| Literature DB >> 29205294 |
Elena S Izmailova1, John A Wagner1, Eric D Perakslis1.
Abstract
The development of innovative wearable technologies has raised great interest in new means of data collection in healthcare and biopharmaceutical research and development. Multiple applications for wearables have been identified in a number of therapeutic areas; however, researchers face many challenges in the clinic, including scientific methodology as well as regulatory, legal, and operational hurdles. To facilitate further evaluation and adoption of these technologies, we highlight methodological and logistical considerations for implementation in clinical trials, including key elements of analytical and clinical validation in the specific context of use (COU). Additionally, we provide an assessment of the maturity of the field and successful examples of recent clinical experiments.Entities:
Mesh:
Year: 2018 PMID: 29205294 PMCID: PMC6032822 DOI: 10.1002/cpt.966
Source DB: PubMed Journal: Clin Pharmacol Ther ISSN: 0009-9236 Impact factor: 6.875
Examples of wearable sensors
| Device type | Data collected | Examples |
|---|---|---|
| Wrist worn | Actigraphy, HR (Heart Rate), BP (Blood Pressure), EDA (Electrodermal activity) | Actiwatch Spectrum by Phillips, ActiGraph Link by ActiGraph, E4 by Empatica, ViSi Mobile by Sotera Wireless |
| Skin patch | ECG (Electrocardiography), actigraphy, skin temperature | BioStampRC by MC10, HealthPatch by Vital Connect, BodyGuardian by Preventice |
| Cuffs | BP, HR | Intellisense Digital BP Monitor by Omron Healthcare |
| Finger worn | HR, SpO2 | iSpO2 Pulse Oximeter by Massimo |
| Clothing embedded sensors | HR, HRV (Heart Rate Variability), ECG, Breathing Rate, actigraphy | Smart shirts by Hexoskin |
| Headbands | EEG (Electroencephalogram), EMG (Electromyography) | EMOTIV EPOC by Emotiv, 4D FORCE by 4D FORCE |
Novel endpoints: application, benefits, and examples
| Application | Benefit | Examples and references |
|---|---|---|
| Safety monitoring/patient phenotyping |
• Early safety signal, dose and frequency adjustments, discontinuation of certain drug candidates | Vital sign, e.g. HR, RR, skin temperature, BP, and actigraphy |
| Novel endpoints |
• Mobility as a measure of quality of life |
• Actigraphy in Oncology |
| Medication adherence monitoring and intervention |
• Improved adherence |
• Adherence surveys |
| Patient enrollment and retention in clinical trials |
• Fewer obstacles to enroll in clinical trials |
• Remote enrollment and consent apps |
New families of privacy and security controls
| Control family | Key example controls |
|---|---|
| Access Control | Account Management, Access Enforcement, Information Flow Enforcement |
| Awareness & Training | General Awareness Training, Role‐based Training |
| Audit & Accountability | Audit Event Management, Audit Review Analysis & Reporting |
| Assessment, Authorization & Monitoring | Annual Assessments, Assessment Guidelines, Independent Assessment |
| Configuration Management | Baseline Configuration, Configuration Change Control |
| Contingency Planning | Contingency Plan, Contingency Training, Contingency Plan Testing |
| Identification and Authentication | User Management, Device Management, Management of Unique Identifiers |
| Individual Participation | Individual Consent, Redress, Access, Privacy Notices and ACT Statements |
| Incident Response | Incident Response Policies & Procedures, Training, Testing, Handling, Monitoring |
| Maintenance | Controlled Maintenance, Maintenance Tools, Personnel, Local & Non‐local |
| Media Protection | Media Access, Media Marking, Storage & Transport, Sanitization and Use |
| Privacy Authorization | Authority to Collect, Purpose and Sharing |
| Physical and Environmental Protection | Physical Access Authorization & Control, Monitoring |
| Planning | Security & Privacy Plans, Updates, Rules of Behavior, Impact Assessments |
| Program Management | Program Plan, Roles, Resources, Inventory, Architecture and Performance |
| Personnel Security | Personnel Screening, Risk Designation, Transfer and Termination |
| Risk Assessment | Security Categorization, Assessment and Vulnerability Scanning |
| System and Services Acquisition | Resource Allocation, Systems Lifecycle, Acquisition and Documentation |
| System and Communications Protection | Application Partitioning, Security Function Isolation, Boundary Protection |
| System and Information Integrity | Flaw Remediation, Malicious Code Protection, Monitoring, Alerts & Advisories |
Figure 2Most common and potential cyber threat vectors.
Figure 3Scientific, validation, and operational considerations for wearable device implementation in clinical trials.