113,268 research outputs found
Online television library: organization and content browsing for general users
This paper describes the organisational and playback features of Físchlár, a digital video library that allows users to record, browse and watch television programmes online. Programmes that can be watched and recorded are organised by personal recommendations, genre classifications, name and other attributes for access by general television users. Motivations and interactions of users with online television libraries are outlined and they are also supported by personalised library access,
categorised programmes, a combined player browser with content viewing history and content marks. The combined player browser supports a user who watches a programme on different occasions in a non-sequential order
Use of the Físchlár video library system
Físchlár is a shared video retrieval system that lets users record, browse and watch television programmes using their web browser. In Físchlár, the programmes users can watch and record are organised by channel, by theme and by personal recommendation as provided by the ChangingWorlds’ ClixSmart personalisation engine. Our initial results from user trials illustrate the usage of each of these features
Browser Update Practices in Households: Insights from Protection Motivation Theory and Customer Satisfaction
Web Browser is the most common tool used for surfing the Internet. With personal computer users growing by leaps and bounds, the use of browsers is also increasing at a similar rate. Outdated versions of browsers have security flaws and hence represent a significant threat to the cyber infrastructure. Yet many users do not keep their browsers updated. Given the fact that voluntariness of action characterizes personal computer users\u27 security behavior, we argue that satisfaction derived from using the browser along with perceptions of threat severity and vulnerability play an important role in browser update intention. However, considering the inconsistency of household computer users\u27 behavior, we posit that urgency plays a role in the browser update behavior. Using a combined model of Customer Satisfaction and Protection Motivation Theory along with positive and negative urgency as direct antecedents’ to behavior, we evaluate the important antecedents to browser update intentions
Web-browser encryption of personal health information
<p>Abstract</p> <p>Background</p> <p>Electronic health records provide access to an unprecedented amount of clinical data for research that can accelerate the development of effective medical practices. However it is important to protect patient confidentiality, as many medical conditions are stigmatized and disclosure could result in personal and/or financial loss.</p> <p>Results</p> <p>We describe a system for remote data entry that allows the data that would identify the patient to be encrypted in the web browser of the person entering the data. These data cannot be decrypted on the server by the staff at the data center but can be decrypted by the person entering the data or their delegate. We developed this system to solve a problem that arose in the context of clinical research, but it is applicable in a range of situations where sensitive information is stored and updated in a database and it is necessary to ensure that it cannot be viewed by any except those intentionally given access.</p> <p>Conclusion</p> <p>By developing this system, we are able to centralize the collection of some patient data while minimizing the risk that protected health information be made available to study personnel who are not authorized to use it.</p
A Non-Visual Photo Collection Browser based on Automatically Generated Text Descriptions
This study presents a textual photo collection
browser that automatically and quickly analyses large personal
photo collections and produces textual reports that can be
accessed by blind users using either text-to-speech or Braille
output devices. The textual photo browser exploits recent
advances in image collection analysis and the strategy does not
rely on manual image tagging. The reports produced by the
textual image browser gives the user a gist about where, when
and what the photographer was doing in the form of a story.
Although yet crude, the strategy can give blind users a
valuable overview about the contents of large image collections
and individual images which otherwise are totally inaccessible
without vision
Recommended from our members
The Case for Browser Provenance
In our increasingly networked world, web browsers are important applications. Originally an interface tool for accessing distributed documents, browsers have become ubiquitous, incorporating a significant portion of user interaction. A modern browser now also reads email, plays media, edits documents, and runs applications. Consequently, browsers process large quantities of data, and must record metadata, such as history, to help users manage their data. Most of the metadata that modern browsers record is actually provenance – metadata that captures the causality and lineage of data obtained via the browser. We demonstrate that characterizing browser metadata as provenance and then applying techniques from the provenance research community enables new browser functionality. For example, provenance can improve both history and web search by indicating contextual and personal relationships between data items. Users can also answer complex questions about the origins of their data by querying provenance. Our initial results suggest these features are feasible to implement and could perform well in modern browsers.Engineering and Applied Science
- …