• Title/Summary/Keyword: Healthcare Systems

Search Result 773, Processing Time 0.025 seconds

Association between Unmet Dental-Care Needs and the Intention to Use Mobile Healthcare Services among Soldiers

  • Mi-Sook Yoon;Han-A Cho
    • Journal of dental hygiene science
    • /
    • v.24 no.3
    • /
    • pp.208-220
    • /
    • 2024
  • Background: Although a direct association has been established between oral health management and maintaining military combat readiness and fulfilling defense duties, unmet dental-care needs have been consistently reported, and there has been little research on the role of mobile healthcare services in addressing this issue. This study explored the association between unmet dental-care needs and the intention to use mobile healthcare services among military personnel. Methods: This study was conducted on military personnel who visited a military hospital in Gyeonggi-do, Korea, from August 19 to August 31, 2024. A total of 150 self-administered questionnaires were distributed and 135 valid responses were analyzed. The analysis included general characteristics, dental care utilization, and intention to use mobile healthcare services. Statistical analyses, such as t-tests, ANOVA, and multiple regression, were employed to determine the factors influencing the intention to use mobile healthcare services. Results: This study found that military personnel with unmet dental-care needs had significantly higher intentions to use mobile healthcare services than those without such needs. The analysis revealed that the key factors influencing this intention were perceived health status and previous dental-care utilization. Specifically, participants who rated their overall health as better and those who had used dental care services in the past year showed a greater tendency to express interest in mobile healthcare services than those who did not. Furthermore, unmet dental-care needs were more prevalent among soldiers who reported limited access to dental facilities owing to time constraints or a lack of prioritization of oral health, which increased their inclination toward utilizing mobile healthcare solutions as an alternative. Conclusion: Mobile healthcare solutions can offer personalized and timely care as viable alternatives for improving oral health management in the military. Moreover, integrating mobile healthcare services into military health systems could significantly reduce unmet dental-care needs and enhance overall combat readiness by promoting better health outcomes.

A Study on the Differences in Performances by Hospital Management Systems and the Architectural Meanings (병원의 운영형태에 따른 경영실태와 건축적 시사점에 관한 연구)

  • Choi, Kwang-Seok
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.11 no.3
    • /
    • pp.7-17
    • /
    • 2005
  • The purpose of this study is to evaluate the performances of 5 hospitals which have some different management systems and how are the differences in performance and what do they mean in aspects of architectural planning, if they exist. All of hospitals are located in M city, Jeonnam Province. Data sources are each hospital's patient-statistics and profit & loss statements. Management systems of surveyed hospitals consist in 2 inpatient-based, 1 outpatient-focused and 2 hospitals, not showing any characteristics. Time ranges for survey are 5 years from 1999 through 2003.

  • PDF

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Systems Biology and Emerging Technologies Will Catalyze the Transition from Reactive Medicine to Predictive, Personalized, Preventive and Participatory (P4) Medicine

  • Galas, David J.;Hood, Leroy
    • Interdisciplinary Bio Central
    • /
    • v.1 no.2
    • /
    • pp.6.1-6.4
    • /
    • 2009
  • We stand at the brink of a fundamental change in how medicine will be practiced. Over the next 5-20 years medicine will move from being largely reactive to being predictive, personalized, preventive and participatory (P4). Technology and new scientific strategies have always been the drivers of revolutions and this is certainly the case for P4 medicine, where a systems approach to disease, new and emerging technologies and powerful computational tools will open new windows for the investigation of disease. Systems approaches are driving the emergence of fascinating new technologies that will permit billions of measurements on each individual patient. The challenge for health information technology will be how to reduce this enormous amount of data to simple hypotheses about health and disease. We predict that emerging technologies, together with the systems approaches to diagnosis, therapy and prevention will lead to a down turn in the escalating costs of healthcare. In time we will be able to export P4 medicine to the developing world and it will become the foundation of global medicine. The "democratization" of healthcare will come from P4 medicine. Its first real emergence will require the unprecedented integration of biology, medicine, technology and computation. as well as societal issues of major importance: ethical, regulatory, public policy, economic, and others. In order to effectively move the P4 scientific agenda forward new strategic partnerships are now being created with the large-scale integration of complementary skills, technologies, computational tools, patient records and samples and analysis of societal issues. It is evident that the business plans of every sector of the healthcare industry will need to be entirely transformed over the next 10 years.and the extent to which this will be done by existing companies as opposed to newly created companies is a fascinating question.

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Security Analysis of Remote Healthcare System in Cloud-based IoT Environment (클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석)

  • Kwon Jaemin;Hong Sewoong;Choi Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

IoT Healthcare Communication System for IEEE 11073 PHD and IHE PCD-01 Integration Using CoAP

  • Li, Wei;Jung, Cheolwoo;Park, Jongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1396-1414
    • /
    • 2018
  • With the proliferation of the Internet of Things (IoT) healthcare devices, significant interoperability issue arises where devices use proprietary data transfer protocols. The IHE PCD-01 standard has been suggested for the exchange of healthcare data in ISO/IEEE 11073 PHD data model. However, the PCD-01 is not efficient to be used in the IoT environment. This is because the use of SOAP for PCD-01 may be too complex to be implemented in the resource-constrained IoT healthcare devices. In this paper, we have designed a communication system to implement ISO/IEEE 11073 and IHE PCD-01 integration using the IETF CoAP. More specifically, we have designed the architecture and procedures, using CoAP, to seamlessly transmit the bio-signal from the tiny resource-constrained IoT healthcare devices to the server in a standardized way. We have also built the agent, gateway, and PCD-01 interface at the server, all of which are using the CoAP as a communication protocol. In order to evaluate the performance of the proposed system, we have used the PCD data to be transmitted over CoAP, MQTT, and HTTP. The evaluation of the system performance shows that the use of CoAP results in faster transaction and lesser cost than other protocols, with less battery power consumption.

A Development of Healthcare Monitoring System Based on Internet of Things Effective

  • KIM, Song-Eun;MUN, Ji-Hui;KIM, Kyoung-Sook;KANG, Min-Soo
    • Korean Journal of Artificial Intelligence
    • /
    • v.8 no.1
    • /
    • pp.1-6
    • /
    • 2020
  • The Recently there has been a growing interest in health care due to the COVID-19 situation. In this paper, we intend to develop a healthcare monitoring system to provide users with smart healthcare systems in line with the healthcare 3.0 era. The system consists of a wireless network between various sensors, Android smartphones, and OLEDs using Bluetooth, and through this, a health care monitoring system capable of collecting user's biometric information and managing health by receiving data values of sensors connected to Arduino. In conclusion, the user's BPM value was calculated using the heart rate sensor, and the exercise intensity can be adjusted through this. In addition, a step derivation algorithm is implemented using an acceleration sensor, and calorie consumption can be measured using the step and weight values. As such, the heart rate, step count, calorie consumption data can be transmitted to a smartphone application through a Bluetooth module and output, and can be output to an OLED for users who are not easy to access the smartphone. This healthcare monitoring system can be applied to various groups and technologies.

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.