4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Network Security Problems and Countermeasures of Hospital Information System after Going to the Cloud

      research-article
      Computational and Mathematical Methods in Medicine
      Hindawi

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In the current social context, information technology, network technology, and cloud computing have been widely used in all walks of life. The analysis of the specific application results of progressive technology shows that the use of technology has changed the working state of various industries and improved the work efficiency and quality of the industry. It should be noted that although the application of some technologies will bring many positive belongings, the potential risks brought by them cannot be ignored. As far as the hospital is concerned, the information system using cloud computing technology can make better use of the hospital's information data, but after the information system is on the cloud, new problems will appear in network security, resulting in the leakage of hospital patient information or research information. Based on this, in practice, it is necessary to analyze the network security problems after the hospital information system goes to the cloud and build and implement the corresponding strategies. The author analyzes and discusses the corresponding contents through work practice and combined with previous articles, in order to provide guidance and help for peers.

          Related collections

          Most cited references18

          • Record: found
          • Abstract: not found
          • Article: not found

          Sustainable development problems and countermeasures: A case study of the Qinghai-Tibet Plateau

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Disinfection Technology for Auricularia auricula in Bag Cultivation: Problems and Countermeasures

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Discussion on computer network security and preventive countermeasures in the era of big data

                Bookmark

                Author and article information

                Contributors
                Journal
                Comput Math Methods Med
                Comput Math Methods Med
                cmmm
                Computational and Mathematical Methods in Medicine
                Hindawi
                1748-670X
                1748-6718
                2022
                18 July 2022
                : 2022
                : 9725741
                Affiliations
                Information Department, Pingdu People's Hospital, No. 112, Yangzhou Road, Pingdu, Shandong 266700, China
                Author notes

                Academic Editor: Naeem Jan

                Author information
                https://orcid.org/0000-0003-4907-8282
                Article
                10.1155/2022/9725741
                9313935
                35898480
                dee5f75c-e83c-4710-bdd0-0cc9f1011a97
                Copyright © 2022 Shuming Gao.

                This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

                History
                : 31 May 2022
                : 22 June 2022
                : 25 June 2022
                Categories
                Research Article

                Applied mathematics
                Applied mathematics

                Comments

                Comment on this article