• Title/Summary/Keyword: health security system

Search Result 413, Processing Time 0.038 seconds

Policy Formulation of Health Insurance and Its Problems in Korea (의료보장정책의 형성과 문제점)

  • 이규식
    • Health Policy and Management
    • /
    • v.10 no.1
    • /
    • pp.57-94
    • /
    • 2000
  • Korea's social health insurance system was introduced in 1977, which has made a universal coverage possibly by July 1989. Korean government had pursued a single objective for the last decade to put the whole population under the coverage of medical security, and the objective was achieved within 12 years. The rapid accomplishment is primarily due to such factors as limited benefits, high copayment rate, low contributions as well as rapid economic growth. There are several sources of pressure for the implementation of social health insurance such as health professional group, labor unions, politicians, international organizations etc.. However it is important to look at the feasibility of social health insurance. Among other things, it is necessary to identify the administrative infrastructure of insurance system and to assess income for source of fund. As many developed countries, Korea began to apply health insurance to the employees of the large firms, and the expansion based on employment status. Thus the several funds system was inevitable according to the gradual expansion strategy. However many persons had criticized several funds system in respect with equity and efficiency aspects. In the short history of the Korean health insurance, whether one fund or sever or funds had been the most controversial issue. In Febrary 1999, the National Assembly passed the act of one fund system. From July 2000 separate funds will be unifed under new health insurance scheme. In this study we will analyze the policy making process on implementation, expansion and integration of health insurance system of Korea. And also analyse problems related to policy making.

  • PDF

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

Multi-Institutional Database System for The Aid of Improvement in Radiotherapy Results

  • Ishibashi, Masatoshi;Harauchi, Hajime;Kou, Hiroko;Kumazaki, Yu;Shimizu, Keiji;Harano, Masako;Numasaki, Hodaka;Yoshioka, Munenori;Inamura, Kiyonari
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.126-128
    • /
    • 2002
  • A learning system was built into an on-line, multi-institutional radiotherapy database, where the treatment history records and the results in each institution were integrated, each radiotherapy planning was supported, and it led to the improvement in treatment results.

  • PDF

Consumer's Response for Health Friendly Planning Features of Smart Home (건강친화 지능형주택 계획요소에 대한 소비자 반응 연구)

  • Lee, Sunmin;Lee, Yeunsook;Ahn, Changhoun
    • KIEAE Journal
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2009
  • Due to rapid advances in science and technology and peoples life value, multi-dimensional functionality of the house has been possible and demanded. Among them, intellectual function and health support function appeared prominent and the former can support the later. The purpose of this study was to delineate health support planning features for smart home. Thirty six planning elements were extracted for initial pool for survey to find out what consumers demanded. Two hundred and nine data were collected through the web-survey. Important planning features were identified in relation to three different health dimensions that is physical/physiological, psychological, and social health. Generally consumers' responses were positive for all features. Major health friendly features highly demanded by consumers were found gas detect system, security system, and a call alarm system. The result of this study is expected to be used as a basic reference to develop strategies for smart home and to grasp current housing culture.

Basic Concepts and Detailed Dimensions of Food Security and Related Indicators for Policy Development and Evaluation (식품보장 기준선 마련을 위한 기본 개념과 세부 영역 설정 및 관련 지표 탐색)

  • Park, Sohyun;Hwang, Ji-Yun;Shim, Jae Eun;Kim, Kirang
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.6
    • /
    • pp.429-440
    • /
    • 2021
  • Objectives: Standardized guidelines and reference points for a food security policy are necessary to guarantee that basic social safety nets work properly. Therefore, this study aimed to explore the basic concepts and detailed dimensions of food security, including the potential relevant indicators, and sought to establish standardized well-being baselines. Methods: A literature review and 14 expert roundtable discussions were carried out to analyze and extract the key concepts of food security. After determining these concepts and detailed dimensions of food security, a conceptual framework was modeled. Then, indicators for each local government that could be monitored and evaluated for each sub-area were suggested. Results: The concept of food security was defined as follows: Individuals should be provided with sufficient, safe, and quality food, which should be accessible to the community and available for use to achieve health and well-being. In addition, food security should be ensured sustainably in a changing environment. Four dimensions were suggested while conceptualizing food security. First, sufficient food, which means sufficient food supply in quantity, quality, and safety. Second, equitable food which includes creating environments in which high-quality and safe food can be purchased at an appropriate price and can be provided regardless of the socioeconomic gap. Third, healthy food which should be provided to promote people's health and happiness through the eco-friendly consumption of food. Fourth, sustainable food, which can be supplied in a sustainable manner and as part of an eco-friendly food system that considers the conservation of natural environments. Conclusions: The basic concepts and detailed areas of food security including the potential indicators proposed in this study, may be useful for developing and implementing various policies and programs to support food and nutrition security in the future.

Service-oriented protocol security framework in ICT converged industrial environment (ICT 융합 산업 환경에서 서비스 지향 프로토콜 보안 프레임워크)

  • Lee, Seoung-Woo;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.15-22
    • /
    • 2017
  • This paper analyzes vulnerability of each service protocol used in ICT convergence industry, smart factory, smart grid, smart home, smart traffic, smart health care, and suggests technologies that can overcome security vulnerabilities. In addition, we design a service-oriented protocol security framework that allows us to quickly and easily develop security functions in an open environment by defining a security element common to protocols and designing a security module for each protocol layer including the corresponding elements. Service protocol independent security module and specialized security module, it will be possible to develop flexible and fast security system in ICT convergence industry where various protocols are used. The overall security level of the ICT service network can be improved by installing the necessary security modules in the operating system, and the productivity can be improved in the industrial security field by reusing each security module.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

Privacy and Security Model for RFID Healthcare System in Wireless Communication Network (무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안 모델)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1223-1228
    • /
    • 2012
  • The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

A Study on Development of Security Detection System for Infant, the Old and the Weak by using TRIZ (TRIZ를 활용한 유아 및 노약자를 위한 안전감지시스템 개발에 관한 연구)

  • Lee, Kook-Hwan;Lee, Kyeong-Won
    • Journal of the Semiconductor & Display Technology
    • /
    • v.7 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • There are no products, systems to manage health and detect security for infant, the old and the weak in Korea. Recently, the concerns of parents are increasing more about all of children(baby, infant, etc) because rate of birth is decreasing gradually. Also, the average span of human life is on an increasing trend according to well-being and evolution of medical treatment. Therefore, this treatise analyzed problems in managing and following-up infant, the old and the weak at present. By using TRIZ to solve problems, we devised new conceptional ideas, detail designs to manage health, detect security, cope with correspondences for them and developed the prototype and tested it. Excellent performances are proved through various field test.

  • PDF

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks