• Title/Summary/Keyword: Health security

Search Result 1,067, Processing Time 0.038 seconds

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.

Changes in body weight and food security of adult North Korean refugees living in South Korea

  • Jeong, HaYoung;Lee, Soo-Kyung;Kim, Sin-Gon
    • Nutrition Research and Practice
    • /
    • v.11 no.4
    • /
    • pp.307-318
    • /
    • 2017
  • BACKGROUND/OBJECTIVES: Relocation to new environments can have a negative impact on health by altering body weight and dietary patterns. This study attempted to elucidate changes in body weight, food security, and their current food and nutrient consumption in adult North Korean refugees (NKR) living in South Korea (SK). SUBJECTS/METHODS: This study analyzed data on 149 adult NKR from a North Korean refugee health in SK cohort at four time points (leaving North Korea, entering SK, first examination, and second examination). Body weight was self-reported at the two earlier time points and directly measured at the two later time points. Food security, diet-related behaviors (dietary habits and food consumption), and sociodemographic information were obtained using a self-administered questionnaire. Nutrient intake information was obtained by one-day 24-hour recall. Statistical analyses were performed with SPSS ver 23.0. RESULTS: Body weight increased during relocation by an average of 4 kg, although diversified patterns were observed during the settlement period in SK. Approximately 39.6% of subjects maintained their body weight between the first and second examinations, whereas 38.6% gained and 22.1% lost at least 3% of their body weight at the first examination by the second examination. Food security status improved from 12.1% food secure proportion to 61.7%. NKR showed generally good food and nutrient consumption (index of nutrient quality: 0.77-1.93). The body weight loss group showed the most irregular meal consumption pattern (P < 0.05), and eating-out was infrequent in all three groups. Consumption frequencies of food groups did not differ by group, except in the fish group (P = 0.036). CONCLUSION: This study observed considerable body weight adjustment during the settlement period in SK after initial weight gain, whereas food security consistently improved. More detailed understanding of this process is needed to assist healthy settlement for NKR in SK.

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

Food security and diet quality among urban poor adolescents in Kuala Lumpur, Malaysia

  • Janice Ee Fang Tay;Satvinder Kaur;Wui Wui Tham;Wan Ying Gan;Nik Norasma Che Ya;Choon Hui Tan;Serene En Hui Tung
    • Nutrition Research and Practice
    • /
    • v.17 no.2
    • /
    • pp.269-283
    • /
    • 2023
  • BACKGROUND/OBJECTIVES: This study aimed to examine the food security status of urban poor adolescents and its association with diet quality. SUBJECTS/METHODS: A cross-sectional survey was conducted among 188 adolescents aged 13-18 yrs living in Kuala Lumpur, Malaysia. Household food insecurity and dietary intake data were collected using the Radimer/Cornell hunger and food insecurity instrument and 2-day 24-h dietary recalls, respectively. Diet quality was determined using the Malaysian Healthy Eating Index (HEI). Weight and height were measured and body mass index-for-age, as well as height-for-age z scores were calculated. RESULTS: The present study revealed that 47.9% of the adolescents experienced household food insecurity, 24.5% experienced individual food insecurity, 18.6% household food security, and 9.0% child hunger. The mean score of diet quality was 56.83 ± 10.09, with a significantly lower HEI score among food insecure adolescents (household food insecure, individual food insecure, and child hunger) than household food secure adolescents (P = 0.001). The differences between food secure and food insecure households were found to be significant for energy (P = 0.001) and nutrients including proteins (P = 0.006), carbohydrates (P = 0.005), dietary fiber (P = 0.001), folate (P < 0.001), and vitamin C (P = 0.006). The multiple linear regression showed that adolescents who experienced food insecurity (β = -0.328; P = 0.003) were found to be significantly associated with poor diet quality (F = 2.726; P < 0.01), wherein 13.3% of the variation in the diet quality was explained by the food security status. CONCLUSIONS: Experiencing food insecurity contributed to poor diet quality among urban poor adolescents. Further longitudinal studies are needed to comprehensively understand this association to improve food insecurity and diet quality among urban poor communities.

Privacy and Security Model for RFID Healthcare System in Wireless Sensor Network (무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.439-441
    • /
    • 2012
  • The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

  • PDF

Democratic Values, Collective Security, and Privacy: Taiwan People's Response to COVID-19

  • Yang, Wan-Ying;Tsai, Chia-hung
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.222-245
    • /
    • 2020
  • In the pandemic crisis, many governments implemented harsh interventions that might contradict democratic values and civil liberties. In Taiwan, the debate over whether or not to reveal personal information of infected persons to limit the coronavirus's spread poses the democratic dilemma between public health and civil liberties. This study examines whether and explains how Taiwan's people respond to the choice between individual privacy and collective security. We used survey data gathered in May 2020 to show that, first, the democratic values did not deter the pursuit of collective safety at the cost of civil liberty; rather, people with higher social trust were more likely to give up their civil liberties in exchange for public safety. Second, people who support democratic values and pursue collective security tend to avoid violating privacy by opposing the release of personal information. This study proves that democratic values do not necessarily threaten collective safety and that the pursuit of common good can co-exist with personal privacy.

Secure Architecture of the Mobile Healthcare Environment Using security protocols

  • Moon, KangNam;Lee, JeongHoon;Kwock, DongYeup;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.892-895
    • /
    • 2009
  • Medical records must be well protected because they are needed to care for the health of patients. For that reason, user authentication and medical data encryption are essential for the security of both wired and wireless Healthcare Information Systems (HIS). The main focus of this paper is on the analysis of the numerous possible attacks and the countermeasures to overcome these attacks in Mobile Healthcare Environment (MHE) with an appropriate security protocols. To draw a conclusion, this will propose why a healthcare architecture should establish a multi-layered defense against the risks.

  • PDF

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad;Farahmand, Mahdieh;Daryanavard, Hassan
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.155-167
    • /
    • 2022
  • The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.