• Title/Summary/Keyword: health security system

Search Result 408, Processing Time 0.029 seconds

Health Status, Depression and Social Support of Elderly Beneficiaries of the National Basic Livelihood Security System (기초생활보장수급노인의 건강상태, 우울, 사회적 지지)

  • Kang, Jung-Hee;Kim, Jeong-Ah;Oh, Ka-Sil;Oh, Kyong-Ok;Lee, Sun-Ock;Lee, Sook-Ja;Jun, Hoa-Yun;Kim, Hye-Ryoung
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.6
    • /
    • pp.866-882
    • /
    • 2008
  • Purpose: The purpose of this study was: 1) To investigate health status(health behavior, health problem and cognition), depression and social support of elderly beneficiaries of the National Basic Livelihood Security System. 2) To identify the relationships among health status, depression and social support. Methods: This descriptive study used a cross-sectional design. The study sample was a total of 883 elderly recipients supported from the National Basic Livelihood Security System. Quotas for sampling were designed and conducted nationwide throughout Korea. Results: The mean age was 76.2 and the 79.6% of the sample were female. The scores for the health behavior, health problem, ADL, and cognition were 23.9, 4.4, 39.6 and 24.9, respectively. Additionally, the depression score was 19.8 and the social support score was 63.2. Gender, age, education, religion, marital status and monthly income were found as important variables in increasing health status and in decreasing depression among the elderly. Furthermore, depression showed a positive correlation with health problems, but showed negative correlations with health behavior, ADL, and cognition. The upper 25% of social support recipients suffered less depression than the lower 25% of the recipients. Subjects with more social supports had higher ADL scores and less health problem. Conclusion: These findings provide significant practical implications for nursing intervention, including social support for the elderly receiving assistance from the National Basic Livelihood Security System.

  • PDF

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

The Roles of the National Health Insurance Service in the Public Health Security (건강보장과 국민건강보험공단의 역할)

  • Kim, Yong-Ik
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.210-216
    • /
    • 2018
  • National Health Insurance Service (NHIS) has put a great effort on extending life expectancy, for last 40 years. The system has also made remarkable outcomes in achieving universal health coverage. However, it is facing challenges of low health insurance benefits and sustainability risk due to low birth rate and aging society at the same time. To overcome the difficulties and build a lifelong health security system for the nation, it is required for NHIS to make multilateral changes in its roles. Based on the quantitative growth achieved so far, NHIS needs to strive for the growth in quality by not only increasing coverage and reforming contribution imposition system, but also reorganizing the relevant systems such as lifelong health management support, rational adjustment to the medical fee, and benefit costs monitoring. In addition, it's important for NHIS to restructure the organizational culture by having specialty and communicating with people for high quality of administration and health insurance sustainability.

The Effect of Catastrophic Health Expenditure on the Transition to Poverty and the Persistence of Poverty in South Korea (과부담 의료비 지출이 빈곤화 및 빈곤 지속에 미치는 영향)

  • Song, Eun-Cheol;Shin, Young-Jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.5
    • /
    • pp.423-435
    • /
    • 2010
  • Objectives: The low benefit coverage rate of South Korea's health security system has been continually pointed out. A low benefit coverage rate inevitably causes catastrophic health expenditure, which can be the cause of the transition to poverty and the persistence of poverty. This study was conducted to ascertain the effect of catastrophic health expenditure on the transition to poverty and the persistence of poverty in South Korea. Methods: To determine the degree of social mobility, this study was conducted among the 6311 households that participated in the South Korea Welfare Panel Study in both 2006 and 2008. The effect of catastrophic health expenditure on the transition to poverty and the persistence of poverty in South Korea was assessed via multiple logistic regression analysis. Results: The poverty rate in South Korea was 21.6% in 2006 and 20.0% in 2008. 25.1 - 7.3% of the households are facing catastrophic health expenditure. Catastrophic health expenditure was found to affect the transition to poverty even after adjusting for the characteristics of the household and the head of the household, at the threshold of 28% or above. Conclusions: 25.1% of the households in this study were found to be currently facing catastrophic health expenditure, and it was determined that catastrophic health expenditure is a cause of transition to poverty. This result shows that South Korea's health security system is not an effective social safety net. As such, to prevent catastrophic health expenditure and transition to poverty, the benefit coverage of South Korea's health security system needs to the strengthened.

User-friendly Application for operability with HL7 in mobile agent of Ubiquitous Health Environment

  • Lee, JeongHoon;Kwock, DongYeup;Moon, KangNam;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.866-870
    • /
    • 2009
  • Mobile Health (M-Health) system is a recent term for medical and public health practice supported by mobile devices, such as mobile phones, PDAs, and other wireless devices. Mobile Health system has been successfully establishing at few general hospital in Korea. However, to use diverse devices manufactured by various company cause inoperability, and lack of security disappoints customers often. Although the outstanding health environment, most of hospitals are unavailable to share electronic patient records due to lack of standard protocol to handle the interoperability each other. Health Level 7 (HL7) is the best solution for the problem. In this paper, we will analyse a current M-Health service in terms of security and mobile device, and suggest iPhone for the best device against hospital environment. Also, for keep confidentiality of health information and patient privacy, enhanced security mechanism is introduced. As a consequence, interoperable standard, and most appropriate device for supporting staffs and M-Health performance, and enhanced securirty mechanism will be integrated in order to propose improved M-health model.

  • PDF

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

A Building Method of Security Architecture Framework on the Medical Information Network Environment (의료정보시스템상에서의 네트워크 보안기능 프레임워크와 보안 아키텍쳐 설계방법)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.3-9
    • /
    • 2011
  • On health information network architecture, traffic along the path of traffic and security, blocking malicious code penetration is performed. The medical information system network security infrastructure study, which was whether to be designed based on the structure and methodology is designed to develop the security features. Health informati on system's functionality and capabilities framework for infrastructure is the backbone and structure. The design fea tures a framework for the overall network structure formation of the skeleton and forms the basic structure of the security methodology. Infrastructure capabilities to build the framework and the application functionality is being implemented. Differentiated in accordance with security zones to perform security functions and security mechanisms that operate through this study is to present. u-Healthcare future advent of cloud computing and a new health information environment, the medical information on the preparation of this study is expected to be utilized for security.

Design of MIR Security System in Mobile Environment (모바일 환경에서의 MIR 시큐리티 시스템에 관한 연구)

  • Kim, Seok-Soo;Ha, Kyung-Jae;Han, Kun-Hee
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.25-32
    • /
    • 2006
  • MIR system is a nationwide medical record information system that makes medical information available to any hospital and health institution at any time, and information in the system mostly requires high security. In particular, personal information related to patients and doctors, medical technology information and each hospital's digital information are used very frequently and are likely to be modified for illegal use. Thus we need to develop a system equipped with security measures to prevent information leakage while providing medical information service effectively.

  • PDF

A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations (의료기관의 정보보안 수준 측정을 위한 평가모형 개발)

  • Ahn, Sun-Ju;Kwon, Soon-Man
    • Korea Journal of Hospital Management
    • /
    • v.10 no.4
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF