• Title/Summary/Keyword: Health security

Search Result 1,067, Processing Time 0.033 seconds

An Audit Model for Information Security of Hospital Information System (병원정보시스템에서의 정보보호를 위한 감리모형)

  • Yu, Wan Hee;Han, Ki Joon;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.133-145
    • /
    • 2014
  • Recently, Hospital information systems have the large databases by wide range offices for hospital management, health care to improve the quality of care. However, hospital information systems for information security measures are insufficient. Therefore, when we construct the hospital information system, we have to audit the information security measures for them, and we have to manage the ISMS(Information Security Management System) to maintain the information protection level through the risk managements. In this paper, we suggested the hospital information security audit model for the protection of health information privacy by the current hospital information systems, information security management system(ISMS), and hospital information security requirements and threats. We derived the check items compared with ISO27799 reflected the characteristics of the hospital. We classified the security domains as the physical, technical, administrative domain, and derived the check items for information security. We also designed the check lists by mapping the ISO27799 risk management process to improve the security and efficiency simultaneously. Our model by the five-point scale survey of IT experts was verified the suitability with the average of 4.91 points.

Physical Health Status, Depression and Activities of Daily Living of the Low-income Elderly Living Alone in Metropolitan Areas (대도시 저소득 독거노인의 신체적 건강상태, 우울 및 일상 활동 능력)

  • Kim, Yeon-Hwa
    • Research in Community and Public Health Nursing
    • /
    • v.16 no.2
    • /
    • pp.137-147
    • /
    • 2005
  • Purpose: This study was conducted to investigate physical health status. depression. activities of daily living (ADL & IADL) of the low-income elderly who live alone in urban areas. Method: The subjects were the 400 low-income elders who live alone in Daegu city and the following instruments were used: 1. The number of self-reported physical health problems and present diseases: 2. CES-D scale for depression by Jo Nam-Oak et al. (1998): and 3. ADL scale by Katz (1989) and IADL scale by Lawton and Brody (1969). Results: 1. Visual difficulty was the most prevailing problem (55.3%) among physical problems. the second bowel elimination and the third hearing disturbance. As for present diseases. arthritis (26.5%), hypertension(24.3%) and DM (11.8%) were the most common diseases. 2. There were significant differences in physical health status according to age (t=3.115. p=.045). kind of medical security (t=-1.973. p=.049). perceived life satisfaction (F=4.966. p=.007) and the number of present diseases (F=2.937. p=.033). 3. There were significant differences in depression according to sex (t=-3.758. p=.000) . kind of medical security (t=-4.368. p=.000). perceived life satisfaction (F=35.743. p=.000) and the number of present diseases (F=4.246. p=.006). 4. There were significant differences in ADL according to sex (t=-2.136. p=.033) and age (F=4.863. p=.008). and in IADL according to sex (t=4.552, p=.000), age (F=3.090. p=.047) and kind of medical security (t=-3.306. p=.001). 5. Physical health state was correlated positively with both the number of present diseases (r=.140. p=.005) and depression (r=.352. p=.000), and negatively with ADL (r=-.176. p= .000) and IADL (r= -.230. p=.000). Depression was correlated positively with the number of present diseases (r=.169. p=.001) and negatively with both ADL (r=-.139. p=.005) and IADL (r=-.203. p= .000). Conclusion: The results of this study suggest that general characteristics are important factors for physical health status, depression. ADL and IADL of the low-income elderly who live alone and there are close relations among physical health status, the number of diseases, depression, ADL and IADL. Therefore, these results must be reflected in community health programs for the low-income elderly who live alone. In addition, this kind of study must be extended to the low-income elderly who live alone in rural areas.

  • PDF

Dietary and health characteristics of the young-old and the old-old by food security status: analysis of data from the 6th (2013 ~ 2015) Korea National Health and Nutrition Examination Survey (전기노인과 후기노인의 식품안정성에 따른 식생활 및 건강 특성 : 제6기 (2013~2015년) 국민건강영양조사 자료 분석)

  • Bae, Ajung;Yoon, Jihyun;Yun, Soh-Yoon;Asano, Kana
    • Journal of Nutrition and Health
    • /
    • v.52 no.1
    • /
    • pp.104-117
    • /
    • 2019
  • Purpose: This study examined dietary and health characteristics of the young-old and the old-old by food security status. Methods: The study used data from the $6^{th}$ (2013 ~ 2015) Korea National Health and Nutrition Examination Survey. The study subjects consisted of 3,948 subjects, of whom 2,445 were the young-old (aged 65 to 74 years) and 1,503 were the old-old (aged 75 years and over). Food security status was evaluated using an 18-item questionnaire. Energy intake, nutrient densities, and prevalence of insufficient nutrient intake were assessed. Food intake was evaluated in terms of the number of food group servings. Dietary behaviors and health status were also assessed. Results: The prevalence of food insecurity among the young-old and the old-old was 10.0% and 11.6%, respectively. Among the young-old, the food insecure group had a significantly higher level of prevalence of insufficient intake for all the nutrients (protein, vitamin A, thiamin, riboflavin, niacin, vitamin C, calcium, phosphorous, and iron) assessed in this study compared with the food secure group. In case of the old-old, significant differences were found only for four nutrients (protein, riboflavin, niacin, and phosphorus) in the prevalence of insufficient nutrient intake between the food secure and the food insecure groups. Kinds of food groups with significantly different numbers of servings by food security status were dissimilar between the two age groups. In both the age groups, the food insecure group consumed a significantly lower number of servings in meat fish eggs legumes and fruits than the food secure group; grains and vegetables intake in the young-old and oils sweets intake in the old-old differed in the number of servings by food security status. Among the young-old, the prevalence of chewing difficulties in the food insecure group was significantly higher than that of the food secure group, while among the old-old, no significant differences were found by food security status. Conclusion: Dietary and health characteristics of the young-old and the old-old differed by food security status. Such differences were more apparent in the young-old than the old-old. Therefore, it is suggested that food and nutrition assistant programs should be designed with consideration of the differences.

Implementation of Care Model for Management of U-Health (U-Health 관리를 위한 케어모델 구현)

  • Hong, Jin-Keun;Son, Dong-Chul;Kim, Ki-Hong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.498-501
    • /
    • 2006
  • 본 논문에서는 고령화 사회로 진입되고 있는 우리 사회에서 더 한층 관심이 고조되고 있는 의료 서비스를 목표로 하는 U-Health 케어 시스템의 선진국의 사례와 함께 적용 가능한 U-Health 케어 시스템 모델을 제시하였다.

  • PDF

A Study on the Advanced Impedance Converter for Pipeline Health Monitoring (배관 안전진단을 위한 향상된 임피던스 컨버터 연구)

  • Kwon, Young-Min;Lee, Hyung-Su;Song, Byung-Hun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2011
  • The Underground pipeline facility is a general but most important facility in modern world, but its maintainability has been left behind. An automated and intelligent management technology is needed to prevent the wast of social resource and security. In this paper, we introduce Pipeline Health Monitoring(PHM) with Ubiquitous Sensor Network(USN) for inexpensive structure safety monitoring system, and improve its utility by inventing the advanced impedance converter.

  • PDF

Health and nutritional status of Korean adults according to age and household food security: Using the data from 2010~2012 Korea National Health and Nutrition Examination Survey (한국 성인의 식품안정성에 따른 연령별 건강 및 영양섭취상태 : 2010~2012년 국민 건강영양조사 자료를 활용하여)

  • Park, Geun Ah;Kim, Sung Hee;Kim, Seok Joong;Yang, Yoon Jung
    • Journal of Nutrition and Health
    • /
    • v.50 no.6
    • /
    • pp.603-614
    • /
    • 2017
  • Purpose: This study was performed to identify the health and nutritional status of Korean adults according to food security by age group. Methods: The subjects were 20~79 year old adults (n = 16,595) who participated in the fifth Korea National Health and Nutrition Examination Survey (2010~2012). Subjects were divided into three groups based on food security such as secure, mildly insecure, and moderately/severely insecure groups. Dietary intake was estimated by 24-hour dietary recall. As for mental health status, the data on mental stress, sleep hours, depression symptoms, and suicide ideation were used. Results: Korean adults who were exposed to high food insecurity typically had low income levels, lived alone, and were recipients of basic welfare. In the 20~39y group, people with higher food insecurity had lower concentrations of hemoglobin and higher iron-binding capacity. In the 40~59y group, people with higher food insecurity had lower HDL-cholesterol. In the 60~79y group, people with higher food insecurity had higher total cholesterol levels, more stress, more experiences of depression symptoms, and were more suicidal. Mean intakes of energy, protein, calcium, phosphorus, potassium, vitamin A, carotene, vitamin $B_1$, vitamin $B_2$, niacin, and vitamin C were lower in the food insecure groups. Amounts of vegetables, fruits, and seasoning intakes tended to be lower in people with higher food insecurity. The effects of food security on nutrition intake were greater in the 40~59y and 60~79y groups than the 20-39y group. Conclusion: Food insecurity was related to certain health indicators such as anemia and cholesterol levels and affected mental health. The effects of food insecurity on health and nutritional status were different by age group.

Analysis the job-ability demanded in the security and secretary (경호비서에게 요구되는 업무능력 분석)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.2
    • /
    • pp.40-50
    • /
    • 2008
  • The purpose of this study is to analyze the job of the security and secretary, to offer useful basic data throughout human resources management by withdrawing the ability required from the security and secretary based on the analyzed results. In this regard, this study intended to look into the job of the security and secretary, the necessary ability for the job of the security and secretary. To achieve the research goals, the study selected the research participants, composed of 5 secretaries for security with more than 5-year careers after graduating from a security and secretarial service department in a college and conducted an in-depth interview with them concerning their jobs. The in-depth interview data from the 5 participants was applied with a classification analysis used by Spradley (1980). In order to enhance the dependability and validity of the research, the study held an expert meeting composed of 2 persons with a doctoral degree in securities service studies and 1 person with a master's degree in secretarial information studies, twice. Also, the study drew results concerning the job of the security and secretary and the necessary ability of the job. Though the above process, the following conclusions were drawn; the job of the security and secretary includes the areas of job safety, a housing residence job, a health care job, an interpersonal relationships job, an assistant' s job, document and office works, general affairs, and an education job. The necessary ability for the job of the security and secretary involves martial arts abilities, risk management ability, the strict keeping of secrets, decision-making ability, information processing ability, foreign language proficiency, understanding other cultures, communications skills and office work ability.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.