• Title/Summary/Keyword: Patient privacy

Search Result 160, Processing Time 0.024 seconds

The Effects of the Inpatients' Stress and Privacy for the Satisfaction with Patients' Room (입원환자의 프라이버시와 스트레스가 병실 만족도에 미치는 영향)

  • Shin, Eun-Gyeong;Park, Soobeen
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.5
    • /
    • pp.148-156
    • /
    • 2016
  • This study proposes the structural model of inpatient's satisfaction with their room. Relationship among patients' privacy, patients' stress, and patients' satisfaction were evaluated and were discussed. Survey research followed the literature review, in which the subjects answered questions of the 12 items for the patients' privacy requirements, 10 items selected from the HSRS, and an item of patients' satisfaction. A total of 120 copies were analyzed through the statistical process using the SPSS Win Program 20.0 and SEM by the AMOS 20.0. Results and conclusions are as follows: (1) the inpatients' privacy requirements was subdivided into 'the reserve factor', 'the territoriality factor', and 'the solitude factor'. (2) The inpatients' stress level was subdivided into 'the relationship factor', 'the unfamiliarity factor', and 'the control factor'. (3) The model of relationship among the subjects' privacy requirements, stress level and their satisfaction with the patients' room showed that the subjects' stress level affected their satisfaction with the patients' room directly and the subjects' privacy requirements gave an direct and indirect effect on their' stress level and an indirect effect on their satisfaction with patients' room.

Comparison of User's Satisfaction between 4-bedroom and 5/6-bedroom in Single General Hospital (일개 종합병원 4인실과 5/6인실 사용자의 만족도 비교)

  • Lee, Chan Hee;Lim, Hyunsun;Yoon, Soojin;Park, Eun-Cheol;Kang, Jung-Gu
    • Korea Journal of Hospital Management
    • /
    • v.21 no.2
    • /
    • pp.13-23
    • /
    • 2016
  • Purpose: The purpose of this study is to compare the user satisfaction between 4-bedrooms and 5/6-bedrooms in a single general hospital. Methodology: To measure and compare multiple-bed ward user satisfaction between 4-bedrooms and 5/6-bedrooms, questionnaires were collected from 916 inpatients and 129 nurses in a single general hospital. The patient satisfaction questionnaire categories included environmental conditions, protection of privacy, and medical services. The nurse satisfaction questionnaire categories included space, infection control, patient safety, work load and psychologic view point. Findings: Satisfaction of patient who admitted in 4-bedroom to the environmental conditions and protection of privacy was higher than that of 5/6-bedroom group (3.91 vs. 3.25, p<0.001). Satisfaction of nurse who worked in 4-bedroom was higher than that of 5/6-bedroom (3.05 vs. 1.92, p<0.001). By the multiple linear regression analysis, patient satisfaction to the environmental conditions and protection of privacy was related with multi-bedroom type and location of beds; 4-bedrooms were higher than 5/6-bedrooms(p<0.001), window side bed were higher than hallway side bed(p=0.001). There was no satisfaction difference in comparing medical services between the two groups. By the multiple linear mixed regression analysis, nurse satisfaction who were assigned for 4-bedrooms were higher than that of 5/6-bedrooms in all categories(p<0.001). Practical Implications: Even though no difference has shown in medical services satisfaction between the two patient groups, multi-bedroom type may affect patient satisfaction in environmental condition, protection of privacy and may also affect overall nurse satisfaction. This result suggests that to improve multi-bedroom user satisfaction, 4-bedroom is recommended over 5/6-bedroom.

The Perception Survey for Personal Health Information Protection of First Aid Training Courses Students - Focused of EMT students and Nursing students - (응급처치 교육과정을 배우는 학생들의 개인의료정보 보호에 대한 인식도 조사 - 응급구조과와 간호과 학생을 중심으로 -)

  • Bae, Sung-Ju;Choi, Young-Jin
    • Journal of Korean Clinical Health Science
    • /
    • v.2 no.1
    • /
    • pp.25-34
    • /
    • 2014
  • Purpose. The checked of perception for the protection of personal medical information of EMT student and Nursing student. Methods. Nursing students and EMT students 200 questionnaires were collected and Frequency analysis, Chi-square test, one-way ANOVA was performed for using the Windows SPSS(ver. 12.0). Results. Most of the subjects were aware of the protection law of personal information and Infringement of the privacy of personal information will be exposed. also, Education is needed privacy(EMT students $3.84{\pm}0.96$, Nursing students $3.73{\pm}0.99$). EMT($3.99{\pm}1.00$) and Nursing($4.07{\pm}0.94$)students due to exposure to both the patient's personal information privacy was violated would get recognized. Exposure to the computerization of information privacy will be exploited in other agencies(EMT students $3.78{\pm}0.88$, Nursing students $3.95{\pm}0.94$) was called. Conclusions. For the protection of personal health information, education needs to be expanded.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

A Comparative Study of Regional Medical Information Protection Act and Privacy Act (국가별 개인정보보호법 및 의료정보보호법의 비교연구)

  • Bang, Yun-Hui;Rhee, Hyun-Sill;Lee, Il-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.164-174
    • /
    • 2014
  • The purpose of this study is to explore ways to resolve the conflicting issues that are currently applied in medical Act and medical privacy Act through the comparative Analysis of the Privacy Act and the Medical Information Protection Act foreign. the results run to establish the Public Health Act coming for the protection of health information is a characteristic of many countries, France in Europe, the United States and Canada had been running an independent medical information laws are enacted. Prescribes penalties of up to a fairly systematic method from the case records of patients would not have occurred in the management and implementation of the law and the protection of the author of the book focuses on the subject of medical records and physician records between patient confidentiality and privacy it can be seen that the method defined in. This indicates the need for the establishment of an independent medical information laws to protect all records relating to the patient systematically Korea also.

Design of Personal Information Security Model in U-Healthcare Service Environment (유헬스케어 서비스 환경 내 개인정보 보호 모델 설계)

  • Lee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.189-200
    • /
    • 2011
  • With rapid development and contribution of IT technology IT fushion healthcare service which is a form of future care has been changed a lot. Specially, as IT technology unites with healthcare, because delicate personal medical information is exposed and user's privacy is invaded, we need preperation. In this paper, u-healthcare service model which can manage patient's ID information as user's condition and access level is proposed to protect user's privacy. The proposed model is distinguished by identification, certification of hospital, access control of medical record, and diagnosis of patient to utilize it efficiently in real life. Also, it prevents leak of medical record and invasion of privacy by others by adapting user's ID as divided by user's security level and authority to protect privacy on user's information shared by hospitals.

A Study on the Patient Privacy Protection of Medical Information For Internet (인터넷 환경에서의 의료정보화와 환자개인정보보호 방안)

  • Ji, Hye-Jung;Shin, Seung-Jung;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.235-241
    • /
    • 2008
  • Please Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The medical information in today's modern internet environment can violate privacy of the patients. Many medical institutions in Korea are very passive in the privacy protection of patients in the internet environment. The law, standard scheme and systematic guidance to prevent drain of medical information are not developed. This study examines cases of infringement pattern on information of each patient in the internet environment. This study will also try to find a solution to protect the personal information of patients in the internet environment in the measures of law system, technique and management.

  • PDF

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

A Study for Sharing Patient Medical Information with Demographic Datasets (환자 의료 정보 공유 및 데이터 통합을 위한 데모그래픽 데이터 활용 연구)

  • Lim, Jongwoo;Jung, Eun-Young;Jeong, Byoung-Hui;Park, Dong Kyun;Whangbo, Taeg-Keun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.128-136
    • /
    • 2014
  • Recently, although exponentially growing the quantity of information that have been used and shared on internet networks, the patient information of each medical center have not been used and shared among medical centers due to the protection of patients privacy and the different database schema. To address this problem, we have studied the data structure of the patient information, the standard of medical information for patients we propose a patient information sharing system design that each medical center is able to use and share the patient information among medical centers in spite of different patient information systems with protecting patients privacy.