• Title/Summary/Keyword: Secure Healthcare

Search Result 135, Processing Time 0.032 seconds

Refugee Medical Administration in Republic of Korea (대한민국의 난민 의료지원)

  • Samin Hong
    • Health Policy and Management
    • /
    • v.33 no.2
    • /
    • pp.214-222
    • /
    • 2023
  • Refugees who are persecuted can apply for refugee recognition in the Republic of Korea in accordance with the Refugee Convention and the Refugee Act. They can do so either at the port of entry or during their stay in Korea. After undergoing screening, individuals may be recognized and protected under different categories, such as recognized refugees, humanitarian status holders, refugee applicants, and refugees seeking resettlement. Recognized refugees are entitled to the same social benefits and basic livelihood guarantees as Korean nationals. Humanitarian status holders and refugee applicants may receive support such as minimum living expenses, housing facilities, medical care, and education. In the medical field, refugees and their unmarried minor children are eligible for medical support through the "Medical Service Support Project for Marginalized Populations, Including Foreign Workers." This support is in addition to the national healthcare coverage and medical benefits provided by the government. However, there are pressing concerns regarding the inadequate budget allocated to this project and the excessive cost burden placed on participating medical institutions. It is crucial to secure additional funding and implement administrative improvements. Furthermore, it is essential to develop medical support measures that ensure the minimum right to health for individuals who choose not to undergo the refugee recognition process at the port of entry.

Implementation of A Patient Card Integrating System Using by IC Card To Share A Medical Information (진료정보 공유를 위한 IC카드 기반 병원 진찰 카드 통합 시스템 구축)

  • Pack D.H.;Lee N.Y.;Kim Y.J.;Lee K.B.
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.6 s.81
    • /
    • pp.533-541
    • /
    • 2003
  • In the paper. the health card system to integrate several cards into one card for protecting patient's privacy and security problems is proposed. Firstly, it is defined the minimal data set for integrating several patient cards into one card using IC card, and developed the issuing system to issue the integrated patient IC card. In order to secure and certificate a patient's personal information. the integrated patient IC card has applied 3-DES and the PKI certificate authority based Windows 2000 is established. The receipt and reservation system for taking care of a healthcare has developed to cooperate with the existing hospital computer system. The integrating patient IC card system proposed in this paper is implemented to 11 hospitals and used for 1.000 patients. On the result of the simulation. the proposed system can receive or reserve for a patient to take care of healthcare in the simulated hospitals and also establish the basis of the mechanism to share a medical information.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on the Ward Module according to the External Design of the Hospital (병원 외주부 디자인에 따른 병실모듈 연구)

  • Lee, Hyunjin;Park, Wonbae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.3
    • /
    • pp.71-78
    • /
    • 2021
  • Purpose: It is important to plan the ward module at a time when the size of beds, the floor area, and the construction budget are all set prior to the hospital design. In this context this study aims (1) to derive various factors affecting the ward module, and (2) to analyze the appropriate room module according to the type. Methods: Design factors related to hospital modules are derived through precedential studies, and the types of ward elevation are classified by reviewing the drawings of 18 case hospitals. And the detailed dimensions and area of the derived elements are analyzed. Results: The X-axis modules of the ward are switched to long span structural columns of 9.9 m, 12.6 m and 13.2 m, but the ward modules still represent 6.6 m. The Y-axis module of the ward shows a dimension of 9 to 9.9m in the process of changing a multi-person room into a four-person room. Type A of curtain wall with columns located on the wall of the room and type B of curtain wall located in the center of the room are analyzed due to their variations. The square window type, which forms the elevation of the square window by exposing the columns to the elevation, and the outframe type, which protrudes from the structural columns and beams, have elevation designs limited. There are, however, no obstacles to the interior space of the hospital room, so the wall composition and furniture arrangement are expected to be free. The ward area of Curtain Wall Type A, which can secure an effective area of 5.9m*5.0m, are 52.1m2. The Curtain Wall Type A, Square window type, and the outframe type are 49.8m2. Implications: As part of the hospital standard module plan for economical and reasonable hospital building planning, a type was proposed in this study in conjunction with the external design. It is hoped that it be a base for standard module research linked together to the Central Treatment department, Outpatient department and underground parking lot.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A study on the digitalization of 3D Pen (3D펜의 디지털화에 대한 연구)

  • Kim, Jong-Young;Jeon, Byung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.583-590
    • /
    • 2021
  • This paper is a study on the digitization of an analog 3D pen. The term digital implies features such as homeostasis, transformability, combinability, reproducibility, and convenience of storage. One device that produces a combination of these digital characteristics is a 3D printer, but its industrial use is limited due to low productivity and limitations with materials and physical characteristics. In particular, improvements are required to use 3D printers, such as better user accessibility owing to expertise and skills in modeling software and printers. Complementing this fact is the 3D pen, which is excellent in portability and ease of use, but has a limitation in that it cannot be digitized. Therefore, in order to secure a digitalization capability and ease of use, and to secure the safety of printing materials that pose controversial hazards during the printing process, research problems and alternatives have been derived by combining food, and digitization was demonstrated with a newly developed 3D pen. In order to digitize the 3D pen, a sensor in a structured device detects the motion of an analog 3D pen, and this motion is converted into 3D data (X-Y-Z coordinate values) through a spatial analysis algorithm. To prove this method, the similarity was confirmed by visualization using MeshLab version 1.3.4. It is expected that this food pen can be used in youth education and senior healthcare programs in the future.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Considerations in work years and dental institution types among some dental hygiene graduates, and ways to improve the clinical dental hygiene society (일부대학 치위생과 졸업생의 근무경력, 근무기관별 취업 시 고려사항 및 임상치위생계의 개선사항)

  • Lee, Sun-Mi;Jun, Mi-Kyoung;Lee, Jung-Hwa
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.3
    • /
    • pp.311-321
    • /
    • 2018
  • Objectives: The purpose of this study was to provide basic data on the current status and ways to improve the dental hygiene society by investigating working conditions, working experience, dental institution types among some dental hygienists, and ways to improve the dental hygiene society. Methods: This study conducted an online survey to 450 graduates of the department of dental hygiene in colleges in Gyeonggi, Jeolla and Gangwon Provinces. This study got some help in securing the list of graduates from the heads of the departments. SPSS WIN 23.0 was used to analyze the data. Results: To questions on what is the most important thing in considering to apply for jobs, the highest proportion (39.1%) of respondents designated employee welfare, followed by improvement of clinical dental hygiene (34.0%), of welfare related contents (26.0%), and salary (19.5%). In the relationship between employee welfare and dental institution type and between employee welfare and work experience, employee welfare tend to rise with the increase of work years. In the relationship between the director and staff members, it was found that as work years accumulate, the relationship tends to decrease. The dental clinic with no more than five staff members showed the best relationship between the leader and co-workers, while employee welfare was the highest in the other types of clinics, and the differences were statistically significant. Conclusions: Dental hygienists need to make various efforts to improve their statuses as professionals. In order to secure a part of professionalism, it is necessary for them to make more efforts to realize the health-care professionals being promoted by the Dental Hygienists Association of Korea.

Effects of Mentoring Program's Development about New Nurses (신입간호사에 대한 멘토링 프로그램의 개발 효과)

  • Park, Mee-Lan;Lee, Mi-Joon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.43-51
    • /
    • 2018
  • The purpose of this study was to develop a mentoring program to support the professional growth of new nurses and to check the effectiveness. This mentoring program was developed by research teams and mentoring professionals based on Benner's theory. The data was analyzed using SPSS 18.0 program. The average of satisfaction of mentoring program in the mentees is 4.31 higher than mentor as 3.77. The highest scored item was 'need of mentoring program', the lowest one was 'mentoring program period and number of meetings'. Finally based on the results of the research, the duration of the mentoring program was changed to the six months. A steady support of the organizational policy about mentoring program is required to secure an outstanding nursing workforce.

The Effects of Technology Readiness Index of Artificial Intelligence and Internet of Things on the Recognition of Substitute Employment of Medical Personnel (인공지능, 사물인터넷의 기술준비도가 의료인력 고용대체인지도에 미치는 영향)

  • Kang, Han Seom;Kim, Young Hoon
    • Korea Journal of Hospital Management
    • /
    • v.23 no.2
    • /
    • pp.54-66
    • /
    • 2018
  • Purpose: This study was to figure out relationships of perceived Technology Readiness Index(TRI), usefulness, acceptance intension, and the recognition of substitute employment of medical personnel on the artificial intelligence (AI) and internet of things (IoT) among main technologies. Methodology: To achieve the purpose, this study utilized structured survey tools to conduct a questionnaire survey of nursing, administrative and medical technology professionals at six university hospitals in Korea metropolitan area. A PLS(Partial Least Square) Path analysis was utilized To analyze the material. Findings: In the relation with the technology readiness and perceived usefulness, it had a positive influence to the perceived usefulness when the optimism and innovativeness were higher and the discomfort was lower. In the relation with the technology readiness and acceptance intension, it showed a positive influence when the innovativeness was higher and the discomfort was lower. In the relation with the perceived usefulness and acceptance intension, it had a positive influence to the acceptance intension when the perceived usefulness was higher. In the relation with the acceptance intension and the recognition of substitute employment, it showed a positive influence to the recognition of substitute employment when the acceptance intension was higher. Practical Implications: Judging based on the above study results and reference reviews, it confirmed that it is necessary to prepare in the level of hospital organization in the $4^{th}$ Industrial Revolution. They should increase the efficiency of human resources through the technological factors or changes of employment types for the additional demands of human resources to handle increasing medical demands or induce to secure necessary abilities which are changing at the right time by performing the $4^{th}$ Industrial Revolution related re-training continuously to develop the value of existing human resources.