One more HE-75 topic before proceeding into design and design related activities. The topic, risk management.
Reading HE-75, you will note that this document continually discusses risk management and reducing risk. In fact, the entire document is fundamentally about reducing risk, the risks associated with a poor or inappropriate design.
If you drive a car, especially if you have been driving cars for more than a decade or two, you will note that a driving a car with well-designed controls and well-laid out and designed displays seems inherently easier than one that is poorly designed. Furthermore, it has been demonstrated time and again that driving safety increases when a driver has been provided well-designed controls and displays, driving become less risky for everyone concerned.
Car makers now see safety as selling point. (Look at a car that was built in the 40s, 50s or 60s and you'll note how few safety features the car included.) Manufacturers are beginning to include in their luxury models driver-error detection systems. For example, one manufacturer has a system that signals the driver of the existence of an other vehicle the space the driver wants to move to. One of the qualities of a well-designed user interface is the ability to anticipate the user and identify and trap errors or potential user errors, and provide a means or path for preventing or correcting the error without serious consequences. Car manufacturers have been moving in this direction. I suggest that the adoption of HE-75 will be the FDA's way of pushing medical manufacturers in the same direction.
Risk Management: Creating a Good Design and Verifying It
My many blog postings on HE-75 will address the specifics of how to create a good design and verify it, and the process of incorporating these design and verification processes in the a company's risk management processes. In this posting I want to address a two issues at a high level.
First, I want to address "what is a good design and how to do to create it." Creating a good design requires a process such as one outlined by HE-75. I am often amused at hiring managers and HR people who want to see a designer's portfolio having no conception regarding how the design were created. A good design for a user interface is not artistry, it is a result of an effective process. It should not only look good, but it should enable users to perform their tasks effectively and with a minimum of errors. Furthermore, it should anticipate users and trap errors and prevent serious errors occurring. And finally, it should provide users with paths or instructions on how to correct the error. This is what HE-75 teaches in that it instructs researchers and designs And to that end, the design process should reduce risk. Think this is not possible? Then I suggest you spend some time in the cockpit of a commercial airline. It is possible.
Second, HE-75 teaches that design verification should be empirical and practiced often throughout the design process. This is an adjunct to classic risk management that tends to be speculative or theoretical in that it relies on brainstorming and rational analysis. HE-75 teaches that medical device and system manufacturers should not rely just on opinions - although opinions provided by subject-matter experts can provide valuable guidance. HE-75 instructs subjects drawn from the targeted population(s) should be used to guide and test the design at each stage of the process. This becomes the essence of risk management and risk reduction in the design of user interfaces.
Additional Resources
I have this book in my library. It provides some good information, but it's not comprehensive. Unfortunately, it's the only book I know of in this field.
These books I do not owe, but provide you with the links for information purposes. I am surprised at how few books in the field of medical risk management there are. It may go a long ways to explain the large number medical errors, especially the ones that injure or kill patients.
Risk Management Handbook for Health Care Organizations, Student Edition (J-B Public Health/Health Services Text)
Medical Malpractice Risk Management
A technical blog dedicated to discussing future technologies to improve medical monitoring and patient management. If you have an interest in this area, I think you will not be disappointed. I have added a new dimension: periodic articles on medical usability, risk management, IEC 62366 and ANSI/AAMI HE 75 ... and all things related. If you want to know more about me, please look at my LinkedIn profile ... search for Gary Dorst.
Monday, May 3, 2010
Saturday, May 1, 2010
HE-75 Topic: Meta Analysis
The definition of a "meta-analysis" is an analysis of analyzes. Meta analyzes are often confused with a literature search, although a literature search is often the first step in a meta-analysis.
A meta-analysis is a consolidation of similar studies on a single, well defined topic. The each study may have covered a variety of topics, but with the meta-analysis, each study will have addressed the common topic in depth and collected data regarding it.
The meta-analysis is a well-respected means of developing broad-based conclusions from a variety of studies. (I have included a book on the topic at the end of this article.) If you search the literature, you will note that meta-analyzes are often found in the medical literature, particularly in relationship to the effectiveness or problems with medications.
In some quarters, the meta-analysis is not always welcome or respected. Human factors (Human engineering) is rooted in experimental psychology, and meta-analyzes are not always respected or well-received in this community. It is work outside of the laboratory. It is not collecting your own data, but using the data collected by others, thus the tendency has been to consider the meta-analysis as lesser.
However, the meta-analysis has a particular strength in that it provides a richer and wider view than a single study with a single population sample. It is true that the studies of others often do not directly address all the issues that researchers could study if those researchers performed that research themselves. In other words, the level and the types of research related controls were employed by the researchers themselves. But, again, the meta-analysis can provide a richness and the numeric depth that a single study cannot provide.
Thus the question is, to use or not to use a meta-analysis when collecting data about a specific population? Should a meta-analysis be used in lieu of collecting empirical data?
Answer. There are no easy answers. Yes, a meta-analysis could be used in lieu of an empirical analysis, but only if there are enough applicable studies recently performed. However, I would suggest that when moving forward with a study of a specific, target population that the first response should be to initiate a literature search and perform some level of a meta-analysis. If the data is not available or is incomplete, then the meta-analysis will not suffice. But, a meta-analysis is always a good first step, and a relatively inexpensive first step, even if the decision is made to go forward with an empirical study. The meta-analysis will aid in the study's design and data analysis. And will act as a guide when drawing conclusions.
A meta-analysis is a consolidation of similar studies on a single, well defined topic. The each study may have covered a variety of topics, but with the meta-analysis, each study will have addressed the common topic in depth and collected data regarding it.
The meta-analysis is a well-respected means of developing broad-based conclusions from a variety of studies. (I have included a book on the topic at the end of this article.) If you search the literature, you will note that meta-analyzes are often found in the medical literature, particularly in relationship to the effectiveness or problems with medications.
In some quarters, the meta-analysis is not always welcome or respected. Human factors (Human engineering) is rooted in experimental psychology, and meta-analyzes are not always respected or well-received in this community. It is work outside of the laboratory. It is not collecting your own data, but using the data collected by others, thus the tendency has been to consider the meta-analysis as lesser.
However, the meta-analysis has a particular strength in that it provides a richer and wider view than a single study with a single population sample. It is true that the studies of others often do not directly address all the issues that researchers could study if those researchers performed that research themselves. In other words, the level and the types of research related controls were employed by the researchers themselves. But, again, the meta-analysis can provide a richness and the numeric depth that a single study cannot provide.
Thus the question is, to use or not to use a meta-analysis when collecting data about a specific population? Should a meta-analysis be used in lieu of collecting empirical data?
Answer. There are no easy answers. Yes, a meta-analysis could be used in lieu of an empirical analysis, but only if there are enough applicable studies recently performed. However, I would suggest that when moving forward with a study of a specific, target population that the first response should be to initiate a literature search and perform some level of a meta-analysis. If the data is not available or is incomplete, then the meta-analysis will not suffice. But, a meta-analysis is always a good first step, and a relatively inexpensive first step, even if the decision is made to go forward with an empirical study. The meta-analysis will aid in the study's design and data analysis. And will act as a guide when drawing conclusions.
Additional Resources
Labels:
accuracy,
HE75,
User Analysis,
User Modeling
Friday, April 30, 2010
How to Hack Grandpa's ICD, Reprise ...
Several weeks ago I published an article (How to Hack Grandpa's ICD) discussing another article published in an IEEE journal that described a variety of ways to hack, illicitly manipulate or modify an ICD. To those in the know, this is a potentially greater concern than I had imagined. As it turns out, not surprisingly enough, the concerns about hacking are not limited to ICDs.
One of my readers notified me of a recent article published by the CNN website that discusses concerns regarding the capability to hack ICDs. Here's the link to the article that was published on 16 April 2010. I was also republished in the Communications of the ACM (of which I am a member) on 19 April 2010.
Much of the article appears below Before proceeding, I would like to add a little background about myself and a little bit of commentary regarding hacking. I am a co-founder of data leak security company, Salare Security (http://www.salaresecurity.com). If anyone is interested in what the company does, please do follow the link above. (As of this point, I am a silent partner in the company. My partners are currently running the business.) I mention this because I have some real-world based knowledge regarding system vulnerabilities.
From experience and research I have found that even vulnerabilities that seem unlikely to be exploited, inevitably are exploited. If something can be gained from a target and a vulnerability exists, you can be assured that the vulnerability will be exploited.
For example, specific vulnerabilities that Salare Security addresses months ago were considered unlikely to be exploited because of the lack knowledge and a lack of interest on the part of hackers. However, the vulnerabilities are of significant interest because if exploited, the damage to a government, a company or other organization could be severe. Nevertheless, the thinking in the industry has been that exploitation of the vulnerabilities over the near term were remote.
However, recently, we have received information that the system vulnerabilities that Salare Security addresses have been exploited by a government funded group of hackers. So much for "nothing happening in the near term."
In the case of the vulnerabilities that Salare Security protects ... the hackers were after information. (I do not know the details of the attack so I cannot tell you what information they stole.) But, why might hackers develop systems to exploit medical device vulnerabilities?
My sense is that the hackers most likely are not out to attack, injure or kill people with medical devices. In my estimation, these hackers would be engaged in an extortion scheme against a device manufacturer or manufacturers. This suggestion is based on some of the current trends in criminal activity. (Please see: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1510919,00.html?track=NL-102&ad=763387&asrc=EM_NLN_11442713&uid=6228713) The article references other possible motives for hacking medical devices. I would strongly side with any motivation that opens the door for extracting money from a manufacturer.
Here is the article published by CNN
One of my readers notified me of a recent article published by the CNN website that discusses concerns regarding the capability to hack ICDs. Here's the link to the article that was published on 16 April 2010. I was also republished in the Communications of the ACM (of which I am a member) on 19 April 2010.
Much of the article appears below Before proceeding, I would like to add a little background about myself and a little bit of commentary regarding hacking. I am a co-founder of data leak security company, Salare Security (http://www.salaresecurity.com). If anyone is interested in what the company does, please do follow the link above. (As of this point, I am a silent partner in the company. My partners are currently running the business.) I mention this because I have some real-world based knowledge regarding system vulnerabilities.
From experience and research I have found that even vulnerabilities that seem unlikely to be exploited, inevitably are exploited. If something can be gained from a target and a vulnerability exists, you can be assured that the vulnerability will be exploited.
For example, specific vulnerabilities that Salare Security addresses months ago were considered unlikely to be exploited because of the lack knowledge and a lack of interest on the part of hackers. However, the vulnerabilities are of significant interest because if exploited, the damage to a government, a company or other organization could be severe. Nevertheless, the thinking in the industry has been that exploitation of the vulnerabilities over the near term were remote.
However, recently, we have received information that the system vulnerabilities that Salare Security addresses have been exploited by a government funded group of hackers. So much for "nothing happening in the near term."
In the case of the vulnerabilities that Salare Security protects ... the hackers were after information. (I do not know the details of the attack so I cannot tell you what information they stole.) But, why might hackers develop systems to exploit medical device vulnerabilities?
My sense is that the hackers most likely are not out to attack, injure or kill people with medical devices. In my estimation, these hackers would be engaged in an extortion scheme against a device manufacturer or manufacturers. This suggestion is based on some of the current trends in criminal activity. (Please see: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1510919,00.html?track=NL-102&ad=763387&asrc=EM_NLN_11442713&uid=6228713) The article references other possible motives for hacking medical devices. I would strongly side with any motivation that opens the door for extracting money from a manufacturer.
Here is the article published by CNN
Scientists work to keep hackers out of implanted medical devices
By John D. Sutter, CNN (4/16/2010)
(CNN) -- Nathanael Paul likes the convenience of the insulin pump that regulates his diabetes. It communicates with other gadgets wirelessly and adjusts his blood sugar levels automatically.
But, a few years ago, the computer scientist started to worry about the security of this setup.
What if someone hacked into that system and sent his blood sugar levels plummeting? Or skyrocketing? Those scenarios could be fatal.
Researchers say it is possible for hackers to access and remotely control medical devices like insulin pumps, pacemakers and cardiac defibrillators, all of which emit wireless signals.This article references the same IEEE article that I referenced in my blog posting.
In 2008, a coalition of researchers from the University of Washington, Harvard Medical School and the University of Massachusetts at Amherst wrote that they remotely accessed a common cardiac defibrillator using easy-to-find radio and computer equipment. In a lab, the researchers used their wireless access to steal personal information from the device and to induce fatal heart rhythms by taking control of the system.
"Medical devices have provided important health benefits for many patients, but their increasing number, automation, functionality, connectivity and remote-communication capabilities augment their security vulnerabilities," he wrote.
FDA spokeswoman Karen Riley declined to say whether the FDA is looking into new regulations of wireless medical devices; she added that the responsibility for making the devices secure falls primarily on the manufacturer.
"The FDA shares concerns about the security and privacy of medical devices and emphasizes security as a key element of device design," she said.
Wendy Dougherty, spokeswoman for Medtronic Inc., a large maker of implantable medical devices, said the company is willing to work with the FDA to establish "formal device security guidelines."
The company is aware of potential security risks to implanted medical devices, she said. "Safety is an integral part of our design and quality process. We're constantly evolving and improving our technologies."
In a written statement, Dougherty described the risk of someone hacking into a wireless medical device as "extremely low."
Wireless connections
The security concerns stem from the fact that pacemakers, defibrillators and insulin pumps emit wireless signals, somewhat like computers.
These signals vary in range and openness. Researchers who reported hacking into a defibrillator said some in-the-body devices have a wireless range of about 15 feet.
Many devices do not have encrypted signals to ward off attack, the researchers say. Encryption is a type of signal scrambling that is, for example, employed on many home Wi-Fi routers to prevent unknown people from accessing the network.
MotiveI emphasized Denning's comments because in my experience those are "famous last words." If there is a way to profit from exploiting a vulnerability, be assured, it will be exploited.
There's some question as to why a person would hack into a pacemaker or insulin pump and how the hacker would know a person uses a medical device.
Maisel listed some possible scenarios in his New England Journal article.
"Motivation for such actions might include the acquisition of private information for financial gain or competitive advantage; damage to a device manufacturer's reputation; sabotage by a disgruntled employee, dissatisfied customer or terrorist to inflict financial or personal injury; or simply the satisfaction of the attacker's ego," he wrote.
Denning, from the University of Washington, said the current risk of attack is very low, but that someone could hack into a pacemaker without apparent motive.
She referenced a case from 2008 in which a hacker reportedly tried to induce seizures in epilepsy patients by putting rapidly flashing images on an online forum run by the Epilepsy Foundation.
Additional Resources
Labels:
Hacking,
Security,
Telemedicine,
Wireless Communication
Friday, April 23, 2010
Medical Implant Issues: Part 1, A True Story
When I started this article, I thought I could place it into a single posting. However, having written just the first section, noted it's length and how much more there was to write. Thus, I decided to turn this into a serialized publication just as I am doing with HE-75. Thus, here is Part 1 ...
Part 1: Background Story
Before I dive into the technical details of this issue, I want to tell a true story from my own experience. It involves a friend of mine. (I need to be vague regarding the person's identity including gender and how I came to know this person. As you read this, you'll understand.)
My friend was incredibly intelligent (e. g., the best applied statistician I have ever known) and physically attractive, and diagnosed as a paranoid schizophrenic. In the early 1990's, my friend underwent back surgery. To my amazement, my friend claimed that the surgeon had placed a "chip," small processor into the person's spinal cord. My friend said that the chip could be activated by people with controls that looked like garage door openers. When activated, the chip would cause my friend to have a sudden, overwhelming desire to have sexual relations with the person who had activated the chip. My friend called this chip a "tutu."
At the time I had been part of the cutting-edge technology community to know that such a chip was absurd. And I told my friend that this chip did not exist. My information was not well received by my friend who was convinced of the reality of this chip.
I tell this story because at the time my friend informed me of the "tutu," the idea of embedding a chip in a human being and activate it using wireless means was patently absurd. Embedding programmable chips with wireless communications less than a decade and a half later is no longer considered absurd, but real. And for some people, frightening with religious overtones. Consider what the Georgia state legislature just passed and you'll understand what I mean. Here's a link to that article: Georgia Senate Makes "Mark of the Beast Illegal."
The reaction from the Georgia Senate makes my paranoid-schizophrenic friend's story seem plausible. Interestingly enough and I did not realize it at the time (but I do now), that was my introduction to wireless, medical remote programming. As I said, my friend was extremely intelligent and as it turned out more creative and prescient than I realized at the time. Turns out that today a device embedded in the spinal cord with the ability to trigger sexual experience is real. And the ability to embed microprocessors and controls in people with the capability of wireless communication and medical management is also real.
I tell you that story not to make light of people's stories and fears, but as a "sideways" introduction to the technical topic of dealing with multiple, embedded medical monitoring and remote programming systems. And to suggest that people may have real fears and concerns regarding the capabilities that technologists like myself often overlook. In this series I discuss real and imagined fears as well as the technical problems with multiple, implanted devices.
Part 2: Multiple, Implanted Wireless Communicating Devices
New Frontiers in Medical Device Technology
MEMS and Nanotechnology-Based Sensors and Devices for Communications, Medical and Aerospace Applications
Part 1: Background Story
Before I dive into the technical details of this issue, I want to tell a true story from my own experience. It involves a friend of mine. (I need to be vague regarding the person's identity including gender and how I came to know this person. As you read this, you'll understand.)
My friend was incredibly intelligent (e. g., the best applied statistician I have ever known) and physically attractive, and diagnosed as a paranoid schizophrenic. In the early 1990's, my friend underwent back surgery. To my amazement, my friend claimed that the surgeon had placed a "chip," small processor into the person's spinal cord. My friend said that the chip could be activated by people with controls that looked like garage door openers. When activated, the chip would cause my friend to have a sudden, overwhelming desire to have sexual relations with the person who had activated the chip. My friend called this chip a "tutu."
At the time I had been part of the cutting-edge technology community to know that such a chip was absurd. And I told my friend that this chip did not exist. My information was not well received by my friend who was convinced of the reality of this chip.
I tell this story because at the time my friend informed me of the "tutu," the idea of embedding a chip in a human being and activate it using wireless means was patently absurd. Embedding programmable chips with wireless communications less than a decade and a half later is no longer considered absurd, but real. And for some people, frightening with religious overtones. Consider what the Georgia state legislature just passed and you'll understand what I mean. Here's a link to that article: Georgia Senate Makes "Mark of the Beast Illegal."
The reaction from the Georgia Senate makes my paranoid-schizophrenic friend's story seem plausible. Interestingly enough and I did not realize it at the time (but I do now), that was my introduction to wireless, medical remote programming. As I said, my friend was extremely intelligent and as it turned out more creative and prescient than I realized at the time. Turns out that today a device embedded in the spinal cord with the ability to trigger sexual experience is real. And the ability to embed microprocessors and controls in people with the capability of wireless communication and medical management is also real.
I tell you that story not to make light of people's stories and fears, but as a "sideways" introduction to the technical topic of dealing with multiple, embedded medical monitoring and remote programming systems. And to suggest that people may have real fears and concerns regarding the capabilities that technologists like myself often overlook. In this series I discuss real and imagined fears as well as the technical problems with multiple, implanted devices.
Part 2: Multiple, Implanted Wireless Communicating Devices
Books sold by Amazon that might be of interest in this series
New Frontiers in Medical Device Technology
MEMS and Nanotechnology-Based Sensors and Devices for Communications, Medical and Aerospace Applications
Remote Monitoring Demonstration System for Diabetes & COPD Available
I want to share the article and it's link to the the demonstration system. Here are a few quotes from the article.
The system apparently uses a communication model similar to one I have described in an earlier article. (http://medicalremoteprogramming.blogspot.com/2009/10/communication-model-for-medical-devices.html) I do not know what data integrity and security measures they have taken.
The article can be found at:
http://www.healthrevolutionsciences.com/2010/04/forvida-demo-up-and-running/
Health Revolution Sciences Inc. has launched a new Website demonstrating its remote health care monitoring capabilities for perspective patients and care givers.Called ForVida, the software application represents a sea change in health care technology.
The software allows physicians and patients to watch streaming cardiac telemetry or reference steadily growing actionable patient EKG and heart rate histories.
The system apparently uses a communication model similar to one I have described in an earlier article. (http://medicalremoteprogramming.blogspot.com/2009/10/communication-model-for-medical-devices.html) I do not know what data integrity and security measures they have taken.
The article can be found at:
http://www.healthrevolutionsciences.com/2010/04/forvida-demo-up-and-running/
Labels:
Remote Monitoring,
Wireless Communication
Wednesday, April 21, 2010
Remote Monitoring and Preventing Unnecessary ICD Shocks
In 2009 there was an interesting editorial written by Joseph E. Marine from Johns Hopkins University School of Medicine, published in the journal, Europace (European Society of Cardiology). The title of the editorial was "Remote monitoring for prevention of inappropriate implantable cardioverter
defibrillator shocks: is there no place like home?" The entire article can be found at the following location: http://www.europace.oxfordjournals.org/content/11/4/409.full.pdf
For those of you unfamiliar with ICD's (implantable cardioverter
defibrillator), the ICD delivers a relatively high-voltage shock to the heart when conditions indicate that the heart may be about to go ventricle fibrillation (a rapid irregular heartbeat that will likely lead to death) or that the heart ceases beating. The latter condition is easily detected, however, determining the former condition is more difficult. Because the conditions are not always clear, ICD (and a companion system, the CRT-D) too frequently deliver shocks unnecessarily. (I have discussed issues related to detection in other articles in the blog. Here are the links to those discussions: http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-sensitivity-and.html, http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-update-to-sensitivity.html
http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-predictability.html) Another reason that an ICD might deliver unnecessary shocks would be because of sensor lead failure or near failure.
Joseph Marine examined the value of remote monitoring to the prevention of unnecessary shocks. He concluded that remote monitoring was particularly suited to providing early detection of failing sensor leads. However, ...
To those who have not been involved with ICDs, it may seem that the delivery of an unnecessary may not be so bad given the alternative, that a failure to deliver a shock will likely lead to the patient's death. And there are many cardiologists who will argue the case for a "hair-trigger" system - acceptance of false positives, but no acceptance of false negative: that is a failure to deliver a shock when conditions warrant.
However, unnecessary shocks will do damage over time. Furthermore, those patients who have received a shock describe it as feeling like "... a mule kicked" them in the chest. I know of situations where patients who a received shocks eventually have the ICD removed.
So, I want to make the case to the medical device industry that remote monitoring may be the key to solving the false positive problem. In that the data that remote monitoring systems collect and transmit may lead to better detection and discrimination. In addition with reference to my article on prediction, remote monitoring may enable physicians to tune ICDs based on specific predecessor events that could enable remotely adjusting the parameters on the ICD to allow better targeting.
I'm not an expert in this area. However, I know enough about indicator conditions in other areas that can be used to adjust systems and improve their accuracy.
defibrillator shocks: is there no place like home?" The entire article can be found at the following location: http://www.europace.oxfordjournals.org/content/11/4/409.full.pdf
For those of you unfamiliar with ICD's (implantable cardioverter
defibrillator), the ICD delivers a relatively high-voltage shock to the heart when conditions indicate that the heart may be about to go ventricle fibrillation (a rapid irregular heartbeat that will likely lead to death) or that the heart ceases beating. The latter condition is easily detected, however, determining the former condition is more difficult. Because the conditions are not always clear, ICD (and a companion system, the CRT-D) too frequently deliver shocks unnecessarily. (I have discussed issues related to detection in other articles in the blog. Here are the links to those discussions: http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-sensitivity-and.html, http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-update-to-sensitivity.html
http://medicalremoteprogramming.blogspot.com/2009/11/remote-monitoring-predictability.html) Another reason that an ICD might deliver unnecessary shocks would be because of sensor lead failure or near failure.
Joseph Marine examined the value of remote monitoring to the prevention of unnecessary shocks. He concluded that remote monitoring was particularly suited to providing early detection of failing sensor leads. However, ...
[f]inally, most inappropriate ICD shocks are not caused byIn other words, remote monitoring could not aid with improving the false positive rate - the delivery of unnecessary shocks.
lead failure, but rather by supraventricular arrhythmias, and this
study does not provide any evidence that home monitoring
reduces risk of inappropriate shocks from this cause.
To those who have not been involved with ICDs, it may seem that the delivery of an unnecessary may not be so bad given the alternative, that a failure to deliver a shock will likely lead to the patient's death. And there are many cardiologists who will argue the case for a "hair-trigger" system - acceptance of false positives, but no acceptance of false negative: that is a failure to deliver a shock when conditions warrant.
However, unnecessary shocks will do damage over time. Furthermore, those patients who have received a shock describe it as feeling like "... a mule kicked" them in the chest. I know of situations where patients who a received shocks eventually have the ICD removed.
So, I want to make the case to the medical device industry that remote monitoring may be the key to solving the false positive problem. In that the data that remote monitoring systems collect and transmit may lead to better detection and discrimination. In addition with reference to my article on prediction, remote monitoring may enable physicians to tune ICDs based on specific predecessor events that could enable remotely adjusting the parameters on the ICD to allow better targeting.
I'm not an expert in this area. However, I know enough about indicator conditions in other areas that can be used to adjust systems and improve their accuracy.
Labels:
accuracy,
Remote Monitoring,
Remote Programming
HE-75: Collecting Data and Modeling Tasks and Environment
This article expounds on my earlier article related to AAMI HE-75: Know what thy user does and where they do it.
Collect and Represent the Data
Ideally the first steps in the design process should occur before a design is ever considered. Unfortunately, in virtually every case I have encountered, a design for the user interface has already been in the works before the steps for collecting user and task related data have been performed.
Nevertheless, if you are one of the people performing the research, do as much as you can to push the design out of your mind and focus on objectively collecting and evaluating the data. And, in your data analysis, following the data and not your or the preconceived notions of someone else.
There are a variety of means for collecting data and representing it. The means for collecting the data will generally involve:
I cannot hope to provide detailed instructions in this blog. However, I can provide a few pointers. There published works on how to collect, analyze and model the data by leaders in the field.
Here are three books that can recommend and several can be found in my library:
User and Task Analysis for Interface Design by J. Hackos & J. Redish
I highly recommend this book. I use it frequently. For those of us experienced in the profession and with task and user analysis, what they discuss will seem familiar - as well it should. However, what they do are provide clear paths and methods for collecting data from users. The book is well-structured and extremely useful for practitioners. I had been using task and user analysis for a decade before this book came out. I found that by owning this book, I could throw all my notes away related to task and user analysis, and use this book as my reference.
Motion and Time Study: Improving Work Methods and Management
by F. Meyer
Motion and Time Study for Lean Manufacturing (3rd Edition) by F. Meyer & J. R. Stewart
Time and motion study is a core part of industrial engineering as the means to improve the manufacturing process. Historically, time and motion studies go back to Fredrick Taylor (http://en.wikipedia.org/wiki/Frederick_Winslow_Taylor) who pioneered this work in the later part of the 19th and in early part of the 20th Century. I have used time and motion studies as a means for uncovering problematic designs. Time and motion studies can be particularly useful when users are engaged in repetitive activities and as a means for improving efficiency and even as a means for reducing repeated stress injuries. The first book I have in my library however it is a bit old (but very inexpensive) so I include the second book by Meyers (and Stewart) that more recent. I can say that the methods of time and motion can be considered timeless, thus adding a book published in 1992 can still be valuable.
Time and motion studies can produce significant detail regarding the activities that those under observation perform. However, these studies are time-consuming and as such, expensive. Nevertheless, they can provide extremely valuable data that can uncover problems and improve efficiency.
Contextual Design: Defining Customer-Centered Systems (Interactive Technologies) by H. Beyer & K. Holtzblatt &
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design (Interactive Technologies) by K. Holtzblatt, J. B. Wendell & S. Wood
The first book I have in my library, but not the second. I have used many of the methods described in Contextual Design before the book was published. The contextual design process is one of the currently "hot" methods collecting user and task data, and as such, every practitioner should own a copy of this book - at least as a reference.
I believe what's particularly useful about this contextual inquiry is that it collects data about activities not directly observered. It's able but that affect the users and the tasks that they perform. For example, clinicians engaged in the remote monitoring of patients often have other duties, many of them patient related. Collecting data exclusively targeting remote monitoring activities (or the activities specific to a targeted device or company) can miss significant activities that impact remote monitoring and vice versa.
Additional Resources
As a graduate student, I had the privilege of having my education supported by Xerox's Palo Alto Research Center. I was able to work with luminaries of the profession, Tom Moran and Allen Newell on a couple of projects. In addition I was able to learn the GOMS model. I have found this model useful in that it nicely blends objectively observed activities with cognitive processes. However, the modeling process can be arduous, and as such, expensive.
Allen Newell and Herbert Simon are particularly well known for their research on chess masters and problem solving. They were well-known for their research method, protocol analysis. Protocol analysis is a method that has the person under observation verbally express their thoughts while engaged a particular activity. This enables the observer to collect data about the subject's thoughts, strategies and goals. This methodology has been adopted by the authors of contextual inquiry and one that I have often used in my research.
The problem with protocol analysis is that it cannot capture cognitive processes that occur beyond the level of consciousness, such as the perception. For example, subjects are unable to express how they perceive and identify words, or express how they are able to read sentences. These processes are largely automatic and thus not available to conscious processes. (I shall discuss methods that will enable one to collect data that involves automatic processes when I discuss usability testing in a later article.) However, protocol analysis can provide valuable data regarding a subject's thoughts particularly when that person reaches a point where confusion sets-in or where the person attempts to correct an error condition.
Here's a link from Wikipedia: http://en.wikipedia.org/wiki/GOMS.
Another book that I have in my library by a former Bell Labs human factors researcher, Thomas K. (TK) Landauer, is The Trouble with Computers: Usefulness, Usability, and Productivity.
This is fun book. I think it's much more instructive to the professional than Don Norman's book, The Psychology Of Everyday Things. (Nevertheless, I place the link to Amazon just the same. This is a good book for professional in the field to give to family members who ask "what do you do for a living?")
Tom rails against the many of the pressures and processes that push products, systems and services into the commercial space before they're ready from a human engineering standpoint. Although the book is relatively old, many of the points he makes are more relevant today than when the book was first published. The impluse to design user interfaces without reference or regard for users has been clearly noted by the FDA, hence the need for HE-75.
Collect and Represent the Data
Ideally the first steps in the design process should occur before a design is ever considered. Unfortunately, in virtually every case I have encountered, a design for the user interface has already been in the works before the steps for collecting user and task related data have been performed.
Nevertheless, if you are one of the people performing the research, do as much as you can to push the design out of your mind and focus on objectively collecting and evaluating the data. And, in your data analysis, following the data and not your or the preconceived notions of someone else.
There are a variety of means for collecting data and representing it. The means for collecting the data will generally involve:
- Observation - collecting the step-by-step activities as a person under observation performs their tasks.
- Inquiry - collecting data about the a person's cognitive processes.
- Task models - summary process models (with variants and edge cases) of how users perform each task. This is different from workflow models in that in task models no references to specific tools or systems should be included in the task model. A task model should be abstracted and represented at a level without reference to actions taking place on a particular device or system.
- Workflows - summary process models (with variants and edge cases) similar to the task flows with reference to a particular device or system. For example, if the user interface consists of a particular web page, there should be a reference to that webpage and the action(s) that took place.
- Cognitive models - a representation of the cognitive activities and processes that take place as the person performs a task.
- Breadth analysis - I have noted that this is often overlooked. Breadth analysis organizes the tasks by frequency of use and if appropriate, order of execution. This is also the place to represent the tasks that users perform in their work environment but were not directly part of the data collection process.
I cannot hope to provide detailed instructions in this blog. However, I can provide a few pointers. There published works on how to collect, analyze and model the data by leaders in the field.
Here are three books that can recommend and several can be found in my library:
User and Task Analysis for Interface Design by J. Hackos & J. Redish
I highly recommend this book. I use it frequently. For those of us experienced in the profession and with task and user analysis, what they discuss will seem familiar - as well it should. However, what they do are provide clear paths and methods for collecting data from users. The book is well-structured and extremely useful for practitioners. I had been using task and user analysis for a decade before this book came out. I found that by owning this book, I could throw all my notes away related to task and user analysis, and use this book as my reference.
Motion and Time Study: Improving Work Methods and Management
by F. Meyer
Motion and Time Study for Lean Manufacturing (3rd Edition) by F. Meyer & J. R. Stewart
Time and motion study is a core part of industrial engineering as the means to improve the manufacturing process. Historically, time and motion studies go back to Fredrick Taylor (http://en.wikipedia.org/wiki/Frederick_Winslow_Taylor) who pioneered this work in the later part of the 19th and in early part of the 20th Century. I have used time and motion studies as a means for uncovering problematic designs. Time and motion studies can be particularly useful when users are engaged in repetitive activities and as a means for improving efficiency and even as a means for reducing repeated stress injuries. The first book I have in my library however it is a bit old (but very inexpensive) so I include the second book by Meyers (and Stewart) that more recent. I can say that the methods of time and motion can be considered timeless, thus adding a book published in 1992 can still be valuable.
Time and motion studies can produce significant detail regarding the activities that those under observation perform. However, these studies are time-consuming and as such, expensive. Nevertheless, they can provide extremely valuable data that can uncover problems and improve efficiency.
Contextual Design: Defining Customer-Centered Systems (Interactive Technologies) by H. Beyer & K. Holtzblatt &
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design (Interactive Technologies) by K. Holtzblatt, J. B. Wendell & S. Wood
The first book I have in my library, but not the second. I have used many of the methods described in Contextual Design before the book was published. The contextual design process is one of the currently "hot" methods collecting user and task data, and as such, every practitioner should own a copy of this book - at least as a reference.
I believe what's particularly useful about this contextual inquiry is that it collects data about activities not directly observered. It's able but that affect the users and the tasks that they perform. For example, clinicians engaged in the remote monitoring of patients often have other duties, many of them patient related. Collecting data exclusively targeting remote monitoring activities (or the activities specific to a targeted device or company) can miss significant activities that impact remote monitoring and vice versa.
Additional Resources
As a graduate student, I had the privilege of having my education supported by Xerox's Palo Alto Research Center. I was able to work with luminaries of the profession, Tom Moran and Allen Newell on a couple of projects. In addition I was able to learn the GOMS model. I have found this model useful in that it nicely blends objectively observed activities with cognitive processes. However, the modeling process can be arduous, and as such, expensive.
Allen Newell and Herbert Simon are particularly well known for their research on chess masters and problem solving. They were well-known for their research method, protocol analysis. Protocol analysis is a method that has the person under observation verbally express their thoughts while engaged a particular activity. This enables the observer to collect data about the subject's thoughts, strategies and goals. This methodology has been adopted by the authors of contextual inquiry and one that I have often used in my research.
The problem with protocol analysis is that it cannot capture cognitive processes that occur beyond the level of consciousness, such as the perception. For example, subjects are unable to express how they perceive and identify words, or express how they are able to read sentences. These processes are largely automatic and thus not available to conscious processes. (I shall discuss methods that will enable one to collect data that involves automatic processes when I discuss usability testing in a later article.) However, protocol analysis can provide valuable data regarding a subject's thoughts particularly when that person reaches a point where confusion sets-in or where the person attempts to correct an error condition.
Here's a link from Wikipedia: http://en.wikipedia.org/wiki/GOMS.
Another book that I have in my library by a former Bell Labs human factors researcher, Thomas K. (TK) Landauer, is The Trouble with Computers: Usefulness, Usability, and Productivity.
This is fun book. I think it's much more instructive to the professional than Don Norman's book, The Psychology Of Everyday Things. (Nevertheless, I place the link to Amazon just the same. This is a good book for professional in the field to give to family members who ask "what do you do for a living?")
Tom rails against the many of the pressures and processes that push products, systems and services into the commercial space before they're ready from a human engineering standpoint. Although the book is relatively old, many of the points he makes are more relevant today than when the book was first published. The impluse to design user interfaces without reference or regard for users has been clearly noted by the FDA, hence the need for HE-75.
Labels:
AAMI,
ANSI,
GOMS,
HE75,
Human factors,
measurement,
Task Analysis,
User Analysis,
User Modeling
Monday, April 19, 2010
Market Research Report Available: Remote & Wireless Patient Monitoring Markets
A new market research report has just been made available that discusses the market and investment potential of remote and wireless monitoring of patients. I do not endorse this study or suggest it's purchase. I am making it's existence known.
Here's a list of some of disorders covered by the study:
Here's the link to the press release and links to purchasing this study: http://www.marketresearch.com/product/display.asp?productid=2645944&g=1
Here's a list of some of disorders covered by the study:
- Asthma
- COPD
- CHF
- CHD
- Diabetes
Patient monitoring systems are emerging in response to increased healthcare needs of an aging population, new wireless technologies, better video and monitoring technologies, decreasing healthcare resources, an emphasis on reducing hospital days, and proven cost-effectiveness.
Of these new high-tech patient monitoring systems, nearly all focus on some form of wireless or remote patient monitoring. ...
... the following companies are profiled in detail in this report:
- Abbott Laboratories, Inc
- Aerotel Medical Systems
- GE Healthcare
- Honeywell HomMed LLC
- Intel Corporation
- Philips Medical Systems
- Roche Diagnostics Corporation
Here's the link to the press release and links to purchasing this study: http://www.marketresearch.com/product/display.asp?productid=2645944&g=1
Saturday, April 17, 2010
Article: Investments in Real Time Medical Monitoring
This is an article targeted to the investment community regarding investment in real time medical monitoring. I do not endorse anything in this article. However I do find it interesting. I do not know the track record of this publication. Nevertheless, here a link to the article: http://www.onemedplace.com/blog/archives/4878
Article: Initiation of a Telemonitoring Study of Heart Failure, COPD and Diabetes Patients
A study will be performed by researchers from Case Western Reserve University and Cleveland State University with patients suffering from heart failure, diabetes and COPD. The objective of the study will be to determine how effective remote monitoring is with maintaining the health of these patients and with keeping them out of the hospital.
Here's a link to a report on this study: http://www.physorg.com/news190634143.html
Additional Resources
COPD
The Complete Guide to Understanding and Living with COPD: From A COPDer's Perspective
COPD For Dummies
Diabetes
Diabetes For Dummies (For Dummies (Health & Fitness))
Tell Me What to Eat If I Have Diabetes: Nutrition You Can Live With
The Official Pocket Guide to Diabetic Exchanges
Heart Failure
The Cleveland Clinic Guide to Heart Failure (Cleveland Clinic Guides)
Manual of Heart Failure Management
Subscribe to:
Posts (Atom)