期刊文献+

南京军区“医云工程”建设中的风险分析与管控 被引量:1

Risk Analysis and Control in the Construction of Medical Cloud Project in Nanjing Military Region
下载PDF
导出
摘要 目的:通过分析"医云工程"在军区医院整体发展、数据安全、医疗行为和日常运维中的风险因素,提出相应措施和解决办法,降低工程建设中的安全风险。方法:结合军区医院信息化建设实际,充分分析"医云工程"建设特点和实施方法,研究云计算技术的应用可能给军区医院在信息管理、医疗行为等方面带来的影响。结果:应用云计算在增强医院信息化建设能力的同时,应采取适当措施降低军区医院在整体发展、数据安全、医疗行为和日常运维中的风险。结论:通过采取加大统筹力度、突出数据安全、建立应急机制、强化技术保障等方法举措,能够减少风险,提高并优化军区医院基于云计算的医疗信息服务保障能力。 Objective: Through the analysis of the risk factors in overall development, data safety, medical behavior and daily operation of Medical Cloud Project in military hospital, the corresponding measures and solutions are proposed to reduce the safety risks in the project construction. Method: Combining the actual situation of information construction of the military hospital, the construction characteristics and implement method of Medical Cloud Project are fillly analyzed. The possible impact of the application of cloud computing technology on information management, medical behavior and other aspects in military hospital is studied. Results: While cloud computing is used to improve the hospital' s ability of information construction, appropriate measures shall be taken to reduce the risks of the military hospital in overall development, data safety, the medical behavior and daily operation. Conclusion: By strengthening overall planning, highlighting data safety, establishing emergency mechanism, strengthening methods of technical guarantee and using other methods, risks can be reduced, and the military hospital' s medical information service guarantee ability based on cloud computing can be improved and optimized.
出处 《中国数字医学》 2013年第8期5-7,共3页 China Digital Medicine
基金 南京军区卫勤专项课题-基于云计算的医院信息技术平台的构建与研究(编号:12WQZ04)~~
关键词 医云工程 云计算 风险分析 管控 medical cloud project, cloud computing, risk analysis, control
  • 相关文献

参考文献6

二级参考文献30

  • 1刘继承.企业信息系统与服务外包风险管理研究[J].情报理论与实践,2005,28(2):180-183. 被引量:29
  • 2Guidelines on Security and Privacy in Public Cloud Computing[R], NIST SP 800-114,2011. 被引量:1
  • 3张健.全球云计算安全研究综述[J].电信网络技术,2010,(09):15. 被引量:1
  • 4Ramgovind S. The management of security in cloud computing[C]. Information Security for South Africa,IEEE, 2010. 1-7. 被引量:1
  • 5Enisa, Benefits. Risks and recommendations for information security[EB/OL], http://www.enisa.europa.eu/activities/risk management/files/deliverables/cloud-computing-risk-assessment/, 2009-11-20/2012-07-12. 被引量:1
  • 6Grobauer,B. Understanding cloud computing vulnerabilities[C].lEEE, 2011.50-57,. 被引量:1
  • 7Shigeak TANIMOTO. Risk Management on the Security Problem in Cloud Computing[C]. Computers Networks Systems and Industrial Engineering (CNSI) First ACIS/JNU International Conference,lEEE, 2011. 147-152. 被引量:1
  • 8Cloud Security Alliance Working Group. Top Threats to Cloud Computing V1.0[R]. [s.1.]: Cloud Security Alliance, 2010. 被引量:1
  • 9LOH,LAWP.ENCE, VENKATRAMAN N, Diffusion of information technology outsourcing: influence sources and the kodak effect[J].nformation Systems Research,1992,3(4): 334-358,25. 被引量:1
  • 10常政大风起兮云飞扬一记2011年的中国云计算[J].程序员,2011(5):48-52. 被引量:1

共引文献49

同被引文献18

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部