• 제목/요약/키워드: Internet medical information

검색결과 609건 처리시간 0.024초

치위생과 학생들의 보건의료 정보화에 대한 태도 (Attitude toward medical health information in the dental hygiene students)

  • 이성숙
    • 한국치위생학회지
    • /
    • 제15권6호
    • /
    • pp.1027-1032
    • /
    • 2015
  • Objectives: The purpose of the study is to investigate the attitude toward medical health information in the dental hygiene students. Methods: The subjects were 370 dental hygiene college students in the metropolitan area. A self-reported questionnaire was completed by 350 students from March 2 to May, 3, 2014. Except 20 incomplete answers, data were analyzed by frequency analysis, t-test, and one-way ANOVA using SPSS 12.0 program. The questionnaire consisted of general characteristics of the subjects, satisfaction of internet use, and attitude toward medical health information. Results: Most of the students had personal computers and they did not receive computer education. The students used internet in the variety of the fields. Satisfaction level was 3.28 by 5 point Likert scale. The attitude toward medical health information was 3.20. They would not use computer if possible, and the score was 3.50 points that was the highest mark. There was no statistically significant difference in medical health information by the general characteristics of the subjects. Conclusions: The attitude toward medical health information was not fully satisfactory in many fields. The curriculum for the dental hygiene must include step-by-step computer course and the computer education must provide the diverse educational opportunities for the students.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

e-Healthcare 환경 내 개인정보 보호 모델 (Privacy Information Protection Model in e-Healthcare Environment)

  • 김경진;홍승필
    • 인터넷정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.29-40
    • /
    • 2009
  • 인터넷 등의 정보기술의 발전은 기존의 의료기술에 빠른 변화를 가져오면서 e-Healthcare가 사회적 이슈로 등장하고 있다. 의료정보화 패러다임의 새로운 전환점이라 할 수 있는 e-Healthcare는 국내에서 의료정책방안이나 기술개발을 하고 있지만, 아직 의료정보화의 기반이 되는 인프라는 부족한 수준이며 개방된 인터넷 환경 내 역공학적 측면으로 민감한 의료정보 유출 및 프라이버시 침해에 대한 문제가 대두되는 실정이다. 본 논문에서는 앞서 제시한 문제점의 해결방안으로 e-Healthcare환경 내 개인의 의료정보 보호를 위한 역할기반의 접근제어 시스템(HPIP - Health Privacy Information Protection)을 네 가지 주요 메커니즘(사용자 신분확인, 병원 권한확인, 진료기록 접근제어, 환자진단)으로 제안하였으며, 실 환경에서 효과적으로 활용될 수 있도록 프로토타이핑을 통해 그 가능성을 타진해 보았다.

  • PDF

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

  • Choi, Jeongseok;Kim, Jaekwon;Lee, Dong Kyun;Jang, Kwang Soo;Kim, Dai-Jin;Choi, In Young
    • Genomics & Informatics
    • /
    • 제14권1호
    • /
    • pp.20-28
    • /
    • 2016
  • Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

The Design of Integrated system for the cloud-based medical Information sharing

  • Lee, Kwang-Cheol;Hwang, Chigon;Lee, Seong Ro;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • 제4권2호
    • /
    • pp.145-153
    • /
    • 2015
  • Development of IT technology, in combination with the medical area, a number of developments have been made of the digital advanced medical devices, also increased interest in health, sharing of medical information has become increasingly necessary. Standardization for medical information sharing to satisfy these requirements have been studied. However, the medical information system is to build a system independent hospital itself, is difficult to share and exchange medical data with other medical institutions. In this paper, we provide a medical cloud system that can share medical information. Use DBaaS of cloud services. And is an international standard to have a HL7 share information by forming a meta-schema, each of the data transfer, the format of the document oriented data solves the heterogeneity between hospitals. Extracts the required field name of examination information, to exchange information with each of the local information and mapping. Health diagnostic information in the present study and diagnosis through accurate information sharing and exchange is possible ongoing management.

Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity

  • Yang, Zhenzhen;Kuang, Nan;Yang, Yongpeng;Kang, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1167-1187
    • /
    • 2020
  • With the development of medical imaging technology, image registration has been widely used in the field of disease diagnosis. The registration between different modal images of brain magnetic resonance (MR) is particularly important for the diagnosis of brain diseases. However, previous registration methods don't take advantage of the prior knowledge of bilateral brain symmetry. Moreover, the difference in gray scale information of different modal images increases the difficulty of registration. In this paper, a multimodal medical image registration method based on image segmentation and symmetric self-similarity is proposed. This method uses modal independent self-similar information and modal consistency information to register images. More particularly, we propose two novel symmetric self-similarity constraint operators to constrain the segmented medical images and convert each modal medical image into a unified modal for multimodal image registration. The experimental results show that the proposed method can effectively reduce the error rate of brain MR multimodal medical image registration with rotation and translation transformations (average 0.43mm and 0.60mm) respectively, whose accuracy is better compared to state-of-the-art image registration methods.

Analysis of Some Online Questions with High Frequency about Dental Treatment in Korea

  • Kang, A-Reum;Go, Ye-Eun;Kim, Ka-Eun;Kim, Min-Joo;Kim, Seon-Jeong;Hwang, SooJeong
    • 치위생과학회지
    • /
    • 제19권3호
    • /
    • pp.190-197
    • /
    • 2019
  • Background: The Internet has advantages in terms of accessibility and amount of information, and the search for health information over the Internet is increasing exponentially. The purpose of this study is to analyze the information generated about some dental treatment on the internet by year. Methods: Naver Knowledge (JisikIn in Korean) which is an interactive search service was selected as the first search site in Korea. Scaling, wisdom tooth extraction, and endodontic treatment that can be paid by Korean health insurance were selected. Finally, 4,729 questions about scaling, 23,963 wisdom teeth extraction questions and 17,733 endodontic treatment questions were extracted. The question contents, the information about the questioner and the answerer, and an error of answers were investigated. Frequency analysis was used and chi-square test was used if necessary. Results: The most frequently asked questions were discomfort and dissatisfaction after the treatment. The need for treatment was the second in questions of the wisdom tooth extraction and endodontic treatment, but the health insurance benefit was the second in dental scaling. Most of the questioners didn't disclose personal information. The public answered the most in 2013~2014, but the highest percentage of the respondents was experts in 2017. Responses were mostly personal experience, but showed a tendency to decrease with years, and professional knowledge showed an increasing tendency. The error of the answer has also gradually decreased. Conclusion: Questions about dental care over the Internet are increasing exponentially, experts are responding increasingly, and errors in answers are decreasing. Nevertheless, it is necessary to pay attention to the related expert group to prevent misinformation.

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2772-2786
    • /
    • 2022
  • We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.

IoT-based Architecture and Implementation for Automatic Shock Treatment

  • Lee, Namhwa;Jeong, Minsu;Kim, Youngjae;Shin, Jisoo;Joe, Inwhee;Jeon, Sanghoon;Ko, Byuk Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2209-2224
    • /
    • 2022
  • The Internet of Things (IoT) is being used in a wide variety of fields due to the recent 4th industrial revolution. In particular, research is being conducted that combines IoT with the medical field such as telemedicine. Among them, the field of shock detection is a big issue in the medical field because the causes of shock are diverse, treatments are very complex, and require a high level of medical knowledge and experience. The transmission of infectious diseases is common when treating critically ill patients, especially patients with shock. Thus, to effectively care for shock patients, we propose an architecture that continuously monitors the patient's condition, and automatically recommends a drug injection treatment according to the patient's shock condition. The patient's hemodynamic information is continuously monitored, and the patient's shock generation information is recorded periodically. With the recorded patient information, the patient's condition is determined and automatically injected with necessary medication. The medical team can find out whether the patient's condition has improved by checking the recorded information through web applications. The study can help relieve the shortage of medical personnel and help prevent transmission of infectious disease in medical staff. We look forward to playing a role in helping medical staff by making recommendations for the diagnosis and treatment of complex and difficult shocks.