DOI QR코드

DOI QR Code

An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment

스마트 의료환경에서 보안체계 구축을 위한 이해관계자 역할 분석

  • Kim, Yanghoon (Department of Industrial Security, Far East University) ;
  • Jeong, Wonwho (Department of Convergence Security, Chung-Ang University)
  • Received : 2018.11.27
  • Accepted : 2018.12.29
  • Published : 2019.02.28

Abstract

With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.

4차 산업혁명의 몰입과 함께 산업의 전반적인 흐름이 ICT 기반의 비즈니스 환경으로 나아감에 따라 의료산업에도 환경변화가 일어나고 있다. 공공재 성격을 지닌 의료산업에서는 의료서비스의 신뢰성과 지속성을 요구하고 있으나, 스마트 환경으로 전환하기에 기존 시스템들의 호환성, 확장성 문제로 인하여 보안에 대한 도입이 늦춰지고 있다. 이에 따라, 본 연구에서는 신속하게 스마트 의료환경에서 보안체계를 구축하기 위하여, 필요로 하는 보안기술을 도출, 분석하고 도입하기 위한 이해관계자들이 관심을 가져야하는 부분과 역할에 대하여 설계하였다. 이를 통하여 의료보안체계를 구축하기 위한 이해관계자들의 다차원적인 노력에 대하여 확장성 있는 가능성을 제시하였다.

Keywords

References

  1. Barrow, R. C., "Privacy, Confidentiality, and Electronic Medical Record," Journal of the American Medical Informatics Association, Vol. 3, No. 2, pp. 139-148, 1996. https://doi.org/10.1136/jamia.1996.96236282
  2. Cao, F., Huang, H. K., and Zhou, X. Q., "Medical Image Security in a HIPAA Mandated PACS Environment," Computerized Medical Imaging and Graphics, Vol. 27, No. 2, pp. 185-196, 2003. https://doi.org/10.1016/S0895-6111(02)00073-3
  3. "Cyber Security Guide for Smart Medical Service," Korea Internet & Security Agency, 2018.
  4. Glemm, A. L., Scott, R., Robert, M. S., and Nitesh, R. T., "If Electronic Medical Records are so Great, Why aren't Family Physicians Using Them?," Journal of Family Practice, Vol. 51, No. 7, 2002.
  5. Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K., "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices," ACM SIGCOMM Computer Communication Review, Vol. 41, No. 4, pp. 2-13. 2011. https://doi.org/10.1145/2043164.2018438
  6. Halperin, D., Thomas, S. H., Fu, K., Tadayoshi, K., and Maisel, W. H., "Security and Privacy for Implantable Medical Devices," The Community for Technology Leaders, Vol. l7, No. 1, 2008.
  7. Jung, Y. S., "Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service," Korea Society of Industrial Information Systems, Vol. 15, No. 2, pp. 115-126, 2010.
  8. Kim, D. W. and Han, K. H., "Recent Research Trends for Responding to Security Threats in Smart Healthcare Environment," Information & Communications Magazine, Vol. 35, No. 2, pp. 95-99, 2018.
  9. Kim, Y. H. and Chang, H. B., "The Change of Future Environment and The Task of Healthcare Security," OSIA S&TR Journal, Vol. 31, No. 2, pp. 4-9, 2018.
  10. Koo, C. C., Shyy, Y. M., iMedica Corp., "Medical Records Data Security System," U.S. Patent 6,874,085, 2005.
  11. Kumar, P. and Lee, H. J., "Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey," Sensors, Vol. 12, No. 1, pp. 55-91, 2012. https://doi.org/10.1109/JSEN.2011.2119477
  12. Lee, Y. H. and Jung, C. S., "Design of Privilege Authentication for Secure OS based on PKI," Korea Institute of Information Scientists and Engineers, Vol. 34, No. 1, 2007.
  13. Oh, K. Y., "The Point of Issue and Blind on a Debate Concerning De-identification of Data," Korean Public Law Association, Vol. 45, No. 2, 2016.
  14. Park, S. H., Kim, Y. H., Park, G. M., Na, O. C., and Chang, H. B., "Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment," Sustainability, Vol. 10, No. 4, pp. 1-24, 2018. https://doi.org/10.3390/su10020001
  15. Williams, P., "A Practical Application of CMM to Medical Security Capability," Information Management & Computer Security, Vol. 16, No. 1, pp. 58-73, 2008. https://doi.org/10.1108/09685220810862751
  16. Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., "Taiwan's Perspective on Electronic Medical Records' Security and Privacy Protection: Lessons Learned from HIPAA," Computer Methods and Programs in Biomedicine, Vol. 82, No. 3, pp. 277-282, 2006. https://doi.org/10.1016/j.cmpb.2006.04.002
  17. Lee, K. K., Jung, Y. S., and Han, C. H., "A Study on Consumer's Acceptance of Medical Internet Marketing According to Medical Departments," The Journal of Society for e-Business Studies, Vol. 14, No. 1, pp. 121-142, 2009.
  18. Kim, J. W. and Chang, H., "A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions," The Journal of Society for e-Business Studies, Vol. 23, No. 1, pp. 89-102, 2018. https://doi.org/10.7838/jsebs.2018.23.1.089