1994
DOI: 10.1109/52.251205
|View full text |Cite
|
Sign up to set email alerts
|

Retrofitting software safety in an implantable medical device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

1994
1994
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…Some safety hazards posed by complex new technologies may be difficult to anticipate during development, and may not be realized until the device is actually in use (Maisel, 2005). Mojdehbakhsh et al (1994) suggest there may be different phases in the lifecycle of a device where different types of safety problems may arise. Like the other industries we review, some problems occur prior to use.…”
Section: Product Safety and Security In Critical Industriesmentioning
confidence: 99%
See 1 more Smart Citation
“…Some safety hazards posed by complex new technologies may be difficult to anticipate during development, and may not be realized until the device is actually in use (Maisel, 2005). Mojdehbakhsh et al (1994) suggest there may be different phases in the lifecycle of a device where different types of safety problems may arise. Like the other industries we review, some problems occur prior to use.…”
Section: Product Safety and Security In Critical Industriesmentioning
confidence: 99%
“…Anticipating these hazards and developing strategies to mitigate the risk they present is the objective of hazard analysis (Higson, 2002). Mojdehbakhsh et al (1994) describe another approach which they call retrofitting safety. It is a lifecycle approach for software-controlled medical device systems, which integrates process with traceability.…”
Section: Product Lifecycle Managementmentioning
confidence: 99%
“…The most direct way of electronic eavesdropping is for spy software to be installed onto a device to collect and forward information within another phone or server disabling the phone permanently (BRICK) [10][11][12].…”
Section: Curb Wireless Interfacesmentioning
confidence: 99%
“…Examples include radiation therapy machines (this application area is noteworthy for providing one of the few well-documented examples of computer failure resulting in loss of human life), heart pace-makers [Mojdehbakhsh et al 1994], and even robotic surgeons.…”
mentioning
confidence: 99%