• Title/Summary/Keyword: Medical Security

Search Result 805, Processing Time 0.024 seconds

The Correlation Between The Right To Medical Secrecy And The Employer's Right To Receive Information On The Employee's Health State

  • Yuryk, Olha;Stashkevich, Anatoly;Chornyi, Ruslan;Chorna, Zhanna;Kronivets, Tеtiana;Valakh, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.103-107
    • /
    • 2021
  • The article analyzes the theoretical aspects of the relationship between the right to medical secrecy and the employer's right to receive information on the employee's state of health, resulting in a more complete description of the implementation of the right to medical secrecy and the employer's right to information on the employee's health state and the possibilities of protecting violated rights. The limits of permissible restrictions on the right to secrecy of health in terms of ensuring the person's performance of their job function have been clarified.

Food Security in Households of People Living With Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome: A Cross-sectional Study in a Subdivision of Darjeeling District, West Bengal

  • Dasgupta, Pallabi;Bhattacherjee, Sharmistha;Das, Dilip Kumar
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.4
    • /
    • pp.240-248
    • /
    • 2016
  • Objectives: Human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) adversely impacts food security in households of people living with HIV/AIDS (PLWHA). Little research has focused on food insecurity among PLWHA in India. The purpose of this study was to identify the prevalence of and factors relating to food security in households of PLWHA in the Siliguri subdivision of Darjeeling, West Bengal, India. Methods: A cross-sectional community-based study was carried out among 173 PLWHA residing in Siliguri and registered at the Anti-retroviral Therapy Centre of North Bengal Medical College & Hospital. Data was collected at the household level with interviews of PLWHA using a food security survey instrument. We analyzed the associations using logistic regression. Results: The prevalence of household food security among the participants was 50.9% (88/173). Five years or more of schooling, higher socioeconomic class and males were found to be significantly associated with a higher likelihood of food security. A later stage of the disease and the presence of other family members with HIV/AIDS were significantly associated with a lower likelihood of food security. The major coping strategies to deal with food insecurity in the acute phase HIV infection included borrowing money (56.1%), followed by spousal support, loans from microfinance institutions, banks, or money lenders, borrowing food, or selling agricultural products. Conclusions: The present study revealed that only about half of households with PLWHA were food secure. Prior interventions relating to periods of food and economic crisis as well as strategies for sustaining food security and economic status are needed in this area.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

A Study on the Hospital Worker's Security Stress (국내 병원 종사자들의 보안스트레스에 관한 연구)

  • Hyun, Seung Hoon;Lee, Chang-Moo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.41-49
    • /
    • 2016
  • The need for protecting computerized medical information has been growing as information and communication technology has rapidly been developed. Government is also promoting institutional improvement measures for the information protection of medical institutions. With more emphasis upon the efforts to enhance the information protection capability of the medical institution, however, it could increase stress to the hospital workers and cause a reduction in the quality of essential medical services of medical institutions. Therefore, it is necessary to research the stress from hospital workers to strengthen the protection of information that medical institutions to manage and its antecedents. Based on the results of relevant researches, this study selected several factors that affect the security stress, including work overload, invasion of privacy and work uncertainty. The sample for this study was 123 hospital workers who were surveyed by questionnaire. The factor analysis and multiple regression method were employed for the analysis of this study. The results of this study showed that work overload, invasion of privacy and some of work uncertainty were the main factors positively influencing the security stress.

A Study on the Cost-Effective Security System for SME Hospital Acceptability in Convergence Medical Environment (의료융합 환경에서 수용성을 고려한 비용 효율적 보안체계구축 방안 연구: 중소의료기관을 중심으로)

  • Kim, Yanghoon;Ahn, Byung-Goo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.75-81
    • /
    • 2018
  • As industries converge in recent years, the impact of the use of convergence tools among industries on the security of the organization is increasing. However, organizational members lack the ability to adapt to introduction of new system because they are operating business around existing systems, and thus, security considerations are an environment that will inevitably emerge as a follow-up priority. In this study, we studied cost-effective options for factors that should be considered first in order to establish a security system for small and medium-sized healthcare institutions in the healthcare convergence industry. Specifically, the current legal system was considered and the security status was analyzed through prior research, and the necessary security solution/system was derived from small and medium-sized healthcare institutions. In addition, it analyzed relative priorities for cost-efficient deployment of security systems to those involved in small and medium-sized healthcare institutions in actual business environments and presented measures to establish a overall security.

  • PDF

Analysis of Medical Expenses Structure for Patients on Percutaneous Coronary Intervention by Medical Security Type (의료보장형태에 따른 관상동맥중재술 환자의 진료비 구조분석)

  • Son, Mi-Kyung;Lee, Sok-Goo
    • Journal of agricultural medicine and community health
    • /
    • v.44 no.4
    • /
    • pp.195-208
    • /
    • 2019
  • Objectives: The purpose of this study was to analyze whether there are differences in medical expenses according to medical security type in the use of medical services with high disease burden such as coronary intervention. Methods: Chi-square test and covariance analysis(ANCOVA) were conducted to identify the differences in the characteristics and costs according to medical security type of 1,904 patients who underwent coronary intervention in a university hospital from 2011 to 2012. Hierarchical regression analysis was conducted to determine whether the cost affects medical expenses. Results: In the medical aid group, the proportion of women, those without a job, those without a spouse, and those who received hemodialysis was high, length of stay was high, patients using the emergency room and those who died was high. The medical aid patients were significantly higher in the non-benefit medical expenses, optional medical expenses, physician and admission, meals, medications and injections. National health insurance patients were significantly higher in procedure. The medical security type was found to be significant as a variable affecting the medical expenses. Conclusions: Provision of medical expenses should be managed in advance by providing prevention and education services for the vulnerable, and care services in the region should be provided to suppress the occurrence of medical expenses due to the increase in the number of days spent. In addition, it is necessary to support medical expenses to prevent unsatisfactory medical services from occurring for non-benefit and optional care.

Comparison of Health Status and Life Satisfaction According to Food Security in Single-Person Households of Elderly Population

  • Dong Hoon Jung;Jae Won Han;Wonha Kim;Hee-Sook Lim
    • Clinical Nutrition Research
    • /
    • v.13 no.1
    • /
    • pp.42-50
    • /
    • 2024
  • This study analyzed the 2019 Community Health Survey data to compare and analyze the health levels and life satisfaction of single-person elderly households based on food security. The final study subjects were 15,606 single-person elderly individuals aged 65 and above. These subjects were classified based on their response to food security into three groups: food sufficient-diverse, food sufficient-not diverse, and food insufficient. The study results showed that the proportion of the food insufficient group among single-person elderly households was 7.4% for men and 10.6% for women, with a slightly higher rate for female elderly. Both male and female elderly over 80 years of age, with low education levels, and basic living support recipients showed significantly higher proportions in the sufficient-not diverse and food insufficient groups. For male elderly, significant differences were observed in subjective health status and oral health level in the food insufficient group, and for female elderly, stress levels also showed significant differences. Life satisfaction scores were generally lower for female elderly compared to male, and significant differences were found in both male and female elderly based on food security. Common factors that significantly influence life satisfaction among single-person elderly households, both male and female, include food security, subjective health status, and living environment satisfaction, with food security being the most impactful factor. The study suggests that it is necessary to include these significant factors in the development of various social activity programs, such as dietary programs, to enhance life satisfaction and food security of single-person elderly households.

Digital Signature Considering the Medical Information Property on Mobile Environment (모바일 환경에서 의료 정보 특성을 고려한 디지털서명)

  • Kim Yong-Gug;Lee Yeun-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.374-379
    • /
    • 2005
  • In the most of medical institution medical information is totally stored in a database and many number of researchers and staffs of the hospital access these information anytime. This can be caused patient's privacy to be violated. Introducing a tool for security should be considered as one of the most important requirement especially in the case that today's medical information service expands into an integrated one. In this paper we review the matters of security threat on a medical information system and propose a secure medical information service model equipped on mobile device such as PDA. Also we propose a security architecture employing a digital signature mechanism to protect the personal information on the model. Proposed architecture can lead the doctor to diagnose with high responsibility, help to build a reliable medical information system. and through the signed data, we can get some useful information against medical strife.

Study on The RBAC Protocol of Medical Information System (의료정보시스템의 RBAC 프로토콜 연구)

  • Lim, Kyeong Suk;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.77-84
    • /
    • 2016
  • In general RBAC(Role-Based-Access Control) model, senior role has junior role's permissions by virtue of role hierarchy. But although the opposite case is needed partially in medical institutions, such case cannot be performed in medical information systems. This is because inheritances of permissions in role hierarchies are static. In order to tackle this problem, this paper defined a dynamic role assignment, thereby proposed the way for the junior temporarily to be able to perform the permissions of the senior, and showed the applications of medical information systems.

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.