{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:46:48Z","timestamp":1775263608090,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031948541","type":"print"},{"value":"9783031948558","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94855-8_22","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:51:10Z","timestamp":1749793870000},"page":"338-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MDCG 2019-16 Guidelines: Case Study-Based Assessment and\u00a0Path Forward"],"prefix":"10.1007","author":[{"given":"Christos","family":"Androutsos","sequence":"first","affiliation":[]},{"given":"Steve","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Karin","family":"Bernsmed","sequence":"additional","affiliation":[]},{"given":"Andrea Neverdal","family":"Skytterholm","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Epiphaniou","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Moukafih","sequence":"additional","affiliation":[]},{"given":"Theodoros N.","family":"Arvanitis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Messinis","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Papadakis","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Fruscione","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9s","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Dusko","family":"Milojevic","sequence":"additional","affiliation":[]},{"given":"Dimitrios S.","family":"Karas","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Fotos","sequence":"additional","affiliation":[]},{"given":"Max","family":"Ostermann","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Freyer","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Gilbert","sequence":"additional","affiliation":[]},{"given":"Vasilis","family":"Pezoulas","sequence":"additional","affiliation":[]},{"given":"Lambros","family":"Athanasiou","sequence":"additional","affiliation":[]},{"given":"George","family":"Gkois","sequence":"additional","affiliation":[]},{"given":"Dimitrios I.","family":"Fotiadis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"22_CR1","unstructured":"MDCG 2019-16 - Guidance on Cybersecurity for medical devices. Document date: 06\/01\/2020 - Created by GROW.R.2.DIR - Last update: 22\/06\/2020. https:\/\/ec.europa.eu\/docsroom\/documents\/41863"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Taylor, S., et al.: A way forward for the MDCG 2019-16 medical device security guidance. In: 17th International Conference on PErvasive Technologies Related to Assistive Environments, pp. 593\u2013599. Association for Computing Machinery (2024)","DOI":"10.1145\/3652037.3663894"},{"key":"22_CR3","unstructured":"OWASP. https:\/\/owasp.org\/www-project-mobile-top-10\/2023-risks\/. Accessed 06 Feb 2025"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s11517-023-02912-0","volume":"62","author":"CM Mej\u00eda-Granda","year":"2024","unstructured":"Mej\u00eda-Granda, C.M., Fern\u00e1ndez-Alem\u00e1n, J.L., Carrillo-de-Gea, J.M., Garc\u00eda-Bern\u00e1, J.A.: Security vulnerabilities in healthcare: an analysis of medical devices and software. Med. Biol. Eng. Comput. 62(1), 257\u2013273 (2024)","journal-title":"Med. Biol. Eng. Comput."},{"key":"22_CR5","unstructured":"Mode Sensors AS Homepage. https:\/\/www.modesensors.com\/. Accessed 06 Feb 2025"},{"key":"22_CR6","unstructured":"PD Neurotechnology Homepage. https:\/\/www.pdneurotechnology.com. Accessed 06 Feb 2025"},{"key":"22_CR7","unstructured":"Debiotech Homepage. https:\/\/www.debiotech.com. Accessed 06 Feb 2025"},{"key":"22_CR8","unstructured":"FreeStyle Libre Homepage. https:\/\/www.freestyle.abbott\/us-en\/products\/freestyle-libre-2.html. Accessed 06 Feb 2025"},{"key":"22_CR9","unstructured":"Ospedale San Raffaele Homepage. https:\/\/research.hsr.it\/en\/index.html. Accessed 06 Feb 2025"},{"key":"22_CR10","unstructured":"IPFS Homepage. https:\/\/ipfs.tech. Accessed 06 Feb 2025"},{"key":"22_CR11","unstructured":"Hospital Ni\u00f1 Jes\u00fas Homepage. https:\/\/www.comunidad.madrid\/hospital\/ninojesus\/. Accessed 06 Feb 2025"},{"key":"22_CR12","unstructured":"Hospitals Bambino Ges\u00f9 of Rome. https:\/\/www.ospedalebambinogesu.it. Accessed 06 Feb 2025"},{"key":"22_CR13","unstructured":"Charit\u00e9 of Berlin. https:\/\/claim.charite.de\/en. Accessed 06 Feb 2025"},{"issue":"5","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s10877-023-01013-5","volume":"37","author":"AJ Cartwright","year":"2023","unstructured":"Cartwright, A.J.: The elephant in the room: cybersecurity in healthcare. J. Clin. Monit. Comput. 37(5), 1123\u20131132 (2023)","journal-title":"J. Clin. Monit. Comput."},{"key":"22_CR15","unstructured":"KARDINBLU project Homepage. https:\/\/www.kardinero.com.tr\/english\/news\/tubitak-grant-for-our-kardinblu-project. Accessed 06 Feb 2025"},{"key":"22_CR16","unstructured":"Tellu Homepage. https:\/\/www.tellu.no\/en\/services\/remote-patient-monitoring\/. Accessed 06 Feb 2025"},{"key":"22_CR17","unstructured":"Eukon Homepage. https:\/\/www.eukon.it\/products\/compact-7\/. Accessed 06 Feb 2025"},{"key":"22_CR18","unstructured":"Feel Homepage. https:\/\/rpm.feeltherapeutics.com. Accessed 06 Feb 2025"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/s41746-024-01044-5","volume":"7","author":"S Gilbert","year":"2024","unstructured":"Gilbert, S., Ricciardi, F., Mehrali, T., Patsakis, C.: Can we learn from an imagined ransomware attack on a hospital at home platform? NPJ Digit. Med. 7(1), 65 (2024)","journal-title":"NPJ Digit. Med."},{"key":"22_CR20","unstructured":"Ostermann, M., Freyer, O., Jahed, F., Rosenzweig, C., Gilbert, S.: Cybersecurity in the hospital at home: assessment of patient risks when using IoMT devices. Zenodo (2024)"},{"key":"22_CR21","unstructured":"Ostermann, M., Gilbert, S., Freyer, O.: Cybersecurity requirements for medical devices in the EU and US - a comparison and gap analysis. Zenodo (2024)"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"e65528","DOI":"10.2196\/65528","volume":"26","author":"O Freyer","year":"2024","unstructured":"Freyer, O., Jahed, F., Ostermann, M., Rosenzweig, C., Werner, P., Gilbert, S.: Consideration of cybersecurity risks in the benefit-risk analysis of medical devices: scoping review. J. Med. Internet Res. 26, e65528 (2024)","journal-title":"J. Med. Internet Res."}],"container-title":["Communications in Computer and Information Science","Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94855-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:13:55Z","timestamp":1765196035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94855-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031948541","9783031948558"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94855-8_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Interdisciplinary Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rennes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eicc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fvv.um.si\/eicc2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}