Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 13 de 13
Filter
Add filters








Year range
1.
Chinese Journal of Hospital Administration ; (12): 730-733, 2021.
Article in Chinese | WPRIM | ID: wpr-912837

ABSTRACT

Under the guidance of national policies on Internet medical services, the scope of medical information services provided by the hospital information system is growing all the way, the interaction with external information is more and more frequent, and the network security risk is higher and higher. The authors analyzed the business types of the hospital′s external information service, the way to connect with the external network and the existing network security problems.Following the principles of information system security level protection 2.0, the authors built a unified extranet secure channel for the hospital under the principles of top-level design, formed an all-round network security protective barrier with strict management measures and technical means, then ensured the stable operation of hospital information system and data security.

2.
Chinese Medical Equipment Journal ; (6): 77-78,82, 2017.
Article in Chinese | WPRIM | ID: wpr-617183

ABSTRACT

Objective To study transaction log and apply its analysis to hospital information security to prevent data loss and treat abnormal data.Methods The application of transaction log was described in log backup and database recovery,and the optration of log analysis was explored in HIS.Sqlplus and Ftp tools in Oracle were used to analyze the transaction log.Results The tracking and analysis of the log files contributed to making clear the incident,finding program bug,getting back lost data.Conclusion Log backup,database recovery and log analysis were of great importance for hospital information security,and log analysis has to be emphasized on in the future.

3.
Journal of Medical Informatics ; (12): 40-43, 2017.
Article in Chinese | WPRIM | ID: wpr-616768

ABSTRACT

On the basis of summarizing the general situation of current internal and external network construction of hospitals,the paper introduces the main hidden dangers of hospital network security,puts forward internal and external network security management measures,and elaborates the internal and external network security construction principle,network topology structure,and network construction achievements of the First Affiliated Hospital of Guangxi Medical University.

4.
Chinese Journal of Medical Library and Information Science ; (12): 50-52,74, 2017.
Article in Chinese | WPRIM | ID: wpr-663985

ABSTRACT

The desktop terminal management system, imported based on the security of intranet terminal in hospi-tals can effectively solve the security threat and the terminal delay due to undue operation, improve the security and stability of hospital information system, and reduce the work load of its maintenance staff.

5.
Chinese Medical Ethics ; (6): 281-283, 2014.
Article in Chinese | WPRIM | ID: wpr-448280

ABSTRACT

Objective:To investigate the current situation of network ethics among the college students , to pro-vide evidence for cultivating correct network ethics .Methods:A survey was conducted in 1200 students with a self-designed questionnaire .Results:College students in the network ethics exist conflicts .They eager to trust but face a crisis of confidence , tool enhancements but responsibility fall , network security but network open , virtual but reality.Conclusion:The government should strengthen the network legislation and network credit system , should increase the development of network security technology so as to build networks ethical norms .Colleges should pay attention to culture the social responsibility , and promote the quality level of network ethics among the college students .

6.
Chinese Medical Equipment Journal ; (6)2004.
Article in Chinese | WPRIM | ID: wpr-595826

ABSTRACT

Objective To discover and troubleshoot before user's appeal so as to keep the hospital daily work in order. Methods Through the use of network management software,unified monitoring and management were achieved. Results After many years of practice in information technology,a set of network safety plan was carried out from the system architecture design,implementation and network management. With desirable effect,we keep ahead in this field. Conclusion It is of vital importance to design and carry out effective management based on the practical running of HIS.

7.
Chinese Medical Equipment Journal ; (6)2004.
Article in Chinese | WPRIM | ID: wpr-586945

ABSTRACT

Throughputs of 802.11g wireless LAN in different distances and different modes were measured,as well as the real throughputs of medical images using PACS software.Main problems and the promising future of using 802.11g wireless LAN in PACS are discussed.

8.
Chinese Medical Equipment Journal ; (6)2003.
Article in Chinese | WPRIM | ID: wpr-587790

ABSTRACT

With the development of network and information in hospital,the issue of security has been raised and got more and more important.This article describes the factors that might threaten the network and information security,such as the reliability of network equipments,computer viruses,invalid intrusion,the security of inner-network,the thunder,users' actions and so on.Then some solutions to the problems are proposed.This could be an instruction to design or update the hospital's network and information system.

9.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-594966

ABSTRACT

Objective To analyze and deploy in the hospital network security for guarantee hospital network and information of safety, and ensure stability operation in the hospital management information system. Methods The network environment was based on the original hospital, which was added to measures about the isolation for network security, the prevention of computer viruses and firewall, data backup and recovery, physical safety management and so on. Results After the comparatively perfect measure of network security was deployed, the security of hospital information and data was effectively protected, and the security threat was solved from the inner and outer network. Conclusion The deployment of network security prevention system can better give fully play to important function on which management information system can efficiently operate in whole hospital.

10.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-594687

ABSTRACT

Internet not only substantially improve the efficiency of work, but also realize the sharing of information resources to the broadest extend. At present, China has the world's largest number of Internet users and the large basis network, a very serious problem is that Internet security issues. The issue of the status on network security of domestic and abroad is discussed and the related recommendations of internet security are putted forward.

11.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-586522

ABSTRACT

With the rapid development of computer technology and informatization of the society,hospital network security and reliability becomes more and more important.According to HIS maintenance in our hospital,this paper discusses security measures in hospital from such aspects as system security,data security,network security,and security management.

12.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-583786

ABSTRACT

Functional requirement of LIS analyzed, this paper discusses the application of web technology to it. The choice of application server and security control and management are emphasized on, and then corresponding solutions are provided.

13.
Chinese Medical Equipment Journal ; (6)1989.
Article in Chinese | WPRIM | ID: wpr-593853

ABSTRACT

Objective To design a set of feasible program of data monitor based on the database's security of the "No.1 Military Medical Project" in many years of running successful operation to enhance safety audit of database.Methods The system was consisted with date's collection of active and passive for safety information,preservation of backup data,and analysis of credibility dictionaries and auditing.Results The complete processing program of network security monitor which could form alarm message and advance corresponding disposal plans was came into being and its better reliability.Conclusion By using the way,the question of the "No.1 Military Medical Project" in database monitoring is solved in network environment and ensured safe operation of database,the network security of the "No.1 Military Medical Project" system is promoted.

SELECTION OF CITATIONS
SEARCH DETAIL