• Title/Summary/Keyword: Patient' Health Information Protection

Search Result 57, Processing Time 0.026 seconds

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Insights into the state of radiation protection among a subpopulation of Indian dental practitioners

  • Binnal, Almas;Rajesh, Gururaghavendran;Denny, Ceena;Ahmed, Junaid;Nayak, Vijayendra
    • Imaging Science in Dentistry
    • /
    • v.43 no.4
    • /
    • pp.253-259
    • /
    • 2013
  • Purpose: Radiographs is an integral part of patient management in dentistry, despite their detrimental effects. As the literature pertaining to radiation protection among Indian dental practitioners is sparse, exploring such protection is needed. Materials and Methods: All private dental practitioners in Mangalore, India were included in the study. A structured, pre-tested, self-administered questionnaire was employed to assess the knowledge, attitudes, practices, previous training, perceptions towards the need to spread awareness, and willingness to gain and implement knowledge about radiation hazards and protection. Information regarding each respondent's age, gender, education, and type and duration of practice was collected. Results: Overall, 87 out of 120 practitioners participated in the study. The mean knowledge, attitude, and practice scores were $9.54{\pm}2.54$, $59.39{\pm}7.01$, and $5.80{\pm}3.19$, respectively. Overall, 25.3% of the respondents had undergone training in radiation protection, 98.9% perceived a need to spread awareness, and 94.3% were willing to improve their knowledge. Previous training showed a significant correlation with age, sex, and duration of practice; attitude was significantly correlated with education and type of practice; and knowledge scores showed a significant correlation with type of practice. Conclusion: Although the knowledge and practices of respondents were poor, they had a positive attitude and were willing to improve their knowledge. Age, sex, and duration of practice were associated with previous training; education and type of practice with attitude scores; and type of practice with knowledge scores. The findings of this study suggest a policy is needed to ensure the adherence of dental practitioners to radiation protection guidelines.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Study on Building Smart Home Testbed for Collecting Daily Health Condition based on Internet of Things (사물인터넷 기반의 일상 건강정보 수집을 위한 스마트 홈 테스트베드 구축)

  • Chae, Myungsu;Kim, Yongrok;Kim, Sangsik;Kim, Sangtae;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.284-292
    • /
    • 2017
  • With the development of Internet of Things (IoT) technology, the combination of ICT and medical services has been increasing to improve the quality of medical services. Using the IoTs, we can collect personal health information continuously in a patient's everyday life. We expect that this will improve the quality of medical service through analysis. However, the problem of ensuring the protection of personal information within the personal health information has been hampering the research, development, and application of such services. Other problems include lack of IoT devices and lack of user convenience for collecting health information about a patient's everyday life. Therefore, in this study, we construct a daily health information management service that can collect the health related information at any time and store this data in personal storage. This data is then only provided to the healthcare worker when necessary. We built a test bed for an IoT-based smart home platform and are currently conducting user experiments. Based on the results of this study, we are attempting to provide a high quality medical trial service based on daily health information through linkage with medical device manufacturers, medical clinics, insurance companies, etc. We expect the proposed health information management service will contribute to the revitalization of smart health care services via activating various health related IoT devices and analyzing daily health information.

A Study on the Software Safety Assessment of Healthcare Systems

  • Olenski, Rafal;Park, Man-Gon
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.241-248
    • /
    • 2015
  • The safety-critical software in healthcare systems needs more and more perceptive excess among human observation and computer support. It is a challenging conversion that we are fronting in confirming security in healthcare systems. Held in the center are the patients-the most important receivers of care. Patient injuries and fatalities connected to health information technologies commonly show up in the news, contrasted with tales of how health experts are being provided financial motivation to approve the products that may be generating damage. Those events are unbelievable and terrifying, however they emphasize on a crucial issue and understanding that we have to be more careful for the safety and protection of our patients.

Issues on the Patient's Information Protection (환자 의료정보 보호의 문제)

  • Jeong, Bu-Gyun
    • The Korean Society of Law and Medicine
    • /
    • v.9 no.2
    • /
    • pp.339-382
    • /
    • 2008
  • Medical information is one of significant private information that includes in-dividual's own diverse information. Once opened, it exposes one's health condition and medical history to a third party, which could bring about serious troubles. On this account, the third parties are of much concerns about the information. If medical information collected through various routes is used with another purpose, oilier than the initial intention, it might cause serious results beyond one's control. Thus, it is essential to keep the information confidential. Also, the discrimination based on the medical information ought to be banned because it is likely to happen that exposed information socially stigmatizes a person, being discriminated in a work place or a school when he/she is employed or gets an insurance. In the current system, only medical institutions are responsible for protecting or securing medical records. Despite the information technology development and the increased interests in medical information, there are quite a few limitations in legal, technical, and administrative aspects. All kinds of organizations, involved in collecting and using the information, as well as medical institutions primarily producing and managing it should share the responsibilities.

  • PDF

A Study on Private Health Insurance in Korea (민간의료보험의 현황 및 활성화에 관한 연구)

  • 정기택
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.109-146
    • /
    • 1997
  • This study explores the feasibility of activating private health insurance in Korea. The rationale for expanding private supplementary health insurance can be found in many cases of health care reforms in the European countries. Private health insurance can not only relieve the financial distress of the government health insurance programs but also offer the medical institutions incentives to improve the quality of medical care. In Korea there is no supplementary health insurance that reimburses for various kinds of diseases based on a well designed fee schedule. Recently, the cancer insurance is the best seller in the health related insurance market. As observed in the U. S. case, the cancer insurance which pays the predetermined amount (indemnity coverage) regardless of the medical charges incurred to the patient is limited in its coverage for the insured. To provide better protection against catastrophic diseases, the government should give insurance companies incentives to develop health insurance products that cover multiple diseases rather than a single disease. Consumers can hardly understand and compare complex insurance products. To resolve the information asymmetries, the government should publish a consumer report that compare various health insurance products in a user friendly way. In the long run, insurance companies will plan to sell health insurance products that charge risk related premium only when insurers accumulate the underwriting know-hows, the government shares data on various health statistics including claims and demographics, and risk pool for high risk patients is well established and subsidized by the government.

  • PDF