Abstract
The outbreak of the new crown epidemic has changed the traditional medical treatment model, and medical institutions all over the country have innovated online service models. Suzhou Guangji Hospital has used the psychological cloud platform, psychological hotline, WeChat public platform, etc. to participate in online services for mental and mental health, and is currently improving the level of Internet services through the construction of Internet hospitals. By extending the business of medical institutions to the Internet, the traditional offline diagnosis and treatment business will be Internetized, effectively connect online medical services and offline medical procedures, and establish online and offline integrated medical services covering pre-diagnosis, diagnosis, and post-diagnosis model. Improve the operation and management of Internet hospitals by building independent service brands of Internet hospitals, building network security, giving full play to the competitive advantages of Internet hospitals, increasing policy support for Internet hospitals, strengthening Internet hospital service quality control, and carrying out patient relationship management. Innovate the Internet hospital business service model. Provide high-quality mental health medical services for 12 million residents of Suzhou.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Saad Baqer, N., Mohammed, H.A., Albahri, A.S., Zaidan, A.A., Al-qaysi, Z.T., Albahri, O.S.: Development of the Internet of Things sensory technology for ensuring proper indoor air quality in hospital facilities: taxonomy analysis, challenges, motivations, open issues and recommended solution. J. Int. Measur. Confeder. 192, 110920 (2022)
Karvounis, E., Vavva, M., Giannakeas, N., Tzallas, A.T., Smanis, I., Tsipouras, M.G.: A hospital healthcare monitoring system using internet of things technologies. In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), p. 6 (2021)
Preveze, B., Alkhayyat, A., Abedi, F., Jawad, A.M., Abosinnee, A.S.: SDN-driven internet of health things: a novel adaptive switching technique for hospital healthcare monitoring system. Wirel. Commun. Mob. Comput. 2022, 1–11 (2022)
Qiu, F.: Hospital archives intelligent management system based on 5G network and Internet of Things system. Microprocess. Microsyst. 80, 103564 (2021)
Kuttalingam, U., et al.: A novel data security for hospital records management using Internet of Things. In: ACCAI 2022 (2022)
Omarov, B., et al.: Smart hospital: automation of business processes in medical centers. In: ICCIKE 2021, pp. 106–111 (2021)
Chuma, K.G., Ngoepe, M.: Security of electronic personal health information in a public hospital in South Africa. Inf. Secur. J. Glob. Perspect. 31(2), 179–195 (2022)
Kardaras, K., Lambrou, G.I., Koutsouris, D.: Security methods and approaches for internal and external network hospital information systems with single sign-on. Int. J. Electron. Secur. Digit. Forens. 11(4), 434–446 (2019)
Avianto, H., Ogi, D.: Design of electronic medical record security policy in hospital management information system (SIMRS) in XYZ Hospital. In: ICAITI 2019, pp. 163–167 (2019)
Pereira, B., Pavão, J., Carreira, D., Costa, V., Rocha, N.P.: A security review of a Portuguese hospital using the cyber security framework: a case study. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 367–378. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93677-8_32
Yazdanmehr, A., Li, Y., Wang, J.: Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. Eur. J. Inf. Syst. 32(6), 1033–1051 (2022)
Brodin, M., Rose, J.: Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach. Int. J. Mob. Commun. 18(5), 598–618 (2020)
Zhang, X., He, Y.: Information security management based on risk assessment and analysis. In: 2020 7th International Conference on Information Science and Control Engineering (ICISCE), pp. 749–752 (2020)
Tariq, M.I., et al. Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 20(5), 1310 (2020). (36 p.)
Awang, N., et al.: Identification of information security threats using data mining approach in campus network. In: Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future (PACIS 2020) (2020)
Hina, S., Dominic, P.D.D.: Information security policies’ compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201–211 (2020)
Wang, Y.: Network information security risk assessment based on artificial intelligence. J. Phys. Conf. Ser. 1648, 042109 (2020). (8 pp.)
Wang, C., Jin, X.: The researches on public service information security in the context of big data. In: ISBDAI 2020, pp. 86–92 (2020)
Kang, M., Hovav, A.: Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Inf. Syst. Front. 22(1), 221–242 (2020)
Alsbou, N., Price, D., Ali, I.: IoT-based smart hospital using cisco packet tracer analysis. In: 2022 IEEE International IoT, Electronics and Mechatronics Conference (IEMTRONICS), p. 6 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, X., Zhao, D., Zhong, W., Ye, J. (2024). Research and Thinking on the Construction of Internet Hospitals in Psychiatric Hospitals. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-50571-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-50571-3_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50570-6
Online ISBN: 978-3-031-50571-3
eBook Packages: Computer ScienceComputer Science (R0)