![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Health & safety aspects of computing
Artificial Intelligence (AI) has transformed many aspects of our daily activities. Health and well-being of humans stand as one of the key domains where AI has achieved significant progresses, saving time, costs, and potentially lives, as well as fostering economic resilience, particularly under the COVID-19 pandemic environments. This book is a sequel of the Handbook of Artificial Intelligence in Healthcare. The first volume of the Handbook is dedicated to present advances and applications of AI methodologies in several specific areas, i.e., signal, image, and video processing as well as information and data analytics. In this second volume of the Handbook, general practicality challenges and future prospects of AI methodologies pertaining to healthcare and related domains are presented in Part 1 and Part 2, respectively. It is envisaged that the selected studies will provide readers a general perspective on the issues, challenges, and opportunities in designing, developing, and implementing AI-based tools and solutions in the healthcare sector, bringing benefits to transform and advance health and well-being development of humans..
This book defines the phenomenon of mHealth and its evolution, explaining why an understanding of mHealth is critical for decision makers, entrepreneurs and policy analysts who are pivotal to developing products that meet the collaborative health information needs of consumers and providers in a competitive and rapidly-changing environment. The book examines trends in mHealth and discusses how mHealth technologies offer opportunities for innovators and entrepreneurs, those who often are industry first-movers with regard to technology advancement. It also explores the changing dynamics and relationships among physicians, patients, insurers, regulators, managers, administrators, caregivers and others involved in the delivery of health services. The primary focus is on the ways in which mHealth technologies are revising and reshaping healthcare delivery systems in the United States and globally and how those changes are expected to change the ways in which the business of healthcare is conducted. mHealth: Transforming Healthcare consists of nine chapters that addresses key content areas, including history (to the extent that dynamic technologies have a history), projection of immediate evolution and consistent issues associated with health technology, such as security and information privacy and government and industry regulation. A major point of discussion addressed is whether mHealth is a transient group of products and a passing patient encounter approach, or if it is the way much of our health care will be delivered in future years with incremental evolution to achieve sustainable innovation of health technologies.
Aware that a single crisis event can devastate their business, managers must be prepared for the worst from an expansive array of threats. The Routledge Companion to Risk, Crisis and Security in Business comprises a professional and scholarly collection of work in this critical field. Risks come in many varieties, and there is a growing concern for organizations to respond to the challenge. Businesses can be severely impacted by natural and man-made disasters including: floods, earthquakes, tsunami, environmental threats, terrorism, supply chain risks, pandemics, and white-collar crime. An organization's resilience is dependent not only on their own system security and infrastructure, but also on the wider infrastructure providing health and safety, utilities, transportation, and communication. Developments in risk security and management knowledge offer a path towards resilience and recovery through effective leadership in crisis situations. The growing body of knowledge in research and methodologies is a basis for decisions to safeguard people and assets, and to ensure the survivability of an organization from a crisis. Not only can businesses become more secure through risk management, but an effective program can also facilitate innovation and afford new opportunities. With chapters written by an international selection of leading experts, this book fills a crucial gap in our current knowledge of risk, crisis and security in business by exploring a broad spectrum of topics in the field. Edited by a globally-recognized expert on risk, this book is a vital reference for researchers, professionals and students with an interest in current scholarship in this expanding discipline.
The three-dimensional structure and function of molecules present many challenges and opportunities for developing an understanding of biological systems. With the increasing availability of molecular structures and the advancing accuracy of structure predictions and molecular simulations, the space for algorithmic advancement on many analytical and predictive problems is both broad and deep. To support this field, a rich set of methods and algorithms are available, addressing a variety of important problems such as protein-protein interactions, the effect of mutations on protein structure and function, and protein structure determination. Despite recent advancements in the field, in particular in protein folding with the development of AlphaFold, many problems still remain unsolved. In this book we focus on a number of topics in Structural Bioinformatics: Cryo-EM structural detection, protein conformational exploration, elucidation of molecular binding surface using geometry, the effect of mutations, insertions and deletions on protein structural stability, and protein-ligand binding.
New in paperback: A renowned health authority reveals how we can protect ourselves against the harmful effects of electromagnetic fields. The hazards of electronic pollution may once have been the stuff of science fiction, but now we know they're all too real. And now that 5G ultra-wideband technology is here to stay, the danger is greater than ever. Dr. Joseph Mercola, one of the world's foremost authorities on alternative health, has mined the scientific literature to offer a radical new understanding of how electromagnetic fields impact your body and mind. In this eye-opening guide, now available in paperback for the first time, he reveals: What EMFs (electromagnetic fields) actually are, where you find them in your daily life, and how they affect you The toll that EMFs have been proven to take on human health--and why you've been largely kept in the dark about this threat How you can actually repair the damage done by EMFs at a cellular level Practical strategies to protect yourself and your loved ones from EMFs at home, at work, and out in the world "Dr. Mercola's groundbreaking new book on the health effects of EMFs is both a sobering tale and an effective call to action." -- Thomas Cowan, M.D., author of Vaccines, Autoimmunity, and the Changing Nature of Childhood Illness and Cancer and the New Biology of Water
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.
This book covers the results of a study concerning systems for healthcare-oriented monitoring of elderly persons. It is focused on the methods for processing data from impulse-radar sensors and depth sensors, aimed at localisation of monitored persons and estimation of selected quantities informative from the healthcare point of view. It includes mathematical descriptions of the considered methods, as well as the corresponding algorithms and the results of their testing in a real-world context. Moreover, it explains the motivations for developing healthcare-oriented monitoring systems and specifies the real-world needs which may be addressed by such systems. The healthcare systems, all over the world, are confronted with challenges implied by the ageing of population and the lack of adequate recruitment of healthcare professionals. Those challenges can be met by developing new technologies aimed at improving the quality of life of elderly people and at increasing the efficiency of public health management. Monitoring systems may contribute to this strategy by providing information on the evolving health status of independently-living elderly persons, enabling healthcare personnel to quickly react to dangerous events. Although these facts are generally acknowledged, such systems are not yet being commonly used in healthcare facilities and households. This may be explained by the difficulties related to the development of technological solutions which can be both acceptable for monitored persons and capable of providing healthcare personnel with useful information. The impulse-radar sensors and depth sensors, considered in this book, have a potential for overcoming those difficulties since they are not cumbersome for the monitored persons - if compared to wearable sensors - and do not violate the monitored person's privacy - if compared to video cameras. Since for safety reasons the level of power, emitted by the radar sensors, must be ultra-low, the task of detection and processing of signals is a research challenge which requires more sophisticated methods than those developed for other radar applications. This book contains descriptions of new Bayesian methods, applicable for the localisation of persons by means of impulse-radar sensors, and an exhaustive review of previously published ones. Furthermore, the methods for denoising, regularised numerical differentiation and fusion of data from impulse-radar sensors and depth sensors are systematically reviewed in this book. On top of that, the results of experiments aimed at comparing the performance of various data-processing methods, which may serve as guidelines for related future projects, are presented.
This book presents state-of-the-art research methods, results, and applications in social media and health research. It aims to help readers better understand the different aspects of using social web platforms in health research. Throughout the chapters, the benefits, limitations, and best practices of using a variety of social web platforms in health research are discussed with concrete use cases. This is an ideal book for biomedical researchers, clinicians, and health consumers (including patients) who are interested in learning how social web platforms impact health and healthcare research.
This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the analytical areas affected by COVID-19. This ultimately shows different paths to the same destination to help understand the nature of the COVID-19 pandemic and how to avoid it in the future.
This edited book helps researchers and practitioners to understand e-health, m-healthcare architecture through IoT and the state of the art in IoT counter measures. This book provides a comprehensive discussion on a functional framework for IoT-based healthcare systems, intelligent medicine box, RFID technology, HMI, cognitive interpretation, BCI, remote health monitoring systems, wearable sensors, WBAN, healthcare analytics, machine learning (ML) techniques for IoT-enabled healthcare services, security and privacy issues in IoT-based healthcare monitoring systems. The book discusses integration of IoT with big data and cloud computing for solving several real-time problems by the use of smart healthcare applications. In these applications, the cloud computing provides a common workplace for IoT and big data, big data provides data analytics technology and IoT provides the source of data. It serves as a reference resource for researchers and practitioners in academia and industry.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes. Predicting health outcomes using data modeling approaches is an emerging field that can reveal important insights into disproportionate spending patterns. This book presents data driven methods, especially machine learning, for understanding and approaching the high utilizers problem, using the example of a large public insurance program. It describes important goals for data driven approaches from different aspects of the high utilizer problem, and identifies challenges uniquely posed by this problem. Key Features: Introduces basic elements of health care data, especially for administrative claims data, including disease code, procedure codes, and drug codes Provides tailored supervised and unsupervised machine learning approaches for understanding and predicting the high utilizers Presents descriptive data driven methods for the high utilizer population Identifies a best-fitting linear and tree-based regression model to account for patients' acute and chronic condition loads and demographic characteristics
This book is a proficient guide to understanding artificial intelligence (IoT) and the Internet of Medical Things (IoMT) in healthcare. The book provides a comprehensive study on the applications of AI and IoT in various medical domains. The book shows how the implementation of innovative solutions in healthcare is beneficial, and IoT, together with AI, are strong drivers of the digital transformation regardless of what field the technologies are applied in. Therefore, this book provides a high level of understanding with the emerging technologies on the Internet of Things, wearable devices, and AI in IoMT, which offers the potential to acquire and process a tremendous amount of data from the physical world.
This book provides readers with an integrative overview of the latest research and developments in the broad field of biomedical engineering. Each of the chapters offers a timely review written by leading biomedical engineers and aims at showing how the convergence of scientific and engineering fields with medicine has created a new basis for practically solving problems concerning human health, wellbeing and disease. While some of the latest frontiers of biomedicine, such as neuroscience and regenerative medicine, are becoming increasingly dependent on new ideas and tools from other disciplines, the paradigm shift caused by technological innovations in the fields of information science, nanotechnology, and robotics is opening new opportunities in healthcare, besides dramatically changing the ways we actually practice science. At the same time, a new generation of engineers, fluent in many different scientific "languages," is creating entirely new fields of research that approach the "old" questions from a new and holistic angle. The book reports on the scientific revolutions in the field of biomedicine by describing the latest technologies and findings developed at the interface between science and engineering. It addresses students, fellows, and faculty and industry investigators searching for new challenges in the broad biomedical engineering fields.
An indispensable guide for telling fact from fiction on the internet—often in less than 30 seconds. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to
And so much more. Building on techniques like SIFT and lateral reading, Verified will help students and anyone else looking to get a handle on the internet’s endless flood of information through quick, practical, and accessible steps.
This is a practical book for health and IT professionals who need to ensure that patient safety is prioritized in the design and implementation of clinical information technology. Healthcare professionals are increasingly reliant on information technology to deliver care and inform their clinical decision making. Health IT provides enormous benefits in efficiency, communication and decision making. However a number of high-profile UK and US studies have concluded that when Health IT is poorly designed or sub-optimally implemented then patient safety can be compromised. Manufacturers and healthcare organizations are increasingly required to demonstrate that their Health IT solutions are proactively assured. Surprisingly the majority of systems are not subject to regulation so there is little in the way of practical guidance as to how risk management can be achieved. The book fills that gap. The author, a doctor and IT professional, harnesses his two decades of experience to characterize the hazards that health technology can introduce. Risk can never be eliminated but by drawing on lessons from other safety-critical industries the book systematically sets out how clinical risk can be strategically controlled. The book proposes the employment of a Safety Case to articulate and justify residual risk so that not only is risk proactively managed but it is seen to be managed. These simple techniques drive product quality and allow a technology's benefits to be realized without compromising patient safety.
This book emphasizes the latest developments and achievements in artificial intelligence and related technologies, focusing on the applications of artificial intelligence and medical diagnosis. The book describes the theory, applications, concept visualization, and critical surveys covering most aspects of AI for medical informatics.
A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.
This book offers a comprehensive yet concise overview of the challenges and opportunities presented by the use of artificial intelligence in healthcare. It does so by approaching the topic from multiple perspectives, e.g. the nursing, consumer, medical practitioner, healthcare manager, and data analyst perspective. It covers human factors research, discusses patient safety issues, and addresses ethical challenges, as well as important policy issues. By reporting on cutting-edge research and hands-on experience, the book offers an insightful reference guide for health information technology professionals, healthcare managers, healthcare practitioners, and patients alike, aiding them in their decision-making processes. It will also benefit students and researchers whose work involves artificial intelligence-related research issues in healthcare.
Game Over tells the harrowing true story of teenager Breck Bednar, who was groomed over the internet and brutally murdered on 17 February 2014 by a supposed 'friend' that he met online. Breck's story is told in Mark's potent verbatim style, using the words of his family, friends and the killer. It's a shocking but deeply powerful play, with a unique 21st-century message. The play is particularly suitable for 'socially distanced' or online performances in students' own homes and can be easily adapted to suit this medium. Suitable for: Key Stage 3/4, GCSE, BTEC, A-Level to adult Duration: 75 minutes approximately Cast: 24 characters total. 8 male, 9 female and 7 male or female. The play is suitable for a large cast and multi-roling is also possible. "[A] chilling and harrowing tale, skilfully written using the words of Breck's family, friends and his killer. It deals with the potentially disastrous effects of social media and how to keep safe online by recognising the signs of grooming and exploitation." Vivienne Lafferty, Trustee National Drama
Parenting for the Digital Generationprovides a practical handbook for parents, grandparents, teachers, and counselors who want to understand both the opportunities and the threats that exist for the generation of digital natives who are more familiar with a smartphone than they are with a paper book. This book provides straightforward, jargon-free information regarding the online environment and the experience in which children and young adults engage both inside and outside the classroom. The digital environment creates many challenges, some of which are largely the same as parents faced before the Internet, but others which are entirely new. Many children struggle to connect, and they underperform in the absence of the social and emotional support of a healthy learning environment. Parents must also help their children navigate a complex and occasionally dangerous online world. This book provides a step-by-step guide for parents seeking to raise happy, mature, creative, and well-adjusted children. The guide provides clear explanations of the keys to navigating as a parent in the online environment while providing practical strategies that do not look for dangers where there are only remote threats.
Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.
Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people-including those in influential business and government positions-are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.
Founded in 2004, the Games for Health Project supports community, knowledge and business development efforts to use cutting-edge games and game technologies to improve health and health care. The Games for Health Conference brings together researchers, medical professionals and game developers to share information about the impact of games, playful interaction and game technologies on health, health care and policy. Over two days, more than 400 attendees participate in over 60 sessions provided by an international array of 80+ speakers, cutting across a wide range of activities in health and health care. Topics include exergaming, physical therapy, disease management, health behavior change, biofeedback, rehab, epidemiology, training, cognitive health, nutrition and health education.
This second edition of Human Factors Methods: A Practical Guide for Engineering and Design now presents 107 design and evaluation methods as well as numerous refinements to those that featured in the original. The book has been carefully designed to act as an ergonomics methods manual, aiding both students and practitioners. The eleven sections represent the different categories of ergonomics methods and techniques that can be used in the evaluation and design process. Offering a 'how-to' text on a substantial range of ergonomics methods that can be used in the design and evaluation of products and systems, it is a comprehensive point of reference for all these methods. An overview of the methods is presented in chapter one, with a methods matrix showing which can be used in conjunction. The following chapters detail the methods showing how to apply them in practice. Flowcharts, procedures and examples cover the requirements of a diverse audience and varied applications of the methods. The final chapter, a new addition, illustrates the EAST method, which integrates several well-known methods into a teamwork analysis approach. |
![]() ![]() You may like...
Track-Before-Detect Using Expectation…
Samuel J. Davey, Han X. Gaetjens
Hardcover
R3,204
Discovery Miles 32 040
Planar Double-Gate Transistor - From…
Amara Amara, Olivier Rozeau
Hardcover
R4,473
Discovery Miles 44 730
Geometric Phases in Classical and…
Dariusz Chruscinski, Andrzej Jamiolkowski
Hardcover
R3,172
Discovery Miles 31 720
|