Abstract
Accelerate the construction of smart hospitals and the standardization of hospital information by accelerating the “trinity” of electronic medical records, smart services, and smart management. Mainly use the self-developed mobile terminal platform to study the transformation of mobile applications such as hospital medical management, reporting and review, and epidemic reporting. Taking the Second People's Hospital of Changshu City as an example, in combination with the actual clinical business environment, combined with the security boundary of data exchange, the important clinical application and medical management of the hospital are completed within the theoretically divided area using data transmission technology that meets safety standards The effective data is centralized, so as to establish a customized standard software application system. Through the management method of safe aggregation, the research on the integration and integration of all mobile systems in the hospital will provide the basis for the development and application of intelligent hospitals. The self-developed mobile platform has added security management and monitoring functions to create a scalable, high-efficiency and high-security network service platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Marchenko, R., Borremans, A.: Smart hospital medical equipment: integration into the enterprise architecture. In: Digitalization of Society, Economics and Management: A Digital Strategy Based on Post-pandemic Developments. Lecture Notes in Information Systems and Organisation, vol. 53, pp. 69–84 (2022)
Levina, A., Iliashenko, V.M., Kalyazina, S., Overes, E.: Smart hospital architecture: IT and digital aspects. In: ASBC 2021. LNNS, vol. 387, pp. 235–247. Springer, Cham (2022)
Gourisaria, M.K., Agrawal, R., Singh, V., Rautaray, S.S., Pandey, M.: AI and IoT enabled smart hospital management systems. Stud. Big Data 114, 77–106 (2022)
Wijethilaka, S., Porambage, P., De Alwis, C., Liyanage, M.: A comprehensive analysis on network slicing for smart hospital applications. In: IEEE Consumer Communications and Networking Conference, CCNC, pp. 276–279 (2022)
Alsbou, N., Price, D., Ali, I.: IoT-based smart hospital using cisco packet tracer analysis. In: IEMTRONICS 2022, 2022 IEEE International IOT, Electronics and Mechatronics Conference
Wijethilaka, S., Porambage, P., De alwis, C., Liyanage, M.: A comprehensive analysis on network slicing for smart hospital applications. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 276–279 (2021)
Kumar, A., Dhanagopal, R., Albreem, M.A., Le, D.-N.: A comprehensive study on the role of advanced technologies in 5G based smart hospital. Alexandria Eng. J. 60(6), 5527–5536 (2021)
Omarov, B., et al.: Smart hospital: automation of business processes in medical centers. In: ICCIKE 2021, pp. 106–111 (2021)
Chuma, K.G., Ngoepe, M.: Security of electronic personal health information in a public hospital in South Africa. Inf. Secur. J. Glob. Perspect. 31(2), 179–195 (2022)
Kardaras, K., Lambrou, G.I., Koutsouris, D.: Security methods and approaches for internal and external network hospital information systems with single sign-on. Int. J. Electron. Secur. Digit. Forens. 11(4), 434–446 (2019)
Avianto, H., Ogi, D.: Design of electronic medical record security policy in hospital management information system (SIMRS) in XYZ Hospital. In: ICAITI 2019, pp. 163–167 (2019)
Pereira, B., Pavão, J., Carreira, D., Costa, V., Rocha, N.P.: A security review of a portuguese hospital using the cyber security framework: a case study. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 367–378. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93677-8_32
Brodin, M., Rose, J.: Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach. Int. J. Mob. Commun. 18(5), 598–618 (2020)
Zhang, X., He, Y.: Information security management based on risk assessment and analysis. In: 2020 7th International Conference on Information Science and Control Engineering (ICISCE), pp. 749–752 (2020)
Tariq, M.I., et al.: Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 20(5), 1310 (2020). (36 pp.)
Awang, N., et al.: Identification of information security threats using data mining approach in campus network. In: Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future (PACIS 2020) (2020)
Hina, S., Dominic, P., Durai, D.: Information security policies’ compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201–211 (2020)
Wang, Y.: Network information security risk assessment based on artificial intelligence. J. Phys. Conf. Ser. 1648, 042109 (2020). (8 pp.)
Wang, C., Jin, X.: The researches on public service information security in the context of big data. In: ISBDAI 2020, pp. 86–92 (2020)
Kang, M., Hovav, A.: Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Inf. Syst. Front. 22(1), 221–242 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, Y., Fang, W., Chen, L., Zhu, W. (2024). Research on the Construction and Application of Smart Hospital Based on Mobile Terminal Security Aggregation Business Management Platform. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-50571-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-50571-3_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50570-6
Online ISBN: 978-3-031-50571-3
eBook Packages: Computer ScienceComputer Science (R0)