Cardboard computers: mocking-it-up or hands-on the future
Design at work
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Modeling Privacy Control in Context-Aware Systems
IEEE Pervasive Computing
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Security and Usability
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Privacy-Aware Autonomous Agents for Pervasive Healthcare
IEEE Intelligent Systems
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Proceedings of the 2007 international ACM conference on Supporting group work
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Designing for privacy in a multi-agent world
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Proceedings of the Sixth Symposium on Usable Privacy and Security
A taxonomy of vulnerabilities in implantable medical devices
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
Proceedings of the 42nd ACM technical symposium on Computer science education
In the shadow of misperception: assistive technology use and social interactions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Improving the safety of homeless young people with mobile phones: values, form and function
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Ethics and Information Technology
Infrastructure and vocation: field, calling and computation in ecology
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Internet of things: a review of literature and products
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
A Review of 25 Years of CSCW Research in Healthcare: Contributions, Challenges and Future Agendas
Computer Supported Cooperative Work
Hi-index | 0.01 |
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices to inform the design of computer security for wireless IMDs. We interviewed 13 individuals with implanted cardiac devices. Key questions concerned the evaluation of 8 mockups of IMD security systems. Our results suggest that some systems that are technically viable are nonetheless undesirable to patients. Patients called out a number of values that affected their attitudes towards the systems, including perceived security, safety, freedom from unwanted cultural and historical associations, and self-image. In our analysis, we extend the Value Sensitive Design value dams and flows technique in order to suggest multiple, complementary systems; in our discussion, we highlight some of the usability, regulatory, and economic complexities that arise from offering multiple options. We conclude by offering design guidelines for future security systems for IMDs.