Using Card Sorting to Classify Elements of the Security Risk Management Program for Medical Devices

被引:0
|
作者
Lechner, Nadica Hrgarek [1 ]
机构
[1] Univ Zagreb, Fac Org & Informat, Pavlinska 2, Varazhdin 42000, Croatia
关键词
card sorting; card sort; closed cart sorting; cybersecurity; medical devices; security risk management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Establishing a security risk management program for medical devices can be challenging. Medical device manufacturers must understand which elements of the program are required, optional, or unnecessary to make effective decisions. By prioritizing the most important elements, manufacturers can establish a robust security risk management program. This paper identifies 40 elements of the security risk management program for medical devices. Using closed card sorting, professionals within the medical device sector classified these elements into predefined categories. The study involved 53 participants who completed two card sorts using an online tool over a period of five weeks.
引用
收藏
页码:489 / 500
页数:12
相关论文
共 50 条
  • [41] Dynamic Security Risk Management Using Bayesian Attack Graphs
    Poolsappasit, Nayot
    Dewri, Rinku
    Ray, Indrajit
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 61 - 74
  • [42] SECURITY AND RISK MANAGEMENT WHEN USING CLOUD COMPUTING IT SERVICES
    Sepulveda O, Erick
    Salcedo, Octavio J.
    Gomez Vargas, Ernesto
    REDES DE INGENIERIA-ROMPIENDO LAS BARRERAS DEL CONOCIMIENTO, 2010, 1 (02): : 10 - 21
  • [43] The risk assessment and management of port security using fuzzy modeling
    Ung, S.T.
    Williams, V.
    Bonsall, S.
    Wang, J.
    Marine Technology and SNAME News, 2009, 46 (02): : 61 - 73
  • [44] Dynamic Security Modeling in Risk Management Using Environmental Knowledge
    Fugini, Mariagrazia
    Hadjichristofi, George
    Teimourikia, Mahsa
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 429 - 434
  • [45] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [46] Enhancing Cryptocurrency Security Using AI Risk Management Model
    Elhoseny, Mohamed
    Darwiesh, Abdelaziz
    El-Baz, A. H.
    Rodrigues, Joel J. P. C.
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2024, 13 (01) : 48 - 53
  • [47] The Risk Assessment and Management of Port Security Using Fuzzy Modeling
    Ung, S. T.
    Williams, V.
    Bonsall, S.
    Wang, J.
    MARINE TECHNOLOGY AND SNAME NEWS, 2009, 46 (02): : 61 - 73
  • [48] Improving Medical Risk Management Using Automotive Standards
    Walker, Alastair
    DHEALTH 2020 - BIOMEDICAL INFORMATICS FOR HEALTH AND CARE, 2020, 271 : 263 - 270
  • [49] Teaching emergency airway management using medical simulation: A pilot program
    Zirkle, M
    Blum, R
    Raemer, DB
    Healy, G
    Roberson, DW
    LARYNGOSCOPE, 2005, 115 (03): : 495 - 500
  • [50] PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
    D. S. Kim
    Y. J. Jung
    T. M. Chung
    The Journal of Supercomputing, 2005, 33 : 103 - 121