CSIA 45 – Robotics – Medical Device Tech Discussions
CSIA 45 Discussion 5
3 pages – References must be in APA7 format

Before you begin read the following articles:
Robots in public spaces: implications for policy design
https://www.tandfonline.com/doi/full/10.1080/25741292.2021.1905342
Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
https://www-sciencedirect-com.ezproxy.umgc.edu/science/article/pii/S092188901730283X
You have been asked to provide a short background paper for government leaders who are meeting to discuss regulatory requirements for robotic systems used in public spaces. Your presentation will be part of a series of presentations about the risks associated with insecure robotic systems. You may find it useful to pick one or more examples of robotic systems used in public spaces and frame your discussion around those emerging applications of technology.
For this background paper, you will need to find and analyze information from at least 3 authoritative sources, which provide information about threats, attacks, and vulnerabilities affecting robotic systems. (You may use the two starter resources listed above.) Use that information to identify and discuss risks and potential impacts that could occur if attacks against robotic systems were successful. Provide at least three example risks.
The target length for your background paper is 5 to 7 paragraphs.

Resource
https://medium.com/mistyrobotics/robots-as-a-platform-are-you-ready-379d4e43cf73
https://www-sciencedirect-com.ezproxy.umgc.edu/science/article/pii/S1353485819301229
https://www.roboticsbusinessreview.com/public-safety/how-robots-and-drones-are-changing-rescue-operations/
https://www-sciencedirect-com.ezproxy.umgc.edu/science/article/pii/S1474667017333657
https://gesrepair.com/guide-inspection-robots-used-industrial-sectors/
https://techhq.com/2020/08/industrial-robots-are-dominating-but-are-they-safe-from-cyber-attacks/

CSIA 45 Discussion 6
3 pages – References must be in APA7 format
Prepare a short background (briefing) paper in which you discuss the following:
Medical device technologies (what they are, how they are used, give examples) in these three areas:
Wearable sensors and/or monitoring devices
Implants (e.g. insulin pumps, pace makers, nerve stimulaters, etc.)
Medical Robots and other applications of robotic technologies in healthcare settings
What are the major or most notable cyber threats (sources of cyber risks) for medical device technologies
How do innovations in medical device technologies reduce risk and medical risk management in healthcare settings and applications? (Focus on the positive or benefits)
Your background paper should be 5 to 7 paragraphs long. Please remember to include an introduction to the topic, analysis (answers to #1, #2, #3), and summary (the “so what” or “what this all means”).
Your audience is a group of managers (technical and non-technical) who are participating in a conference on reducing cyber-related risks associated with the adoption of new technologies in medical and healthcare settings.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your background paper.

Resource
https://www.fda.gov/medical-devices/digital-health-center-excellence/cybersecurity
https://www.mitre.org/sites/default/files/2021-11/Playbook-for-Threat-Modeling-Medical-Devices.pdf
https://www.avenga.com/magazine/wearables-iot-healthcare/
https://spectrum.ieee.org/what-is-neural-implant-neuromodulation-brain-implants-electroceuticals-neuralink-definition-examples
https://www.asme.org/topics-resources/content/robo-doctor-will-see-you-now
https://www.thehealthy.com/healthcare/hacked-medical-devices/
https://spectrum.ieee.org/cyber-attacks-on-medical-devices-are-on-the-riseand-manufacturers-must-respond
https://www.wired.com/story/medtronic-insulin-pump-hack-app/
https://orangematter.solarwinds.com/2020/03/20/medical-device-hacking-worldwide-part-2/
https://spectrum.ieee.org/thwart-cyber-attacks-on-implanted-medical-devices

Medical device technologies refer to the use of technology in the medical field to diagnose, treat, and monitor patients. These technologies include wearable sensors and monitoring devices, implants, and medical robots.
Wearable sensors and monitoring devices are devices that can be worn on the body, such as smartwatches, fitness trackers, and heart rate monitors. These devices are used to track and monitor a person’s health, such as their heart rate, sleep patterns, and activity levels. Examples of wearable sensors and monitoring devices include the Apple Watch and the Fitbit.
Implants are devices that are surgically inserted into the body, such as insulin pumps, pace makers, and nerve stimulators. These devices are used to manage chronic conditions, such as diabetes and heart conditions. Examples of implants include the Medtronic MiniMed insulin pump and the Boston Scientific pacemaker.
Medical robots are robots that are used in healthcare settings, such as surgical robots and rehabilitation robots. These robots can Help with surgeries and physical therapy, and can be controlled by a human operator or have autonomous capabilities. Examples of medical robots include the da Vinci surgical robot and the REX rehabilitation robot.
The major cyber threats for medical device technologies include unauthorized access, data breaches, and malware. These threats can compromise the confidentiality, integrity, and availability of patient data and can disrupt the functioning of the device. Innovations in medical device technologies, such as encryption and authentication, can reduce these risks and improve medical risk management in healthcare settings.
In all, medical device technologies, such as wearable sensors and monitoring devices, implants, and medical robots, are increasingly being used in healthcare settings. However, these technologies also pose cyber-related risks that must be mitigated. Innovations in medical device technologies can reduce these risks and improve medical risk management in healthcare settings, by providing better security and protection of patient data.

Published by
Dissertations
View all posts