• Title/Summary/Keyword: 안전인증제

Search Result 210, Processing Time 0.032 seconds

Change in patient safety, quality of medical care, organization culture and hospital management performance after healthcare accreditation system for convalescent hospital (요양병원 의료기관인증제 시행 후 환자안전, 의료의 질, 조직문화 및 병원경영성과의 변화)

  • Seo, Young-Ho;Kim, Keon-Yeop;Kim, Myeong-Seon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.9
    • /
    • pp.391-401
    • /
    • 2018
  • This study was conducted to investigate the effects of implementation of the healthcare accreditation system on patient safety, quality of medical care, organization culture and management performance of convalescent hospitals. Ten hospitals were selected at random from among 36 convalescent hospitals in Daegu that had obtained accreditation until September 2015. To accomplish this, hospital staff were surveyed from 15 February to 25 March, 2016 using a questionnaire with 253 objects. We investigated how the healthcare accreditation system has influenced patient safety, service quality, organization culture and performance of hospital management. The change in the treatment support system showed the highest score of 3.93 among quality change and medical service items, while that of personnel source culture showed the highest score of 3.78 points among organization culture items, and that of internal process view, study and growth view showed the highest score of 3.71 among management performance items. Multiple regression analysis revealed that factors positively changing hospital management performance were nurses, employees and managers, basic value systems, organization culture, personnel source culture, open system culture, hierarchical culture, and production oriented culture. The quality of patient safety and medical care was positively influenced by changes in the quality of convalescent hospitals after implementation of the healthcare accreditation system. However, among the four types of organizational culture, the financial perspective was relatively low compared to other perspectives.

정보통신망법 개정에 따른 기업 정보보호 제도 현황 및 정보보호 관리체계의 인증기준 비교

  • Kim, Hwan Kuk;Ko, Kym Man;Lee, Jae Il
    • Review of KIISC
    • /
    • v.23 no.4
    • /
    • pp.53-58
    • /
    • 2013
  • 최근 사이버공격은 지능화, 대규모화되고 있는 반면, 경기침체 등으로 인해 기업의 정보보호 투자가 저조하고 인터넷 침해사고 예방활동이 미흡한 실정이다. 정부는 취약한 기업의 정보보호 환경을 개선하기 위해 정보보호 안전진단 제도를 폐지하고 정보보호 관리체계(ISMS) 인증제도로 일원화하였으며, ISMS 인증기업을 대상으로 한 정보보호 관리등급제, 정보보호 사전점검, 임원급 정보보호 최고책임자(CISO) 지정 등 신설하였다. 본 고에서는 개정 정보통신망법에 따라 신설 보완된 기업 정보보호 관련 제도현황과 변경된 정보보호 관리체계 인증기준에 대해 소개하고자 한다.

Evaluation of Introducing Feasibility of Blockchain Technology to Food Safety Management Network (식품안전관리망 강화를 위한 블록체인 기술 도입의 적절성 평가)

  • Kwon, So-Young;Min, Kyong-Se;Cho, Seung Yong
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.5
    • /
    • pp.489-494
    • /
    • 2019
  • The appropriateness of introducing blockchain technology into food safety management systems was evaluated by conducting a survey of experts on the effectiveness and constraint evaluation indicators, and a portfolio analysis was conducted to set the priorities of blockchain application. The food safety management activities considered in this study were issuing documents on food import/export, food hygiene rating scheme, civil complaint management in the food sector, food- related certification, risk information management, and food traceability systems. The sectors that can be expected to be effective in the introduction of blockchain technology were food- related certification, food hygiene rating scheme, risk information management, and issuing documents on food import/export. In the case of food traceability systems and civil complaint management, the introduction of blockchain technology was not recommended due to ineffectiveness. From the evaluation of the constraints (e.g., technical limits, cost, legal amendment, personal information disclosure, timeliness, and ease of connection) to be overcome when introducing blockchain into food safety management, it was found that there are more than average constraints in all six areas. In particular, the food traceability system was evaluated to have the most constraints. Issuing documents on food import/export is very effective with the introduction of blockchain technology, but due to high cost and legal restrictions, it is necessary to improve the institutional system in order to introduce blockchain. Among the evaluation sectors, food- related certification, food hygiene rating scheme, and risk information management on foods were suitable for preferentially adopting blockchain technology since these areas might experience greatly improved reliability and transparency through the introduction of blockchain, with relatively low constraints.

Security Protocol Design for Wireless Mobile Communication (무선 이동 통신을 위한 보안 프로토콜 설계)

  • 강형우;이수연;박창섭;이동훈;윤이중
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.541-543
    • /
    • 1998
  • 무선 이동 통신에서는 가입자의 이동성으로 인하여 가입자의 인증 프로토콜을 수행 할 때 신원이 노출되기 쉽다. 이러한 가입자의 신원 노출은 제 3자가 이동 가입자의 이동을 추적하거나 위치를 파악할 수 있게 할 수 있다. 또한 이동 가입자가 사용하는 단말기의 낮은 계산 능력으로 인하여 가입자의 단말기가 인증 프로토콜을 수행함에 있어서 적은 암호학적 연산이 요구된다. 본 논문에서는 단말기의 계산능력이 낮은 점을 고려하여 단말기에 적은 암호학적 연산이 요구되며 가입자의 위치와 행동의 노출 없이 안전하게 이동 가입자를 인증하는 프로토콜을 제안한다.

  • PDF

Complex impact of Patient Safety and Medical Quality on Hospital Management Activities due to Healthcare Accreditation Adoption (의료기관인증제 도입에 따른 환자안전과 의료의 질이 병원경영활동에 미치는 복합영향)

  • Yoo, Jin-Yeong;Lee, Jong-Hwa
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.283-292
    • /
    • 2015
  • The purpose of this study was to confirm the complex relationship between patient safety-medical quality and hospital management activities to observe the mediating effect of organizational culture in the relationship due to healthcare accreditation adoption. For this, we conducted a 4 weeks survey, from September 22, 2014 to October 17, 2014 to the employees of 6 hospitals that could accommodate less than 300 patients or more than 300 patients located in Daegu and Gyeongbuk. The study includes 377 participants who have worked for more than one year in the hospital. All of hospital with less than 300-beds or more than 300-beds, such as patient safety-medical quality, organizational culture, hospital management activities found a positive correlation among variables. The mediating effect of organizational culture in the relationship between patient safety-medical quality and hospital management activities was shown by the partial mediating effect and high causal effect. Therefore, these study suggest that patient safety-medical quality due to healthcare accreditation adoption has the potential to improve hospital management activities.

Secure modified AKE protocol against man-in-the-middle attack (Man-in-the-middle attack에 강한 변형된 AKE 프로토콜)

  • Chang, Sung-Ryul;Cho, Hyun-Ho;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2085-2088
    • /
    • 2003
  • 인터넷의 발전과 함께 사용자 인증 기술도 발전하였다. 이러한 사용자 인증 기술 중 패스워드 인증기술이 특정 컴퓨터 또는 통신 시스템 서버의 서비스를 요구하는 클라이언트의 신분을 확인하는 기술로 가장 널리 사용되고 있다. 그러나 일반적으로 사용되는 패스워드 인증의 약한 안전성으로 인한 보안 사고는 매년 증가하고 있고, 그 피해 또한 상당하다. 본 논문은 이런 패스워드 인증 방식 중 강한 인증으로 분류되는 AKE 프로토콜에 대해 분석하고, man-in-the-middle attack이 가능하다는 것을 보인 후, 이 취약점을 보완하여 제 3의 신뢰기관을 두지 않고 두 파티간의 상호인증이 가능한 변형된 AKE 프로토콜을 제안한다.

  • PDF

A Secret Sharing Mechanism for Multi-Hop Sensor Nodes Environment Using the Third Node (제 3의 노드를 이용한 다중 홉 환경의 센서 노드를 위한 안전한 비밀값 공유 기법)

  • Cho, Eung Jun;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1297-1299
    • /
    • 2010
  • 무선 통신에서는 무선 통신의 브로드캐스트한 특성으로 데이터의 기밀성 유지를 위한 암호화가 매우 중요하다. 특히 무선 센서 네트워크(WSN - Wireless Sensor Network)의 경우 일반적인 PC와는 다르게 다양한 환경에 위치할 수 있어 공격자에게 더 쉽게 노출 될 수 있는 문제점을 가지고 있다. 이런 환경에서 미리 저장된 해쉬 함수나 비밀 값에 의존한 키 분배를 할 경우 저장된 값이 노출될 경우 심각한 문제를 초래하게 된다. 그리고 D-H 키 분배 알고리즘의 경우 키 값을 안전하게 도출을 할 수 있지만 키를 도출한 대상에 대한 인증의 부재와 멀티 홉 환경에서 중간자 공격에 취약한 문제점을 드러내고 있다. 본 논문에서는 이런 문제를 해결하기위해 기존 연구를 응용하여 멀티 홉 환경에서 무선 통신의 특성을 이용한 비밀값 공유와 제 3의 노드를 이용한 간단한 인증이 가능한 기법을 제안한다.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Certification Framework for Aviation Software with AI Based on Machine Learning (머신러닝 기반 AI가 적용된 항공 소프트웨어 인증체계)

  • Dong-hwan Bae;Hyo-jung Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.466-471
    • /
    • 2024
  • Recently, the Machine Learning based Artificial Intelligence has introduced in aviation field. In most cases, safety assurance of aviation software is achieved by applying RTCA DO-178C or DO-278A or similar standards. These standards were developed for and are well-suited to software that has inherent deterministic properties and explainability. Considering the characteristics of AI software based on ML, it is not feasible to assure the integrity of those new aviation systems using traditional software assurance standards mentioned above. In this paper, we research the certification framework that is newly suggested by EASA to deal with the aviation system including ML AI functions, and discuss what should the Korean authority and related industries prepare to cope with this issue.

A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication (초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구)

  • Shin Kwang-Cheul;Cho Sung-Je
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.83-91
    • /
    • 2006
  • In this paper, we improved a cryptography system model based on the secure initial authentication public key with PKINIT of authentication and key recovery protocol. It is applied to all fields of cryptography system using certificate. This study presents two mechanisms to authenticate between member users. The first mechanism is initial authentication and distribution of session key by public key cryptography based on certificate between entity and server, and the second mechanism is a key recovery support protocol considering loss of session key in the secure communication between application servers.

  • PDF