• Title/Summary/Keyword: Healthcare Security

Search Result 361, Processing Time 0.032 seconds

A Study on the Priorities of Enabling Digital Healthcare Platform for Small and Medium Enterprises : A Comparative Analysis of Consumers and Suppliers

  • Yeon-Kyeong Lee;Min-Jung Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.131-141
    • /
    • 2024
  • The aging population and worsening lifestyle habits have increased the risk of chronic diseases. This has heightened the importance of preventive healthcare, particularly through personalized health management services based on individual health data. Despite this, the domestic digital healthcare industry remains underdeveloped. Given the need for acceptance from both consumers and providers, this study uses the Analytic Hierarchy Process (AHP) to identify success factors for health management service platforms. AHP evaluates the relative importance of various factors to aid decision-making. Results show that providers prioritize data analysis and platform design, laws and regulations, and data standardization, while consumers prioritize system stability, laws and regulations, and system security. These findings highlight the need for strategies to bridge the expectation gap to effectively promote health management service platforms.

The Association between the Subjective Perception of the Regional Healthcare Environment and Unmet Medical Needs (지역의 의료서비스 환경에 대한 주관적 인식과 연간 미충족의료 발생 간의 연관성)

  • Seohyun Woo;Hyun Woo Moon;Yeong jun Lee;Sun jung Kim
    • Korea Journal of Hospital Management
    • /
    • v.28 no.4
    • /
    • pp.62-72
    • /
    • 2023
  • Based on the basic ideology of health care, this study realized the seriousness of annual unmet medical need and conducted a study to confirm the relationship between the subjective perception of regional healthcare environment and unmet medical needs. The independent variable was classified into attitude 'satisfaction' and 'unsatisfaction' toward regional healthcare, and the dependent variable was classified as whether unmet medical needs occurred annually. Based on previous studies, the control variables were selected as demographic and socioeconomic characteristics that can affect the occurrence of unmet medical care annually and characteristics related to health behavior. Descriptive statistics were conducted for each variable on the extracted sample, and multivariate survey logistic regression analysis was conducted to confirm the association between variables. As a result, more unmet medical needs occurred annually than those who were satisfied with the medical services in the area where they lived. In addition, more unmet medical need occurred annually in "unsatisfied" households compared to households "satisfied" with local medical services. In residential areas, women live in "metropolis" and "rural areas" compared to "urban," women live in men, lower education levels, and poor subjective health levels, and less satisfied with local medical services. As such, the impact of environmental factors in the community on the use of health and medical services is one of the major areas of interest in the field of health science, such as health policy and social dynamics. Therefore, hospitals in each region need to make efforts in terms of hospital management to increase the overall satisfaction of medical services in the region by continuously monitoring the attitude of residents to achieve universal health security, and policymakers should also be interested and propose new policies.

  • PDF

Medical Information Security and Standard Technology On IoT Environment (IoT 환경의 의료 정보보호와 표준 기술)

  • Woo, Sung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2683-2688
    • /
    • 2015
  • Internet of Things(IoT) using a variety of technologies in combination provides a convenient, elevated range of services to users. IoT has been noted in combining the fields of medical service in particular. However, with the advent and growing of IoT, the more medical services are evolving, security problems caused by leakage of personal health information will become more serious. U-Health and medical devices, which deal mainly the personal health information, is required to a high level of privacy and security of health information. Therefore, the introduction of the IoT in the healthcare industry requires the medical information security as a prerequisite. This study analyzes security status and trend of IoT, personal medical information leakage cases, the health information protection measures in accordance with the life cycle of medical information, and the standardized protection technologies.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

The security issue and example experiment of smart healthcare (스마트 헬스 케어의 보안 이슈 및 사례 연구)

  • Lim, Kwonchang;Jung, Taeeul;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.773-775
    • /
    • 2015
  • 스마트폰과 소형 디바이스의 발달로 헬스 케어 시장은 큰 성장세를 보이고 있고 플랫폼을 제공하는 회사들 간의 치열한 경쟁이 시작되고 있다. 시장의 성장세와는 달리 데이터 보안에는 상대적으로 취약한 면을 보였다. 본 논문에서는 헬스 케어 보안이 허술한 사례들을 보이고 이에 대한 해결방안을 모색해 본다.

A Security Survey in U-Healthcare Service (U-헬스케어 서비스에서의 보안 동향)

  • Lee, So-Hee;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.938-940
    • /
    • 2011
  • IT 기술의 발전으로 전 세계적으로 M2M시장이 급부상 하고 있는 가운데 언제 어디서나 이용할 수 있도록 정보통신기술을 토대로 제공되는 보건의료 서비스인 U-헬스케어 서비스에 대한 관심이 급증하고 있다. 그와 더불어 국내외 적으로 U-헬스케어 시장의 확산에도 불구하고 U-헬스케어 장치에 대한 보안 시스템의 구축은 아직 미흡한 편이다. 이에 본 논문에서는 U-헬스케어 서비스의 새로운 비즈니스 모델과 정보를 주고받는 네트워크상의 문제점과 해결방안을 제시하고자 한다.

Information Security Management in Healthcare Area (보건의료정보 보호관리 모델 개발)

  • Jeong, Hey-Jeong;Kim, Nam-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.953-956
    • /
    • 2005
  • 보건의료정보는 개인의 가장 민감한 정보로 최상의 보호가 이뤄져야하는 한편, 국민 건강과 복지 향상을 위한 공익의 성격도 강하여 관리와 책임에 대한 명확한 지침이 반드시 필요하다. 본 연구에서는 보건의료 부문의 특성과 정보화 현황을 반영하고 선행연구의 한계점을 보완하여 국내 보건의료 환경에 적합한 정보보호관리 모델을 개발하였다. BS7799, HIPAA Security Rule, HL7 EHR SIG 기능명세 등을 참고하여 필요성, 정보보호 목적/전략 수립, 위험분석/평가, 정보보호관리 정책수립, 정보보호관리 프레임워크 설계, 관리적 보안, 물리적 보안, 기술적 보안, 정보보호관리 평가,운영관리의 총 10개 세부 프로세스와 111개의 이행지표로 구성된 본 모델은 보건의료정보 취급자에게 실행 지침을 제공하여 보건의료정보시스템의 안정성 향상과 국민 보건복지 수준 향상에 이바지할 수 있을 것으로 기대된다.

  • PDF

Deidentification Method Proposal for EHR Data on Remote Healthcare Service (원격 의료 서비스를 위한 EHR 데이터 비식별화 기법 제안)

  • Yoon, Junho;Kim, Hyunsung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.268-271
    • /
    • 2019
  • 최근 인공지능과 빅데이터 등 최첨단 기술이 빠른 속도로 의료 정보시스템에 도입됨에 따라 환자정보를 포함한 민감한 개인정보에 대한 사이버 공격이 급증하고 있다. 다양한 개인정보 비식별화에 대한 표준이 제안되었지만, 데이터의 범주에 따른 기법 적용에 대한 연구가 미비하다. 본 논문에서는 EHR 데이터를 위한 심근경색을 대상으로 하는 원격 의료 시스템을 위한 개인정보들에 대한 민감도를 4단계로 분류하고 이에 따른 비식별화 기법에 대해 제안한다. 본 논문에서 제안한 EHR 데이터에 대한 분류 및 비식별화 기법은 다양한 의료 정보 서비스를 위한 프라이버시 보호에 활용될 수 있다.

A Study on a PAN Security Protocol for u-Healthcare (u-헬스케어 서비스를 위하 PAN 보안 프로톨에 관한 연구)

  • Lee, Deok Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.883-886
    • /
    • 2015
  • 최근 헬쓰케어 장비나 웨어러블 컴퓨터 등에 대한 연구가 활발하게 진행되고 있으며, 유비쿼터스 헬스케어 환경은 이러한 다양한 센서와 휴대용 의료 장치들에 의해 구성된다. PAN은 인간 주변의 디바이스들을 무선으로 연결하여 하나의 네트워크를 구성하는 핵심 기술로서, 차세대 무선 네트워크로 주목을 받고 있다. 본 논문에서는 안전한 u-헬스케어 서비스를 위한 PAN 환경을 정의하고, 발생 가능한 보안 요구사항을 도출한다. 그리고 이를 기반으로 개인 건강 정보를 보호하기 위한 보안프레임워크를 정의한다. 마지막으로 PAN의 이종(異種) 네트워크 환경을 고려한 새로운 보안 프로토콜을 제안한다.