• Title/Summary/Keyword: Patients' Privacy Requirements

Search Result 9, Processing Time 0.02 seconds

The Effects of the Inpatients' Stress and Privacy for the Satisfaction with Patients' Room (입원환자의 프라이버시와 스트레스가 병실 만족도에 미치는 영향)

  • Shin, Eun-Gyeong;Park, Soobeen
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.5
    • /
    • pp.148-156
    • /
    • 2016
  • This study proposes the structural model of inpatient's satisfaction with their room. Relationship among patients' privacy, patients' stress, and patients' satisfaction were evaluated and were discussed. Survey research followed the literature review, in which the subjects answered questions of the 12 items for the patients' privacy requirements, 10 items selected from the HSRS, and an item of patients' satisfaction. A total of 120 copies were analyzed through the statistical process using the SPSS Win Program 20.0 and SEM by the AMOS 20.0. Results and conclusions are as follows: (1) the inpatients' privacy requirements was subdivided into 'the reserve factor', 'the territoriality factor', and 'the solitude factor'. (2) The inpatients' stress level was subdivided into 'the relationship factor', 'the unfamiliarity factor', and 'the control factor'. (3) The model of relationship among the subjects' privacy requirements, stress level and their satisfaction with the patients' room showed that the subjects' stress level affected their satisfaction with the patients' room directly and the subjects' privacy requirements gave an direct and indirect effect on their' stress level and an indirect effect on their satisfaction with patients' room.

A Study of Gender Differences in Inpatients' Privacy Concerns in Multi-bed Hospital Room (다인병실 입원환자의 성별에 따른 프라이버시 특성 연구)

  • Shin, Eun-Gyeong;Park, Soo-Been
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.1
    • /
    • pp.80-87
    • /
    • 2018
  • This study aims to find gender differences in inpatients' privacy and stress concerns in multi-bed hospital room. In the literature review, we consider the characteristics of multi-bed hospital room and patients' privacy as a psychological environment factor. In the survey research, the questionnaires were used to understand the inpatients' general characteristics and privacy requirements. A total of 109 copies were analyzed through a cross-tabulations and T-test using the SPSS 18.0. Results and conclusions are as follows: (1) In the case of multi-bed room patients, there were some gender differences in privacy and stress, but the differences were limited. (2) There is a difference in the patient 's preference of the hospital room according to gender, and this is related to the privacy characteristic. (3) The social communication and strolling are commonly effective stress relief methods for both men and women, so space is needed to do this methods. The meaning of this study is to specify the privacy and stress of the inpatients in multi-bed patients' room.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

A Study on Security Weakness and Threats in Personal Health Record Services (개인건강기록 서비스에서 보안취약성 및 위협요소에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.163-171
    • /
    • 2015
  • Personal Health Records(PHR) service offers patients a convenient and easy-to-use solution for managing their personal health records, crucial medical files, and emergency contacts. In spite of the indispensable advantages, PHR service brings critical challenges that cannot be avoided from consumer side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, therefore, we analyze the various security aspects that are vulnerable to the PHR service and needed to be resolved. Moreover, we analyze the security requirements from the point of view of the PHR users and application service providers and provides the PHR security mechanism for addressing PHR security threats and satisfying PHR security requirements.

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A Study on the Ward Design Guideline Abroad for Architectural Planning of Acute Psychiatric Ward (정신건강의학과 급성기 병동 공간계획을 위한 국외 가이드라인에 관한 연구)

  • Jee, Soo In;Park, Kyeong Hyeon;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.29 no.1
    • /
    • pp.53-62
    • /
    • 2023
  • Purpose: Recently, the number of severely mentally ill patients has been increasing rapidly in Korea, but there are no design guidelines for spatial planning of Korea's acute psychiatric wards. The study aims to clarify the areas and required rooms in Korea's acute psychiatric wards which are important in establishing the design guidelines for Korea's acute psychiatric wards. Methods: This study proposed a structural framework based on the results of investigating and analyzing the acute psychiatric ward guidelines in the UK, Australia, and the U.S. and the areas and the required rooms of the wards stipulated in the basic data for establishing acute psychiatric ward design guidelines in Korea. The design guidelines for overseas acute psychiatric wards are 'Adult Acute Mental Health' in the UK, 'Adult Acute Mental Health Inpatient Unit' in the Australia, and 'Specific Requirements for Mental Health Hospitals' in the United States. Results: As a result of investigating and analyzing the design guidelines for overseas acute psychiatric wards, the areas of wards applicable to acute wards in domestic psychiatric wards were access, patient, treatment, support, and employee areas. In addition, the required rooms for each area were defined around major considerations such as visibility, convenience, comfort, security, safety, patient observation, barrier-free design, and privacy protection. Implications: The results of the study will be presented as a structural framework and basic data for establishing design guidelines for Korea's acute psychiatric wards, which is still absent.