{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:24:31Z","timestamp":1743031471575,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505706"},{"type":"electronic","value":"9783031505713"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50571-3_27","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T08:02:33Z","timestamp":1708416153000},"page":"370-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Thinking on the Construction of Internet Hospitals in Psychiatric Hospitals"],"prefix":"10.1007","author":[{"given":"Xinlei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Dongming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Jiufeng","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Saad Baqer, N., Mohammed, H.A., Albahri, A.S., Zaidan, A.A., Al-qaysi, Z.T., Albahri, O.S.: Development of the Internet of Things sensory technology for ensuring proper indoor air quality in hospital facilities: taxonomy analysis, challenges, motivations, open issues and recommended solution. J. Int. Measur. Confeder. 192, 110920 (2022)","DOI":"10.1016\/j.measurement.2022.110920"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Karvounis, E., Vavva, M., Giannakeas, N., Tzallas, A.T., Smanis, I., Tsipouras, M.G.: A hospital healthcare monitoring system using internet of things technologies. In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), p. 6 (2021)","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566252"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Preveze, B., Alkhayyat, A., Abedi, F., Jawad, A.M., Abosinnee, A.S.: SDN-driven internet of health things: a novel adaptive switching technique for hospital healthcare monitoring system. Wirel. Commun. Mob. Comput. 2022, 1\u201311 (2022)","DOI":"10.1155\/2022\/3150756"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Qiu, F.: Hospital archives intelligent management system based on 5G network and Internet of Things system. Microprocess. Microsyst. 80, 103564 (2021)","DOI":"10.1016\/j.micpro.2020.103564"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Kuttalingam, U., et al.: A novel data security for hospital records management using Internet of Things. In: ACCAI 2022 (2022)","DOI":"10.1109\/ACCAI53970.2022.9752660"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Omarov, B., et al.: Smart hospital: automation of business processes in medical centers. In: ICCIKE 2021, pp. 106\u2013111 (2021)","DOI":"10.1109\/ICCIKE51210.2021.9410672"},{"issue":"2","key":"27_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/19393555.2021.1893410","volume":"31","author":"KG Chuma","year":"2022","unstructured":"Chuma, K.G., Ngoepe, M.: Security of electronic personal health information in a public hospital in South Africa. Inf. Secur. J. Glob. Perspect. 31(2), 179\u2013195 (2022)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"issue":"4","key":"27_CR8","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1504\/IJESDF.2019.102563","volume":"11","author":"K Kardaras","year":"2019","unstructured":"Kardaras, K., Lambrou, G.I., Koutsouris, D.: Security methods and approaches for internal and external network hospital information systems with single sign-on. Int. J. Electron. Secur. Digit. Forens. 11(4), 434\u2013446 (2019)","journal-title":"Int. J. Electron. Secur. Digit. Forens."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Avianto, H., Ogi, D.: Design of electronic medical record security policy in hospital management information system (SIMRS) in XYZ Hospital. In: ICAITI 2019, pp. 163\u2013167 (2019)","DOI":"10.1109\/ICAITI48442.2019.8982122"},{"key":"27_CR10","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-030-93677-8_32","volume-title":"Digital Science","author":"B Pereira","year":"2022","unstructured":"Pereira, B., Pav\u00e3o, J., Carreira, D., Costa, V., Rocha, N.P.: A security review of a Portuguese hospital using the cyber security framework: a case study. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 367\u2013378. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-93677-8_32"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Yazdanmehr, A., Li, Y., Wang, J.: Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. Eur. J. Inf. Syst. 32(6), 1033\u20131051 (2022)","DOI":"10.1080\/0960085X.2022.2099767"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Brodin, M., Rose, J.: Mobile information security management for small organisation technology upgrades: the policy-driven approach and the evolving implementation approach. Int. J. Mob. Commun. 18(5), 598\u2013618 (2020)","DOI":"10.1504\/IJMC.2020.109973"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., He, Y.: Information security management based on risk assessment and analysis. In: 2020 7th International Conference on Information Science and Control Engineering (ICISCE), pp. 749\u2013752 (2020)","DOI":"10.1109\/ICISCE50968.2020.00159"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Tariq, M.I., et al. Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors 20(5), 1310 (2020). (36 p.)","DOI":"10.3390\/s20051310"},{"key":"27_CR15","unstructured":"Awang, N., et al.: Identification of information security threats using data mining approach in campus network. In: Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future (PACIS 2020) (2020)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Hina, S., Dominic, P.D.D.: Information security policies\u2019 compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201\u2013211 (2020)","DOI":"10.1080\/08874417.2018.1432996"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Y.: Network information security risk assessment based on artificial intelligence. J. Phys. Conf. Ser. 1648, 042109 (2020). (8 pp.)","DOI":"10.1088\/1742-6596\/1648\/4\/042109"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Wang, C., Jin, X.: The researches on public service information security in the context of big data. In: ISBDAI 2020, pp. 86\u201392 (2020)","DOI":"10.1145\/3436286.3436304"},{"issue":"1","key":"27_CR19","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10796-018-9855-6","volume":"22","author":"M Kang","year":"2020","unstructured":"Kang, M., Hovav, A.: Benchmarking methodology for information security policy (BMISP): artifact development and evaluation. Inf. Syst. Front. 22(1), 221\u2013242 (2020)","journal-title":"Inf. Syst. Front."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Alsbou, N., Price, D., Ali, I.: IoT-based smart hospital using cisco packet tracer analysis. In: 2022 IEEE International IoT, Electronics and Mechatronics Conference (IEMTRONICS), p. 6 (2022)","DOI":"10.1109\/IEMTRONICS55184.2022.9795743"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50571-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T13:05:40Z","timestamp":1716815140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50571-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505706","9783031505713"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50571-3_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icmtel.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}