• Title/Summary/Keyword: secure medical information management

Search Result 46, Processing Time 0.032 seconds

A Study on Revitalization of Dental Medical Tourism in Korea

  • Kim, Hyo-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.249-253
    • /
    • 2020
  • Medical tourism refers to visiting overseas to receive medical services and tourism at the same time. In other words, it can be said that it is a tourism activity that combines medical service, various cultural activities, leisure, and shopping. As such, medical tourism is not limited to simple medical services, but is a new high-value-added industry that creates new profits by fusion with tourism services. Many countries are making continuous efforts to foster their own tourism industry by attracting foreign tourists. Therefore, in order to secure competitiveness in dental services among the medical tourism industry in Korea, this study was to examine the relationship between dentist's treatment, hospital facilities, dental staff, and patient satisfaction. As a result, it was found that the dentist's treatment had a positive effect on both the staff of the dental facility in the hospital and the satisfaction of the patient.

Development of Guideline on Electronic Signatures for Electronic Medical Record (전자의무기록에 대한 공인전자서명 적용 지침 개발)

  • Park Jeong-Seon;Shin Yong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.120-128
    • /
    • 2005
  • One of the most secure ways of maintaining the confidentiality and integrity of electronic information is to use electronic signatures. So, in this paper, we developed guideline on electronic signatures for EMR(electronic medical record) based on the Medical Law and the Electronic Signature Act. This guideline is intended to introduce EMR easily in the medical field and to facilitate the promotion of EMR. We developed it through consulting from the advisory committee that was made up of experts in the fields of medical record, EMR system and electronic signatures. The contents of the guideline consist of subject and time stamp of electronic signatures, validity of a certificate, management of electronic signatures and custody and management of EMR. In the future, we will develop practical cases and promote educations and publicities of them to use in the medical institutes and EMR system related industries.

  • PDF

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

A Study on The Improved Selection Method of Information Security Management System(ISMS) Certification Object Applying SMART Technic (SMART 평가법을 활용한 정보보호 관리체계(ISMS) 인증 의무대상자 선정 기준 개선 방안에 관한 연구)

  • Jang, Sang Soo
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.85-94
    • /
    • 2014
  • Information Security Check System was Introduced in 2004, higher than in 2013, the effectiveness of Information Security Management System(ISMS) certification scheme was to unification. This is incident to the Internet affecting people's lives telecommunications service provider to target accountability because, considering the subject's duty selection criteria need to be clarified. however, Obligations under the current legislation, subject selection criteria applying the law itself is ambiguous, the result being a significant problem. Moreover, the regulatory system of certification systems subjects, although selection criteria should be clear and objectively not the obligation not to distrust the system itself and the subject was raised many issues for you. In this study, with SMART Technic in order to improve this certification you can easily determine whether a medical person authorized to develop a model for selection of medical subjects, The developed model is verified through empirical ways to improve the system by presenting the system to help, to secure the effectiveness.

A Study on Contents in China Statistical Yearbook of Chinese Medicine (전국중의약통계적편(全國中醫葯統計摘編)의 구성내용에 관한 연구)

  • Bae, Sun-Hee;Han, Jeong-Min;Kim, Jin-Hyun;Jang, Hyun-Chul;Kim, Chul;Yea, Sang-Jun;Kim, Sang-Kyun;Song, Mi-Young
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.93-108
    • /
    • 2009
  • In order to achieve the growth of traditional Chinese medicine, the chinese government has annually released "China Statistical Yearbook of Chinese Medicine" to the world since "State Administration of Traditional Chinese Medicine of the People's Republic of China" established in 1988. It is believed that the chinese government intends to secure the early dominance of the global medical market by systematic management of its own medicine infrastructures. Although the statistics of "China Statistical Yearbook of Chinese Medicine" weren't systematically organized at the beginning, it has becoming richer, more systematic, and more standardized in the data construction and system as time has passed. Furthermore, we can take a look at China's effort to take the initiative of oriental medicine by expanding investment in several core areas - medicine resources, operation of medical instruments, service, medicine education, medicine science research, and working expenses. This article will show how china has been trying to develop the chinese medicine, focusing on two parts. One is specific analysis of the book "China Statistical Yearbook of Chinese Medicine". It is divided into analysis of its construction system, the degree of data construction, and its statistical system. The other is analysis of annual changes in areas of medicine resources, operation of medical instruments, service, medicine education, medicine science research, and working expenses.

Interoperability Framework between GRID and PACS based on Web Services (웹서비스 기반의 Grid-PACS 상호운용성 프레임워크)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1799-1808
    • /
    • 2010
  • Recently the increasing collaborative research requires the remote medical and clinical data sharing and access of external institutions. In this paper, an interoperability framework between Grid and PACS using Web services is proposed and implemented in order to provide flexible and efficient medical data management. The Digital Imaging and Communications in Medicine(DICOM) standard defines medical image data exchange and transfer between PACSs and image databases. However, medical data exchange between hospitals is limited within the trusted and static environments. Moreover, DICOM does not provide medical data management and the Grid middleware does not include standard toolkit to access DICOM data. To address this issue, a Web services-based Grid Service Mediator (WGSM) which provides PACS integration and medical image data management is developed. The WGSM consists of several service mediators such as compress mediator, GridFTP mediator, RFT mediator, MyProxy mediator, MDS mediator, and RLS mediator and others. The proposed Web services-based framework provides user authentication and secure data access between PACSs in collaborative environments. In particular, the WGSM allows ordinary users to access remote PACS data in a simple and efficient manner without any the knowledge about underlying Grid middleware.

Mapping Tool for Semantic Interoperability of Clinical Terms (임상용어의 의미적 상호운영성을 위한 매핑 도구)

  • Lee, In-Keun;Hong, Sung-Jung;Cho, Hune;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.167-173
    • /
    • 2011
  • Most of the terminologies used in medical domain is not intended to be applied directly in clinical setting but is developed to integrate the terms by defining the reference terminology or concept relations between the terms. Therefore, it is needed to develop the subsets of the terminology which classify categories properly for the purpose of use and extract and organize terms with high utility based on the classified categories in order to utilize the clinical terms conveniently as well as efficiently. Moreover, it is also necessary to develop and upgrade the terminology constantly to meet user's new demand by changing or correcting the system. This study has developed a mapping tool that allows accurate expression and interpretation of clinical terms used for medical records in electronic medical records system and can furthermore secure semantic interoperability among the terms used in the medical information model and generate common terms as well. The system is designed to execute both 1:1 and N:M mapping between the concepts of terms at a time and search for and compare various terms at a time, too. Also, in order to enhance work consistency and work reliability between the task performers, it allows work in parallel and the observation of work processes. Since it is developed with Java, it adds new terms in the form of plug-in to be used. It also reinforce database access security with Remote Method Invocation (RMI). This research still has tasks to be done such as complementing and refining and also establishing management procedures for registered data. However, it will be effectively used to reduce the time and expenses to generate terms in each of the medical institutions and improve the quality of medicine by providing consistent concepts and representative terms for the terminologies used for medical records and inducing proper selection of the terms according to their meaning.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.