• Title/Summary/Keyword: e-healthcare system

Search Result 132, Processing Time 0.026 seconds

Analysis of the Status of Infection Controls after Application of the Healthcare Accreditation System (의료기관 인증제 도입에 따른 감염관리 실태 분석)

  • Jeong, Sun-Young;Oh, Hyang-Soon;Chun, Hee-Kyung
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.4
    • /
    • pp.33-49
    • /
    • 2015
  • Objectives : This study was conducted to measure the effects of healthcare accreditation (HA) on the changes in infection control (IC). Methods : Questionnaires were e-mailed to 60 hospitals from 23 October to 23 December, 2011. Data were analyzed by SPSS 12.0. Results : Finally 50 hospitals (83.0%) were enrolled in the study: Seoul area (40.0%), tertiary (76.0%), and >500 beds (98.0%). Nine hospitals (18.0%) had a full time infection control nurse[ICN] with 300 beds. Among various factors, ICN (36.0%), hospital facilities (66.0%), instruments (32.0%) and supplies (88.0%) all improved. Hand hygiene increased (53.1% vs 83.2%, p<.001), but it was continued only in 34.1% of hospitals. Healthcare-associated infection (68.4%), multi drug resistant organisms (42.1%) and outbreaks (26.3%) decreased. Reasons for difficulties in satisfying the HA standards were inadequate support which included hospital facilities, instruments, budget, and a shortage of ICNs and healthcare workers (HCWs). Conclusions : HA had effects on the IC, but they were transient. Staffing in ICN and HCW staffing, hospital facilities, instruments, and supplies all need to be improved.

e-Transformation Strategy : From EDI to Web-based e-Business Standard Framework

  • Kim, Min-Soo;Kim, Dong-Soo;Kim, Hoon-Tae;Yoon, Jung-Hee
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.149-154
    • /
    • 2005
  • Recently, lots of EDI-VAN (Electronic Data Interchange-Value Added Network) companies challenge to convert their business systems into Web-based e-business frameworks to avoid high cost and closed structure of EDI system. This research proposes e-Transformation strategies for EDI-VAN companies to adopt Web-based e-business standard frameworks such as ebXML (e-business using XML) and RosettaNet. Four migration strategies for EDI companies are presented, and their properties are described in detail. Transformation procedures of two representative strategies are also provided fur the convenience of medium-sized companies. The result of this work can be used as a practical guideline for EDI companies to develop there own transformation strategy suitable to its scale and capability, while minimizing the impacts on the pre-existing business processes.

  • PDF

An Embedded Multi-Agent Based Healthcare Service with Two-way Handshaking Mode (무선 및 유선환경에서 임베디드 멀티에이전트 기반의 쌍방향 건강관리 서비스)

  • Md, Amiruzzaman;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.155-161
    • /
    • 2008
  • An automated healthcare monitoring is demand of time, lot of problems occurring just because of less monitoring of patients health condition on time. In this paper an embedded healthcare service is proposed by an iSCSI protocol on an automated multi-agent coordination by resource-constrained devices controlled system for healthcare service. The coordination between the resource constrained devices (e.g. PDA, SmartPhone, Tablet PC), and automated agents are maintained by a two-way handshaking mode iSCSI protocol. The automated health care control could be useable, and beneficial in the repetitive way. A fully centralized control is not applicable for this kind of approach.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Development of an Information Security Standard for Protecting Health Information in u-Health Environment (u-Health 환경에서의 정보보호 수준제고를 위한 보안 표준 개발)

  • Kim, Dong-Soo;Kim, Min-Soo
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.177-185
    • /
    • 2007
  • e-Business in healthcare sector has been called e-Health, which is evolving into u-Health with advances of ubiquitous technologies. Seamless information sharing among health organizations is being discussed in many nations including USA, UK, Australia and Korea. Efforts for establishing the electronic health record (EHR) system and a nation-wide information sharing environment are called NHII (National Health Information Infrastructure) initiatives. With the advent of u-Health and progress of health information systems, information security issues in healthcare sector have become a very significant problem. In this paper, we analyze several issues on health information security occurring in u-Health environment and develop an information security standard for protecting health information. It is expected that the standard proposed in this work could be established as a national standard after sufficient reviews by information security experts, stakeholders in healthcare sector, and health professionals. Health organizations can establish comprehensive information security systems and protect health information more effectively using the standard. The result of this paper also contributes to relieving worries about privacy and security of individually identifiable health information brought by NHII implementation and u-Health systems.

Patterns of Antimicrobial Resistance and Detection of mecA Gene from Methicillin Resistant Staphylococcus aureus Isolated from Healthcare Facilities and U.S. Military Hospital in Korea

  • Sin Chin-Su;Lee Gyu-Sang;Lim Kwan-Hun;Kim Jong-Bae
    • Biomedical Science Letters
    • /
    • v.11 no.4
    • /
    • pp.447-453
    • /
    • 2005
  • A total of 108 strains of MRSA (Methicillin-resistant Staphylococcus aureus) clinical isolates was collected from $121^{st}$ general hospital (U.S. military hospital), Korean healthcare facility from January to March in 2005 and Wonju Christian hospital in 1999. Antimicrobial susceptibility test by Vitek System and MIC test using oxacillin and cephalothin stripes by E-test were executed. PCR based detection of mecA gene was performed on the all of MRSA clinical isolates, too. MRSA clinical isolates were characterized with antimicrobial resistance patterns, PCR based detection of mecA gene and validation of the multiplex PCR strategy of SCCmec among clinical isolates.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Development of a Prototype System for Active Emergency Call Services (능동적 응급 호출 서비스 시스템 프로토타입 개발)

  • Han, Won-Hee;Song, Eun-Ha;Han, Sung-Kook;Jeong, Young-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.7
    • /
    • pp.1016-1024
    • /
    • 2008
  • In this paper, we designed and implemented the ACE(ACtive Emergency call service system) system for emergency call service actively. ACE system has two physical components; E-Device(Emergency Mobile Device) and E-Server(Emergency Server). The role of E-Device is the mobile device in order to call emergency by using mild handi-capped, the elderly and children who are able to communicate theirs intention to another. E-Server is the server for management E-devices with realtime monitering. E-Device will be developed to the portable size for easily mild handi-capped, the elderly and children. When they need the service of emergency call, the button of E-device can be used and the call signal is transmitted to the emergency office and the guardian through Internet and CDMA. E-server should be developed the integrated control system for management of E-Devices basically. And it also supported to realtime monitoring of E-devices with respect to high quality of emergency call service for rise the efficiency.

  • PDF

A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing

  • Saeed, Waqar;Ahmad, Zulfiqar;Jehangiri, Ali Imran;Mohamed, Nader;Umar, Arif Iqbal;Ahmad, Jamil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • Fog computing aims to provide the solution of bandwidth, network latency and energy consumption problems of cloud computing. Likewise, management of data generated by healthcare IoT devices is one of the significant applications of fog computing. Huge amount of data is being generated by healthcare IoT devices and such types of data is required to be managed efficiently, with low latency, without failure, and with minimum energy consumption and low cost. Failures of task or node can cause more latency, maximum energy consumption and high cost. Thus, a failure free, cost efficient, and energy aware management and scheduling scheme for data generated by healthcare IoT devices not only improves the performance of the system but also saves the precious lives of patients because of due to minimum latency and provision of fault tolerance. Therefore, to address all such challenges with regard to data management and fault tolerance, we have presented a Fault Tolerant Data management (FTDM) scheme for healthcare IoT in fog computing. In FTDM, the data generated by healthcare IoT devices is efficiently organized and managed through well-defined components and steps. A two way fault-tolerant mechanism i.e., task-based fault-tolerance and node-based fault-tolerance, is provided in FTDM through which failure of tasks and nodes are managed. The paper considers energy consumption, execution cost, network usage, latency, and execution time as performance evaluation parameters. The simulation results show significantly improvements which are performed using iFogSim. Further, the simulation results show that the proposed FTDM strategy reduces energy consumption 3.97%, execution cost 5.09%, network usage 25.88%, latency 44.15% and execution time 48.89% as compared with existing Greedy Knapsack Scheduling (GKS) strategy. Moreover, it is worthwhile to mention that sometimes the patients are required to be treated remotely due to non-availability of facilities or due to some infectious diseases such as COVID-19. Thus, in such circumstances, the proposed strategy is significantly efficient.