• Title/Summary/Keyword: Healthcare convergence

Search Result 796, Processing Time 0.027 seconds

A Study on the Analysis of Consumer Convergence Preferences for Healthcare Information Service in Social Media (소셜미디어 건강정보서비스에 대한 융합적 소비자선호도 분석방법 연구)

  • Kim, Kyoung-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.181-188
    • /
    • 2016
  • This study investigated consumer convergence preferences for healthcare information service in social media using the multi-attribute utility theory. The multi-attribute utility theory is an approach for compositional modeling attributes wherein researchers compute the overall service utility by aggregating the evaluation results for attribute values. We found that healthcare information service consumers in social media evaluate the service preference through the multi attributes - Update, Cost, Usefulness, Usability, Reliability. And the study shows that individual preference by estimating weight of each attribute in the services influences the service use intention. So we believe that estimating preferences with multi-attribute utility theory will predict business success of the services in a new media, and for a successful business of the social media services marketers should assess the consumer's preference using the multi-attributes.

User Authentication Key Establishment Scheme based on Color Model for Healthcare Environment (헬스케어 환경을 위한 칼라 모델 기반의 사용자 인증 키 설립 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.115-121
    • /
    • 2017
  • Hospital medical services are making great efforts to provide prompt medical services to patients or improve the quality of medical services by convergence patient's healthcare information. However, recent research suggests problems about safety and efficiency when trying to transmit patient's healthcare information to hospital server via radio and wireless. In this paper, we propose a color model - based patient authentication key establishment protocol method to securely transmit patient healthcare information. The proposed method extracts randomly three color information used in the color model and vectorizes the extracted arbitrary information to obtain the key information required for user authentication as the sum of orthogonal vectors to improve the efficiency. In addition, the proposed method can securely generate key information used for user authentication without using an additional encryption algorithm. In performance evaluation result, proposed method shows that the server processing time of the sensed information is 8.1% higher than the existing method and 7.7% lower than the existing method.

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.

Perception and Attitude on Augmented Reality Smart Glass for Healthcare Convergence Simulation (증강현실(AR) 스마트글라스 보건의료 융합 시뮬레이션에 대한 인식 및 태도)

  • Lee, Youngho;Choi, Jongmyung;Yoon, Hyoseok;Kim, Sun Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.369-377
    • /
    • 2021
  • Augmented reality smart-glass enables healthcare providers to use patient and their care related information without interference of workflow. In addition, augmented reality smart-glass simulation had advantages in improving competency via remote collaboration and real-time information sharing. This study investigated perception and attitude regarding augmented reality smart glass based healthcare simulation on three different groups of healthcare major students, computer major students, developers and faculties. Using convenience sampling method, data were obtained from 95 participants and statistical analysis were performed using SPSS 25.0. Developer and faculty group showed the highest scores, followed by healthcare major students. There was the high expectation on augmented reality smart-glass for skill acquisition and the high performance and big screen were essential features of device. The findings of this study revealed that differences between healthcare and computer major students exist and strategies to reduce those gaps are required to adopt augmented reality smart glass in healthcare settings.

A Study on the Mediating Effect of Patient Activation between Trust in Healthcare Professionals and Shared Decision Making in Diabetic Patients (당뇨병 환자의 의료진 신뢰와 공유의사결정의 관계에서 환자활성화의 조절효과)

  • Jeong, Miri
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.361-371
    • /
    • 2021
  • This study aims to identify the moderating effect of patient activation in relation between trust in healthcare professionals and shared decision making in patients with diabetes mellitus. The participants were 186 patients who received treatment for diabetes at the department of endocrinology in the tertiary hospital located in Daejeon and consented to participate in our survey. The results of this study were a significant interaction between trust in healthcare professionals(β=0.32, p=.045) and patient activation(β=0.32, p=.024) was associated with shared decision making. The patient activation had a moderating effect between trust in healthcare professionals and shared decision making in patients with diabetes mellitus(β=0.25, p=.019). Therefore, it is necessary to assess trust in healthcare professionals to improve negative awareness of healthcare professionals and strengthen trust in them. In addition, to promote participation in shared decision making, it is necessary to develop a convergent program to focus patient activation.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

A Study on the Cost-Effective Security System for SME Hospital Acceptability in Convergence Medical Environment (의료융합 환경에서 수용성을 고려한 비용 효율적 보안체계구축 방안 연구: 중소의료기관을 중심으로)

  • Kim, Yanghoon;Ahn, Byung-Goo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.75-81
    • /
    • 2018
  • As industries converge in recent years, the impact of the use of convergence tools among industries on the security of the organization is increasing. However, organizational members lack the ability to adapt to introduction of new system because they are operating business around existing systems, and thus, security considerations are an environment that will inevitably emerge as a follow-up priority. In this study, we studied cost-effective options for factors that should be considered first in order to establish a security system for small and medium-sized healthcare institutions in the healthcare convergence industry. Specifically, the current legal system was considered and the security status was analyzed through prior research, and the necessary security solution/system was derived from small and medium-sized healthcare institutions. In addition, it analyzed relative priorities for cost-efficient deployment of security systems to those involved in small and medium-sized healthcare institutions in actual business environments and presented measures to establish a overall security.

  • PDF

A study on the factors influencing the data collection performance of smart buoys (스마트 항로표지의 데이터 수집 성능에 영향을 미치는 요인에 관한 연구)

  • Ho-Joon Kim;Min-Kyu Kim;Nam-Yong Lee;Chul-Soo Kim;Sangmun Shin;Se-woong Oh;Jin-Hong Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.60-62
    • /
    • 2021
  • 항로표지는 해상상황 정보를 수집하고 선박들의 항해에 안전을 도모하기 위해 설치 및 운용되고 있다. 관련해 개별 지방청에서 운영되는 데이터를 빅데이터 형태로 활용하고자 하는 경우 수집된 데이터의 품질에 대한 평가가 이루어져야 한다. 본 논문에서는 수집된 항로표지 데이터의 누락 정보를 중심으로 데이터 수집에 있어 장애 생성의 주된 원인을 찾고자 하였다. 수집된 데이터의 분석 결과 기상악화와 표지의 전압이 하락한 날에 데이터 결측 발생률이 톺음을 확인할 수 있었다. 이를 통해 기상 상황, 표지의 전압 상태 그리고 수집된 데이터 개수의 비교를 통해 기상악화가 영향을 미쳤을 수 있음을 확인하였다.

  • PDF

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.