• Title/Summary/Keyword: Health security

Search Result 1,067, Processing Time 0.028 seconds

Smart Health Monitoring System (SHMS) An Enabling Technology for patient Care

  • Irfan Ali Kandhro;Asif Ali Wagan;Muhammad Abdul Aleem;Rasheeda Ali Hassan;Ali Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.43-52
    • /
    • 2024
  • Health Monitoring System is a sophisticating technology and another way to the normal/regular management of the health of the patient. This Health Monitoring Mobile Application is a contribution from our side to the public and to the overall health industry in Pakistan. With the help of Health mobile application, the users will be able to store their medical records, prescriptions and retrieve them later. The users can store and keep track of their vital readings (heart rate, blood pressure, fasting glucose, random glucose). The mobile application also shows hospitals that are nearby in case the user wants to avail of any medical help. An important feature of the application is the symptoms-based disease prediction, the user selects the symptoms which he has and then the application will name certain diseases that match those symptoms based on relevant algorithms. The major advances and issues have been discussed, and as well as potential tasks to health monitoring will be identified and evaluated.

Evaluation of Functional Ability and Nutritional Risk according to Self-Rated Health (SRH) of the Elderly in Seoul and Kyunggi-do (서울 및 경기지역 노인의 건강자가평가에 따른 기능적 건강 및 영양위험 평가)

  • Choi, Yoon-Jung;Park, Yu-Sin;Kim, Chan;Jang, Yu-Kyung
    • Journal of Nutrition and Health
    • /
    • v.37 no.3
    • /
    • pp.223-235
    • /
    • 2004
  • A functional ability and adequate nutritional status are the major determinants of health status, Self-rated health (SRH) is a worldwide method to assess health status and it is recognized as a predictor of morbidity and mortality in the elderly, This study was designed to evaluate the functional ability and nutritional risk according to SRH in the elderly. Four hundred nine free-living elderly people (118 male, 291 female), aged $\geq$ 65 years were interviewed by trained interviewers using structured questionnaires including demographic information, SRH, anthropometric measurements, functional ability, general health status, and nutritional risk. SRH was divided into three status such as “Good”, “Moderate” and “Poor” status. And all the data were analyzed by oneway ANOVA, spearman correlation, and x$^2$ analysis using SPSS 9.0 version at p 〈 0.05. Of all the subjects, 48.9% perceived their health status as “poor”, and their functional abilities (activities of daily living, instrumental activities of daily living) were more impaired than their counterparts (“good” and “moderate”). Poor self-rated health was also related to: a higher prevalence of illnesses (p 〈 0,001) especially in hypertension, arthritis. Self-rated health was significantly related to food security (p 〈 0.001), food enjoyment (p 〈 0.001) ,and nutritional knowledge (p = 0.0 13). Also NSI checklist total score was the highest in “poor” health status (p 〈 0.001). Better self-rated health was related to better food security, and better food enjoyment. However, smoking, alcoholic intake, exercise, eating behaviors, and demographic characteristics were not significantly different among the three SRH status. SRH was closely related to chronic diseases, functional ability, and nutritional risk in the elderly. Therefore, public health strategies for the elderly should be focused on the elderly who are “poor” in SRH, to improve nutritional status and functional ability, and to reduce risk factors of chronic diseases.

An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender (인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교)

  • Lim, Se-Hun;Lee, Sung-Ho;Kim, Dae-Kil
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

Quality of Health Information on the Internet

  • Lotfia Mahmoud Refaat Shenishen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.147-151
    • /
    • 2023
  • The article reviews the quality of information on the Internet in general and health information in particular, where the accumulation and steady increase of information available on the Internet, without concern for its quality or importance, and regardless of the target audience, in addition to the lack of evidence of its credibility such as the availability of the name of the editor and references, and the availability of the name of an academic or research body responsible for that information. Add to this the lack of bibliographic data that can help infer the novelty of the information, and verify the element of trust in it . The problem is exacerbated with regard to the health information available on the Internet, due to its danger resulting from the presence of false health information that may cause danger to human health if relied upon. Through this article, the researcher proposes criteria that can help users search for information to measure the degree of quality, trust, and credibility of information in general and health information available on the Internet in particular.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

Basic Concepts and Detailed Dimensions of Food Security and Related Indicators for Policy Development and Evaluation (식품보장 기준선 마련을 위한 기본 개념과 세부 영역 설정 및 관련 지표 탐색)

  • Park, Sohyun;Hwang, Ji-Yun;Shim, Jae Eun;Kim, Kirang
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.6
    • /
    • pp.429-440
    • /
    • 2021
  • Objectives: Standardized guidelines and reference points for a food security policy are necessary to guarantee that basic social safety nets work properly. Therefore, this study aimed to explore the basic concepts and detailed dimensions of food security, including the potential relevant indicators, and sought to establish standardized well-being baselines. Methods: A literature review and 14 expert roundtable discussions were carried out to analyze and extract the key concepts of food security. After determining these concepts and detailed dimensions of food security, a conceptual framework was modeled. Then, indicators for each local government that could be monitored and evaluated for each sub-area were suggested. Results: The concept of food security was defined as follows: Individuals should be provided with sufficient, safe, and quality food, which should be accessible to the community and available for use to achieve health and well-being. In addition, food security should be ensured sustainably in a changing environment. Four dimensions were suggested while conceptualizing food security. First, sufficient food, which means sufficient food supply in quantity, quality, and safety. Second, equitable food which includes creating environments in which high-quality and safe food can be purchased at an appropriate price and can be provided regardless of the socioeconomic gap. Third, healthy food which should be provided to promote people's health and happiness through the eco-friendly consumption of food. Fourth, sustainable food, which can be supplied in a sustainable manner and as part of an eco-friendly food system that considers the conservation of natural environments. Conclusions: The basic concepts and detailed areas of food security including the potential indicators proposed in this study, may be useful for developing and implementing various policies and programs to support food and nutrition security in the future.

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives (정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로)

  • Jee, Bum-Suk;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.