Skip to main content

Using Context-Aware Environment for Elderly Abuse Prevention

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9622))

Included in the following conference series:

  • 1590 Accesses

Abstract

Numerous national, international and private institutions indicate that in the field of elderly care there is an important, growing and unsolved problem of elderly abuse – also in certified nursing homes. Intelligent environments and contextual processing can be used as a set of tools for elderly abuse prevention and detection, to decrease possibility of a set of abusive behaviors such as neglect and psychological abuse. Thanks to the context of care giving facilities, intelligent sensors can act not only as a help for caregivers to monitor the patient, but can also provide a method to monitor caregivers work in private homes as well as in long term nursing and residential care facilities. The aim of this text is to present which elements of context-aware intelligent environments such as high-level contextual analysis of data, continuous monitoring and placement of main data processing outside of the care giving area are needed to build systems that can help to prevent elderly abuse. Text describes also how low-level contextual processing can enhance functionality of such systems by extending sensors battery life as well as decreasing usage of radio channels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sethi, D., Wood, S., Mitis, F., Bellis, M., Penhale, B., Marmolejo, I., Lowenstein, A., Manthorpe, G., Kärki, F.: European Report on Preventing Elder Maltreatment. World Health Organization (2011)

    Google Scholar 

  2. Georgantzi, N.: Elder Abuse and Neglect in the European Union. UN Open-ended Working Group on Ageing, AGE Platform Europe (2012)

    Google Scholar 

  3. Elder Abuse: Definitions. US Centers for Disease Control & Prevention, National Center for Injury Prevention (2015)

    Google Scholar 

  4. Choi, N.G., Mayer, J.: Elder abuse, neglect, and exploitation: risk factors and prevention strategies. J. Gerontological Soc. Work 33, 5–25 (2000)

    Article  Google Scholar 

  5. Abuse of Residents of Long Term Care Facilities Fact Sheet. National Center on Elder Abuse, University of California (2012)

    Google Scholar 

  6. Post, L., Page, C., Conner, T., Prokhorov, A., Fang, Y., Biroscak, B.: Elder abuse in long-term care: types, patterns, and risk factors. Res. Aging 32(3), 323–348 (2012)

    Article  Google Scholar 

  7. Teaster, P., Dugar, T., Mendiondo, M., Abner, E., Cecil, K., Otto, J.: The Survey of State Adult Protective Services: Abuse of Adults 60 Years of Age and Older. National Center on Elder Abuse (2006)

    Google Scholar 

  8. McDaid, D.: Measuring the quality of long-term care. Eurohealth 16(2), 1–44 (2010)

    Google Scholar 

  9. Report on Elder Maltreatment: Prevention Strategies. US Centers for Disease Control and Prevention, Division of Violence Prevention, Atlanta, USA (2014)

    Google Scholar 

  10. Abujarad, F., Swierenga, S.J., Dennis, T.A., Post, L.A.: Rap backs: continuous workforce monitoring to improve patient safety in long-term care. In: Marcus, A. (ed.) DUXU 2013, Part III. LNCS, vol. 8014, pp. 3–9. Springer, Heidelberg (2013)

    Google Scholar 

  11. Hossain, M.A., Ahmed, D.T.: A human caregiver support system in elderly monitoring facility. In: IEEE International Conference on Multimedia and Expo Workshops, pp. 435–440. IEEE (2012)

    Google Scholar 

  12. Chen, C.L., Yang, T.T., Leu, F.Y.: A secure authentication scheme of health care based on the cloud. In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 499–504 (2014)

    Google Scholar 

  13. Huk, M.: Learning distributed selective attention strategies with the Sigma-if neural network. In: Akbar, M., Hussain, D. (eds.) Advances in Computer Science and IT, pp. 209–232. InTech, Vukovar (2009)

    Google Scholar 

  14. Roy, N., Misra, A., Julien, C., Das, S.K., Biswas, J: An energy-efficient quality adaptive framework for multi-modal sensor context recognition. In: IEEE International Conference (2011)

    Google Scholar 

  15. Xing, X., Jing, T., Cheng, W., Huo, Y., Cheng, X.: Spectrum prediction in cognitive radio networks, next generation cognitive cellular networks. IEEE Wirel. Commun. 20(2), 90–96 (2013)

    Article  Google Scholar 

  16. Huk, M.: Backpropagation generalized delta rule for the selective attention sigma-if artificial neural network. Int. J. Appl. Math. Comput. Sci. 22(2), 449–459 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maciej Huk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huk, M. (2016). Using Context-Aware Environment for Elderly Abuse Prevention. In: Nguyen, N.T., Trawiński, B., Fujita, H., Hong, TP. (eds) Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science(), vol 9622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49390-8_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49390-8_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49389-2

  • Online ISBN: 978-3-662-49390-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics