Relationship between Information Security Education and Information Protection Practice of Hospital

의료기관의 정보보호교육과 정보보안생활과의 관련성

  • Kim, Jongdeok (Department of Healthcare Administration Dankook University College of Health Science) ;
  • Hong, Hwayong (Department of Healthcare Administration Dankook University College of Health Science) ;
  • Kim, Jae-Hyun (Department of Healthcare Administration Dankook University College of Health Science)
  • 김종덕 (단국대학교 일반대학원 보건학과 보건행정학전공) ;
  • 홍화영 (단국대학교 일반대학원 보건학과 보건행정학전공) ;
  • 김재현 (단국대학교 일반대학원 보건학과 보건행정학전공)
  • Received : 2019.04.23
  • Accepted : 2019.06.26
  • Published : 2019.06.30

Abstract

PURPOSE: To demonstrate that the training of information protection for members at medical institutions increases the information protection activities of employees. METHODS: We used the chi-square test and the logistic regression model to analyze the data of the "Healthcare Information and Communication Status Survey in 2017" (n = 2002) conducted by the Korea Health Industry Development Institute RESULTS: As a result of the analysis, the information protection activity increased when the education was received and the number of received more than the education was not received. Especially, when the management receives education, it affects the information protection activities of the employees. CONCLUSION: In order to protect medical information, medical institutions need to provide education on information protection for management and employees.

Keywords

References

  1. Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law 2014. 22(1): p. 177-208. https://doi.org/10.17215/kaml.2014.06.22.1.177
  2. Jeong, G.W., Use and protection of medical information. Journal of Korea Association For Informedia Law, 2002. 6(1): p. 3-4.
  3. Jang, S.C., The Lgislation on the Protection of Medical Information. The Journal of Law, 2013. 24(2): p. 425-446.
  4. Jeong, B.G., Issues on the Patient's Information Protection. THE KOREAN SOCIETY OF LAW AND MEDICINE, 2008. 9(2): p. 339-382.
  5. Lee, H.J., The Legislation on the Personal Medical Information Protection Law. Korean Journal of Medicine and Law, 2014. 22(1): p. 177-208. https://doi.org/10.17215/kaml.2014.06.22.1.177
  6. Cho, H.S., Protection of Individual Medical Information in Risksociety. Hanyang law review, 2013. 24(4): p. 171-191.
  7. Park, J.H., Impact of Personal Health Information Security Awareness on Convenience. The Journal of the Korea Contents Association, 2017. 17(6): p. 600-612. https://doi.org/10.5392/JKCA.2017.17.06.600
  8. Baek, Y.C., Medical Service Information and Individual Information Protection in Korea. Constitutional Law, 2005. 11(1): p. 395-442.
  9. Care at a hospital medical institution Personal information protection. boannews, 2013. 6. 27.
  10. Jeong, H.J., Kim, N.H., A Study on the institution of a Personal Health Information Protection Law - With the focus on the Personal Information Control Right -. The Journal of Korea Association of Medical Law, 2008. 16(2): p. 99-121.
  11. Von Solms, B., Information security-the fourth wave. Computers & security, 2006. 25(3): p. 165-168. https://doi.org/10.1016/j.cose.2006.03.004
  12. Wei, H., Frincke, D., Carter, O., and Ritter, C., Cost-benefit analysis for network intrusion detection systems. CSI 28th Annual Computer Security Conference, October, Washington DC, USA,, 2001: p. 29-31.
  13. Aron, J.L., Gove, R. A., Azadegan, S., and Schneider, M. C., The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem : Results of a Survey and a Simulation Model. Computers and Security, 2001. 20(8): p. 693-714. https://doi.org/10.1016/S0167-4048(01)00812-4
  14. Dhillon, G.a.J.B., Information System Security Management in the New Millennium. Communications if the ACM, 2000. 43: p. 125-128. https://doi.org/10.1145/341852.341877
  15. Kim, H.N., In the era of personal information leakage, protection of personal medical information. Research Institute for Healthcare Policy Korea Medical Association, 2014. 12(1): p. 71-77.
  16. Confession to leave EMR unauthorized visit Seoul National Univ. Medical Today News, 2019.1.21.
  17. "Online Defamation Attendance" Medical Ransomware Red Alarm. MedicalTimes, 2019-02-26.
  18. GoodHue, D.L.a.D.W.S., Security Concerns if System Users: A Study of Perceptions of the Adequacy of Security Measures. Information & Management, 1991. 20: p. 13-27. https://doi.org/10.1016/0378-7206(91)90024-V
  19. Lim, C.H., Effective information protection awareness improvement plan. Journal of the Korea Institute of Information Security, 2006. 16(2): p. 30-36.
  20. Agency, K.I.S., 2017 Survey on Information Security Businiess. Korea Internet & Security Agency, 2017.
  21. Jung, Y.C., Lee, K.H., Lee, Y.R., A Study on Current Privacy Policies of Medical Institutes and Suggestions. Korea Institute for Health and Social Affairs, 2013. 29.
  22. Lee, C.S., Information security auditing framework in industrial control system. Journal of the Korea Institute of Information Security & Cryptology, 2008. 18(1): p. 139-148. https://doi.org/10.14801/jkiit.2020.18.3.139
  23. Moon, K.W., Kim, S.G., Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness. Journal of the Korea Institute of Information Security & Cryptology, 2017. 27(4): p. 897-912. https://doi.org/10.13089/JKIISC.2017.27.4.897
  24. Chu, J.H., Wang, S.H., Cho, Y.W., Park, M., Lee, B.R., A Study on the Improvement of Legal System for Activation of Medical Information Industry. Korea Information Society Development Institute, 2003: p. 99-100.
  25. Ministry of Public Administration and Security, Notice No. 2017-1(2017.7.26).
  26. Amitava, D.a.K.M., Manangement's Role in Information Security in a Cyber Economy. California Management Review, 2002. 45: p. 67-87. https://doi.org/10.2307/41166154
  27. Choi, D.K., Song, M.S. , Im, J.I. , Lee, K.H., Study the role of information security personnel have on an organization's information security level. Journal of The Korea Institute of Information Security & Cryptology, 2015. 25(1): p. 197-209. https://doi.org/10.13089/JKIISC.2015.25.1.197
  28. Straub, D.W., Effective IS Security: An Empirical Study. Information Systems Research, 1990. 1: p. 255-276. https://doi.org/10.1287/isre.1.3.255
  29. Park, J.K., Kim, B.S., Cho, S.W. , Primary Factors Affecting Corporate Employees' Attitudes Toward Information Security. Korea Business Review, 2011. 40(4): p. 955-985.
  30. Yoo, J.H., Comparison of Information Security Controls by Leadership of Top Management. Journal of Korea Society of Electronic Commerce, 2014. 19(1): p. 63-78.
  31. Song, J.S., Jeon, M. J., and Choi, M. G., A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies. The Journal of Society for e-Business Studies, 2011. 16(1): p. 133-151.
  32. Joshi, K., The measurement of fairness or equity perceptions of management information systems users. MIS Quarterly, 1989. 13: p. 343-358. https://doi.org/10.2307/249010
  33. Choi, M.G., An Exploring Study on Relation Between Maturity Levels of Organizations and Factors Affecting Information Security Policy. Journal of Korean Academic Association of Business Administration, 2009. 22(3): p. 1729-1748.
  34. Lee, G.G., [Future society hopes for technology] We need social security strategy. Naeilnews, 2009.11.15.