Browse > Article
http://dx.doi.org/10.7838/jsebs.2019.24.1.017

An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment  

Kim, Yanghoon (Department of Industrial Security, Far East University)
Jeong, Wonwho (Department of Convergence Security, Chung-Ang University)
Publication Information
The Journal of Society for e-Business Studies / v.24, no.1, 2019 , pp. 17-27 More about this Journal
Abstract
With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.
Keywords
Medical Industry; Smart Healthcare Security Platform; Hospital Information Systems; Medical Industry Stakeholders;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Barrow, R. C., "Privacy, Confidentiality, and Electronic Medical Record," Journal of the American Medical Informatics Association, Vol. 3, No. 2, pp. 139-148, 1996.   DOI
2 Cao, F., Huang, H. K., and Zhou, X. Q., "Medical Image Security in a HIPAA Mandated PACS Environment," Computerized Medical Imaging and Graphics, Vol. 27, No. 2, pp. 185-196, 2003.   DOI
3 "Cyber Security Guide for Smart Medical Service," Korea Internet & Security Agency, 2018.
4 Glemm, A. L., Scott, R., Robert, M. S., and Nitesh, R. T., "If Electronic Medical Records are so Great, Why aren't Family Physicians Using Them?," Journal of Family Practice, Vol. 51, No. 7, 2002.
5 Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K., "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices," ACM SIGCOMM Computer Communication Review, Vol. 41, No. 4, pp. 2-13. 2011.   DOI
6 Halperin, D., Thomas, S. H., Fu, K., Tadayoshi, K., and Maisel, W. H., "Security and Privacy for Implantable Medical Devices," The Community for Technology Leaders, Vol. l7, No. 1, 2008.
7 Jung, Y. S., "Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service," Korea Society of Industrial Information Systems, Vol. 15, No. 2, pp. 115-126, 2010.
8 Kim, D. W. and Han, K. H., "Recent Research Trends for Responding to Security Threats in Smart Healthcare Environment," Information & Communications Magazine, Vol. 35, No. 2, pp. 95-99, 2018.
9 Kim, Y. H. and Chang, H. B., "The Change of Future Environment and The Task of Healthcare Security," OSIA S&TR Journal, Vol. 31, No. 2, pp. 4-9, 2018.
10 Koo, C. C., Shyy, Y. M., iMedica Corp., "Medical Records Data Security System," U.S. Patent 6,874,085, 2005.
11 Kumar, P. and Lee, H. J., "Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey," Sensors, Vol. 12, No. 1, pp. 55-91, 2012.   DOI
12 Lee, Y. H. and Jung, C. S., "Design of Privilege Authentication for Secure OS based on PKI," Korea Institute of Information Scientists and Engineers, Vol. 34, No. 1, 2007.
13 Oh, K. Y., "The Point of Issue and Blind on a Debate Concerning De-identification of Data," Korean Public Law Association, Vol. 45, No. 2, 2016.
14 Park, S. H., Kim, Y. H., Park, G. M., Na, O. C., and Chang, H. B., "Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment," Sustainability, Vol. 10, No. 4, pp. 1-24, 2018.   DOI
15 Williams, P., "A Practical Application of CMM to Medical Security Capability," Information Management & Computer Security, Vol. 16, No. 1, pp. 58-73, 2008.   DOI
16 Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., "Taiwan's Perspective on Electronic Medical Records' Security and Privacy Protection: Lessons Learned from HIPAA," Computer Methods and Programs in Biomedicine, Vol. 82, No. 3, pp. 277-282, 2006.   DOI
17 Lee, K. K., Jung, Y. S., and Han, C. H., "A Study on Consumer's Acceptance of Medical Internet Marketing According to Medical Departments," The Journal of Society for e-Business Studies, Vol. 14, No. 1, pp. 121-142, 2009.
18 Kim, J. W. and Chang, H., "A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions," The Journal of Society for e-Business Studies, Vol. 23, No. 1, pp. 89-102, 2018.   DOI