• Title/Summary/Keyword: Personal Policy

Search Result 1,237, Processing Time 0.036 seconds

Comparison of the Personal Care Benefit System under Workers' Compensation in Japan, Germany, and the United States (일본·독일·미국의 산재보험 간병급여체계의 비고)

  • June, Kyung Ja;Kim, Jae Young;Choi, Yun-Young;Choi., Eun
    • Korean Journal of Occupational Health Nursing
    • /
    • v.16 no.1
    • /
    • pp.58-66
    • /
    • 2007
  • Purpose: A national long-term care system for elderly and the disabled has its unique evolution in each country. Japan, Germany and the United States may be the typical examples of respective social insurance system. This paper reviews the counterpart examples of Japan, Germany and the United States and looks at their accumulated long-term care system experiences and personal care system under workers' compensation. Methods: Literature review and website searching were conducted. Key words as 'workers' compensation insurance', 'personal care benefit' and 'long term care' were used in searching the related literatures. Results: Though the personal care benefit under current Workers'Compensation in Korea is very similar to Japan's, the long-term care system of Korea is not as well established. Germany and the United States have the provision of personal care benefit for injured workers within long term care system. Conclusions: We recommend some key issues to take into account for improving personal care benefit system in workers' compensation in Korea as follows: providing a comprehensive coverage through the linkage of long term care, introducing an assessment & evaluation system for the appropriate benefits, establishing insurer's role for quality management of personal care service, and developing a policy for family caregivers.

  • PDF

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Positive Factors for Return to Work After Accidents: Health Awareness, Consultation with Doctors, and Personal Characteristics of Workers

  • Kang, Dongsuk
    • Safety and Health at Work
    • /
    • v.13 no.1
    • /
    • pp.32-39
    • /
    • 2022
  • Background: Industrial accidents can determine the overall level and quality of the work environment in industries and companies that contribute to national economic development. Korea has transformed the country from an international aid recipient to a donor country, but it has ranked first among the Organisation for Economic Co-operation and Development member countries in the number of fatal industrial accidents. Little has been known about the policy effects in terms of the workers' insurance for their industrial accidents and rehabilitation. This study raises two research questions about the influence of workers' personal characteristics and vocational rehabilitation services on their return to workplaces. Methods: The study implements weighted logistic regression analysis using propensity score matching. This research utilizes the relevant dataset (3,924 persons) of Korea's industrial accident and insurance. Results: The findings show that the level of workers' awareness of health recovery and their counseling for rehabilitation by physicians had positive effects on their return to work. Environmental factors such as workers' job stability at the time of industrial accidents and the temporal effects of industrial accidents (e.g., the level of disability, their age) had negative impacts on their return to work. Conclusions: These findings have policy implications that the concentration of rehabilitation services for patients who have been mildly affected by industrial accidents would be effective in the short and medium term. The findings also highlight the necessity of ongoing policies about workers' vocational recovery with concrete evidence about policy impacts.

A Study on The Acceptance of Communication for People through Smart Phone (스마트폰을 통한 대국민커뮤니케이션 수용성에 관한 연구)

  • Park, Jin-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.465-471
    • /
    • 2011
  • This study was to examined the acceptance of communication for people through smart phone focused users of smart phone. The results were as follows. First, smart phone's mobility influenced positively on attitude toward the transmission of government policy. smart phone's personal appropriateness influenced positively on awareness toward the transmission of government policy and usefulness toward the transmission of government policy. And smart phone's usefulness influenced positively on usefulness toward the transmission of government policy. Second, smart phone's ease of use influenced positively on awareness toward the transmission of government policy. smart phone's security influenced negatively on awareness, usefulness, attitude toward the transmission of government policy. smart phone's connectivity influenced positively on awareness toward the transmission of government policy. Third, usefulness and attitude toward the transmission of government policy through smart phone influenced positively on acceptance intention.

Delphi Study on the Reduction of Cross-contamination and Improvement of Management System on Firefighting Protection Suit (소방 방화복 교차오염 저감 및 관리체계 개선을 위한 델파이 연구)

  • Kim, Soo Jin;Ham, Seunghon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.2
    • /
    • pp.182-194
    • /
    • 2022
  • Objectives: This study evaluates and recommends the priority of policy implementation to improve the fire protection clothing management system used by firefighters and the reduction of cross-contamination from contaminated clothing at the scene of a fire. Methods: It consisted of 7 experts and conducted three interviews and two modified Delphi surveys. Through the results of previous research and interviews with experts, a plan to reduce cross-contamination of fire suits and improve the management system was first derived. An improvement plan was presented in the four areas including resources, management, fire protection related work, and laws and regulations, and the priority of policy implementation was derived by analyzing the importance and practicality of the policy at the same time. Results: As a result of the analysis, the first priority was education on the health effects of pollutants at the disaster scene for firefighters, and the second priority was the addition of SOP for the primary decontamination of on-scene personal protective equipment in preparation for the health effects of the disaster scene, and education for fire suppression and rescue workers. The next step was to improve the management system of personal protective equipment such as fire suits and develop a training course for systematic operation. Conclusions: This findings could be used in the implementation of mid- to long-term firefighting policies for the systematic operation and establishment of a systematic management system for personal protective equipment such as fire protective suits.

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.

Health Policy and Social Epidemiology (보건정책과 사회역학)

  • Shin, Young-Jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.3
    • /
    • pp.252-258
    • /
    • 2005
  • Major approaches of Social epidemiology; 1)holistic, ecological approach, 2)population based approach, 3)development and life-course approach, 4)contextual multi-level approach, have stressed the importance of not only social context of health and illness, but also the population based strategy in the health interventions. Ultimately, it provides the conceptual guidelines and methodological tools to lead toward the healthy public policies; integrated efforts to improve condition which people live: secure, safe, adequate, and sustainable livelihoods, lifestyles, and environments, including housing, education, nutrition, information exchange, child care, transportation, and necessary community and personal social and health services.

Some Proposals for the Policies to Control AIDS (에이즈 관리정책에 대한 제언)

  • 김태한;손은수
    • Journal of Korea Technology Innovation Society
    • /
    • v.6 no.4
    • /
    • pp.447-461
    • /
    • 2003
  • Over the past 10 years, AIDS has grown to become one of the major health problems in Korea. This paper reviews the current status of the prevalence of AIDS, AIDS law and policy in Korea. This paper also suggests some proposals for policy to reduce HIV transmission from the view point of personal rights and welfare. Korea needs more effective national AIDS prevention and control programs applicable to the current situations of health policy in Korea. The activities of NGOs would be as important as those of government.

  • PDF

The effect of dental hygiene students' professional self-concept and ethical propensity on the willingness to performance of private patient information protection (치위생(학)과 학생들의 전문직 자아개념과 윤리적 성향이 환자 개인정보보호 실천의지에 미치는 영향)

  • Kim, Seon-Yeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.22 no.5
    • /
    • pp.443-450
    • /
    • 2022
  • Objectives: This study was conducted to investigate the effect of professional self-concept and ethical awareness of dental hygiene (department) students attending a university located in Gwangju and Jeollanam-do on patients' willingness to protect personal information. Methods: Professional self-concept, ethical disposition, and patients' personal information protection intention according to general characteristics were analyzed using t-tests and one-way ANOVA. After confirming the correlation through Pearson's correlation analysis, the effect on the patient's personal information protection intention was confirmed using multiple regression analysis. Results: Professional self-concept, ethical disposition, and the patients' willingness to protect personal information all showed positive correlations. The higher the communication skills of professional self-concept and the higher the idealism of ethical orientation, the higher the patients' willingness to protect personal information. Conclusions: This study, ascertained the effect of dental hygiene students' professional self-concept and ethical consciousness on patients' personal information protection practices. The results suggest that it is necessary to develop an educational program that can enhance the practice of dental hygienists to protect patients' personal information, and to develop and conduct continuous policy development and research.

Reliability Analysis of Privacy Policies Using Android Static Analysis (안드로이드 정적 분석을 활용한 개인정보 처리방침의 신뢰성 분석)

  • Yoonkyo, Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile app handles user data in a privacy policy. However, users are not certain that the privacy policy describes all the app's behavior. They have no choice but to rely on the privacy policy to confirm how the app uses data. This study designed a system that checks the reliability of privacy policies by analyzing the privacy policy texts and mobile apps. First, the system extracts and analyzes the privacy policy texts to check which personal data the privacy policy discloses that the mobile apps can collect. After analyzing which data apps can access using android static analysis, we compare both results to analyze the reliability of privacy policies. For the experiment, we collected the APK files and metadata of about 13K android apps registered in the Google Play Store and preprocessed the apps by four conditions. According to the comparison between privacy policies and mobile app behavior, many apps can access more personal data than disclosed in the privacy policy.