![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Health & safety aspects of computing
Der Kostendruck im Gesundheitswesen steigt stetig und zwingt zum Handeln dringender denn je. Dieses Buch stellt die IT auf den Prufstand und zeigt, wie mit der Auswahl geeigneter Systeme Kosten reduziert und Ablaufe in medizinischen Einrichtungen optimiert werden konnen."
This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The book provides in-depth discussion about the security issues and protocols for pervasive healthcare. This book explores concepts and techniques behind the successive pervasive healthcare systems by providing in-depth knowledge about patient empowerment, remote patient monitoring, network establishment and protocols for effective pervasive healthcare. The book also provides case studies in the field. It is an ideal resource for researchers, students and healthcare organizations to get insight about the state of the art in pervasive healthcare systems. Provides current research, developments, and applications in pervasive healthcare; Includes technologies such as machine learning, cryptography, fog computing, and big data in the advancement of e-healthcare; Pertinent for researchers, students, practitioners and healthcare decision makers.
Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people-including those in influential business and government positions-are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.
Taxonomien sind Modelle, um unubersichtliche Domanen zu analysieren, Komplexitat zu reduzieren sowie Unterschiede und AEhnlichkeiten von Objekten zu erkennen. Ferner helfen sie, Wissen zu ordnen und so Wissen zu vergroessern. Da taglich neues Wissen entsteht, ist eine nutzungsorientierte Entwicklung von Taxonomien fur die Wissenschaft und die Praxis von fundamentaler Bedeutung. Taxonomien sind unerlasslich fur die Erforschung, Beschreibung und Strukturierung von Domanen. Trotz ihrer besonderen Bedeutung gibt es fur viele Wissenschaften nur wenige Handlungsanleitungen zur Entwicklung von Taxonomien. In diesem Buch werden die Forschungsergebnisse der Dissertation mit dem Titel "Entwicklung einer Taxonomie fur Patientenportale fur Health Information Manager" prasentiert. Aufgrund der detaillierten Darstellung der Entwicklungsschritte und der eingesetzten Methoden kann diese Dissertationsforschung als Anleitung zur Entwicklung von Taxonomien dienen. Dabei ist die Evaluierung fur die Nutzlichkeit einer Taxonomie massgeblich. Mit dem "TED Taxonomy-Evaluation-Delphi Approach" entwickelte der Autor eine neue Methode zur Evaluierung von Taxonomien, welche hier ausfuhrlich beschrieben wird.
This compilation details the challenges in the development of computer systems more complexed by AI/IoT using examples based on systems thinking, as well as introduces how these technologies can aid in safety and security. The authors carry out a study to establish the safety and security challenges preventing parents from enrolling their young children in schools, with the intention of recommending strategies to address these challenges. This study is guided by the ecological systems theory which explains how factors within the environment influence children's development and education. The concluding section focuses on the system dynamics paradigm which seems to be a suitable modeling method to describe social engineering situations. Opportunities for future research are also discussed.
Thomas Schuler stellt ein Therapiesystem vor, das abstrakte visuelle Effekte als Ruckmeldung auf Bewegungen anzeigt. Einem selbstgesteuerten und explorierenden Ansatz folgend lernen Schlaganfallpatienten mit diesem System motorische Fahigkeiten mit Bezug auf die visuelle Wahrnehmung, wodurch die Lernprozesse gefoerdert werden. Der Autor erlautert die Hintergrunde und Hypothesen, die Entwicklung des AVUS-Therapiesystems sowie eine prospektive empirische Untersuchung im klinischen Kontext und zeigt, wie virtuelle Umgebungen die motorische Rehabilitation nach einem Schlaganfall unterstutzen koennen, wenn sie durch naturliche Bewegungen gesteuert werden.
This book provides a unique introduction to the vast field of Medical Imaging Informatics for students and physicians by depicting the basics of the different areas in Radiology Informatics. It features short chapters on the different main areas in Medical Imaging Informatics, such as Picture Archiving and Communication Systems (PACS), radiology reporting, data sharing, and de-identification and anonymization, as well as standards like Digital Imaging and Communications in Medicine (DICOM), Integrating the Health Enterprise (IHE) and Health Level 7 (HL7,. Written by experts in the respective fields and endorsed by the European Society of Medical Imaging Informatics (EuSoMII) the scope of the book is based on the Medical Imaging Informatics sub-sections of the European Society of Radiology (ESR) European Training Curriculum Undergraduate Level and Level I. This volume will be an invaluable resource for residents and radiologists and is also specifically suited for undergraduate training.
Cyberbullying and online victimisation in general are high on the public agenda. As cyber technology continues to evolve, we must consider how best we can support our children and young people in enjoying the benefits that come with the online world, whilst also protecting them from harm. This book provides a timely review and analyses of the international literature on cyberbullying. Beginning with an overview of the evolution of international research to date, the chapters deal with some of the fundamental issues facing researchers, practitioners, and policymakers. The authors deal with issues such as how best to define cyberbullying, what we currently know about the prevalence of the behaviour, the role of gender in cyberbullying, and alternative theoretical perspectives. Cross-national research is reviewed with the objective of highlighting the similarities across different nations whilst also emphasising the uniqueness and importance of cultural context when attempting to intervene effectively. Due to the research-evident potential for harm as a consequence of cyberbullying, it is important that we move towards appropriate coping and intervention strategies. Therefore, this book also focuses on effective coping strategies at an individual level and at a societal level, examining issues such as education and legislation in relation to cyberbullying. Furthermore, the contemporary knowledge regarding prevention and intervention is explored, with a number perspectives provided. Ultimately, this book presents a state-of-the-art review of cyberbullying knowledge in 2016 and looks to the future with recommendations for development of theory, research, practice, and policy.
This book equips readers to understand a complex range of healthcare products that are used to diagnose, monitor, and treat diseases or medical conditions affecting humans. The first part of the book presents medical technologies such as medical information retrieval, tissue engineering techniques, 3D medical imaging, nanotechnology innovations in medicine, medical wireless sensor networks, and knowledge mining techniques in medicine. The second half of the book focuses on healthcare technologies including prediction hospital readmission risk, modeling e-health framework, personal Web in healthcare, security issues for medical records, and personalized services in healthcare. The contributors are leading world researchers who share their innovations, making this handbook the definitive resource on these topics. Handbook of Medical and Healthcare Technologies is intended for a wide audience including academicians, designers, developers, researchers and advanced-level students. It is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries.
A thorough update to a classic in the field of privacy and big data. We have a global privacy problem. The average person provides more information about themselves to more outsiders than any time in history. Corporations, governments and even our neighbors can know where we are at times, can quickly learn our preferences and priorities and see who we meet. The past decade has brought deep changes in the collection of our private information, the regulation of that collection, and in people's sensitivity to loss of privacy. The nascent privacy-threatening technology trends of a decade ago have blossomed into relentless data-capturing systems that police and companies have come to rely on. To address the expansion of personal data capture, entire data regulatory regimes have arisen throughout the world, with new regulations added each year. People are more concerned, regulators are more aggressive, yet data collection continues to increase with consequences around the world. Social media use has fragmented in the past five years, spreading personal information over dozens of platforms. Even most of our new televisions have started collecting second-by-second information about our households recently, and some of those televisions can recognize the individuals watching and the devices they carry. Amazon just activated a new worldwide network using bandwidth from personal wifi of Echo devices and Ring security systems. The beat of new intrusions never seems to end. These data trends are relentless, and yet response to the pandemic accelerated them. Rapid development of "contactless everything" became the norm. Contact tracing apps became acceptable. QR codes for everything from menus to contact information were created quickly. Businesses are faced with hybrid in office and remote workforces. More people are dependent on online and mobile technologies for food, medicine, and even human connection. And each of these contacts can be captured somewhere and logged in a file for marketing or surveillance. People want to keep their lives private, but they don't know how. The second edition of Privacy in the Age of Big Data addresses the significant advances in data-driven technology, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of world rife with ransomware and hacking. This thoroughly updated edition demonstrates personal privacy vulnerabilities and shows ways to live a safer, more private life. Other privacy books tend to focus deeply on the evils of large tech companies or more academic and technical concerns. But Privacy in the Age of Big Data, second edition, helps regular people understand the privacy threats and vulnerabilities in their daily lives and will provide solutions for maintaining better privacy while enjoying a modern life. Unlike other books, this one shows what you can do to make a difference to understand your current digital footprint and what you need to do to claw back your privacy and secure it in the future. While PRIVACY IN THE AGE OF BIG DATA will have cross-sectional appeal to many demographics, working adults 25-60 and CEOs and Boards of businesses are the primary demographic--young enough to know we need to do something to protect privacy and old enough to remember what happens when we haven't in the past. With down-to-earth prose and examples pulled from daily life, the writing style will attract buyers of all education levels.
This book is a small contribution towards the development of a more user-centred approach to information technology design methods. It discusses the job design and organisational change issues in the planning domain when information technology systems are being contemplated. |
You may like...
Energy Methods and Finite Element…
Muhsin Jweeg, Muhannad Al-Waily, …
Paperback
R4,703
Discovery Miles 47 030
Highlights in Lie Algebraic Methods
Anthony Joseph, Anna Melnikov, …
Hardcover
R2,668
Discovery Miles 26 680
Handbook of Weighted Automata
Manfred Droste, Werner Kuich, …
Hardcover
R5,960
Discovery Miles 59 600
Mechanics Of Materials - SI Edition
Barry Goodno, James Gere
Paperback
|