• Title/Summary/Keyword: Network

검색결과 58,760건 처리시간 0.077초

The way to achieve Universal Health Coverage: Focusing on the Historical and Cultural Context of Health Care Sector in Vietnam (보편적 건강보장을 향한 노정 : 베트남 보건의료 부문의 역사·문화적 맥락을 중심으로)

  • BEAK, Yong Hun
    • The Southeast Asian review
    • /
    • 제28권1호
    • /
    • pp.173-218
    • /
    • 2018
  • This study focuses on the healthcare sector in Vietnam which is promoting universal health insurance for the achievement of Universal Health Coverage (UHC) under Sustainable Development Goals (SDGs). The purpose of this study is to examine the characteristics of the reform process of the health care system and the law on health insurance through the historical and cultural contexts and its implications from the perspective of development. Based on the three dimensions of UHC - extension of protection for population, provision of various medical services, and financial protection, the current status of the Vietnam healthcare sector is summarized respectively as follows. First, according to the revised Health Insurance law which came into effect in 2015, the mandatory health insurance premiums are calculated based on household units. Second, there is a medical network that can provide preventive and healthcare services centered on primary health care facilities, for example commune health stations (trạm y $t{\hat{e}}$ $X{\tilde{a}}$). Third, out-of-pocket expenditure is still a large proportion although public spending has increased and private spending has decreased since the enforcement of the health insurance law and various schemes. Vietnam is currently striving towards a universal health care system. The development of institutions and systems should be designed in a way that is appropriate for the members of the society rather than efficiency. This article findings shed light on the role of social values, family culture, and informal institutions.

Zkimi : Integrated Security Analysis Tool for UNIX Systems (지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제7권3호
    • /
    • pp.23-40
    • /
    • 1997
  • There are a lot of security tools for the investigation and improvement of UNIX systems. However, most of them fail to provide a consistent and usable user interface. In addition, they concentrate on a specific aspect of a system, not the whole one. For the overall management, system administrators cannot help using several uncomfortable tools. This paper introduces an integrated security analysis tool, named "Zkimi", which provides a convenient user interface and investigates the various aspects of UNIX systems such as account security, system security, network security, and file system integrity. The Zkimi supports user-friendly WWW based interface, so administrators can examine the various aspects of system more easily. We tried the tool for a system of a moderate size, and were confirmed that the tool is very efficient for investigating various security aspects of a system. a system.

Efficient Self-Healing Key Distribution Scheme (효율적인 Self-Healing키 분배 기법)

  • 홍도원;강주성;신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제13권6호
    • /
    • pp.141-148
    • /
    • 2003
  • The self-healing key distribution scheme with revocation capability proposed by Staddon et al. enables a dynamic group of users to establish a group key over an unreliable network, and has the ability to revoke users from and add users to the group while being resistant to collusion attacks. In such a protocol, if some packet gets lost, users ale still capable of recovering the group key using the received packets without requesting additional transmission from the group manager. In this scheme, the storage overhead at each group member is O($m^2$1og p) and the broadcast message size of a group manager is O( ((m$t^2$+mt)log p), where m is the number of sessions, t is the maximum number of colluding group members, and p is a prime number that is large enough to accommodate a cryptographic key. In this paper we describe the more efficient self-healing key distribution scheme with revocation capability, which achieves the same goal with O(mlog p) storage overhead and O(($t^2$+mt)log p) communication overhead. We can reduce storage overhead at each group member and the broadcast message size of the group manager without adding additional computations at user's end and group manager's end.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제16권4호
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권3호
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제20권2호
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • 제28권4호
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

A Meta-analysis on the Variables Related with Case Management Performance (사례관리수행에 영향을 미치는 변인에 관한 메타분석 연구)

  • Park, Jung-Im
    • The Journal of the Korea Contents Association
    • /
    • 제21권1호
    • /
    • pp.520-530
    • /
    • 2021
  • This study conducted a meta-analysis on the variables related with case management performance in Korea. In order to do a meta-analysis, a total of 27 journals, theses and dissertations published between 1998 and 2020 were reviewed systematically. Through this process, this study calculated average effect size of each variable and explored moderator variables. This study results were as follows. First, this study identified a total of 14 individual, enviroment of institution, population variables related with case management performance. Second, the results indicated that case management performance variables which showed large effect sizes included professional capability, supervision, network, case management significance recognition, manual, agency support. Third, variables with medium effect sizes included self-efficacy, case management education, autonomy, motivation, number of conference and variables with small effect sizes included work experience, academic ability, age. Fourth, Moderator effects were identified in the field, target, publication of case management. Finally, the implications of the study findings were discussed.

Predicting Acculturation for Chinese International Students in Korea: The Role of Social Support through SNS (SNS 이용 동기와 사회적 지지가 문화적응에 미치는 영향 - 국내 거주 중국인 유학생의 문화적응을 중심으로)

  • Moon, Shin-Il;Jia, Liao;Lee, Hyunjoo;Kim, Kitae
    • The Journal of the Korea Contents Association
    • /
    • 제21권1호
    • /
    • pp.722-732
    • /
    • 2021
  • A recent rapid growth in the number of Chinese international students in Korea has generated interest in the key factors to affect their acculturation in domestic culture. In accordance with the growing interest, the present study aims to empirically test and analyze the effects of demographics (gender, age, the length of stay, the length of Korean language education and the level of Korean language skills), SNS use patterns (personal network sizes and hours of use for Korean and Chinese SNS, and motivations of Korean or Chinese SNS uses), and social support through Korean and Chinese SNS on acculturation for Chinese international students in Korea. A total of 322 Chinese international students in Korea participated in the online survey. Results showed that use of Chinese SNS for entertainment had an negative impact on the acculturation, while the use of Korean SNS had an overall positive impact. Finally, this study suggests that the practitioners regarding the issue of acculturation for international students in Korea should focus more on specific guidelines to help their appropriate SNS uses rather than on to prevent their SNS addiction problems.

The Current Research Status of Complementary and Integrative Medicine in Practice-Based Research Networks: A Systematic Review (개원의중심연구망에서 수행된 보완통합의학 관련 연구 현황: 체계적 문헌고찰)

  • Won, Jiyoon;Han, Gajin;Kim, Yejin;Park, Jae Rang;Noh, Eunyoung;Ji, Yu-jin;Adams, Jon;Lee, Hyangsook
    • Korean Journal of Acupuncture
    • /
    • 제37권4호
    • /
    • pp.209-230
    • /
    • 2020
  • Objectives : Practice-Based Research Networks (PBRNs), collaborations of practitioners and academic researchers, have provided platforms for conducting research to address clinical questions generated from daily routine care. This review aimed to critically analyse articles from PBRNs that are related to complementary and integrative medicine (CIM) and to suggest future directions for a PBRN which is appropriate for Korean Medicine (KM). Methods : PubMed, PBRN registries in Agency for Healthcare Research and Quality and relevant PBRN websites were searched up to November 2019 for research articles from PBRNs that focused on CIM regardless of study design. Methodological quality of the included studies was assessed. The included studies were read in full, classified and summarised according to their topics. Results : A total of 51 articles published from 1998 through 2020 were included in this review. They were categorised into three principal themes based on research questions and findings: health services research (embracing researches examining characteristics of patients and CIM practitioners/practices, and communication between patients and practitioners); effectiveness and safety of CIM practices/interventions; and feasibility studies of instruments and interventions in PBRN settings. The study designs varied including surveys (n=30), prospective observational studies (n=6), 2ndary analyses of existing studies (n=7), protocols (n=7), retrospective chart review (n=1) and qualitative study (n=1). Quality of the included studies greatly varied. Conclusions : PBRNs can serve as a feasible platform for conducting practice-relevant research on KM and CIM. Considering growing demands on evidence-base for routine practice of KM amid various stakeholders, a PBRN in KM community and further researches nested within PBRN designs are warranted.