Foreword |
|
ix | |
Acknowledgements |
|
xi | |
Introduction |
|
xiii | |
|
|
1 | (16) |
|
Chapter 1 Connected Objects |
|
|
3 | (8) |
|
1.1 What is a connected object? |
|
|
3 | (2) |
|
1.2 The different categories of connected objects |
|
|
5 | (3) |
|
1.2.1 Connected objects having the status of connected medical devices |
|
|
5 | (2) |
|
1.2.2 Connected objects not having the status of medical devices; they do not necessarily have a medical purpose |
|
|
7 | (1) |
|
1.3 The actors in the ecosystem of a connected medical device |
|
|
8 | (3) |
|
Chapter 2 The Digitization of Health |
|
|
11 | (6) |
|
2.1 Definitions of basic concepts |
|
|
11 | (3) |
|
2.1.1 The quantified self |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
2.2 Toward a convergence of the connected objects market |
|
|
14 | (3) |
|
2.2.1 Estimates from the connected objects market |
|
|
14 | (1) |
|
2.2.2 Estimates from the connected health market |
|
|
15 | (2) |
|
Part 2 Analysis and Cartography of the Risks Linked to Connected Object Usage |
|
|
17 | (60) |
|
Chapter 3 Project Management |
|
|
19 | (4) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
3.4 Role of the risk manager |
|
|
21 | (2) |
|
Chapter 4 Comprehensive Risk Analysis Process |
|
|
23 | (30) |
|
4.1 Comprehensive risk analysis system |
|
|
23 | (21) |
|
4.1.1 Functional analysis |
|
|
23 | (9) |
|
4.1.2 Value and analysis notion approach |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (5) |
|
4.1.6 Cartography of dangerous situations |
|
|
40 | (4) |
|
|
44 | (9) |
|
|
44 | (1) |
|
4.2.2 Scale of likelihood |
|
|
44 | (3) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (3) |
|
Chapter 5 Results of the Scenario and Dangerous Situation Analysis |
|
|
53 | (4) |
|
5.1 Dangerous situation analysis |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (3) |
|
5.2.1 Measurements already implemented by certain manufacturers |
|
|
54 | (1) |
|
5.2.2 Scenario estimation by initial criticity |
|
|
55 | (1) |
|
5.2.3 Scenario estimation by residual criticity |
|
|
56 | (1) |
|
Chapter 6 Comprehensive Risk Analysis by Subfunction and by Danger |
|
|
57 | (10) |
|
|
57 | (3) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (7) |
|
|
60 | (2) |
|
|
62 | (3) |
|
|
65 | (2) |
|
Chapter 7 The Scales of Loss and Effort |
|
|
67 | (6) |
|
7.1 Analysis of the scales loss and effort |
|
|
67 | (1) |
|
|
68 | (1) |
|
7.3 Risk-reduction action plan and catalogue of security parameters |
|
|
69 | (4) |
|
Chapter 8 Comprehensive Approach |
|
|
73 | (4) |
|
8.1 Contribution from the comprehensive risk analysis process |
|
|
73 | (1) |
|
8.2 New health challenges: risks emerging from the use of connected medical devices |
|
|
74 | (3) |
|
Part 3 Connected Objects, a New Era for Scientific Revolution |
|
|
77 | (12) |
|
Chapter 9 Prospects in Health |
|
|
79 | (4) |
|
9.1 Connected medical devices, participatory contribution to research |
|
|
79 | (1) |
|
9.1.1 Sorting rare pathologies at the border: the case of ebola |
|
|
79 | (1) |
|
9.2 Epidemiological monitoring |
|
|
80 | (1) |
|
9.3 The patient becomes an active member of the healthcare team |
|
|
80 | (1) |
|
9.4 Development of online portals (patient portal) with or without subscriptions |
|
|
81 | (2) |
|
Chapter 10 A Step Towards the Augmented Human |
|
|
83 | (6) |
|
|
83 | (2) |
|
|
85 | (1) |
|
10.3 Some applications of connected health and nanotechnologies to move toward the augmented human |
|
|
86 | (3) |
|
Part 4 Methodological Approach |
|
|
89 | (70) |
|
Chapter 11 Functional Need Analysis |
|
|
91 | (6) |
|
11.1 Functional need analysis |
|
|
91 | (6) |
|
11.1.1 Definition of the octopus diagram |
|
|
91 | (1) |
|
11.1.2 Function validation |
|
|
92 | (2) |
|
11.1.3 Product characterization |
|
|
94 | (1) |
|
11.1.4 Appreciation criteria |
|
|
95 | (2) |
|
Chapter 12 Comprehensive Risk Scenario Analysis Cartography |
|
|
97 | (38) |
|
|
97 | (38) |
|
Chapter 13 Risk-Reduction Action Forms |
|
|
135 | (24) |
|
13.1 Risk-reduction actions |
|
|
135 | (2) |
|
13.1.1 Synthesis of the risk-reduction actions |
|
|
135 | (1) |
|
13.1.2 Number of risk-reduction actions per system element and danger |
|
|
136 | (1) |
|
13.2 List of the risk-reduction action forms |
|
|
137 | (22) |
|
13.2.1 Number of security parameters per system element and danger |
|
|
154 | (5) |
Conclusion |
|
159 | (2) |
Glossary |
|
161 | (4) |
Bibliography |
|
165 | (4) |
Index |
|
169 | |