• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.028 seconds

Has Disabled Access in Healthcare Institutions been Increased? - A Case Study of Jongno-gu in Seoul, Korea - (장애인의 의료기관 접근성은 향상되었는가? - 서울시 종로구 병의원을 대상으로 -)

  • Lee, Jin Yong;Jeong, Jaeyoung;Kim, You Kyung;Jun, Eun-Kyung;Kim, So Yun;Kim, Hyun Joo;Lee, Bo Woo
    • Health Policy and Management
    • /
    • v.22 no.4
    • /
    • pp.696-702
    • /
    • 2012
  • The purpose of this study was to evaluate the improvement of disabled access to healthcare institution located in Jongno-gu, Seoul in 2011 compared to 2003 since disabled access has been mandatory in healthcare institutions located in new buildings by the amended law in 2004. We had investigated 10 assessment items for disabled access in 166 healthcare institutions located in Jongno-gu, Seoul and the results were compared with those of 2003 survey. On average, 74.1% of the healthcare organizations has equipped with items for disabled access. However the adequately equipped rate for those items was only 39.2%. Compared with the results of 2003 survey, these rates showed a little increase by 4.1% and 8.0%, respectively. There were only 10 healthcare institutions located in new buildings which were constructed after July, 2005. Their average equipped rate(84.4%) and adequately equipped rate(46.8%) were higher than those of the other organizations because the Korean government ruled that healthcare institutions in new buildings must have facilities for the disabled. In conclusion, we confirmed that the accessibility of the disabled to healthcare institution slightly increased. In particular, the healthcare institutions in newly constructed building showed the significant increase of accessibility of the disabled. However, it is founded that disabled access is still not enough for the disabled.

A study on application plan of access control requirements in ERMS Standard (ERMS 표준에 나타난 접근통제 요건의 적용방안에 관한 연구)

  • Cheon, Kwon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.179-220
    • /
    • 2008
  • Under the physical records management system, both the records and users could be controlled and secured by closing the door of Archives or using permitted records which is used only approved users. According to the electronic records management system and the concept of service on the basis of users, we have to give up the classical manner. As an alternative, we have to consider the electronic access control system. To accomplish this purpose, functional requirements of ERMS that is issued by UK, EU, U.S and Australia must be compared and analyzed. On the basis of U.K ERMS which is more detailed, 'common access control functional requirements' are arranged. As the access control functional requirements is applied in the records classification scheme, we could find out how the access control is executed in ERMS.

Hospital Security System using Biometric Technology (바이오메트릭스 기술을 이용한 병원보안시스템)

  • Jung, Yong-Gyu;Kang, Jeong-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • Recently increasing importance of information security, personal security is researched. Among them, biometrics research is very good at recognition and security particularly in terms of iris recognition. Recent hospital physicians and employees for access control is emphasized. But most of them, easy-employee card access control systems are used. It has difficulties of iris recognition on the issue of accurate iris recognition algorithm to eliminate noise and inaccuracy of pretreatment methods for recognition from existing research. Therefore, this paper complements existing encryption methods to the disadvantages of biometric iris recognition using high-access records in the hospital management system is applied. In addition to conventional pretreatment process to increase recognition eyebrows when mask line component added to the extraction mask, the correct preparation method, and accordingly proposed to improve the recognition of records management systems offer access to the hospital.

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.

Cancer Care Management through a Mobile Phone Health Approach: Key Considerations

  • Mohammadzadeh, Niloofar;Safdari, Reza;Rahimi, Azin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.9
    • /
    • pp.4961-4964
    • /
    • 2013
  • Greater use of mobile phone devices seems inevitable because the health industry and cancer care are facing challenges such as resource constraints, rising care costs, the need for immediate access to healthcare data of types such as audio video texts for early detection and treatment of patients and increasing remote aids in telemedicine. Physicians, in order to study the causes of cancer, detect cancer earlier, act in prevention measures, determine the effectiveness of treatment and specify the reasons for the treatment ineffectiveness, need to access accurate, comprehensive and timely cancer data. Mobile devices provide opportunities and can play an important role in consulting, diagnosis, treatment, and quick access to health information. There easy carriage make them perfect tools for healthcare providers in cancer care management. Key factors in cancer care management systems through a mobile phone health approach must be considered such as human resources, confidentiality and privacy, legal and ethical issues, appropriate ICT and provider infrastructure and costs in general aspects and interoperability, human relationships, types of mobile devices and telecommunication related points in specific aspects. The successful implementation of mobile-based systems in cancer care management will constantly face many challenges. Hence, in applying mobile cancer care, involvement of users and considering their needs in all phases of project, providing adequate bandwidth, preparation of standard tools that provide maximum mobility and flexibility for users, decreasing obstacles to interrupt network communications, and using suitable communication protocols are essential. It is obvious that identifying and reducing barriers and strengthening the positive points will have a significant role in appropriate planning and promoting the achievements of mobile cancer care systems. The aim of this article is to explain key points which should be considered in designing appropriate mobile health systems in cancer care as an approach for improving cancer care management.

Design and implementation of an object-oriented graphic system configuration editor for access control systems (출입자 통제 시스템을 위한 객체지향 그래픽 시스템 구성편집기의 설계 및 구현)

  • 이정호;정선태;설철규
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1336-1339
    • /
    • 1996
  • In this paper, we design implement an Object-Oriented Graphic System Configuration Editor for Access Control Systems. 'Visual Builder', with such functions as graphic drawing, system configuration, graphic management, processing of user input through graphics. Visual Builder is designed to be well separated from and independent of S/W parts closely coupled with the underlying H/W and thus to improve its reusability and maintainability.

  • PDF

Design and Implementation of a Bluetooth LAN access system for VoIP phone (Bluetooth를 이용한 VOIP Phone 의 Wireless LAN Access System 개발)

  • 김정근;김영덕;장태규
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.343-346
    • /
    • 2002
  • This paper presents a Prototype system developed for a Bluetooth interfaced VoIP system. The VoIP phone is developed based on tile implementation of a CELP coder on the TI 16bit DSP Processor A PC interfaced with Bluetooth module is used to designing a access point system. Host controller protocol stack is implemented to realize gateway between the wireless and wired line networks. A server application program for user management and call processing, which is based on TCP/IP peer to peer connection, is implemented for tile evaluation of overall interface system.

  • PDF

Regular File Access of Embedded System Using Flash Memory as a Storage (플래시 메모리를 저장매체로 사용하는 임베디드 시스템에서의 정규파일 접근)

  • 이은주;박현주
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.189-200
    • /
    • 2004
  • Recently Flash Memory which is small and low-powered is widely used as a storage of embedded system, because an embedded system requests portability and a fast response. To resolve a difference of access time between a storage and RAM, Linux is using disk caching which copies a part of file on disk into RAM. It is not also an exception on embedded system. A READ access-time of flash memory is similar to RAMs. So, when a process on an embedded system reads data, it is similar to the time to access cached data in RAM and to access directly data on a flash memory. On the embedded system using limited memory, using a disk cache is that wastes much time and memory spaces to manage it and can not reflects the characteristic of a flash memory. This paper proposes the regular file access of limited using a page cache in the file system based on a flash memory and reflects the characteristic of a flash memory. The proposed algorithm minimizes power consumption because access numbers of the RAM are reduced and doesn't waste a memory space because it accesses directly to a flash memory Therefore, the performance improvement of the system applying the proposed algorithm is expected.

  • PDF

The Impact of Internet Access Charges on Economic Activities : A Cross-country Analysis (인터넷 사용료 수준이 경제활동 수준에 미치는 영향에 대한 다국가 분석)

  • Yoo, Seoung-Hoon;Yang, Chang-Young
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.63-76
    • /
    • 2004
  • There is a considerable gap in the level of the Internet access charges among countries because of the history of the Internet use, current status of the Internet infrastructure, the Internet penetration rate, and so on. Low Internet access charge increases the number of the Internet users and the Internet penetration rate, which boosts economic activities. This paper empirically explores the impacts of the internet access charges on economic activities using a cross-country analysis based on data from 76 countries for the year 1998-2001. To this end, several versions of the neoclassical growth models, explicitly including the internet access charges, are estimated with the GDP used for a proxy for economic activities and the level of Internet access charges considered as an input to production. Subject to the appropriate caveats, the results show that the level of the Internet access charges make a significantly negative effect on economic activities. In other words, it is concluded that low Internet access charges of a county increase economic activities and the increased economic activities in turn raise the real income of the county.

  • PDF