• Title/Summary/Keyword: Secure Healthcare

Search Result 133, Processing Time 0.02 seconds

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on the Ward Module according to the External Design of the Hospital (병원 외주부 디자인에 따른 병실모듈 연구)

  • Lee, Hyunjin;Park, Wonbae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.3
    • /
    • pp.71-78
    • /
    • 2021
  • Purpose: It is important to plan the ward module at a time when the size of beds, the floor area, and the construction budget are all set prior to the hospital design. In this context this study aims (1) to derive various factors affecting the ward module, and (2) to analyze the appropriate room module according to the type. Methods: Design factors related to hospital modules are derived through precedential studies, and the types of ward elevation are classified by reviewing the drawings of 18 case hospitals. And the detailed dimensions and area of the derived elements are analyzed. Results: The X-axis modules of the ward are switched to long span structural columns of 9.9 m, 12.6 m and 13.2 m, but the ward modules still represent 6.6 m. The Y-axis module of the ward shows a dimension of 9 to 9.9m in the process of changing a multi-person room into a four-person room. Type A of curtain wall with columns located on the wall of the room and type B of curtain wall located in the center of the room are analyzed due to their variations. The square window type, which forms the elevation of the square window by exposing the columns to the elevation, and the outframe type, which protrudes from the structural columns and beams, have elevation designs limited. There are, however, no obstacles to the interior space of the hospital room, so the wall composition and furniture arrangement are expected to be free. The ward area of Curtain Wall Type A, which can secure an effective area of 5.9m*5.0m, are 52.1m2. The Curtain Wall Type A, Square window type, and the outframe type are 49.8m2. Implications: As part of the hospital standard module plan for economical and reasonable hospital building planning, a type was proposed in this study in conjunction with the external design. It is hoped that it be a base for standard module research linked together to the Central Treatment department, Outpatient department and underground parking lot.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A study on the digitalization of 3D Pen (3D펜의 디지털화에 대한 연구)

  • Kim, Jong-Young;Jeon, Byung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.583-590
    • /
    • 2021
  • This paper is a study on the digitization of an analog 3D pen. The term digital implies features such as homeostasis, transformability, combinability, reproducibility, and convenience of storage. One device that produces a combination of these digital characteristics is a 3D printer, but its industrial use is limited due to low productivity and limitations with materials and physical characteristics. In particular, improvements are required to use 3D printers, such as better user accessibility owing to expertise and skills in modeling software and printers. Complementing this fact is the 3D pen, which is excellent in portability and ease of use, but has a limitation in that it cannot be digitized. Therefore, in order to secure a digitalization capability and ease of use, and to secure the safety of printing materials that pose controversial hazards during the printing process, research problems and alternatives have been derived by combining food, and digitization was demonstrated with a newly developed 3D pen. In order to digitize the 3D pen, a sensor in a structured device detects the motion of an analog 3D pen, and this motion is converted into 3D data (X-Y-Z coordinate values) through a spatial analysis algorithm. To prove this method, the similarity was confirmed by visualization using MeshLab version 1.3.4. It is expected that this food pen can be used in youth education and senior healthcare programs in the future.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Considerations in work years and dental institution types among some dental hygiene graduates, and ways to improve the clinical dental hygiene society (일부대학 치위생과 졸업생의 근무경력, 근무기관별 취업 시 고려사항 및 임상치위생계의 개선사항)

  • Lee, Sun-Mi;Jun, Mi-Kyoung;Lee, Jung-Hwa
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.3
    • /
    • pp.311-321
    • /
    • 2018
  • Objectives: The purpose of this study was to provide basic data on the current status and ways to improve the dental hygiene society by investigating working conditions, working experience, dental institution types among some dental hygienists, and ways to improve the dental hygiene society. Methods: This study conducted an online survey to 450 graduates of the department of dental hygiene in colleges in Gyeonggi, Jeolla and Gangwon Provinces. This study got some help in securing the list of graduates from the heads of the departments. SPSS WIN 23.0 was used to analyze the data. Results: To questions on what is the most important thing in considering to apply for jobs, the highest proportion (39.1%) of respondents designated employee welfare, followed by improvement of clinical dental hygiene (34.0%), of welfare related contents (26.0%), and salary (19.5%). In the relationship between employee welfare and dental institution type and between employee welfare and work experience, employee welfare tend to rise with the increase of work years. In the relationship between the director and staff members, it was found that as work years accumulate, the relationship tends to decrease. The dental clinic with no more than five staff members showed the best relationship between the leader and co-workers, while employee welfare was the highest in the other types of clinics, and the differences were statistically significant. Conclusions: Dental hygienists need to make various efforts to improve their statuses as professionals. In order to secure a part of professionalism, it is necessary for them to make more efforts to realize the health-care professionals being promoted by the Dental Hygienists Association of Korea.

Effects of Mentoring Program's Development about New Nurses (신입간호사에 대한 멘토링 프로그램의 개발 효과)

  • Park, Mee-Lan;Lee, Mi-Joon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.43-51
    • /
    • 2018
  • The purpose of this study was to develop a mentoring program to support the professional growth of new nurses and to check the effectiveness. This mentoring program was developed by research teams and mentoring professionals based on Benner's theory. The data was analyzed using SPSS 18.0 program. The average of satisfaction of mentoring program in the mentees is 4.31 higher than mentor as 3.77. The highest scored item was 'need of mentoring program', the lowest one was 'mentoring program period and number of meetings'. Finally based on the results of the research, the duration of the mentoring program was changed to the six months. A steady support of the organizational policy about mentoring program is required to secure an outstanding nursing workforce.

The Effects of Technology Readiness Index of Artificial Intelligence and Internet of Things on the Recognition of Substitute Employment of Medical Personnel (인공지능, 사물인터넷의 기술준비도가 의료인력 고용대체인지도에 미치는 영향)

  • Kang, Han Seom;Kim, Young Hoon
    • Korea Journal of Hospital Management
    • /
    • v.23 no.2
    • /
    • pp.54-66
    • /
    • 2018
  • Purpose: This study was to figure out relationships of perceived Technology Readiness Index(TRI), usefulness, acceptance intension, and the recognition of substitute employment of medical personnel on the artificial intelligence (AI) and internet of things (IoT) among main technologies. Methodology: To achieve the purpose, this study utilized structured survey tools to conduct a questionnaire survey of nursing, administrative and medical technology professionals at six university hospitals in Korea metropolitan area. A PLS(Partial Least Square) Path analysis was utilized To analyze the material. Findings: In the relation with the technology readiness and perceived usefulness, it had a positive influence to the perceived usefulness when the optimism and innovativeness were higher and the discomfort was lower. In the relation with the technology readiness and acceptance intension, it showed a positive influence when the innovativeness was higher and the discomfort was lower. In the relation with the perceived usefulness and acceptance intension, it had a positive influence to the acceptance intension when the perceived usefulness was higher. In the relation with the acceptance intension and the recognition of substitute employment, it showed a positive influence to the recognition of substitute employment when the acceptance intension was higher. Practical Implications: Judging based on the above study results and reference reviews, it confirmed that it is necessary to prepare in the level of hospital organization in the $4^{th}$ Industrial Revolution. They should increase the efficiency of human resources through the technological factors or changes of employment types for the additional demands of human resources to handle increasing medical demands or induce to secure necessary abilities which are changing at the right time by performing the $4^{th}$ Industrial Revolution related re-training continuously to develop the value of existing human resources.

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Beyond SARS-CoV-2: Lessons That African Governments Can Apply in Preparation for Possible Future Epidemics

  • Oboh, Mary Aigbiremo;Omoleke, Semeeh Akinwale;Imafidon, Christian Eseigbe;Ajibola, Olumide;Oriero, Eniyou Cheryll;Amambua-Ngwa, Alfred
    • Journal of Preventive Medicine and Public Health
    • /
    • v.53 no.5
    • /
    • pp.307-310
    • /
    • 2020
  • Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has placed unprecedented pressure on healthcare systems, even in advanced economies. While the number of cases of SARS-CoV-2 in Africa compared to other continents has so far been low, there are concerns about under-reporting, inadequate diagnostic tools, and insufficient treatment facilities. Moreover, proactiveness on the part of African governments has been under scrutiny. For instance, issues have emerged regarding the responsiveness of African countries in closing international borders to limit trans-continental transmission of the virus. Overdependence on imported products and outsourced services could have contributed to African governments' hesitation to shut down international air and seaports. In this era of emerging and re-emerging pathogens, we recommend that African nations should consider self-sufficiency in the health sector as an urgent priority, as this will not be the last outbreak to occur. In addition to the Regional Disease Surveillance Systems Enhancement fund (US$600 million) provided by the World Bank for strengthening health systems and disease surveillance, each country should further establish an epidemic emergency fund for epidemic preparedness and response. We also recommend that epidemic surveillance units should create a secure database of previous and ongoing pandemics in terms of aetiology, spread, and treatment, as well as financial management records. Strategic collection and analysis of data should also be a central focus of these units to facilitate studies of disease trends and to estimate the scale of requirements in preparation and response to any future pandemic or epidemic.