1.The safety situation of the digital hospital and its countermeasures.
Min WANG ; Yi GE ; Hou-bing DENG ; Xiang-jun LI
Chinese Journal of Medical Instrumentation 2006;30(3):213-214
This article introduces briefly the content of the disaster backup technology which should be attached same great importance to, as the construction and application of a information system.
Automatic Data Processing
;
instrumentation
;
Computer Security
;
Hospital Information Systems
;
organization & administration
;
Humans
;
Risk Adjustment
;
methods
;
Security Measures
;
Software
2.A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea.
Soon CHOY ; Hyeong Sik SHIN ; Inyoung CHOI ; Sukil KIM
Journal of Preventive Medicine and Public Health 2007;40(1):64-70
OBJECTIVES: This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. METHODS: The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. RESULTS: Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for 4~7 years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. CONCLUSIONS: Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.
Security Measures
;
Outsourced Services/economics/*utilization
;
Maintenance
;
Logistic Models
;
Korea
;
Hospital Information Systems/*organization & administration
;
Health Services Research
;
Decision Making, Organizational
;
Consumer Satisfaction
;
Computer Security
3.Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Kiho YEO ; Keehyuck LEE ; Jong Min KIM ; Tae Hun KIM ; Yong Hoon CHOI ; Woo Jin JEONG ; Hee HWANG ; Rong Min BAEK ; Sooyoung YOO
Healthcare Informatics Research 2012;18(2):125-135
OBJECTIVES: The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. METHODS: The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. RESULTS: From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. CONCLUSIONS: This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
Compliance
;
Electronic Health Records
;
Humans
;
Intelligence
;
Jurisprudence
;
Security Measures
4.Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Kiho YEO ; Keehyuck LEE ; Jong Min KIM ; Tae Hun KIM ; Yong Hoon CHOI ; Woo Jin JEONG ; Hee HWANG ; Rong Min BAEK ; Sooyoung YOO
Healthcare Informatics Research 2012;18(2):125-135
OBJECTIVES: The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. METHODS: The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. RESULTS: From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. CONCLUSIONS: This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
Compliance
;
Electronic Health Records
;
Humans
;
Intelligence
;
Jurisprudence
;
Security Measures
6.Establishing the legal framework of telehealth in the Philippines.
Patdu Ivy D. ; Tenorio Allan S.
Acta Medica Philippina 2016;50(4):237-246
The National Telehealth Service Program aims to address the inequity in health, and to utilize the advancements in information and communication technology to improve health outcomes in the country, primarily through telemedicine. There are no laws that directly govern the practice of telemedicine but the implementation of the National Telehealth Service Program has legal implications. The Round Table discussions were effective in identifying key issues such as the nature of the practice of telemedicine, liability issues for stakeholders, and the privacy concerns in Telehealth. Based on an analysis of these issues in the context of relevant laws and jurisprudence, it is established that those who practice telemedicine will have a duty to exercise diligence in managing patients or providing specialty advice. The standard of care for physicians practicing telemedicine should take into consideration the limitations of technology and the inherent differences between telemedicine and face-to- face doctor-patient consultations.
The National Telehealth Center has a responsibility to put in place internal policies and procedures that would improve the delivery of health services through telemedicine while safeguarding the patient's right to privacy. Current laws, particularly the Data Privacy Act of 2012, puts emphasis on obtaining patient's consent and requires putting in place organizational, physical and technical security measures in the collection and processing of personal and sensitive information.
Human ; Standard Of Care ; Telemedicine ; Physician-patient Relations ; Physicians ; Security Measures
8.Frequency of Burns by Body Parts of Firefighters and Hospitalization Rate according to the Type of Protective Clothing.
Jin Keun HA ; Gu Hyun KANG ; Hyun Young CHOI ; Yong Soo JANG ; Wonhee KIM ; Jae Guk KIM ; Dae Chan KIM ; Minji KIM ; Ki Cheol YOU ; Dohern KIM ; Haejun YIM
Journal of Korean Burn Society 2017;20(1):16-20
PURPOSE: Fire suits are very important protective equipment for firefighters. In fire scene, radiant heat and warmed water invade into conventional protective clothing gap. The safety of firefighters has long been a hot topic in Korea. Nevertheless, there are still lack of researches and investigations for safety of firefighters. We revealed the characteristics of the burn site and the hospitalization of injured firefighters according to the wearing of the conventional and special protective clothing. METHODS: This study analyzed the data obtained from the online survey (ko.surveymonkey.com) from September 19, 2016 to October 21, 2016 for nationwide firefighters who are cooperating with the National Security Agency. 4,891 firefighters responded to the questionnaire and 424 burn victims were reported. The analysis was conducted with 322 except 102 incomplete responders. The obtained data was analyzed with Chi-square test (P<0.05). RESULTS: The most common site of burn injury during firefighting was hand 166 (51.6%) followed by face 79 (24.5%), neck 55 (17.1%) and wrist 49 (15.2%). The number of people wearing conventional protective clothing was 81 (25.2%) and the number of people wearing special protective clothing was 20 (6.2%). The number of people wearing protective gloves was 247 (76.7%). In terms of protective clothing in injured firefighters, special protective clothing showed lower hospitalization rate comparing with conventional protective clothing (24.7% vs. 5.0%, P<0.05). CONCLUSION: The most common site of burn injury in Firefighters is hand. The special protective clothing showed lower hospitalization rate comparing with conventional protective clothing.
Burns*
;
Firefighters*
;
Fires
;
Gloves, Protective
;
Hand
;
Hospitalization*
;
Hot Temperature
;
Human Body*
;
Humans
;
Korea
;
Neck
;
Protective Clothing*
;
Security Measures
;
Water
;
Wrist
9.The Need for an Implant Identification Card at Airport Security Check.
Erden ALI ; Dennis KOSUGE ; Andrew MACDOWELL
Clinics in Orthopedic Surgery 2017;9(2):153-159
BACKGROUND: Joint replacement surgery is having an increasing demand as national healthcare systems confront an ever ageing population. Surgical complications associated with lower limb arthroplasty are well known but less investigation has been performed examining its effect on air travel, more specifically, unwanted and significant inconvenience caused to travelers going through airport security. METHODS: In lower limb arthroplasty clinics, 50 patients who met our selection criteria were given questionnaires. Ten airport security officers from 4 international airports (London Stansted, London Gatwick, London Heathrow, and Amsterdam Schiphol International Airport) were also given a separate questionnaire. The opinion of the Civil Aviation Authority was also sought. RESULTS: All 50 patients (mean age, 70.4 years; range, 55 to 84 years) who were presenting in lower limb arthroplasty clinics and who met our selection criteria volunteered to enter the study. Twenty-eight of these patients were female (mean age, 69.1 years; range, 55 to 84 years) and 22 were male (mean age, 71.2 years; range, 58 to 81 years). Of the patients, 14% stated that their joint replacements did not set off the airport security alarm. Responses were received from 10 airport security officers as well. Six airport security officers were male and 4 were female. All of the airport officers were aware of some form of implant identification card with 90% stating that these were useful to them at airport security. Eight-four percent of the patients stated that an implant identification card outlining what joint replacement they possessed and when this had been done would be very useful. Sixteen percent of the patients did not think a card would be beneficial since all of them had set off the airport alarm system only once or less in their lifetime. CONCLUSIONS: It is the opinion of airport security officers and patients that joint replacement implant identification cards streamline airport security checks and decrease the need for more invasive searches at airport security.
Airports*
;
Arthroplasty
;
Arthroplasty, Replacement, Knee
;
Aviation
;
Delivery of Health Care
;
Female
;
Humans
;
Joints
;
Lower Extremity
;
Male
;
Patient Selection
;
Security Measures
10.Injury Prevention, Disaster and Public Health Preparedness and Response
Health Policy and Management 2018;28(3):308-314
Injury is a serious problem that not only causes death but also significantly degrades the quality of life of the people and causes loss of socioeconomic opportunities and costs. Damage occurs as a result of an accident. Among them, natural disasters and artificial disasters take lives of many people in a short time and threaten their physical and mental health. The United States has responded to the disaster by establishing relevant laws and regulations and a response system with the recognition that health is recognised soon to be as national security in the wake of the 9/11 terrorist attacks and the Katrina disaster. It is necessary to build a knowledge infrastructure to train disaster response experts in public health area and to have health competence to cope with disasters.
Bioterrorism
;
Disasters
;
Jurisprudence
;
Mental Competency
;
Mental Health
;
Public Health
;
Quality of Life
;
Security Measures
;
Social Control, Formal
;
United States