Skip to main content

Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System

  • Conference paper
  • First Online:
Internet of Things. User-Centric IoT (IoT360 2014)

Abstract

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. JN: Maus tratos a crianças cada vez mais perversos e difíceis de identificar. Jornal De Notícias. Controlinveste (2013). www.jn.pt

  2. ISO: ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems – Requirements. ISO (2013)

    Google Scholar 

  3. Oladimeji, E.A., Chung, L., Jung, H.T., Kim, J.: Managing security and privacy in ubiquitous eHealth information interchange, vol. 10, pp. 26:1–26 (2011)

    Google Scholar 

  4. IRMA: User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications: IGI Global (2013)

    Google Scholar 

  5. H. S. O. WG: HL7 Version 3 Standard: Security and Privacy Ontology, Release 1, Version 3 ed: HL7 (2013)

    Google Scholar 

  6. S.W.g.o. HL7: Composite Security and Privacy - Domain analysis Model Report, Ballot, HL7, May 2010

    Google Scholar 

  7. P. M. o. Health: Despacho n.º 31292/2008, in 236, ed. Diário da república: INCM (2008)

    Google Scholar 

  8. Hevner, A., Chatterjee, S.: Design Science Research in Information Systems. Design Research in Information Systems, pp. 9–22. Springer, Heidelberg (2010)

    Google Scholar 

  9. March, S.T., Hevner, A.R., Park, J., Ram, S.: Design science in information systems research. Manage. Inf. Syst. Q. 28, 75–105 (2004)

    Google Scholar 

  10. Pereira, T.R., Santos, H.: Critical knowledge monitor system model: healthcare context. In: European Conference on Knowledge Management, Cartagena, Spain (2012)

    Google Scholar 

  11. Pereira, T., Santos, H.: Health care critical knowledge monitor system model: health care critical knowledge ontology component. In: SHEWC2013 - XIII Safety, Health and Environment World Congress, Porto, Portugal, p. 002 (2013)

    Google Scholar 

  12. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003)

    MATH  Google Scholar 

  13. Hofmann, T.: Unsupervised learning by probabilistic latent semantic analysis. Mach. Learn. 42, 177–196 (2001)

    Article  MATH  Google Scholar 

  14. Steyvers, M., Griffiths, T.: Probabilistic topic models. In: Landauer, T., McNamara, D.S., Dennis, S., Kintsch, W. (eds.) Handbook of Latent Semantic Analysis, vol. 427, pp. 424–440. Erlbaum, Hillsdale (2007)

    Google Scholar 

  15. Mimno, D., Li, W., McCallum, A.: Mixtures of hierarchical topics with pachinko allocation. In: Proceedings of ICML, pp. 633–640 (2007)

    Google Scholar 

  16. Li, W., McCallum, A.: Pachinko allocation: DAG-structured mixture models of topic correlations. In: Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh, Pennsylvania (2006)

    Google Scholar 

  17. Sharda, R., Delen, D., Turban, E.: Decision Support and Business Intelligence Systems, 9th edn. Prentice Hall Press, Upper Saddle River (2010)

    Google Scholar 

  18. Pereira, T.R., Santos, H.: The matrix of quality dimensions of knowledge management: knowledge management assessment models review. Knowl. Manage. Int. J 12, 33–41 (2013)

    Google Scholar 

Download references

Acknowledgement

This work is financed by FEDER funds through the Competitive Factors Operational Program – COMPETE and Portuguese national funds through FCT – Fundação para a ciência e tecnologia in project FCOMP-01-0124-FEDER-022674.

This work was conducted using the Protégé resource, which is supported by grant GM10331601 from the National Institute of General Medical Sciences of the United States National Institutes of Health.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiago Pereira .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pereira, T., Santos, H. (2015). Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System. In: Giaffreda, R., et al. Internet of Things. User-Centric IoT. IoT360 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 150. Springer, Cham. https://doi.org/10.1007/978-3-319-19656-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19656-5_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19655-8

  • Online ISBN: 978-3-319-19656-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics