Skip to main content

Research on the Construction and Application of Smart Hospital Based on Mobile Terminal Security Aggregation Business Management Platform

  • Conference paper
  • First Online:
Multimedia Technology and Enhanced Learning (ICMTEL 2023)

Abstract

Accelerate the construction of smart hospitals and the standardization of hospital information by accelerating the “trinity” of electronic medical records, smart services, and smart management. Mainly use the self-developed mobile terminal platform to study the transformation of mobile applications such as hospital medical management, reporting and review, and epidemic reporting. Taking the Second People's Hospital of Changshu City as an example, in combination with the actual clinical business environment, combined with the security boundary of data exchange, the important clinical application and medical management of the hospital are completed within the theoretically divided area using data transmission technology that meets safety standards The effective data is centralized, so as to establish a customized standard software application system. Through the management method of safe aggregation, the research on the integration and integration of all mobile systems in the hospital will provide the basis for the development and application of intelligent hospitals. The self-developed mobile platform has added security management and monitoring functions to create a scalable, high-efficiency and high-security network service platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Marchenko, R., Borremans, A.: Smart hospital medical equipment: integration into the enterprise architecture. In: Digitalization of Society, Economics and Management: A Digital Strategy Based on Post-pandemic Developments. Lecture Notes in Information Systems and Organisation, vol. 53, pp. 69–84 (2022)

    Google Scholar 

  2. Levina, A., Iliashenko, V.M., Kalyazina, S., Overes, E.: Smart hospital architecture: IT and digital aspects. In: ASBC 2021. LNNS, vol. 387, pp. 235–247. Springer, Cham (2022)

    Google Scholar 

  3. Gourisaria, M.K., Agrawal, R., Singh, V., Rautaray, S.S., Pandey, M.: AI and IoT enabled smart hospital management systems. Stud. Big Data 114, 77–106 (2022)

    Google Scholar 

  4. Wijethilaka, S., Porambage, P., De Alwis, C., Liyanage, M.: A comprehensive analysis on network slicing for smart hospital applications. In: IEEE Consumer Communications and Networking Conference, CCNC, pp. 276–279 (2022)

    Google Scholar 

  5. Alsbou, N., Price, D., Ali, I.: IoT-based smart hospital using cisco packet tracer analysis. In: IEMTRONICS 2022, 2022 IEEE International IOT, Electronics and Mechatronics Conference

    Google Scholar 

  6. Wijethilaka, S., Porambage, P., De alwis, C., Liyanage, M.: A comprehensive analysis on network slicing for smart hospital applications. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 276–279 (2021)

    Google Scholar 

  7. Kumar, A., Dhanagopal, R., Albreem, M.A., Le, D.-N.: A comprehensive study on the role of advanced technologies in 5G based smart hospital. Alexandria Eng. J. 60(6), 5527–5536 (2021)

    Google Scholar 

  8. Omarov, B., et al.: Smart hospital: automation of business processes in medical centers. In: ICCIKE 2021, pp. 106–111 (2021)

    Google Scholar 

  9. Chuma, K.G., Ngoepe, M.: Security of electronic personal health information in a public hospital in South Africa. Inf. Secur. J. Glob. Perspect. 31(2), 179–195 (2022)

    Article  Google Scholar 

  10. Kardaras, K., Lambrou, G.I., Koutsouris, D.: Security methods and approaches for internal and external network hospital information systems with single sign-on. Int. J. Electron. Secur. Digit. Forens. 11(4), 434–446 (2019)

    Article  Google Scholar 

  11. Avianto, H., Ogi, D.: Design of electronic medical record security policy in hospital management information system (SIMRS) in XYZ Hospital. In: ICAITI 2019, pp. 163–167 (2019)

    Google Scholar 

  12. Pereira, B., Pavão, J., Carreira, D., Costa, V., Rocha, N.P.: A security review of a portuguese hospital using the cyber security framework: a case study. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 367–378. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93677-8_32

    Chapter  Google Scholar 

  13. Brodin, M., Rose, J.: Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach. Int. J. Mob. Commun. 18(5), 598–618 (2020)

    Google Scholar 

  14. Zhang, X., He, Y.: Information security management based on risk assessment and analysis. In: 2020 7th International Conference on Information Science and Control Engineering (ICISCE), pp. 749–752 (2020)

    Google Scholar 

  15. Tariq, M.I., et al.: Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 20(5), 1310 (2020). (36 pp.)

    Google Scholar 

  16. Awang, N., et al.: Identification of information security threats using data mining approach in campus network. In: Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future (PACIS 2020) (2020)

    Google Scholar 

  17. Hina, S., Dominic, P., Durai, D.: Information security policies’ compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201–211 (2020)

    Google Scholar 

  18. Wang, Y.: Network information security risk assessment based on artificial intelligence. J. Phys. Conf. Ser. 1648, 042109 (2020). (8 pp.)

    Google Scholar 

  19. Wang, C., Jin, X.: The researches on public service information security in the context of big data. In: ISBDAI 2020, pp. 86–92 (2020)

    Google Scholar 

  20. Kang, M., Hovav, A.: Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Inf. Syst. Front. 22(1), 221–242 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yixin Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Fang, W., Chen, L., Zhu, W. (2024). Research on the Construction and Application of Smart Hospital Based on Mobile Terminal Security Aggregation Business Management Platform. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-50571-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-50571-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-50570-6

  • Online ISBN: 978-3-031-50571-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics