Skip to main content

Research and Thinking on the Construction of Internet Hospitals in Psychiatric Hospitals

  • Conference paper
  • First Online:
Multimedia Technology and Enhanced Learning (ICMTEL 2023)

Abstract

The outbreak of the new crown epidemic has changed the traditional medical treatment model, and medical institutions all over the country have innovated online service models. Suzhou Guangji Hospital has used the psychological cloud platform, psychological hotline, WeChat public platform, etc. to participate in online services for mental and mental health, and is currently improving the level of Internet services through the construction of Internet hospitals. By extending the business of medical institutions to the Internet, the traditional offline diagnosis and treatment business will be Internetized, effectively connect online medical services and offline medical procedures, and establish online and offline integrated medical services covering pre-diagnosis, diagnosis, and post-diagnosis model. Improve the operation and management of Internet hospitals by building independent service brands of Internet hospitals, building network security, giving full play to the competitive advantages of Internet hospitals, increasing policy support for Internet hospitals, strengthening Internet hospital service quality control, and carrying out patient relationship management. Innovate the Internet hospital business service model. Provide high-quality mental health medical services for 12 million residents of Suzhou.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Saad Baqer, N., Mohammed, H.A., Albahri, A.S., Zaidan, A.A., Al-qaysi, Z.T., Albahri, O.S.: Development of the Internet of Things sensory technology for ensuring proper indoor air quality in hospital facilities: taxonomy analysis, challenges, motivations, open issues and recommended solution. J. Int. Measur. Confeder. 192, 110920 (2022)

    Google Scholar 

  2. Karvounis, E., Vavva, M., Giannakeas, N., Tzallas, A.T., Smanis, I., Tsipouras, M.G.: A hospital healthcare monitoring system using internet of things technologies. In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), p. 6 (2021)

    Google Scholar 

  3. Preveze, B., Alkhayyat, A., Abedi, F., Jawad, A.M., Abosinnee, A.S.: SDN-driven internet of health things: a novel adaptive switching technique for hospital healthcare monitoring system. Wirel. Commun. Mob. Comput. 2022, 1–11 (2022)

    Google Scholar 

  4. Qiu, F.: Hospital archives intelligent management system based on 5G network and Internet of Things system. Microprocess. Microsyst. 80, 103564 (2021)

    Google Scholar 

  5. Kuttalingam, U., et al.: A novel data security for hospital records management using Internet of Things. In: ACCAI 2022 (2022)

    Google Scholar 

  6. Omarov, B., et al.: Smart hospital: automation of business processes in medical centers. In: ICCIKE 2021, pp. 106–111 (2021)

    Google Scholar 

  7. Chuma, K.G., Ngoepe, M.: Security of electronic personal health information in a public hospital in South Africa. Inf. Secur. J. Glob. Perspect. 31(2), 179–195 (2022)

    Article  Google Scholar 

  8. Kardaras, K., Lambrou, G.I., Koutsouris, D.: Security methods and approaches for internal and external network hospital information systems with single sign-on. Int. J. Electron. Secur. Digit. Forens. 11(4), 434–446 (2019)

    Article  Google Scholar 

  9. Avianto, H., Ogi, D.: Design of electronic medical record security policy in hospital management information system (SIMRS) in XYZ Hospital. In: ICAITI 2019, pp. 163–167 (2019)

    Google Scholar 

  10. Pereira, B., Pavão, J., Carreira, D., Costa, V., Rocha, N.P.: A security review of a Portuguese hospital using the cyber security framework: a case study. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 367–378. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93677-8_32

    Chapter  Google Scholar 

  11. Yazdanmehr, A., Li, Y., Wang, J.: Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. Eur. J. Inf. Syst. 32(6), 1033–1051 (2022)

    Google Scholar 

  12. Brodin, M., Rose, J.: Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach. Int. J. Mob. Commun. 18(5), 598–618 (2020)

    Google Scholar 

  13. Zhang, X., He, Y.: Information security management based on risk assessment and analysis. In: 2020 7th International Conference on Information Science and Control Engineering (ICISCE), pp. 749–752 (2020)

    Google Scholar 

  14. Tariq, M.I., et al. Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 20(5), 1310 (2020). (36 p.)

    Google Scholar 

  15. Awang, N., et al.: Identification of information security threats using data mining approach in campus network. In: Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future (PACIS 2020) (2020)

    Google Scholar 

  16. Hina, S., Dominic, P.D.D.: Information security policies’ compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201–211 (2020)

    Google Scholar 

  17. Wang, Y.: Network information security risk assessment based on artificial intelligence. J. Phys. Conf. Ser. 1648, 042109 (2020). (8 pp.)

    Google Scholar 

  18. Wang, C., Jin, X.: The researches on public service information security in the context of big data. In: ISBDAI 2020, pp. 86–92 (2020)

    Google Scholar 

  19. Kang, M., Hovav, A.: Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Inf. Syst. Front. 22(1), 221–242 (2020)

    Article  Google Scholar 

  20. Alsbou, N., Price, D., Ali, I.: IoT-based smart hospital using cisco packet tracer analysis. In: 2022 IEEE International IoT, Electronics and Mechatronics Conference (IEMTRONICS), p. 6 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinlei Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, X., Zhao, D., Zhong, W., Ye, J. (2024). Research and Thinking on the Construction of Internet Hospitals in Psychiatric Hospitals. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 532. Springer, Cham. https://doi.org/10.1007/978-3-031-50571-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-50571-3_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-50570-6

  • Online ISBN: 978-3-031-50571-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics