• 제목/요약/키워드: Health security

검색결과 1,049건 처리시간 0.027초

우리나라 국민기초생활수급자의 사회경제적인 특성과 구강건강에 관한 연구 (A study on the socio-economic study on the characteristics and oral health of national basic livelihood security)

  • 김창숙
    • 한국치위생학회지
    • /
    • 제13권6호
    • /
    • pp.995-1004
    • /
    • 2013
  • Objectives : The purpose of the study is to provide basic data for oral health promotion in national basic livelihood security. Methods : The data were extracted from the 4th National Health and Nutrition Survey (2007-2009) in Korea. The data were analyzed using SPSS 18.0. to $x^2$-test and CSGLM. Results : 1. The subjects were not able to receive dental treatment because of the financial difficulty. 2. The infuencing factors of DMFT include gender (p<0.05), type of health insurance (p<0.05), membership for private health insurance (p<0.05), frequency of toothbrushing (p<0.05), use of oral hygiene products (p<0.01), smoking (p<0.05), drinking (p<0.05). The influencing factors of CPI include gender (p<0.01) and smoking (p<0.05). The influencing factors of fixed bridge include age (p<0.05), income (p<0.05) and use of accessory oral hygiene products (p<0.05). The influencing factors of fixed bridge include age (p<0.001), income (p<0.01), education (p<0.001), type of health insurance (p<0.001), membership for private health insurance (p<0.001), frequency of toothbrushing (p<0.01), use of oral hygiene products (p<0.01), and drinking (p<0.05). Conclusions : It is necessary to provide oral health care and health promotion to the recipients of National basic livelihood security. The government must give them better quality of dental health care in the near future.

의료기관 종별 웹 사이트 정보보안 관리 실태 연구 (A Study on Information Security Management of Hospital Web Sites)

  • 김종민;류황건
    • 보건의료산업학회지
    • /
    • 제9권2호
    • /
    • pp.23-32
    • /
    • 2015
  • In this paper, we evaluated web security vulnerability and privacy information management of hospital web sites which are registered at the Korea Hospital Association. Vulnerability Scanner (WVS) based on the OWASP Top 10 was used to evaluate the web security vulnerability of the web sites. And to evaluate the privacy information management, we used ten rules which were based on guidelines for protecting privacy information on web sites. From the results of the evaluation, we discovered tertiary hospitals had relatively excellent web security compared to other type of hospitals. But all the hospital types had not only high level vulnerabilities but also the other level of vulnerabilities. Additionally, 97% of the hospital web sites had a certain level of vulnerability, so a security inspection is needed to secure the web sites. We discovered a few SQL Injection and XSS vulnerabilities in the web sites of tertiary hospitals. However, these are very critical vulnerabilities, so all hospital types have to be inspected to protect their web sites against attacks from hacker. On the other hand, the inspection results of the tertiary hospitals for privacy information management had a better compliance rate than that of the other hospital types.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

경호비서의 역할에 관한 연구 (A Study of the Security and Secretary Service's Roles)

  • 김정숙;박옥철
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.65-80
    • /
    • 2006
  • Security and Secretary Service is the man who maintains safe condition of boss', following him during all daily schedule and help the boss display his supreme business abilities, settling various affairs The purpose of this study is to examine the role of Security and Secretary Service. To understand the role of Security and Secretary Service, interviews with Security and Secretary Service's. synthesizing records inquire and interviews with present workers, was analyzed. As results of the study, the open coding of grounded theory was 85 categories, 22 lower categories, and 13 upper categories; 7 roles of Security and Secretary Service types out of 13 upper categories were attained. Based on this, from the axial coding a paradigm model related to categories was produced and selective coding the core category, story line development and type were analyzed. Therefore, Security and Secretary Service plays roles: Office manager, Training manager, Information manager, Customer relations manager, Facilitator, Health manager, and Safety manager. Compared with Office secretary, It is said that Health manager, and Safety manager are distinguishing roles. Through the coding process based on grounded theory. For this, based on the writer's theoretical sensitivity and constant comparative analysis, theses as well as writing in each field, data from serial publications and others, the statements of interview subjects were constantly compared and analyzed. Based on these analyses, this study suggests the following: First, the intimidate sample survey is need. Second, professional educational content during the training process of Security and Secretary Services should be strengthened. Third, to expect a more professional role of Security and Secretary Services. the systematic support will be required.

  • PDF

건강보장과 국민건강보험공단의 역할 (The Roles of the National Health Insurance Service in the Public Health Security)

  • 김용익
    • 보건행정학회지
    • /
    • 제28권3호
    • /
    • pp.210-216
    • /
    • 2018
  • National Health Insurance Service (NHIS) has put a great effort on extending life expectancy, for last 40 years. The system has also made remarkable outcomes in achieving universal health coverage. However, it is facing challenges of low health insurance benefits and sustainability risk due to low birth rate and aging society at the same time. To overcome the difficulties and build a lifelong health security system for the nation, it is required for NHIS to make multilateral changes in its roles. Based on the quantitative growth achieved so far, NHIS needs to strive for the growth in quality by not only increasing coverage and reforming contribution imposition system, but also reorganizing the relevant systems such as lifelong health management support, rational adjustment to the medical fee, and benefit costs monitoring. In addition, it's important for NHIS to restructure the organizational culture by having specialty and communicating with people for high quality of administration and health insurance sustainability.

식품안전성과 식사섭취의 관련성;국민건강영양조사 제3기 (2005년) (Association of Household Food Security with Dietary Intake;Based on the Third (2005) Korea National Health and Nutrition Examination Survey (KNHANES III))

  • 심지선;오경원;남정모
    • Journal of Nutrition and Health
    • /
    • 제41권2호
    • /
    • pp.174-183
    • /
    • 2008
  • 제3기 (2005년) 국민건강영양조사 자료를 이용하여 분석한 결과 연구 대상자의 과반수에서 식품확보가 불안정하였으며, 식품안정성은 식사섭취와 관련이 있어 식품확보가 불안정한 군에서 영양소 섭취량이 낮고 섭취 식품의 다양성이 적었다. 본 연구는 우리 국민의 식품안정성과 식사섭취의 관련성에 대한 거의 초기 연구로 식품확보에 대한 안정성의 문제 크기를 파악하고 식품확보 여부에 따른 식사섭취의 양적${\cdot}$질적 측면을 다루었다. 이와 함께 식생활은 건강과 밀접한 관련이 있으므로 식품안정성과 건강 및 질병에 관한 후속 연구가 필요하며, 이러한 연구 결과에 근거하여 향후에는 저소득층의 안정적인 식품확보를 지원하는 정책을 마련하고 시행중인 정책의 효과 평가와 개선 방안을 모색할 필요가 있겠다.

개인건강정보의 2차이용 보호에 관한 국내외 법안 연구 (Research on the Domestic and Foreign Legislation about Secondary Use Protection for Personal Health Information)

  • 박한나;정부금;이동훈;정교일
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.251-260
    • /
    • 2010
  • 의료서비스와 IT 기술간의 융합으로 환자 개인의 건강정보가 전자의무기록(EHR)의 보급과 함께 빠르게 전자화되고 있다. 이와 함께 유헬스사회에 접어들면서 전자화 된 환자의 건강기록들을 진료 이외의 공중보건 및 의학 분야의 연구, 의료서비스 향상을 위해 사용하고자 하는 2차이용의 요구가 증가하고 있다. 개인건강정보의 2차이용으로 의학 분야의 발전의 매우 유익한 일이지만 부주의하게 개인의 건강정보를 이용하는 경우 환자 개인의 프라이버시 손상이 발생, 더불어 2차이용융 통한 연구나 서비스 발전에도 제한이 발생할 수 있다. 하지만 아직 개인건강정보를 이용한 2차적 이용에 대해 체계적인 연구나 논의가 없는 것이 현실이다. 따라서 본 논문에서는 개인건강정보의 2차이용과 관련하여 국내외의 법안들을 살펴보고 이를 비교 분석하여 앞으로 개인의 프라이버시를 존중하고 더불어 의료분야 서비스 있는 방향을 제시하고자 한다.

환각성 약물범죄와 경호안전상의 대응방안 (Measures against Security Safety and Hallucinogenic Drug Crimes)

  • 전경수
    • 시큐리티연구
    • /
    • 제2호
    • /
    • pp.211-226
    • /
    • 1999
  • Troublesome problems are being caused by hallucinogenic drugs which come not only from illegal narcotics but also from unprohibited general drug-kinds such as cough-remedy agents of textromerupan, namely, Lamina, Rubi-king and the likes. Abuse and misuse of narcotics permeated into and threatens mental health of socially-known peoples, actor, actress, talents and businessmen as well. This study especially dealt with problems related with Mesampetamin, Rurajaepam, Texstrometropan and Karisofrodol which affects mental behaviour, and considered counter-measures through analysis and developed appropriate system of goods circulation for guidance to be complied by the medicine professionalists. The guidance sought here is recommended to the government ministries for further enforcement of crack-down of the drug crimes. Arquesa in method is recommend as a method of identifying behaviors and facial expressions of abusers and misusers of narcotics at the spot in place. This study is directed to curtailing hallucinogenic drugs use for absolute preventive security by detecting out black dealers of narcotics supplying to the abusers and misusers. There is a need of special education program to cut off the flow of narcotics or drugs crimes into official security force as well as private security personnel. This study introduced a priority and emphasis of real augmentation to theory and practice of the modern scientific security which can protect the mental health of the guarded persons as well especially in the light of security safety curriculum at the school.

  • PDF

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

하이퍼레저 패브릭과 비대칭키 암호화 기술을 결합한 건강정보 관리서버 (Hyperledger Fabric and Asymmetric Key Encryption for Health Information Management Server)

  • 한혜경;황희정
    • 한국멀티미디어학회논문지
    • /
    • 제25권7호
    • /
    • pp.922-931
    • /
    • 2022
  • Recently, the need for health information management platforms has been increasing for efficient medical and IT technology research. However, health information is requiring security management by law. When permissioned blockchain technology is used to manage health information, the integrity is provided because only the authenticated users participate in bock generation. However, if the blockchain server is attacked, it is difficult to provide security because user authentication, block generation, and block verification are all performed on the blockchain server. In this paper, therefore, we propose a Health Information Management Server, which uses a permissioned blockchain algorithm and asymmetric cryptography. Health information is managed as a blockchain transaction to maintain the integrity, and the actual data are encrypted with an asymmetric key. Since using a private key kept in the institute local environment, the data confidentiality is maintained, even if the server is attacked. 1,000 transactions were requested, as a result, it was found that the server's average response time was 6,140ms, and the average turnaround time of bock generation was 368ms, which were excellent compared to those of conventional technology. This paper is that a model was proposed to overcome the limitations of permissioned blockchains.