An Investigation on the Current Status of Implementation Information Security Management System of Health Unit

碩士 === 嘉南藥理科技大學 === 醫療資訊管理研究所 === 97 === Now away, it is a society of information technology and it can quickly access a number of related messages and information through the information system. It can also quickly issue a number of commands. Due to a result of the circulation of open information...

Full description

Bibliographic Details
Main Authors: Jyun-Rong Shih, 石俊榮
Other Authors: Hung-Hsiou Hsu
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/qs6m7k
Description
Summary:碩士 === 嘉南藥理科技大學 === 醫療資訊管理研究所 === 97 === Now away, it is a society of information technology and it can quickly access a number of related messages and information through the information system. It can also quickly issue a number of commands. Due to a result of the circulation of open information systems and making information systems, information system becomes a useful tool but dangerous. Through the information system, the user can get a lot of information and in other interested people through proper and improper means to obtain the same information he wanted. How to do a good job in IT security is a very important issue and must be. In this study, the research object investigates and understands the difference of health units dealing the information security management system. It will explore the military units and public and private hospitals among the information security differences, different units of information in the information differences in the way security issues to deal with. The related personnel information systems knows the improvement for better information security, the control units can account information security in other ways to dispose of the same information security and information systems will be a future reference for innovation. In this study, a questionnaire survey among the various health units for investigating the requirement of information security management system. It also determines other related applications and explores a future research direction. Throughout this study, all users will achieve information system security for more comprehensive goal and the information systems can be expected to play an important effect.