Description
Medical training devices are becoming increasingly dependent on technology creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production deployed medical training mannequin. The results of the proof of concept research indicate that it is possible to breach a medical training mannequin in a live environment. The research contribution is an initial empirical analysis of the viability of compromising a medical training mannequin along with providing the foundation for future research.
Recommended Citation
Andel, Todd; Campbell, Matt; Glisson, William; Jacobs, Mike; Mayr, Johnny; and McDonald, J, "Compromising a Medical Mannequin" (2015). AMCIS 2015 Proceedings. 5.
https://aisel.aisnet.org/amcis2015/HealthIS/GeneralPresentations/5
Compromising a Medical Mannequin
Medical training devices are becoming increasingly dependent on technology creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production deployed medical training mannequin. The results of the proof of concept research indicate that it is possible to breach a medical training mannequin in a live environment. The research contribution is an initial empirical analysis of the viability of compromising a medical training mannequin along with providing the foundation for future research.