• Title/Summary/Keyword: Healthcare information systems

Search Result 477, Processing Time 0.03 seconds

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

A Study on Wearable Healthcare Device Adoption : An Integrated Approach of UTAUT2 and MIR (웨어러블 헬스케어 기기의 수용에 관한 연구: 확장된 통합기술수용모형과 혁신저항모형의 통합적 접근)

  • Jin, Seok;Ahn, Hyunchul
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.159-202
    • /
    • 2019
  • Purpose The purpose of this study is to explain users' wearable healthcare device adoption using performance expectancy, effort expectancy, the hedonic motivation and price value of UTAUT2, and to identify the causal relationship between intention to use wearable healthcare device and innovation resistance formed by perceived risks. Design/methodology/approach The research model proposed in this study is based on UTAUT2(Extended Unified Theory of Acceptance and Use of Technology) and MIR(Model of Innovation Resistance). In specific, performance expectancy, effort expectancy, hedonic motivation and price value of UTAUT2 and innovation resistance formed by perceived risks of MIR are adopted in our research model. To validate the research model, we carry out the analysis of the survey data using Smart PLS 3.0 to test the hypotheses. Findings According to the empirical analysis results, this study confirms that the performance expectancy, effort expectancy, hedonic motivation, and price value have significant effects on the intention to use wearable healthcare devices. It also finds that perceived risk affects innovation resistance and in turn, innovation resistance affects the intention to use wearable healthcare devices.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

A Study on the Software Safety Assessment of Healthcare Systems

  • Olenski, Rafal;Park, Man-Gon
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.241-248
    • /
    • 2015
  • The safety-critical software in healthcare systems needs more and more perceptive excess among human observation and computer support. It is a challenging conversion that we are fronting in confirming security in healthcare systems. Held in the center are the patients-the most important receivers of care. Patient injuries and fatalities connected to health information technologies commonly show up in the news, contrasted with tales of how health experts are being provided financial motivation to approve the products that may be generating damage. Those events are unbelievable and terrifying, however they emphasize on a crucial issue and understanding that we have to be more careful for the safety and protection of our patients.

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • Jo, Hyeon-Suk;Lee, Hyeong
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

Secure Architecture of the Mobile Healthcare Environment Using security protocols

  • Moon, KangNam;Lee, JeongHoon;Kwock, DongYeup;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.892-895
    • /
    • 2009
  • Medical records must be well protected because they are needed to care for the health of patients. For that reason, user authentication and medical data encryption are essential for the security of both wired and wireless Healthcare Information Systems (HIS). The main focus of this paper is on the analysis of the numerous possible attacks and the countermeasures to overcome these attacks in Mobile Healthcare Environment (MHE) with an appropriate security protocols. To draw a conclusion, this will propose why a healthcare architecture should establish a multi-layered defense against the risks.

  • PDF

Blockchain Revolution in Healthcare : The Era of Patient-centered Dental Information System

  • Kho, Wookyun
    • International Journal of Oral Biology
    • /
    • v.43 no.1
    • /
    • pp.1-3
    • /
    • 2018
  • Blockchain is at the center of attention recently and it is expected to have a huge impact on healthcare industry including dentistry as well. Blockchain is a fundamental technology behind Bitcoin and itis all about decentralization, security, reliability, and transparency. These characteristics of the technology empower it to disrupt the current healthcare industry in innumerable practices such as supply chain management in pharmaceuticals to prevent the counterfeited medicine, clinical trials to guarantee transparency, healthcare information exchanges or personal health record systems to ensure data integrity and interoperability, etc. It will surely revolutionize the way the current healthcare system works; from provider-oriented to patient-centered. Hence, it is time to seriously consider how we could be a part of this blockchain revolution in dentistry.

A Review of Concepts, Advantages and Pitfalls of Healthcare Applications in Blockchain Technology

  • Al-asmari, Aisha M.;Aloufi, Rahaf I.;Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.199-210
    • /
    • 2021
  • Recently, research in blockchain technology has grown in popularity. Most of these researches have pointed out designing and improving conceptual structures to create digital systems that are more secure, accessible, and effective. Although blockchain offers a wide range of advantages, it also has some pitfalls. This research aims to present an understanding of the properties of blockchain, the advantages, pitfalls, and applications based on blockchain technology. To achieve the goal of understanding blockchain technology concepts, a systematic literature review approach was introduced. 93 papers were chosen and reviewed in total. Therefore, this research provides a summary of recent studies that have been published in the field of blockchain. Moreover, we have created concept maps and tables that aid in a deep understanding of blockchain technology concepts and exhibit some of the blockchain applications. In blockchain-based applications, we focused on two areas, namely the Internet of Things (IoT) and healthcare.

A Study of Factors Influencing the Intention of University Students to Accept Healthcare Information Technology Services (대학생의 건강정보기술서비스 수용의도에 미치는 영향요인)

  • Chung, Young-Soon;Han, Hyun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5698-5706
    • /
    • 2013
  • This study presents research into the patterns that affect the understanding and acceptance of healthcare management systems as part of a healthcare information technology infrastructure targeted at university students. The participants were 623 university students in D city and K province. This study employed a descriptive and correlational cross-sectional survey and made use of the ubiquitous healthcare management services measurement scale. 48.5% of respondents had accessed healthcare-related information on the Internet. Among the independent variables of general characteristics related to perceived susceptibility was found to have adj $R^2$ of 11% while the other dependent factors reported much lower between 0.5 to 4.7%. Female respondents, medical-related majors, self-efficacy, and intention to use had significant positive effects while health beliefs and concern had a significant negative effect on the intentional acceptance of healthcare information technology systems.

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.