{"id":573,"date":"2025-10-27T15:31:29","date_gmt":"2025-10-27T18:31:29","guid":{"rendered":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/?p=573"},"modified":"2025-10-27T15:33:34","modified_gmt":"2025-10-27T18:33:34","slug":"documentacion-y-clasificacion-de-anomalias-de-software-medico-para-aportar-a-la-confiabilidad-de-su-desarrollo","status":"publish","type":"post","link":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/2025\/10\/27\/documentacion-y-clasificacion-de-anomalias-de-software-medico-para-aportar-a-la-confiabilidad-de-su-desarrollo\/","title":{"rendered":"Documentaci\u00f3n y clasificaci\u00f3n de anomal\u00edas de software m\u00e9dico para aportar a la confiabilidad de su desarrollo"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">Resumen<\/h4>\n\n\n\n<p><p>En la actualidad el software m\u00e9dico tiene un papel protag\u00f3nico en diagn\u00f3sticos y tratamientos de pacientes, ya que constituye un gran soporte a los profesionales de la salud. La creciente integraci\u00f3n de tecnolog\u00edas de software, en el \u00e1rea de la salud ha transformado la atenci\u00f3n m\u00e9dica. Sin embargo, esta evoluci\u00f3n conlleva una dependencia cr\u00edtica en el software que cada vez tiene funciones m\u00e1s cr\u00edticas. Los incidentes que afectan la seguridad de los pacientes son reportados frecuentemente, incidiendo en la confiabilidad y siempre el estudio en profundidad de los casos resulta escaso con escasas lecciones aprendidas. El objetivo de este trabajo es presentar los avances de una investigaci\u00f3n de casos de estudio de anomal\u00edas en software m\u00e9dico con el objetivo de analizar aportar a mejorar su confiabilidad y seguridad. Para ello, se llev\u00f3 a cabo una documentaci\u00f3n y clasificaci\u00f3n de incidentes. La clasificaci\u00f3n preliminar determin\u00f3 que los defectos son la principal causa de anomal\u00edas en software m\u00e9dico, seguidos por fallas y errores. Los resultados preliminares de este trabajo apoyan la visi\u00f3n sobre la necesidad de implementar enfoques m\u00e1s rigurosos en el desarrollo de software m\u00e9dico, con posibles estrategias como el dise\u00f1o por contratos y los m\u00e9todos formales. Adicionalmente, se busca visibilizar la importancia de este campo dentro de la Bioingenier\u00eda.<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/396559617_Documentacion_y_clasificacion_de_anomalias_de_software_medico_para_aportar_a_la_confiabilidad_de_su_desarrollo\" target=\"_blank\" rel=\"noopener\">Ver publicaci\u00f3n<\/a><\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Resumen En la actualidad el software m\u00e9dico tiene un papel protag\u00f3nico en diagn\u00f3sticos y tratamientos de pacientes, ya que constituye un gran soporte a los profesionales de la salud. La creciente integraci\u00f3n de tecnolog\u00edas de software, en el \u00e1rea de la salud ha transformado la atenci\u00f3n m\u00e9dica. Sin embargo, esta evoluci\u00f3n conlleva una dependencia cr\u00edtica [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[],"class_list":["post-573","post","type-post","status-publish","format-standard","hentry","category-publicaciones"],"_links":{"self":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":5,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/573\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/573\/revisions\/578"}],"wp:attachment":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/media?parent=573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/categories?post=573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/tags?post=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}