0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (11)
  • R500+ (500)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Health & safety aspects of computing

The 4-WEEK MEMORY CHALLENGE (Paperback): Shireen Stephen The 4-WEEK MEMORY CHALLENGE (Paperback)
Shireen Stephen
R459 Discovery Miles 4 590 Ships in 18 - 22 working days
It-Systeme in Der Medizin - It-Entscheidungshilfe Fur Den Medizinbereich - Konzepte, Standards Und Optimierte Prozesse (German,... It-Systeme in Der Medizin - It-Entscheidungshilfe Fur Den Medizinbereich - Konzepte, Standards Und Optimierte Prozesse (German, Paperback, 2006 ed.)
Hartmut Barwolff, Frank Victor, Volker Husken
R1,948 Discovery Miles 19 480 Ships in 10 - 15 working days

Der Kostendruck im Gesundheitswesen steigt stetig und zwingt zum Handeln dringender denn je. Dieses Buch stellt die IT auf den Prufstand und zeigt, wie mit der Auswahl geeigneter Systeme Kosten reduziert und Ablaufe in medizinischen Einrichtungen optimiert werden konnen."

Pervasive Healthcare - A Compendium of Critical Factors for Success (Hardcover, 1st ed. 2022): Mohammad Shahid Husain, Muhamad... Pervasive Healthcare - A Compendium of Critical Factors for Success (Hardcover, 1st ed. 2022)
Mohammad Shahid Husain, Muhamad Hariz Bin Muhamad Adnan, Mohammad Zunnun Khan, Saurabh Shukla, Fahad U Khan
R3,286 Discovery Miles 32 860 Ships in 10 - 15 working days

This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The book provides in-depth discussion about the security issues and protocols for pervasive healthcare. This book explores concepts and techniques behind the successive pervasive healthcare systems by providing in-depth knowledge about patient empowerment, remote patient monitoring, network establishment and protocols for effective pervasive healthcare. The book also provides case studies in the field. It is an ideal resource for researchers, students and healthcare organizations to get insight about the state of the art in pervasive healthcare systems. Provides current research, developments, and applications in pervasive healthcare; Includes technologies such as machine learning, cryptography, fog computing, and big data in the advancement of e-healthcare; Pertinent for researchers, students, practitioners and healthcare decision makers.

Entwicklung der TOPCOP Taxonomie fur Patientenportale - Forschungsdesign, Methoden und Anleitung zur Entwicklung und... Entwicklung der TOPCOP Taxonomie fur Patientenportale - Forschungsdesign, Methoden und Anleitung zur Entwicklung und Evaluierung einer Taxonomie (German, Paperback, 1. Aufl. 2023 ed.)
Michael Gloeggler
R1,684 Discovery Miles 16 840 Ships in 10 - 15 working days

Taxonomien sind Modelle, um unubersichtliche Domanen zu analysieren, Komplexitat zu reduzieren sowie Unterschiede und AEhnlichkeiten von Objekten zu erkennen. Ferner helfen sie, Wissen zu ordnen und so Wissen zu vergroessern. Da taglich neues Wissen entsteht, ist eine nutzungsorientierte Entwicklung von Taxonomien fur die Wissenschaft und die Praxis von fundamentaler Bedeutung. Taxonomien sind unerlasslich fur die Erforschung, Beschreibung und Strukturierung von Domanen. Trotz ihrer besonderen Bedeutung gibt es fur viele Wissenschaften nur wenige Handlungsanleitungen zur Entwicklung von Taxonomien. In diesem Buch werden die Forschungsergebnisse der Dissertation mit dem Titel "Entwicklung einer Taxonomie fur Patientenportale fur Health Information Manager" prasentiert. Aufgrund der detaillierten Darstellung der Entwicklungsschritte und der eingesetzten Methoden kann diese Dissertationsforschung als Anleitung zur Entwicklung von Taxonomien dienen. Dabei ist die Evaluierung fur die Nutzlichkeit einer Taxonomie massgeblich. Mit dem "TED Taxonomy-Evaluation-Delphi Approach" entwickelte der Autor eine neue Methode zur Evaluierung von Taxonomien, welche hier ausfuhrlich beschrieben wird.

A Closer Look at Safety and Security (Paperback): Jeff M. Holder A Closer Look at Safety and Security (Paperback)
Jeff M. Holder
R1,985 Discovery Miles 19 850 Ships in 10 - 15 working days

This compilation details the challenges in the development of computer systems more complexed by AI/IoT using examples based on systems thinking, as well as introduces how these technologies can aid in safety and security. The authors carry out a study to establish the safety and security challenges preventing parents from enrolling their young children in schools, with the intention of recommending strategies to address these challenges. This study is guided by the ecological systems theory which explains how factors within the environment influence children's development and education. The concluding section focuses on the system dynamics paradigm which seems to be a suitable modeling method to describe social engineering situations. Opportunities for future research are also discussed.

Abstrakte virtuelle Illusionen fur die Schlaganfalltherapie - Wie mit Hilfe virtueller Umgebungen motorisches Lernen gefoerdert... Abstrakte virtuelle Illusionen fur die Schlaganfalltherapie - Wie mit Hilfe virtueller Umgebungen motorisches Lernen gefoerdert werden kann (German, Paperback, 2015 ed.)
Thomas Schuler
R1,860 Discovery Miles 18 600 Ships in 18 - 22 working days

Thomas Schuler stellt ein Therapiesystem vor, das abstrakte visuelle Effekte als Ruckmeldung auf Bewegungen anzeigt. Einem selbstgesteuerten und explorierenden Ansatz folgend lernen Schlaganfallpatienten mit diesem System motorische Fahigkeiten mit Bezug auf die visuelle Wahrnehmung, wodurch die Lernprozesse gefoerdert werden. Der Autor erlautert die Hintergrunde und Hypothesen, die Entwicklung des AVUS-Therapiesystems sowie eine prospektive empirische Untersuchung im klinischen Kontext und zeigt, wie virtuelle Umgebungen die motorische Rehabilitation nach einem Schlaganfall unterstutzen koennen, wenn sie durch naturliche Bewegungen gesteuert werden.

?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback): Cory Silverberg ?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback)
Cory Silverberg; Illustrated by Fiona Smyth
R261 R240 Discovery Miles 2 400 Save R21 (8%) Ships in 18 - 22 working days
Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover): Davey Gibian Hacking Artificial Intelligence - A Leader's Guide from Deepfakes to Breaking Deep Learning (Hardcover)
Davey Gibian
R983 Discovery Miles 9 830 Ships in 18 - 22 working days

Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people-including those in influential business and government positions-are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.

Bullying & Cyberbullying - Prevalence, Psychological Impacts & Intervention Strategies (Hardcover): Conor McGuckin, Lucie... Bullying & Cyberbullying - Prevalence, Psychological Impacts & Intervention Strategies (Hardcover)
Conor McGuckin, Lucie Corcoran
R5,966 R5,539 Discovery Miles 55 390 Save R427 (7%) Ships in 10 - 15 working days

Cyberbullying and online victimisation in general are high on the public agenda. As cyber technology continues to evolve, we must consider how best we can support our children and young people in enjoying the benefits that come with the online world, whilst also protecting them from harm. This book provides a timely review and analyses of the international literature on cyberbullying. Beginning with an overview of the evolution of international research to date, the chapters deal with some of the fundamental issues facing researchers, practitioners, and policymakers. The authors deal with issues such as how best to define cyberbullying, what we currently know about the prevalence of the behaviour, the role of gender in cyberbullying, and alternative theoretical perspectives. Cross-national research is reviewed with the objective of highlighting the similarities across different nations whilst also emphasising the uniqueness and importance of cultural context when attempting to intervene effectively. Due to the research-evident potential for harm as a consequence of cyberbullying, it is important that we move towards appropriate coping and intervention strategies. Therefore, this book also focuses on effective coping strategies at an individual level and at a societal level, examining issues such as education and legislation in relation to cyberbullying. Furthermore, the contemporary knowledge regarding prevention and intervention is explored, with a number perspectives provided. Ultimately, this book presents a state-of-the-art review of cyberbullying knowledge in 2016 and looks to the future with recommendations for development of theory, research, practice, and policy.

Handbook of Medical and Healthcare Technologies (Paperback, Softcover reprint of the original 1st ed. 2013): Borko Furht, Ankur... Handbook of Medical and Healthcare Technologies (Paperback, Softcover reprint of the original 1st ed. 2013)
Borko Furht, Ankur Agarwal
R5,402 Discovery Miles 54 020 Ships in 18 - 22 working days

This book equips readers to understand a complex range of healthcare products that are used to diagnose, monitor, and treat diseases or medical conditions affecting humans. The first part of the book presents medical technologies such as medical information retrieval, tissue engineering techniques, 3D medical imaging, nanotechnology innovations in medicine, medical wireless sensor networks, and knowledge mining techniques in medicine. The second half of the book focuses on healthcare technologies including prediction hospital readmission risk, modeling e-health framework, personal Web in healthcare, security issues for medical records, and personalized services in healthcare. The contributors are leading world researchers who share their innovations, making this handbook the definitive resource on these topics. Handbook of Medical and Healthcare Technologies is intended for a wide audience including academicians, designers, developers, researchers and advanced-level students. It is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries.

Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second... Privacy in the Age of Big Data - Recognizing Threats, Defending Your Rights, and Protecting Your Family (Hardcover, Second Edition)
Theresa Payton, Ted Claypoole
R958 Discovery Miles 9 580 Ships in 18 - 22 working days

A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.

Information Technology And Organisational Change (Paperback): K.D. Eason Information Technology And Organisational Change (Paperback)
K.D. Eason
R2,455 Discovery Miles 24 550 Ships in 10 - 15 working days

This book is a small contribution towards the development of a more user-centred approach to information technology design methods. It discusses the job design and organisational change issues in the planning domain when information technology systems are being contemplated.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Growing Your Library Career with Social…
Daniella Smith Paperback R1,630 Discovery Miles 16 300
Optimal State Estimation for Process…
Ch. Venkateswarlu, Rama Rao Karri Paperback R4,214 Discovery Miles 42 140
Mastering Microsoft Dynamics 365…
E Newell Paperback R848 Discovery Miles 8 480
Intelligent Edge Computing for Cyber…
D. Jude Hemanth, Bb Gupta, … Paperback R2,954 Discovery Miles 29 540
Neutrosophic Set in Medical Image…
Yanhui Guo, Amira Ashour Paperback R3,455 Discovery Miles 34 550
Anomaly Detection and Complex Event…
Patrick Schneider, Fatos Xhafa Paperback R2,652 Discovery Miles 26 520
The Feature-Driven Method for Structural…
Weihong Zhang, Ying Zhou Paperback R3,489 Discovery Miles 34 890
Kanban - Quick Start Guide to Kanban For…
Lilian Irwin Hardcover R702 R621 Discovery Miles 6 210
Agile User Experience Design - A…
Diana Brown Paperback R895 Discovery Miles 8 950
International Encyclopedia of…
Roger Vickerman Hardcover R79,215 Discovery Miles 792 150

 

Partners