You are here

Discrete Event Simulation and Optimization Approach for Balancing Usability and Security for Medical Devices in an Integrated Clinical Environment

Award Information
Agency: Department of Defense
Branch: Defense Health Agency
Contract: W81XWH-15-C-0200
Agency Tracking Number: H151-005-0129
Amount: $149,931.00
Phase: Phase I
Program: SBIR
Solicitation Topic Code: DHP15-005
Solicitation Number: 2015.1
Solicitation Year: 2015
Award Year: 2015
Award Start Date (Proposal Award Date): 2015-09-30
Award End Date (Contract End Date): 2016-04-29
Small Business Information
3504 Lake Lynda Drive Suite 390
Orlando, FL 32817
United States
DUNS: 075104708
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 George Chadderdon
 Senior Data Modeler
 (407) 706-0977
Business Contact
 John Stanney
Phone: (407) 706-0977
Research Institution

Integrated clinical environments (ICEs) include medical devices and systems that process, store, and share sensitive data over networks. This requires that security concerns and data privacy be addressed. However, the design of such controls can conflict with the usability of the medical devices, especially in high pressure, time-sensitive conditions such as acute clinical and remote care settings. For multiple team members, patients, devices, and locations, it is difficult to gauge how different configurations of security controls impact the safety, usability, and workflow of the system. There is a great need for computerized workflow models that represent complex clinical scenarios which may be used to analyze the impact of security controls on medical device systems while balancing usability concerns and minimizing impact on clinical workflow. Design Interactive, Inc. (DI) proposes to develop the Security and Usability Model for Devices in an Integrated Clinical Environment (SUM-DEVICE) System, which allows interactive exploration of performance of a simulation model for a clinical workflow scenario using multiple medical devices with an array of possible security mechanisms that can be selected. Performance of the simulation is then measured using a set of metrics to evaluate security, usability, and workflow in a given run of the simulation.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government