Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance.
about
Should health organizations use web 2.0 media in times of an infectious disease crisis? An in-depth qualitative study of citizens' information behavior during an EHEC outbreakCrowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC standards and application examplesScoping review on search queries and social media for disease surveillance: a chronology of innovationRevisiting Information Technology tools serving authorship and editorship: a case-guided tutorial to statistical analysis and plagiarism detection.Infodemiology of alcohol use in Hong Kong mentioned on blogs: infoveillance study.How Twitter Is Studied in the Medical Professions: A Classification of Twitter Papers Indexed in PubMed.Optimizing sentinel surveillance in temporal network epidemiologyUsing metrics to describe the participative stances of members within discussion forums.Disease Surveillance on Complex Social Networks.Exploring 2-1-1 service requests as potential markers for cancer control needs.Information needs of public health practitioners: a review of the literature.Exploring the use of technology pathways to access health information by Australian university students: a multi-dimensional approach.Confronting the data-divide in a time of spatial turns and volunteered geographic informationOptimal multi-source forecasting of seasonal influenza
P2860
Q28673097-E98DA7F0-D226-4AC1-BBA4-667E07EAF099Q28732246-CA7555C3-2DE4-484D-B7D1-D809A6873182Q30352463-5A85F300-C0F7-4D6E-924F-D15356E0D6BCQ30484936-6D604665-ED06-4FE0-B470-85703B555A5BQ31136862-203CA88D-A69B-4AE4-95C6-0EC84386521DQ33855363-2F1A91B1-1467-480E-8162-E89FEF0879AAQ33881192-3D28110D-167F-4945-BED2-DC694F7F7A6EQ35565103-29C724B2-D364-48AB-BA91-5EA292C66AF5Q36077496-0EF40208-89F0-4359-98D3-A0AC57889D31Q36429367-7CC75355-8EEE-44DD-A6FF-28EB485E3744Q38061920-4F96FD6A-8AAF-476A-8E50-72AC94EC7E94Q38686855-9C742294-0C48-4754-A026-AAC3AC1117E0Q57922811-03471983-2916-4171-B03D-BAC2A6A027ECQ58764582-606B443B-78C7-449B-8320-8D16E757FD64
P2860
Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance.
description
2010 nî lūn-bûn
@nan
2010年の論文
@ja
2010年学术文章
@wuu
2010年学术文章
@zh-cn
2010年学术文章
@zh-hans
2010年学术文章
@zh-my
2010年学术文章
@zh-sg
2010年學術文章
@yue
2010年學術文章
@zh
2010年學術文章
@zh-hant
name
Social Web mining and exploita ...... ational security surveillance.
@en
Social Web mining and exploita ...... ational security surveillance.
@nl
type
label
Social Web mining and exploita ...... ational security surveillance.
@en
Social Web mining and exploita ...... ational security surveillance.
@nl
prefLabel
Social Web mining and exploita ...... ational security surveillance.
@en
Social Web mining and exploita ...... ational security surveillance.
@nl
P921
P1476
Social Web mining and exploita ...... ational security surveillance.
@en
P2093
Courtney D Corley
Steve Wheeler
P356
10.1016/J.CMPB.2010.02.007
P577
2010-03-17T00:00:00Z