• Title/Summary/Keyword: Estimation of indemnity

Search Result 4, Processing Time 0.018 seconds

A Study on Experience of the Indemnity Request from Patiences and Indemnity Paid of Malpractice (의료사고시 환자로부터의 배상요구경험과 지불한 배상액에 영향을 미치는 요인에 대한 분석)

  • 민혜영;손명세
    • Health Policy and Management
    • /
    • v.9 no.2
    • /
    • pp.95-117
    • /
    • 1999
  • The purposes of the study was to analysis the factors on the physicians' indemnity experience and indemnity on malpractice. Data was collected from mail interview for the physicians from August, to October in 1996. Questions were asked to the physician who selected with random sample(n=8.338) about the opinion of malpractice insurance. experience that he(she) have requested the indemnity from patience. context of experienced indemnity and demographic characteristics of physician and patience. Response rate is 37.5%(n=3,124). This study was analyzed in two levels' the first. influential factors on whether physician has experience of indemnity and the second. influential factors of indemnity among physicians who had experienced the indemnity. The major findings were as follows : 1. Logistic regression on whether physicians had experience of indemnity request was conducted. And it indicated that statistically meaningful variables of model 1 (about all physicians) were department of surgery, physicians who have intention of insurance fee, physician age and income, physicians who owned the hospitals and statistically meaningful variables of model 11 (about physicians who owned the hospital) were department of surgery and internal treatment. 2. Multiple regression on the influential factors on indemnity was conducted. And it showed that statistically meaningful variables in model 1 were method of malpractice quarrel(physician association), whether physician had malpractice, whether suit succeeded, physician age, average practice time and income and whether physician owned the hospital and statistically meaningful variables of model 11 were whether physician had malpractice, number of outpatient, number of beds. As the conclusion, the thesis was examined about the variables related with experience of indemnity and cost of malpractice. But in order to prevent malpractice and promote medical quality, the reasonable system to solve a malpractice have to settle and cost estimation on malpractice is essential. Therefore an advanced research is progressed with methodology to decide the indemnity bases.

  • PDF

Case Studies for Insurance Service Marketing Using Artificial Intelligence(AI) in the InsurTech Industry. (인슈어테크(InsurTech)산업에서의 인공지능(AI)을 활용한 보험서비스 마케팅사례 연구)

  • Jo, Jae-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.175-180
    • /
    • 2020
  • Through case studies for insurance service marketing using artificial intelligence(AI) in the insurtech industry, it investigated how innovative technologies(artificial intelligence, machine learning etc.) are being used in the insurance ecosystems. In particular, through domestic and international case studies, it was examined by Lemonade's service of insurance contracts and getting the indemnity and AI company's service of calculating the compensation through a medical certificate image based on OCR, which brought disruptive innovations using artificial intelligence. As a result of the case analysis, these services have drastically shortened the lead time of insurance contracts and payment through machine learning using numerous customer data based on artificial intelligence. And accurate and reasonable compensation was calculated in the estimation of indemnity, which has a lot of disputes between customers and insurance companies. It was able to increase customer satisfaction and customer value.

Construction Delay Risk and its Prevention Measures

  • Acharya, Nirmal Kumar;Lee, Young-Dai;Im, Hae-Man
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.268-270
    • /
    • 2006
  • The purpose of this paper was to explore delay avoiding measures and strategies. The paper was based on previous work of authors on finding delay causes. Firstly, the paper has discussed about delay avoidance measures prescribed by the previous work. As the previous study identified five main causes of construction delays, various measures and strategies to overcome those delay problems have been discussed in sequence in the last sections. Major delay prevention strategies are: involving stakeholders in the project decisions, outreach program, realistic time and resource estimation, try to adjust the triple constraints of time, cost and scope, ensure fair and complete disclosure of information at an early stage of the construction project, contractor, itself should inquire about patent design errors prior to submitting its bid, owner should include in its contract with the consultant an indemnity (protection) clause etc.

  • PDF

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.