Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters










Database
Language
Publication year range
1.
Plast Reconstr Surg ; 153(4): 967-975, 2024 Apr 01.
Article in English | MEDLINE | ID: mdl-37199437

ABSTRACT

SUMMARY: A biosensor uses a biological molecule to measure a chemical reaction. Wearable biosensors that attach to the body externally, including tooth enamel biosensors, contact lens biosensors, sweat biosensors, and skin tattoo biosensors, are in development. Nanoparticle-based biosensors are being developed to allow for the early detection of cancerous biomarkers. Applications relevant to plastic surgery include the development of biosensors that can detect metastatic breast cancer cells, bioimpedance spectroscopy, and intraoperative point-of-care diagnostics.


Subject(s)
Biosensing Techniques , Humans , Biosensing Techniques/methods
2.
Plast Reconstr Surg ; 153(1): 204e-217e, 2024 01 01.
Article in English | MEDLINE | ID: mdl-37075274

ABSTRACT

SUMMARY: Artificial intelligence (AI) has been a disruptive technology within health care, from the development of simple care algorithms to complex deep-learning models. AI has the potential to reduce the burden of administrative tasks, advance clinical decision-making, and improve patient outcomes. Unlocking the full potential of AI requires the analysis of vast quantities of clinical information. Although AI holds tremendous promise, widespread adoption within plastic surgery remains limited. Understanding the basics is essential for plastic surgeons to evaluate the potential uses of AI. This review provides an introduction of AI, including the history of AI, key concepts, applications of AI in plastic surgery, and future implications.


Subject(s)
Plastic Surgery Procedures , Surgeons , Humans , Artificial Intelligence , Algorithms , Delivery of Health Care
3.
Plast Reconstr Surg ; 152(1): 239-249, 2023 07 01.
Article in English | MEDLINE | ID: mdl-37382921

ABSTRACT

SUMMARY: Although robotic surgery has been routinely established in other surgical disciplines, robotic technologies have been less readily adopted in plastic surgery. Despite a strong demand for innovation and cutting-edge technology in plastic surgery, most reconstructive procedures, including microsurgery, have continued to necessitate an open approach. Recent advances in robotics and artificial intelligence, however, are gaining momentum and have shown significant promise to improve patient care in plastic surgery. These next-generation surgical robots have the potential to enable surgeons to perform complex procedures with greater precision, flexibility, and control than previously possible with conventional techniques. Successful integration of robotic technologies into clinical practice in plastic surgery requires achieving key milestones, including implementing appropriate surgical education and garnering patient trust.


Subject(s)
Plastic Surgery Procedures , Robotic Surgical Procedures , Robotics , Surgery, Plastic , Humans , Artificial Intelligence
4.
Plast Reconstr Surg ; 2023 May 22.
Article in English | MEDLINE | ID: mdl-37220229

ABSTRACT

Plastic surgery offices are subject to a wide variety of cybersecurity threats, including ransomware attacks that encrypt the plastic surgeon's information and make it unusable, as well as data theft and disclosure attacks that threaten to disclose confidential patient information. Cloud-based office systems increase the attack surface and do not mitigate the effects of breaches that can result in theft of credentials. Although employee education is often recommended to avoid the threats, a single error by a single employee has often led to security breaches, and it is not reasonable to expect that no employee will ever make an error. A recognition of the two most common vectors of these breaches, compromised email attachments and surfing to compromised websites, allows the use of technical networking tools to both prevent email attachments from being received and to prevent employee use of unsanctioned and potentially compromised websites. Further, once compromised code is allowed to run within the office network, that code must necessarily make outbound connections to exploit the breach. Preventing that outbound traffic can mitigate the effects of a breach. However, most small office network consultants design firewalls to only limit incoming network traffic and fail to implement technical measures to stop the unauthorized outbound traffic that is necessary for most network attacks. Detailed techniques are provided which can be used to direct IT consultants to properly limit outbound network traffic as well as incoming email attachments, with more information at https://officenetworksecurity.com.

5.
Plast Reconstr Surg ; 152(4): 751e-758e, 2023 10 01.
Article in English | MEDLINE | ID: mdl-36917745

ABSTRACT

SUMMARY: Blockchain technology has attracted substantial interest in recent years, most notably for its effect on global economics through the advent of cryptocurrency. Within the health care domain, blockchain technology has been actively explored as a tool for improving personal health data management, medical device security, and clinical trial management. Despite a strong demand for innovation and cutting-edge technology in plastic surgery, integration of blockchain technologies within plastic surgery is in its infancy. Recent advances and mainstream adoption of blockchain are gaining momentum and have shown significant promise for improving patient care and information management. In this article, the authors explain what defines a blockchain and discuss its history and potential applications in plastic surgery. Existing evidence suggests that blockchain can enable patient-centered data management, improve privacy, and provide additional safeguards against human error. Integration of blockchain technology into clinical practice requires further research and development to demonstrate its safety and efficacy for patients and providers.


Subject(s)
Blockchain , Humans , Delivery of Health Care , Privacy , Data Management , Computer Security
SELECTION OF CITATIONS
SEARCH DETAIL
...