• 제목/요약/키워드: Patient information security

검색결과 155건 처리시간 0.023초

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

의료정보보호를 위한 RFID를 이용한 환자 인증 시스템 (Patient Authentication System for Medical Information Security using RFID)

  • 윤은준;유기영
    • 한국통신학회논문지
    • /
    • 제35권6B호
    • /
    • pp.962-969
    • /
    • 2010
  • 최근 의료 과실을 줄이기 위한 방법으로 RFID 기술을 많이 적용한다. 이 기술을 이용하면 환자들에 대한 의료처방 및 치료를 정확하게 수행 할 수 있다. 의료 환경에서 RFID 기술 활용의 핵심은 프라이버시 제공이다. 본 논문에서는 위와 같은 환경을 기반으로 안전하고 효율적으로 환자 인증 및 환자 개인 의료 정보를 보호할 수 있는 RFID 인증 시스템을 제안한다. 제안한 시스템은 RFID 기반의 환자 인증 프로토콜과 데이터베이스 보안 프로토콜로 구성된다. 결론적으로, 제안한 RFID 인증 시스템은 강인한 보안성과 효율성을 제공하여 주어, u-Hospital 및 u-Healthcare 같은 첨단 의료 환경 상에서 환자 인증뿐만 아니라 환자 개인의 의료 정보를 안전하게 보호할 수 있음으로 실용적으로 사용되어 질 수 있다.

Original Identifier Code for Patient Information Security

  • Ahmed Nagm;Mohammed Safy
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.141-148
    • /
    • 2023
  • During the medical data transmissions, the protection of the patient information is vital. Hence this work proposes a spatial domain watermarking algorithm that enhances the data payload (capacity) while maintaining the authentication and data hiding. The code is distributed at every pixel of the digital image and not only in the regions of non-interest pixels. But the image details are still preserved. The performance of the proposed algorithm is evaluated using several performance measures such as the mean square error (MSE), the mean absolute error (MAE), and the peak signal to noise Ratio (PSNR), the universal image quality index (UIQI) and the structural similarity index (SSIM).

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • 인터넷정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

항공응급의료 환경에서 환자 개인정보의 보안 전송에 관한 고찰 (Study on Security Transmission of Personal Patient Information in Aerial Emergency Medical Environments)

  • 김순석;이용희;김동호;정호영;박세일
    • 한국항행학회논문지
    • /
    • 제16권1호
    • /
    • pp.103-108
    • /
    • 2012
  • 항공응급의료 환경에서 기본적인 서비스 모델은 응급구조헬기 내에 장착된 각종 의료장비들로부터 게이트웨이로 수집된 환자 개인건강정보들을 최종 목적지인 후송 병원에 전송하는 과정이라 볼 수 있다. 본 논문에서는 이 과정에서 의료장비에서 게이트웨이로 환자개인정보를 전송시 가장 안전한 전송방식에 대해 고찰하고자 한다. 또한 국제 표준인 ISO/IEEE 11073을 기본 모델로 하여 기존에 나와있는 여러 전송 방식들 중 항공응급의료 환경에 가장 적합한 보안 전송 방식을 비교 분석하여 그 대안을 제시하고자 한다.

CPR 시큐리티 시스템에 관한 연구 (A Study on the CPR Security System)

  • 김석수
    • 융합보안논문지
    • /
    • 제6권1호
    • /
    • pp.75-82
    • /
    • 2006
  • 본 논문은 유비쿼터스환경에 실현되는 CPR(Computer-based patient record) 시스템에 관한 연구이며, CPR 시스템내에 시큐리티 시스템을 설계하고 분석하여 시큐리티 정책을 안정화 하기 위한 목적이다. 본 논문에서는 유비쿼터스 환경의 사용자를 고려한 CPR 시스템을 위한 개략적 설계를 하고 보안시스템 개발을 위해서 먼저 운용환경 및 보안 취약성 분석을 통해 CPR 시스템에서 필요한 보안 정책을 수립하고 이를 수행하기 위한 보안 시스템을 설계하였다. CPR 시스템을 지원하는 보안 시스템은 인증 시스템, 의료 정보의 XML 문서화 및 암호화, 네트워크 보안 시스템으로 구성된다.

  • PDF

응급의료정보시스템의 보호를 위한 보안 구조 (Security Structure for Protection of Emergency Medical Information System)

  • 신상열;양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • 윤지희;김경진
    • 인터넷정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs