• Title/Summary/Keyword: Health privacy

Search Result 241, Processing Time 0.023 seconds

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

What Roles should Population-based Cancer Registries be Playing in the 21st Century? Reflections on the Asian Cancer Registry Forum, Bangkok, February 2014

  • Roder, David
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.5
    • /
    • pp.1895-1896
    • /
    • 2014
  • Cancer registries have fundamental roles in cancer surveillance, research, and health services planning, monitoring and evaluation. Many are now assuming a broader role by contributing data for health-service management, alongside data inputs from other registries and administrative data sets. These data are being integrated into de-identified databases using privacy-protecting data linkage practices. Structured pathology reporting is increasing registry access to staging and other prognostic descriptors. Registry directions need to vary, depending on local need, barriers and opportunities. Flexibility and adaptability will be essential to optimize registry contributions to cancer control.

A Study on Improvement of Personal Information Protection Control Log Quality: A Case of the Health and Welfare Division (개인정보통합관제 로그품질 분석 및 개선에 관한 연구: 보건복지 분야 사례를 중심으로)

  • Lee, Yari;Hong, Kyong Pyo;Kim, Jung Sook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.42-51
    • /
    • 2015
  • In this paper, we analyze the quality status of Health and Welfare division's standardized log and asses the characteristics of the institutions' logs analysis to establish the criteria to minimize hazards and control the quality of log's institutional details to limit extraction. As a result, extraction condition's proposed development direction to adequately assess and control health and welfare abuses privacy control target log. This improvement over the status and quality of information shared with relation to institutional work of the log quality characteristics is made possible. In addition, quality control and inspection standards were prepared in accordance with the institutional log characteristics. Future research will include performing continuous analysis and improvement activities on the quality of logs with integrated control of sharing personal information and distributing information about logs' quality to proactively target organ. Therefore, we expect that correcting proactive personal information misuse and leakage is possible to achieve.

Healthcare System using Pegged Blockchain considering Scalability and Data Privacy

  • Azizan, Akmal;Pham, Quoc-Viet;Han, Suk Young;Kim, Jung Eon;Kim, Hoon;Park, Junseok;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.613-625
    • /
    • 2019
  • The rise of the Internet of Things (IoT) devices have greatly influenced many industries and one of them is healthcare where wearable devices started to track all your daily activities for better health monitoring accuracy and even down to tracking daily food intake in some cases. With the amounts of data that are being tracked and shared between from these devices, questions were raised on how to uphold user's data privacy when data is shared between these IoT devices and third party. With the blockchain platforms started to mature since its inception, the technology can be implemented according to a variety of use case scenarios. In this paper, we present a system architecture based on the healthcare system and IoT network by leveraging on multiple blockchain networks as the medium in between that should enable users to have direct authority on data accessibility of their shared data. We provide proof of concept implementation and highlight the results from our testing to show how the efficiency and scalability of the healthcare system improved without having a significant impact on the performance of the Electronic Medical Record (EMR) that mostly affected by the previous solution since these solutions directly connected to a public blockchain network and which resulted in significant delays and high cost of operation when a large amount of data or complicated functions are involved.

Space Usage and Satisfaction with Privacy in General Hospital Inpatients (종합병원 입원환자의 공간사용 및 프라이버시 만족도)

  • Choi, In Young;Park, Hey Kyung
    • Korea Science and Art Forum
    • /
    • v.36
    • /
    • pp.391-400
    • /
    • 2018
  • To ensure a user-centered treatment environment, hospital construction needs an approach that is not centered on functional aspects such as efficiency or economic feasibility but on the consideration of needs as reflected in user psychology and behavior. Patients who are physically and psychologically vulnerable experience psychological pressure when they are placed in an unfamiliar environment. Most of existing studies however focus on the evaluation of the physical environment, without paying attention to the psychological or behavioral approach to anxiety and stress that patients may experience in a special environment that a hospital may be to them. This study examines general hospital inpatients to understand the usage of major space available and their satisfaction with privacy. This study provides useful primary information needed for the user-centered design of general hospital for improved patient health and welfare. For the purpose of the study, literature review, site investigation, and survey were conducted. Major functional space and privacy in general hospitals were studied, and the site investigation was performed to identify the plans and their status. Survey was also performed to understand the usage of functional space and satisfaction with such space usage as well as satisfaction with privacy. The findings were as follows: (1) Space usage was rated as average in general. It was found that patients used their rooms and lobby on a daily basis. By age, the usage was highest in the group in their 40s; the usage was relatively lower in the groups in their 30s or younger. (2) Space satisfaction was above average, indicating that patients were fairly satisfied. Satisfaction was highest in the lobby space designed with distinct features. By case, satisfaction was highest in Case B, characterized by its wide horizontal space in the rural settings. (3) Satisfaction with privacy in hospital was average, indicating that the demand for privacy was relatively higher but what patients receive in return was lower than their expectation. It was also found that satisfaction with privacy was a crucial element that affected the overall satisfaction with hospital.

Addressing Challenges in Leveraging Health and Medical Data for Research and Development (보건의료 데이터 연구 개발 활용의 장애요인 및 활성화 방안 제언)

  • Kyusok Cho;Youngsok Bang
    • Journal of Information Technology Services
    • /
    • v.23 no.3
    • /
    • pp.39-54
    • /
    • 2024
  • This study explores the barriers to using health and medical data in research and development (R&D) within the healthcare industry and suggests ways to enhance data utilization. As artificial intelligence technology drives transformative changes across industries, there is an increased demand for robust health and medical data, highlighting its critical economic value and utility in fostering innovation. Using qualitative analysis through Grounded Theory, the study involves ten R&D professionals from healthcare industry, including both medical centers and corporations, using surveys and in-depth interviews to gather diverse experiences and perspectives on the challenges and opportunities in health and medical data use. Key findings point to legislative, regulatory, and data quality and integration issues, as well as complexities in patient data access and usage. Technological limitations and inadequate data governance frameworks also emerge as significant obstacles. Recommendations focus on improving regulatory frameworks, enhancing data standardization and quality, and fostering stronger partnerships between data custodians and users. The study concludes that overcoming these obstacles requires a comprehensive strategy involving legislative changes, improved technological infrastructure, and increased stakeholder collaboration. Implementing these recommendations could greatly enhance health and medical data utilization in R&D, significantly advancing medical science and patient care services.

Evolving the Cybersecurity of Clinical Photography in Plastic Surgery

  • Daisy L. Spoer;Alexandra Junn;John D. Bovill;Zoe K. Haffner;Andrew I. Abadeer;Stephen B. Baker
    • Archives of Plastic Surgery
    • /
    • v.50 no.4
    • /
    • pp.443-444
    • /
    • 2023
  • Point-of-care photography and photo sharing optimize patient outcomes and facilitate remote consultation imperative for resident surgeons. This literature review and external pilot survey study highlight the risks associated with current practices concerning patient privacy and biometric security. In a survey of 30 plastic surgeon residents and attendings, we found that the majority took photos of patients with their iPhones and shared them with colleagues via Apple iMessage. These findings corroborate previous reports and highlight a lack of physician user acceptance of secure photo-sharing platforms. Finally, we frame a successful example from the literature in the context of a postulated framework for institutional change. Prioritizing the privacy and safety of patients requires a strategic approach that preserves the ease and frequency of use of current practices.

Online Social Networks - Opportunities for Empowering Cancer Patients

  • Mohammadzadeh, Zeinab;Davoodi, Somayeh;Ghazisaeidi, Marjan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.3
    • /
    • pp.933-936
    • /
    • 2016
  • Online social network technologies have become important to health and apply in most health care areas. Particularly in cancer care, because it is a disease which involves many social aspects, online social networks can be very useful. Use of online social networks provides a suitable platform for cancer patients and families to present and share information about their medical conditions, address their educational needs, support decision making, and help to coping with their disease and improve their own outcomes. Like any other new technologies, online social networks, along with many benefits, have some negative effects such as violation of privacy and publication of incorrect information. However, if these effects are managed properly, they can empower patients to manage cancer through changing behavioral patterns and enhancing the quality of cancer patients lives This paper explains some application of online social networks in the cancer patient care process. It also covers advantages and disadvantages of related technologies.

Ethical Issues on Environmental Health Study

  • Hyein WOO
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.9-14
    • /
    • 2023
  • Purpose: Adequate public input and participation in environmental health research must be provided to ensure accurate results from studies involving human exposure to potentially hazardous substances. By addressing these ethical issues associated with environmental health research, this study can help reduce risks for individuals participating in studies and whole communities affected by their impactful findings. Research design, data and methodology: The current research should have followed the rule of qualitative textual research, searching and exploring the adequate prior resources such as books and peer-reviewed journal articles so that the current author could screen proper previous works which are acceptable for the content analysis. Results: The current research has figured out four ethical issues to improve environmental health study as follows: (1) Lack of Guidance for Collecting and Utilizing Data Ethically, (2) Insufficient Consideration Is Given to Vulnerable Populations When Conducting Studies, (3) Unclear Standards Exist for Protecting the Privacy Of Participant's Personal Information, and (4) Conducting Socially and Religiously Acceptable Research in Various Communities. Conclusions: This research concludes that future researchers should consider implementing anonymization techniques where possible so that findings are still accessible, but the risk posed by disclosing identifying information remains minimized during the analysis/publication stages.