• Title/Summary/Keyword: health security system

Search Result 417, Processing Time 0.023 seconds

Approach to History and Problems of Health Insurance through Politics of Law (국민건강보험법의 발전과정과 법정책적 과제)

  • Cho, Hyong-Won
    • The Korean Society of Law and Medicine
    • /
    • v.8 no.2
    • /
    • pp.37-68
    • /
    • 2007
  • Health insurance has gone far toward solving Korea's health related problems through thirty years. Health Insurance as social security system has a role of national system to secure national health. But there are many problems in health insurance. There is a dispute about many issues, coverage of health security, compulsory appointment of health insurance organization, coverage and level of health insurance benefit, decisionmaking right of health insurance price, examination of health insurance etc. Generally, the opinion for health insurance policy to be leaded by nation sets against the opinion to be leaded by private sector. It is necessary to study politics of law, constitute law and comparative law for rational solving these problems. If desirable setting of health law system can be made, legal system must be set during a long time and be discussed synthetically in different standpoint.

  • PDF

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

Development of an Information Security Standard for Protecting Health Information in u-Health Environment (u-Health 환경에서의 정보보호 수준제고를 위한 보안 표준 개발)

  • Kim, Dong-Soo;Kim, Min-Soo
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.177-185
    • /
    • 2007
  • e-Business in healthcare sector has been called e-Health, which is evolving into u-Health with advances of ubiquitous technologies. Seamless information sharing among health organizations is being discussed in many nations including USA, UK, Australia and Korea. Efforts for establishing the electronic health record (EHR) system and a nation-wide information sharing environment are called NHII (National Health Information Infrastructure) initiatives. With the advent of u-Health and progress of health information systems, information security issues in healthcare sector have become a very significant problem. In this paper, we analyze several issues on health information security occurring in u-Health environment and develop an information security standard for protecting health information. It is expected that the standard proposed in this work could be established as a national standard after sufficient reviews by information security experts, stakeholders in healthcare sector, and health professionals. Health organizations can establish comprehensive information security systems and protect health information more effectively using the standard. The result of this paper also contributes to relieving worries about privacy and security of individually identifiable health information brought by NHII implementation and u-Health systems.

Health Publicness beyond the Healthcare Systems: Focusing on the Concept of Health Security and the Process of Social Dialogue (보건의료 공공성을 넘어 건강공공성으로: 건강안보와 사회적 대화를 중심으로)

  • Moon, Daseul;Chung, Haejoo
    • Health Policy and Management
    • /
    • v.28 no.4
    • /
    • pp.329-338
    • /
    • 2018
  • The study seeks to widen the discussion from healthcare oriented 'health publicness' to human security oriented 'health publicness'. The shortcomings of previous literatures on health publicness are as follows: (1) the studies have confined the range of discussions to healthcare system, (2) lacked arguments from political perspectives, and (3) failed to provide actionable pathways to achieve the goal. Thereby, we suggest 'health publicness' based on the concept of human security to solve multidimensional healthcare problems. The health publicness based on human security, which aims to secure everybody's freedom from want and fear, enables not only to expand the scope of health problems that can be discussed but also to propose the procedures to achieve health publicness. More specifically, it consists of substantive and procedural health publicness. The former is about 'health security'-protecting, maintaining, and promoting individual's health-whereas, the latter is about 'social dialogue' guaranteeing participation of citizens, government, employers, and worker representatives. In conclusion, this study proposes the 'Regional Healthcare Quadripartite' as the incarnation of health publicness involving a variety of actors within and across the healthcare system.

A Critical Analysis of the Perspectives on Health Care Reform in Korea (의료개혁 논의의 비교분석)

  • 조병희
    • Korean Journal of Health Education and Promotion
    • /
    • v.15 no.2
    • /
    • pp.217-233
    • /
    • 1998
  • This paper analyzed four different perspectives on health care reform in Korea in terms of the basic values, formulated problems and reform plans, implementation methods, and supporting groups. The medical security plan was insisted by social security specialists and social activists focusing on the integration of medical insurance coops in order to enhancing equity and right of the people. However, its perspective was limited to promoting security instead of reforming health care system. The government proposed the health care reform plans in 1994 and in 1997, focusing on promoting efficiency by remedying many problems in health care delivery system. However, its implementation was not successful due to the lack of organizational and financial supporters. Recently, two opposite proposals were issued. The market reform plan paid attention to revitalizing the market function to promoting efficiency by allowing hospitals to treat private patients instead of applying the medical insurance regulation. The government reform plan focused on intensifying governmental planning and intervention in the health care sector in order to removing inefficiency and promoting equity with the supports of social activists and labor unions. Finally, this paper proposed an alternative plan to promote harmonious social relationship between actors in the health care system.

  • PDF

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.