An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment
With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.
Barrow, R. C., “Privacy, Confidentiality, and Electronic Medical Record,” Journal of the American Medical Informatics Association, Vol. 3, No. 2, pp. 139-148, 1996.
Cao, F., Huang, H. K., and Zhou, X. Q., “Medical Image Security in a HIPAA Mandated PACS Environment,” Computerized Medical Imaging and Graphics, Vol. 27, No. 2, pp. 185-196, 2003.
“Cyber Security Guide for Smart Medical Service,” Korea Internet & Security Agency, 2018.
Glemm, A. L., Scott, R., Robert, M. S., and Nitesh, R. T., “If Electronic Medical Records are so Great, Why aren’t Family Physicians Using Them?,” Journal of Family Practice, Vol. 51, No. 7, 2002.
Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K., “They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices,” ACM SIGCOMM Computer Communication Review, Vol. 41, No. 4, pp. 2-13. 2011.
Halperin, D., Thomas, S. H., Fu, K., Tadayoshi, K., and Maisel, W. H., “Security and Privacy for Implantable Medical Devices,” The Community for Technology Leaders, Vol. l7, No. 1, 2008.
Jung, Y. S., “Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service,” Korea Society of Industrial Information Systems, Vol. 15, No. 2, pp. 115-126, 2010.
Kim, D. W. and Han, K. H., “Recent Research Trends for Responding to Security Threats in Smart Healthcare Environment,” Information & Communications Magazine, Vol. 35, No. 2, pp. 95-99, 2018.
Kim, Y. H. and Chang, H. B., “The Change of Future Environment and The Task of Healthcare Security,” OSIA S&TR Journal, Vol. 31, No. 2, pp. 4-9, 2018.
Koo, C. C., Shyy, Y. M., iMedica Corp., “Medical Records Data Security System,” U.S. Patent 6,874,085, 2005.
Kumar, P. and Lee, H. J., “Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey,” Sensors, Vol. 12, No. 1, pp. 55-91, 2012.
Lee, Y. H. and Jung, C. S., “Design of Privilege Authentication for Secure OS based on PKI,” Korea Institute of Information Scientists and Engineers, Vol. 34, No. 1, 2007.
Oh, K. Y., “The Point of Issue and Blind on a Debate Concerning De-identification of Data,” Korean Public Law Association, Vol. 45, No. 2, 2016.
Park, S. H., Kim, Y. H., Park, G. M., Na, O. C., and Chang, H. B., “Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment,” Sustainability, Vol. 10, No. 4, pp. 1-24, 2018.
Williams, P., “A Practical Application of CMM to Medical Security Capability,” Information Management & Computer Security, Vol. 16, No. 1, pp. 58-73, 2008.
Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., “Taiwan’s Perspective on Electronic Medical Records’ Security and Privacy Protection: Lessons Learned from HIPAA,” Computer Methods and Programs in Biomedicine, Vol. 82, No. 3, pp. 277-282, 2006.
Lee, K. K., Jung, Y. S., and Han, C. H., “A Study on Consumer’s Acceptance of Medical Internet Marketing According to Medical Departments,” The Journal of Society for e-Business Studies, Vol. 14, No. 1, pp. 121-142, 2009.
Kim, J. W. and Chang, H., “A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions,” The Journal of Society for e-Business Studies, Vol. 23, No. 1, pp. 89-102, 2018.
- There are currently no refbacks.