You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In The Patient Revolution, author Krisa Tailor—a noted expert in health care innovation and management—explores, through the lens of design thinking, how information technology will take health care into the experience economy. In the experience economy, patients will shift to being empowered consumers who are active participants in their own care. Tailor explores this shift by creating a vision for a newly designed health care system that's focused on both sickness and wellness, and is driven by data and analytics. The new system seamlessly integrates health into our daily lives, and delivers care so uniquely personalized that no two people are provided identical treatments. Connected t...
An integrated, strategic approach to higher-value analytics Leaders and Innovators: How Data-Driven Organizations Are Winning with Analytics shows how businesses leverage enterprise analytics to gain strategic insights for profitability and growth. The key factor is integrated, end-to-end capabilities that encompass data management and analytics from a business and IT perspective; with analytics running inside a database where the data reside, everyday analytical processes become streamlined and more efficient. This book shows you what analytics is, what it can do, and how you can integrate old and new technologies to get more out of your data. Case studies and examples illustrate real-world...
Cut warranty costs by reducing fraud with transparent processes and balanced control Warranty Fraud Management provides a clear, practical framework for reducing fraudulent warranty claims and other excess costs in warranty and service operations. Packed with actionable guidelines and detailed information, this book lays out a system of efficient warranty management that can reduce costs without upsetting the customer relationship. You'll dig into the whole spectrum of warranty fraud, from simple sloppy procedures to systematic organized crime, and get to know the fraudulent parties, the victims, as well as the objectives and methods of the fraudulent activities in different scenarios. You'l...
This monograph integrates theoretical perspectives on affect and learning with recent research in affective computing with an emphasis on building new learning technologies. The "new perspectives" come from the intersection of several research themes: -Basic research on emotion, cognition, and motivation applied to learning environments -Pedagogical and motivational strategies that are sensitive to affective and cognitive processes -Multimodal Human Computer Interfaces, with a focus on affect recognition and synthesis -Recent advances in affect-sensitive Intelligent Tutoring Systems -Novel methodologies to investigate affect and learning -Neuroscience research on emotions and learning
Uncover the financial fraud that funds terrorist organizations Trade-Based Money Laundering is an authoritative examination of this burgeoning phenomenon, now coming under scrutiny in the War on Terror. This book walks you through the signs and patterns of trade-based money laundering (TBML) to help you recognize it when it occurs, and shows you how data and analytics can be used to detect it. You'll learn the common value transfer techniques including invoice fraud, over-and-under invoicing, and misrepresentation, and learn why analytic detection systems have yet to be implemented despite the existence of copious data. Case studies from around the world highlight the real-life implications ...
Design quality SAS software and evaluate SAS software quality SAS Data Analytic Development is the developer’s compendium for writing better-performing software and the manager’s guide to building comprehensive software performance requirements. The text introduces and parallels the International Organization for Standardization (ISO) software product quality model, demonstrating 15 performance requirements that represent dimensions of software quality, including: reliability, recoverability, robustness, execution efficiency (i.e., speed), efficiency, scalability, portability, security, automation, maintainability, modularity, readability, testability, stability, and reusability. The tex...
This book constitutes the refereed proceedings of the 9th International Conference on Intelligent Tutoring Systems, ITS 2008, held in Montreal, Canada, in June 2008. The 63 revised full papers and 61 poster papers presented together with abstracts of 5 keynote talks were carefully reviewed and selected from 207 submissions. The papers are organized in topical sections on emotion and affect, tutor evaluation, student modeling, machine learning, authoring tools , tutor feedback and intervention, data mining, e-learning and Web-based ITS, natural language techniques and dialogue, narrative tutors and games, semantic Web and ontology, cognitive models, and collaboration.
Effective transaction monitoring begins with proper implementation Anti-Money Laundering Transaction Monitoring Systems Implementation provides comprehensive guidance for bank compliance and IT personnel tasked with implementing AML transaction monitoring. Written by an authority on data integration and anti-money laundering technology, this book offers both high-level discussion of transaction monitoring concepts and direct clarification of practical implementation techniques. All transaction monitoring scenarios are composed of a few common elements, and a deep understanding of these elements is the critical factor in achieving your goal; without delving into actual code, this guide provid...
The long-awaited, comprehensive guide to practical credit risk modeling Credit Risk Analytics provides a targeted training guide for risk managers looking to efficiently build or validate in-house models for credit risk management. Combining theory with practice, this book walks you through the fundamentals of credit risk management and shows you how to implement these concepts using the SAS credit risk management program, with helpful code provided. Coverage includes data analysis and preprocessing, credit scoring; PD and LGD estimation and forecasting, low default portfolios, correlation modeling and estimation, validation, implementation of prudential regulation, stress testing of existin...