0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (122)
  • R250 - R500 (465)
  • R500+ (1,524)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,496 R3,096 Discovery Miles 30 960 Save R400 (11%) Ships in 12 - 19 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

Technology - New Trajectories in Law (Paperback): Penny Crofts, Honni Van Rijswijk Technology - New Trajectories in Law (Paperback)
Penny Crofts, Honni Van Rijswijk
R667 Discovery Miles 6 670 Ships in 12 - 19 working days

Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.

Marketing in the Digital Era (Hardcover, New edition): Zuzana Bacikova Marketing in the Digital Era (Hardcover, New edition)
Zuzana Bacikova
R1,437 Discovery Miles 14 370 Ships in 9 - 17 working days

With the digitalisation of society, marketing is experiencing a renaissance. Digital marketing has introduced a compactness absent in traditional marketing, even after the integration of the holistic marketing approach. Consumers nowadays make choices - between purchasing online and visiting a store. They pay attention to certain ads and decide to support a person or product on social media channels. This book presents the theoretical principles of digital marketing established to serve research plans, educational purposes and practical applications. It aims to support the terminological demarcation and to further the professional discussion.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,317 Discovery Miles 13 170 Ships in 12 - 19 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback): Alicia (Lucy) Cameron Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback)
Alicia (Lucy) Cameron
R1,463 Discovery Miles 14 630 Ships in 12 - 19 working days

Evaluates innovation policy and actions and considers real-world examples. Looks to the future of innovation and the role of future technologies. Provides an overview of recent policy trends in innovation and how they contribute to the creation of technology hotspots. Identifies how governments, industry, the research community and local communities can work together to craft individualised approaches to increasing innovation at a local level and building new industries.

The European Union as Guardian of Internet Privacy - The Story of Art 16 TFEU (Hardcover, 1st ed. 2016): Hielke Hijmans The European Union as Guardian of Internet Privacy - The Story of Art 16 TFEU (Hardcover, 1st ed. 2016)
Hielke Hijmans
R5,215 Discovery Miles 52 150 Ships in 10 - 15 working days

This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, the independent supervisory authorities, the cooperation mechanisms of these authorities, as well as the EU as actor in the external domain. Article 16 TFEU enables the Court of the Justice of the EU to play its role as constitutional court and to set high standards for fundamental rights protection. It obliges the European Parliament and the Council to lay down legislation that encompasses all processing of personal data. It confirms control by independent supervisory authorities as an essential element of data protection and it gives the EU a strong mandate to act in the global arena. The analysis shows that EU powers can be successfully used in a legitimate and effective manner and that this subject could be a success story for the EU, in times of widespread euroskepsis. It demonstrates that the Member States remain important players in ensuring privacy and data protection. In order to be a success story, the key stakeholders should be prepared to go the extra mile, so it is argued in the book. The book is based on academic research for which the author received a double doctorate at the University of Amsterdam and the Vrije Universiteit Brussels. It builds on a long inside experience within the European institutions, as well as within the community of data protection and data protection authorities. It is a must read in a time where the setting of EU privacy and data protection is changing dramatically, not only as a result of the rapidly evolving information society, but also because of important legal developments such as the entry into force of the General Data Protection Regulation. This book will appeal to all those who are in some way involved in making this regulation work. It will also appeal to people interested in the institutional framework of the European Union and in the role of the Union of promoting fundamental rights, also in the wider world.

Pinterest For Dummies (Paperback, Portable): K. Carr Pinterest For Dummies (Paperback, Portable)
K. Carr 1
R422 R363 Discovery Miles 3 630 Save R59 (14%) Ships in 12 - 19 working days

Organize your life, your likes, and more with Pinterest and this fun how-to guide

Now you can organize your digital life with Pinterest, a hot new site that lets you create visual bookmarks of your favorite things and "pin" them on virtual pinboards. Want to save something from a blog? Have a favorite retail website? Want to pin a quick photo you took with your phone? Organize them all with Pinterest and this fast, friendly guide that shows you just how to do it. You'll see how to set up an account and your boards, how to pin and re-pin, where to use hashtags, find ways to share pins with your other social networks, and more.Helps you get the most out of Pinterest, a visual collection of bookmarks that you can organize into virtual pinboards Shows you how to set up an account and boards, how to pin and re-pin, use hashtags and like pins, and even share pins with your other social networks Also discusses Power Pinners, using search, and finding people to follow Offers tips, trick, and techniques to make the process easy and enjoyable

Pinterest is fun and easy, and even more so with "Pinterest for Dummies"

Social Media Marketing 2021 - The Ultimate Mastery to use the secrets of digital Business and become an Influencer This book... Social Media Marketing 2021 - The Ultimate Mastery to use the secrets of digital Business and become an Influencer This book includes Instagram, YouTube, Twitter, and Facebook Marketing 2021 (Hardcover)
Andrew Proctor
R1,049 R911 Discovery Miles 9 110 Save R138 (13%) Ships in 10 - 15 working days
Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,270 Discovery Miles 32 700 Ships in 12 - 19 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Crossing the Bridge of the Digital Divide - A Walk with Global Leaders (Hardcover): Anthony H. Normore, Antonia Issa Lahera Crossing the Bridge of the Digital Divide - A Walk with Global Leaders (Hardcover)
Anthony H. Normore, Antonia Issa Lahera
R3,019 Discovery Miles 30 190 Ships in 10 - 15 working days

Crossing the Bridge of the Digital Divide: A Walk with Global Leaders explores the combined effect of the rapid growth of information as an increasingly fragmented information base, a large component of which is available only to people with money and/or acceptable institutional affiliations. In the recent past, the outcome of these challenges has been characterized as the ""digital divide"" between the information "haves" and "have nots" along racial and socio economic lines that seem to widen as time passes. To address the issues of digital equity and digital inequality in an effort to bridge the digital divide, educational scholars, researchers and practitioners are in positions to ensure equitable opportunities are made available for people of all ages, races, ability, sexual orientation, and ethnicity in support of social justice for bridging the digital divide. The digital divide addresses issues concerning equal opportunity, equity and access that have an effect on the development of marginalized and otherwise disenfranchised populations within and across systems nationally and internationally. The contributing authors- representing Unites States, Canada, South Africa, New Zealand, and the UK - posit that education institutions can serve as the bridge to close the digital divide for students who do not have access to information technology in their homes. At a time when more computers are made available in schools than ever before, the digital divide continues to widen and fewer people in the lowest SES groups are given the opportunity to join the world of computer technology and the internet. As a result, the influence of leadership activity on institutional racism, gender discrimination, inequality of opportunity, inequity of educational processes, digital exclusion, and justice have gained currency and attention. The contributing national and international authors examine the digital divide in terms of social justice leadership, equity and access. It is within this context that the authors offer discussions from a lens of their choice, i.e. conceptual, review of literature, epistemological, etc. By adopting an educational approach to bridging the digital divide, researchers and practitioners can connect and extend long- established lines of conceptual and empirical inquiry aimed at improving organizational practices and thereby gain insights that might be otherwise overlooked, or assumed. This holds great promise for generating, refining, and testing theories of leadership for equity and access, and helps strengthen already vibrant lines of inquiry on social justice.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,852 Discovery Miles 18 520 Ships in 12 - 19 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Legal Analytics - The Future of Analytics in Law (Hardcover): Namita Singh Malik, Smita Gupta, Balamurugan Balusamy, Elizaveta... Legal Analytics - The Future of Analytics in Law (Hardcover)
Namita Singh Malik, Smita Gupta, Balamurugan Balusamy, Elizaveta A Gromova
R4,185 Discovery Miles 41 850 Ships in 12 - 19 working days

Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation. Legal automation navigation is multidimensional, wherein it intends to construct streamline communication, approval, and management of legal tasks. The evolving environment of technology has emphasized the need for better automation in the legal field from time to time, although legal scholars took long to embrace information revolution of the legal field. * Describes the historical development of law and automation. * Analyzes the challenges and opportunities in law and automation. * Studies the current research and development in the convergence of law, artificial intelligence, and legal analytics. * Explores the recent emerging trends and technologies that are used by various legal systems globally for crime prediction and prevention. * Examines the applicability of legal analytics in forensic investigation. * Investigates the impact of legal analytics tools and techniques in judicial decision making. * Analyzes deep learning techniques and their scope in accelerating legal analytics in developed and developing countries. * Provides an in-depth analysis of implementation, challenges, and issues in society related to legal analytics. This book is primarily aimed at graduates and postgraduates in law and technology, computer science, and information technology. Legal practitioners and academicians will also find this book helpful.

Teach Yourself Getting Started on Second Life (Paperback): Teach Yourself Getting Started on Second Life (Paperback)
R100 Discovery Miles 1 000 Ships in 12 - 19 working days
Teach Yourself Making Money in the Second Life World (Paperback): Irie Tsure Teach Yourself Making Money in the Second Life World (Paperback)
Irie Tsure
R99 Discovery Miles 990 Ships in 12 - 19 working days

Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.

Africa 2.0 - Inside a Continent's Communications Revolution (Paperback): Russell Southwood Africa 2.0 - Inside a Continent's Communications Revolution (Paperback)
Russell Southwood
R754 Discovery Miles 7 540 Ships in 12 - 19 working days

Africa 2.0 provides an important history of how two technologies - mobile calling and internet - were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa. -- .

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback)
Gulizar Haciyakupoglu, Yasmine Wong
R1,250 Discovery Miles 12 500 Ships in 12 - 19 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R4,025 Discovery Miles 40 250 Ships in 12 - 19 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover)
Shaun Aghili
R3,291 Discovery Miles 32 910 Ships in 12 - 19 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

CyRM - Mastering the Management of Cybersecurity (Paperback): David X. Martin CyRM - Mastering the Management of Cybersecurity (Paperback)
David X. Martin
R1,182 Discovery Miles 11 820 Ships in 12 - 19 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback)
Steve King; Edited by Kiren Chaudry
R976 Discovery Miles 9 760 Ships in 12 - 19 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover): Abid Hussain, Garima Tyagi, Sheng-Lung Peng IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover)
Abid Hussain, Garima Tyagi, Sheng-Lung Peng
R3,145 Discovery Miles 31 450 Ships in 12 - 19 working days

Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market

Cyber Security Applications for Industry 4.0 (Hardcover): R. Sujatha, G. Prakash, Noor Zaman Jhanjhi Cyber Security Applications for Industry 4.0 (Hardcover)
R. Sujatha, G. Prakash, Noor Zaman Jhanjhi
R3,583 Discovery Miles 35 830 Ships in 12 - 19 working days

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback)
Shaun Aghili
R1,207 Discovery Miles 12 070 Ships in 12 - 19 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover): Luke Munn Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover)
Luke Munn
R1,548 Discovery Miles 15 480 Ships in 12 - 19 working days

How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,433 Discovery Miles 34 330 Ships in 12 - 19 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Polymer Networks '91
Kuchanov, Dusek Hardcover R4,062 R1,679 Discovery Miles 16 790
Advances in Quantum Monte Carlo
Shigenori Tanaka, Stuart M. Rothstein, … Hardcover R5,813 Discovery Miles 58 130
Multigrid
Ulrich Trottenberg, Cornelius W. Oosterlee, … Hardcover R2,387 Discovery Miles 23 870
Mathematics of Uncertainty Modeling in…
S. Chakraverty Hardcover R6,169 Discovery Miles 61 690
AQA A level Chemistry Lab Book - AQA A…
Paperback R170 Discovery Miles 1 700
Analytic Solutions for Flows Through…
Peter Jonathan Baddoo Hardcover R2,899 Discovery Miles 28 990
Calculations in AS/A Level Chemistry
Jim Clark Paperback R1,340 Discovery Miles 13 400
Dynamic Data Assimilation - Beating the…
Dinesh G. Harkut Hardcover R3,310 Discovery Miles 33 100
Lab Manual for Zumdahl/DeCoste's…
John G. Little Paperback R2,955 R2,631 Discovery Miles 26 310
Chemical Reactivity - Volume 1: Theories…
Savas Kaya, Laszlo Von Szentpaly, … Paperback R4,256 Discovery Miles 42 560

 

Partners