1 more Smart Citation