WorldWideScience

Sample records for video content privacy

  1. Privacy-protecting video surveillance

    Science.gov (United States)

    Wickramasuriya, Jehan; Alhazzazi, Mohanned; Datt, Mahesh; Mehrotra, Sharad; Venkatasubramanian, Nalini

    2005-02-01

    Forms of surveillance are very quickly becoming an integral part of crime control policy, crisis management, social control theory and community consciousness. In turn, it has been used as a simple and effective solution to many of these problems. However, privacy-related concerns have been expressed over the development and deployment of this technology. Used properly, video cameras help expose wrongdoing but typically come at the cost of privacy to those not involved in any maleficent activity. This work describes the design and implementation of a real-time, privacy-protecting video surveillance infrastructure that fuses additional sensor information (e.g. Radio-frequency Identification) with video streams and an access control framework in order to make decisions about how and when to display the individuals under surveillance. This video surveillance system is a particular instance of a more general paradigm of privacy-protecting data collection. In this paper we describe in detail the video processing techniques used in order to achieve real-time tracking of users in pervasive spaces while utilizing the additional sensor data provided by various instrumented sensors. In particular, we discuss background modeling techniques, object tracking and implementation techniques that pertain to the overall development of this system.

  2. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video....... There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...... of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure....

  3. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  4. Social video content delivery

    CERN Document Server

    Wang, Zhi; Zhu, Wenwu

    2016-01-01

    This brief presents new architecture and strategies for distribution of social video content. A primary framework for socially-aware video delivery and a thorough overview of the possible approaches is provided. The book identifies the unique characteristics of socially-aware video access and social content propagation, revealing the design and integration of individual modules that are aimed at enhancing user experience in the social network context. The change in video content generation, propagation, and consumption for online social networks, has significantly challenged the traditional video delivery paradigm. Given the massive amount of user-generated content shared in online social networks, users are now engaged as active participants in the social ecosystem rather than as passive receivers of media content. This revolution is being driven further by the deep penetration of 3G/4G wireless networks and smart mobile devices that are seamlessly integrated with online social networking and media-sharing s...

  5. Video Content Foraging

    NARCIS (Netherlands)

    van Houten, Ynze; Schuurman, Jan Gerrit; Verhagen, Pleunes Willem; Enser, Peter; Kompatsiaris, Yiannis; O’Connor, Noel E.; Smeaton, Alan F.; Smeulders, Arnold W.M.

    2004-01-01

    With information systems, the real design problem is not increased access to information, but greater efficiency in finding useful information. In our approach to video content browsing, we try to match the browsing environment with human information processing structures by applying ideas from

  6. Security and Privacy in Video Surveillance: Requirements and Challenges

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    Use of video surveillance has substantially increased in the last few decades. Modern video surveillance systems are equipped with techniques that allow traversal of data in an effective and efficient manner, giving massive powers to operators and potentially compromising the privacy of anyone...... observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...

  7. Adaptive Transformation for Robust Privacy Protection in Video Surveillance

    Directory of Open Access Journals (Sweden)

    Mukesh Saini

    2012-01-01

    Full Text Available Privacy is a big concern in current video surveillance systems. Due to privacy issues, many strategic places remain unmonitored leading to security threats. The main problem with existing privacy protection methods is that they assume availability of accurate region of interest (RoI detectors that can detect and hide the privacy sensitive regions such as faces. However, the current detectors are not fully reliable, leading to breaches in privacy protection. In this paper, we propose a privacy protection method that adopts adaptive data transformation involving the use of selective obfuscation and global operations to provide robust privacy even with unreliable detectors. Further, there are many implicit privacy leakage channels that have not been considered by researchers for privacy protection. We block both implicit and explicit channels of privacy leakage. Experimental results show that the proposed method incurs 38% less distortion of the information needed for surveillance in comparison to earlier methods of global transformation; while still providing near-zero privacy loss.

  8. Video databases: automatic retrieval based on content.

    Science.gov (United States)

    Bolle, R. M.; Yeo, B.-L.; Yeung, M.

    Digital video databases are becoming more and more pervasive and finding video of interest in large databases is rapidly becoming a problem. Intelligent means of quick content-based video retrieval and content-based rapid video viewing is, therefore, an important topic of research. Video is a rich source of data, it contains visual and audio information, and in many cases, there is text associated with the video. Content-based video retrieval should use all this information in an efficient and effective way. From a human perspective, a video query can be viewed as an iterated sequence of navigating, searching, browsing, and viewing. This paper addresses video search in terms of these phases.

  9. Video quality assessment for web content mirroring

    Science.gov (United States)

    He, Ye; Fei, Kevin; Fernandez, Gustavo A.; Delp, Edward J.

    2014-03-01

    Due to the increasing user expectation on watching experience, moving web high quality video streaming content from the small screen in mobile devices to the larger TV screen has become popular. It is crucial to develop video quality metrics to measure the quality change for various devices or network conditions. In this paper, we propose an automated scoring system to quantify user satisfaction. We compare the quality of local videos with the videos transmitted to a TV. Four video quality metrics, namely Image Quality, Rendering Quality, Freeze Time Ratio and Rate of Freeze Events are used to measure video quality change during web content mirroring. To measure image quality and rendering quality, we compare the matched frames between the source video and the destination video using barcode tools. Freeze time ratio and rate of freeze events are measured after extracting video timestamps. Several user studies are conducted to evaluate the impact of each objective video quality metric on the subjective user watching experience.

  10. Tools for Protecting the Privacy of Specific Individuals in Video

    Directory of Open Access Journals (Sweden)

    Chen Datong

    2007-01-01

    Full Text Available This paper presents a system for protecting the privacy of specific individuals in video recordings. We address the following two problems: automatic people identification with limited labeled data, and human body obscuring with preserved structure and motion information. In order to address the first problem, we propose a new discriminative learning algorithm to improve people identification accuracy using limited training data labeled from the original video and imperfect pairwise constraints labeled from face obscured video data. We employ a robust face detection and tracking algorithm to obscure human faces in the video. Our experiments in a nursing home environment show that the system can obtain a high accuracy of people identification using limited labeled data and noisy pairwise constraints. The study result indicates that human subjects can perform reasonably well in labeling pairwise constraints with the face masked data. For the second problem, we propose a novel method of body obscuring, which removes the appearance information of the people while preserving rich structure and motion information. The proposed approach provides a way to minimize the risk of exposing the identities of the protected people while maximizing the use of the captured data for activity/behavior analysis.

  11. Content-based image and video compression

    Science.gov (United States)

    Du, Xun; Li, Honglin; Ahalt, Stanley C.

    2002-08-01

    The term Content-Based appears often in applications for which MPEG-7 is expected to play a significant role. MPEG-7 standardizes descriptors of multimedia content, and while compression is not the primary focus of MPEG-7, the descriptors defined by MPEG-7 can be used to reconstruct a rough representation of an original multimedia source. In contrast, current image and video compression standards such as JPEG and MPEG are not designed to encode at the very low bit-rates that could be accomplished with MPEG-7 using descriptors. In this paper we show that content-based mechanisms can be introduced into compression algorithms to improve the scalability and functionality of current compression methods such as JPEG and MPEG. This is the fundamental idea behind Content-Based Compression (CBC). Our definition of CBC is a compression method that effectively encodes a sufficient description of the content of an image or a video in order to ensure that the recipient is able to reconstruct the image or video to some degree of accuracy. The degree of accuracy can be, for example, the classification error rate of the encoded objects, since in MPEG-7 the classification error rate measures the performance of the content descriptors. We argue that the major difference between a content-based compression algorithm and conventional block-based or object-based compression algorithms is that content-based compression replaces the quantizer with a more sophisticated classifier, or with a quantizer which minimizes classification error. Compared to conventional image and video compression methods such as JPEG and MPEG, our results show that content-based compression is able to achieve more efficient image and video coding by suppressing the background while leaving the objects of interest nearly intact.

  12. Privacy Factors in Video-Based Media Spaces

    Science.gov (United States)

    Boyle, Michael; Neustaedter, Carman; Greenberg, Saul

    Media space research is accompanied by a long-standing debate on the value of awareness leading to casual interaction versus its potential for intended or unintended privacy invasion. This is not just a matter of technology: the trade-off between the two depends very much on the social makeup of the people using the space, how cameras are actually situated, the kinds of activities that typically happen in the space, and so on. This chapter offers a framework — a descriptive theory — that defines how one can think of privacy while analyzing media spaces and their expected or actual use. The framework outlines existing perspectives on privacy and then decomposes privacy into three normative controls for regula ting interpersonal boundaries in an embodied dialectic: solitude, confidentiality, and autonomy. By considering the nuances of these controls, this theory yields a powerful vocabulary of terms that disambiguate the many interrelated and subtle meanings of “privacy.”

  13. Contagious Content: Viral Video Ads Identification of Content Characteristics that Help Online Video Advertisements Go Viral

    Directory of Open Access Journals (Sweden)

    Yentl Knossenburg

    2016-12-01

    Full Text Available Why do some online video advertisements go viral while others remain unnoticed? What kind of video content keeps the viewer interested and motivated to share? Many companies have realized the need to innovate their marketing strategies and have embraced the newest ways of using technology, as the Internet, to their advantage as in the example of virality. Yet few marketers actually understand how, and academic literature on this topic is still in development. This study investigated which content characteristics distinguish successful from non-successful online viral video advertisements by analyzing 641 cases using Structural Equation Modeling. Results show that Engagement and Surprise are two main content characteristics that significantly increase the chance of online video advertisements to go viral.  

  14. Video Quality Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks

    Directory of Open Access Journals (Sweden)

    Asiya Khan

    2010-01-01

    Full Text Available The aim of this paper is to present video quality prediction models for objective non-intrusive, prediction of H.264 encoded video for all content types combining parameters both in the physical and application layer over Universal Mobile Telecommunication Systems (UMTS networks. In order to characterize the Quality of Service (QoS level, a learning model based on Adaptive Neural Fuzzy Inference System (ANFIS and a second model based on non-linear regression analysis is proposed to predict the video quality in terms of the Mean Opinion Score (MOS. The objective of the paper is two-fold. First, to find the impact of QoS parameters on end-to-end video quality for H.264 encoded video. Second, to develop learning models based on ANFIS and non-linear regression analysis to predict video quality over UMTS networks by considering the impact of radio link loss models. The loss models considered are 2-state Markov models. Both the models are trained with a combination of physical and application layer parameters and validated with unseen dataset. Preliminary results show that good prediction accuracy was obtained from both the models. The work should help in the development of a reference-free video prediction model and QoS control methods for video over UMTS networks.

  15. Cobra: A Content-Based Video Retrieval System

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, Willem

    An increasing number of large publicly available video libraries results in a demand for techniques that can manipulate the video data based on content. In this paper, we present a content-based video retrieval system called Cobra. The system supports automatic extraction and retrieval of high-level

  16. Content-based TV sports video retrieval using multimodal analysis

    Science.gov (United States)

    Yu, Yiqing; Liu, Huayong; Wang, Hongbin; Zhou, Dongru

    2003-09-01

    In this paper, we propose content-based video retrieval, which is a kind of retrieval by its semantical contents. Because video data is composed of multimodal information streams such as video, auditory and textual streams, we describe a strategy of using multimodal analysis for automatic parsing sports video. The paper first defines the basic structure of sports video database system, and then introduces a new approach that integrates visual stream analysis, speech recognition, speech signal processing and text extraction to realize video retrieval. The experimental results for TV sports video of football games indicate that the multimodal analysis is effective for video retrieval by quickly browsing tree-like video clips or inputting keywords within predefined domain.

  17. Effective Educational Videos: Principles and Guidelines for Maximizing Student Learning from Video Content

    Science.gov (United States)

    Brame, Cynthia J.

    2016-01-01

    Educational videos have become an important part of higher education, providing an important content-delivery tool in many flipped, blended, and online classes. Effective use of video as an educational tool is enhanced when instructors consider three elements: how to manage cognitive load of the video; how to maximize student engagement with the…

  18. Content-based management service for medical videos.

    Science.gov (United States)

    Mendi, Engin; Bayrak, Coskun; Cecen, Songul; Ermisoglu, Emre

    2013-01-01

    Development of health information technology has had a dramatic impact to improve the efficiency and quality of medical care. Developing interoperable health information systems for healthcare providers has the potential to improve the quality and equitability of patient-centered healthcare. In this article, we describe an automated content-based medical video analysis and management service that provides convenience and ease in accessing the relevant medical video content without sequential scanning. The system facilitates effective temporal video segmentation and content-based visual information retrieval that enable a more reliable understanding of medical video content. The system is implemented as a Web- and mobile-based service and has the potential to offer a knowledge-sharing platform for the purpose of efficient medical video content access.

  19. Content and ratings of mature-rated video games.

    Science.gov (United States)

    Thompson, Kimberly M; Tepichin, Karen; Haninger, Kevin

    2006-04-01

    To quantify the depiction of violence, blood, sexual themes, profanity, substances, and gambling in video games rated M (for "mature") and to measure agreement between the content observed and the rating information provided to consumers on the game box by the Entertainment Software Rating Board. We created a database of M-rated video game titles, selected a random sample, recorded at least 1 hour of game play, quantitatively assessed the content, performed statistical analyses to describe the content, and compared our observations with the Entertainment Software Rating Board content descriptors and results of our prior studies. Harvard University, Boston, Mass. Authors and 1 hired game player. M-rated video games. Percentages of game play depicting violence, blood, sexual themes, gambling, alcohol, tobacco, or other drugs; use of profanity in dialogue, song lyrics, or gestures. Although the Entertainment Software Rating Board content descriptors for violence and blood provide a good indication of such content in the game, we identified 45 observations of content that could warrant a content descriptor in 29 games (81%) that lacked these content descriptors. M-rated video games are significantly more likely to contain blood, profanity, and substances; depict more severe injuries to human and nonhuman characters; and have a higher rate of human deaths than video games rated T (for "teen"). Parents and physicians should recognize that popular M-rated video games contain a wide range of unlabeled content and may expose children and adolescents to messages that may negatively influence their perceptions, attitudes, and behaviors.

  20. Highlight detection for video content analysis through double filters

    Science.gov (United States)

    Sun, Zhonghua; Chen, Hexin; Chen, Mianshu

    2005-07-01

    Highlight detection is a form of video summarization techniques aiming at including the most expressive or attracting parts in the video. Most video highlights selection research work has been performed on sports video, detecting certain objects or events such as goals in soccer video, touch down in football and others. In this paper, we present a highlight detection method for film video. Highlight section in a film video is not like that in sports video that usually has certain objects or events. The methods to determine a highlight part in a film video can exhibit as three aspects: (a) locating obvious audio event, (b) detecting expressive visual content around the obvious audio location, (c) selecting the preferred portion of the extracted audio-visual highlight segments. We define a double filters model to detect the potential highlights in video. First obvious audio location is determined through filtering the obvious audio features, and then we perform the potential visual salience detection around the potential audio highlight location. Finally the production from the audio-visual double filters is compared with a preference threshold to determine the final highlights. The user study results indicate that the double filters detection approach is an effective method for highlight detection for video content analysis.

  1. Using content models to build audio-video summaries

    Science.gov (United States)

    Saarela, Janne; Merialdo, Bernard

    1998-12-01

    The amount of digitized video in archives is becoming so huge, that easier access and content browsing tools are desperately needed. Also, video is no longer one big piece of data, but a collection of useful smaller building blocks, which can be accessed and used independently from the original context of presentation. In this paper, we demonstrate a content model for audio video sequences, with the purpose of enabling the automatic generation of video summaries. The model is based on descriptors, which indicate various properties and relations of audio and video segments. In practice, these descriptors could either be generated automatically by methods of analysis, or produced manually (or computer-assisted) by the content provider. We analyze the requirements and characteristics of the different data segments, with respect to the problem of summarization, and we define our model as a set of constraints, which allow to produce good quality summaries.

  2. Using false colors to protect visual privacy of sensitive content

    Science.gov (United States)

    Ćiftçi, Serdar; Korshunov, Pavel; Akyüz, Ahmet O.; Ebrahimi, Touradj

    2015-03-01

    Many privacy protection tools have been proposed for preserving privacy. Tools for protection of visual privacy available today lack either all or some of the important properties that are expected from such tools. Therefore, in this paper, we propose a simple yet effective method for privacy protection based on false color visualization, which maps color palette of an image into a different color palette, possibly after a compressive point transformation of the original pixel data, distorting the details of the original image. This method does not require any prior face detection or other sensitive regions detection and, hence, unlike typical privacy protection methods, it is less sensitive to inaccurate computer vision algorithms. It is also secure as the look-up tables can be encrypted, reversible as table look-ups can be inverted, flexible as it is independent of format or encoding, adjustable as the final result can be computed by interpolating the false color image with the original using different degrees of interpolation, less distracting as it does not create visually unpleasant artifacts, and selective as it preserves better semantic structure of the input. Four different color scales and four different compression functions, one which the proposed method relies, are evaluated via objective (three face recognition algorithms) and subjective (50 human subjects in an online-based study) assessments using faces from FERET public dataset. The evaluations demonstrate that DEF and RBS color scales lead to the strongest privacy protection, while compression functions add little to the strength of privacy protection. Statistical analysis also shows that recognition algorithms and human subjects perceive the proposed protection similarly

  3. Effective Educational Videos: Principles and Guidelines for Maximizing Student Learning from Video Content.

    Science.gov (United States)

    Brame, Cynthia J

    Educational videos have become an important part of higher education, providing an important content-delivery tool in many flipped, blended, and online classes. Effective use of video as an educational tool is enhanced when instructors consider three elements: how to manage cognitive load of the video; how to maximize student engagement with the video; and how to promote active learning from the video. This essay reviews literature relevant to each of these principles and suggests practical ways instructors can use these principles when using video as an educational tool. © 2016 C. J. Brame. CBE—Life Sciences Education © 2016 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  4. Arcade Video Games: Proxemic, Cognitive and Content Analyses.

    Science.gov (United States)

    Braun, Claude M. J.; Giroux, Josette

    1989-01-01

    A study was designed to determine psychological complexity and reinforcement characteristics of popular arcade video games, including sex differences in game content, clientele social structure, human-to-human interaction contingencies, and value content. Results suggest a need for public control of children's access to the games and the video…

  5. Deriving video content type from HEVC bitstream semantics

    Science.gov (United States)

    Nightingale, James; Wang, Qi; Grecos, Christos; Goma, Sergio R.

    2014-05-01

    As network service providers seek to improve customer satisfaction and retention levels, they are increasingly moving from traditional quality of service (QoS) driven delivery models to customer-centred quality of experience (QoE) delivery models. QoS models only consider metrics derived from the network however, QoE models also consider metrics derived from within the video sequence itself. Various spatial and temporal characteristics of a video sequence have been proposed, both individually and in combination, to derive methods of classifying video content either on a continuous scale or as a set of discrete classes. QoE models can be divided into three broad categories, full reference, reduced reference and no-reference models. Due to the need to have the original video available at the client for comparison, full reference metrics are of limited practical value in adaptive real-time video applications. Reduced reference metrics often require metadata to be transmitted with the bitstream, while no-reference metrics typically operate in the decompressed domain at the client side and require significant processing to extract spatial and temporal features. This paper proposes a heuristic, no-reference approach to video content classification which is specific to HEVC encoded bitstreams. The HEVC encoder already makes use of spatial characteristics to determine partitioning of coding units and temporal characteristics to determine the splitting of prediction units. We derive a function which approximates the spatio-temporal characteristics of the video sequence by using the weighted averages of the depth at which the coding unit quadtree is split and the prediction mode decision made by the encoder to estimate spatial and temporal characteristics respectively. Since the video content type of a sequence is determined by using high level information parsed from the video stream, spatio-temporal characteristics are identified without the need for full decoding and can

  6. Quality-aware Content Adaptation in Digital Video Streaming

    OpenAIRE

    Wilk, Stefan

    2016-01-01

    User-generated video has attracted a lot of attention due to the success of Video Sharing Sites such as YouTube and Online Social Networks. Recently, a shift towards live consumption of these videos is observable. The content is captured and instantly shared over the Internet using smart mobile devices such as smartphones. Large-scale platforms arise such as YouTube.Live, YouNow or Facebook.Live which enable the smartphones of users to livestream to the public. These platforms achieve the dis...

  7. Automated processing of massive audio/video content using FFmpeg

    Directory of Open Access Journals (Sweden)

    Kia Siang Hock

    2014-01-01

    Full Text Available Audio and video content forms an integral, important and expanding part of the digital collections in libraries and archives world-wide. While these memory institutions are familiar and well-versed in the management of more conventional materials such as books, periodicals, ephemera and images, the handling of audio (e.g., oral history recordings and video content (e.g., audio-visual recordings, broadcast content requires additional toolkits. In particular, a robust and comprehensive tool that provides a programmable interface is indispensable when dealing with tens of thousands of hours of audio and video content. FFmpeg is comprehensive and well-established open source software that is capable of the full-range of audio/video processing tasks (such as encode, decode, transcode, mux, demux, stream and filter. It is also capable of handling a wide-range of audio and video formats, a unique challenge in memory institutions. It comes with a command line interface, as well as a set of developer libraries that can be incorporated into applications.

  8. Content and ratings of teen-rated video games.

    Science.gov (United States)

    Haninger, Kevin; Thompson, Kimberly M

    2004-02-18

    Children's exposure to violence, blood, sexual themes, profanity, substances, and gambling in the media remains a source of public health concern. However, content in video games played by older children and adolescents has not been quantified or compared with the rating information provided to consumers by the Entertainment Software Rating Board (ESRB). To quantify and characterize the content in video games rated T (for "Teen") and to measure the agreement between the content observed in game play and the ESRB-assigned content descriptors displayed on the game box. We created a database of all 396 T-rated video game titles released on the major video game consoles in the United States by April 1, 2001, to identify the distribution of games by genre and to characterize the distribution of ESRB-assigned content descriptors. We randomly sampled 80 video game titles (which included 81 games because 1 title included 2 separate games), played each game for at least 1 hour, quantitatively assessed the content, and compared the content we observed with the content descriptors assigned by the ESRB. Depictions of violence, blood, sexual themes, gambling, and alcohol, tobacco, or other drugs; whether injuring or killing characters is rewarded or is required to advance in the game; characterization of gender associated with sexual themes; and use of profanity in dialogue, lyrics, or gestures. Analysis of all content descriptors assigned to the 396 T-rated video game titles showed 373 (94%) received content descriptors for violence, 102 (26%) for blood, 60 (15%) for sexual themes, 57 (14%) for profanity, 26 (7%) for comic mischief, 6 (2%) for substances, and none for gambling. In the random sample of 81 games we played, we found that 79 (98%) involved intentional violence for an average of 36% of game play, 73 (90%) rewarded or required the player to injure characters, 56 (69%) rewarded or required the player to kill, 34 (42%) depicted blood, 22 (27%) depicted sexual themes

  9. Content-Aware Video Adaptation under Low-Bitrate Constraint

    Directory of Open Access Journals (Sweden)

    Hsiao Ming-Ho

    2007-01-01

    Full Text Available With the development of wireless network and the improvement of mobile device capability, video streaming is more and more widespread in such an environment. Under the condition of limited resource and inherent constraints, appropriate video adaptations have become one of the most important and challenging issues in wireless multimedia applications. In this paper, we propose a novel content-aware video adaptation in order to effectively utilize resource and improve visual perceptual quality. First, the attention model is derived from analyzing the characteristics of brightness, location, motion vector, and energy features in compressed domain to reduce computation complexity. Then, through the integration of attention model, capability of client device and correlational statistic model, attractive regions of video scenes are derived. The information object- (IOB- weighted rate distortion model is used for adjusting the bit allocation. Finally, the video adaptation scheme dynamically adjusts video bitstream in frame level and object level. Experimental results validate that the proposed scheme achieves better visual quality effectively and efficiently.

  10. Obtaining video descriptors for a content-based video information system

    Science.gov (United States)

    Bescos, Jesus; Martinez, Jose M.; Cabrera, Julian M.; Cisneros, Guillermo

    1998-09-01

    This paper describes the first stages of a research project that is currently being developed in the Image Processing Group of the UPM. The aim of this effort is to add video capabilities to the Storage and Retrieval Information System already working at our premises. Here we will focus on the early design steps of a Video Information System. For this purpose, we present a review of most of the reported techniques for video temporal segmentation and semantic segmentation, previous steps to afford the content extraction task, and we discuss them to select the more suitable ones. We then outline a block design of a temporal segmentation module, and present guidelines to the design of the semantic segmentation one. All these operations trend to facilitate automation in the extraction of low level features and semantic features that will finally take part of the video descriptors.

  11. Content validation of an interprofessional learning video peer assessment tool.

    Science.gov (United States)

    Nisbet, Gillian; Jorm, Christine; Roberts, Chris; Gordon, Christopher J; Chen, Timothy F

    2017-12-16

    Large scale models of interprofessional learning (IPL) where outcomes are assessed are rare within health professional curricula. To date, there is sparse research describing robust assessment strategies to support such activities. We describe the development of an IPL assessment task based on peer rating of a student generated video evidencing collaborative interprofessional practice. We provide content validation evidence of an assessment rubric in the context of large scale IPL. Two established approaches to scale development in an educational setting were combined. A literature review was undertaken to develop a conceptual model of the relevant domains and issues pertaining to assessment of student generated videos within IPL. Starting with a prototype rubric developed from the literature, a series of staff and student workshops were undertaken to integrate expert opinion and user perspectives. Participants assessed five-minute videos produced in a prior pilot IPL activity. Outcomes from each workshop informed the next version of the rubric until agreement was reached on anchoring statements and criteria. At this point the rubric was declared fit to be used in the upcoming mandatory large scale IPL activity. The assessment rubric consisted of four domains: patient issues, interprofessional negotiation; interprofessional management plan in action; and effective use of video medium to engage audience. The first three domains reflected topic content relevant to the underlying construct of interprofessional collaborative practice. The fourth domain was consistent with the broader video assessment literature calling for greater emphasis on creativity in education. We have provided evidence for the content validity of a video-based peer assessment task portraying interprofessional collaborative practice in the context of large-scale IPL activities for healthcare professional students. Further research is needed to establish the reliability of such a scale.

  12. Privacy-Preserving Content-Based Recommendations through Homomorphic Encryption

    NARCIS (Netherlands)

    Erkin, Z.; Beye, M.; Veugen, P.J.M.; Lagendijk, R.L.

    2012-01-01

    By offering personalized content to users, recommender systems have become a vital tool in ecommerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing

  13. Privacy-Preserving Content-Based Recommender System

    NARCIS (Netherlands)

    Erkin, Z.; Beye, M.; Veugen, P.J.M.; Lagendijk, R.L.

    2012-01-01

    By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or consumed. Unfortunately, collecting and storing

  14. Reading while Watching Video: The Effect of Video Content on Reading Comprehension and Media Multitasking Ability

    Science.gov (United States)

    Lin, Lin; Lee, Jennifer; Robertson, Tip

    2011-01-01

    Media multitasking, or engaging in multiple media and tasks simultaneously, is becoming an increasingly popular phenomenon with the development and engagement in social media. This study examines to what extent video content affects students' reading comprehension in media multitasking environments. One hundred and thirty university students were…

  15. A Video Browsing Tool for Content Management in Postproduction

    Directory of Open Access Journals (Sweden)

    Werner Bailer

    2010-01-01

    Full Text Available We propose an interactive video browsing tool for supporting content management and selection in postproduction. The approach is based on a process model for multimedia content abstraction. A software framework based on this process model and desktop and Web-based client applications are presented. For evaluation, we apply two TRECVID style fact finding approaches (retrieval and question answering tasks and a user survey to the evaluation of the video browsing tool. We analyze the correlation between the results of the different methods, whether different aspects can be evaluated independently with the survey, and if a learning effect can be measured with the different methods, and we also compare the full-featured desktop and the limited Web-based user interface. The results show that the retrieval task correlates better with the user experience according to the survey. The survey rather measures the general user experience while different aspects of the usability cannot be analyzed independently.

  16. Techniques for creating video content for radiology education.

    Science.gov (United States)

    Menashe, Sarah; Otjen, Jeffrey; Thapa, Mahesh M

    2014-01-01

    Video podcasts, or vodcasts, are an innovative tool for teaching and learning that allow the efficient distribution of tutorials, lectures, and other educational content. Certain types of content lend themselves to presentation in a video format. For example, vodcasts are well suited to teaching radiologic procedures. Vodcasts might also be quite useful in demonstrating the use of an audience response system and how one system differs from another, providing background content before an active-learning session, comparing magnetic resonance imaging pulse sequences, and teaching valuable interpersonal skills such as how to deliver bad news to a patient or how to maintain professionalism in the work environment. The authors present a step-by-step text-and-video tutorial on how to create, edit, and export vodcasts using a variety of software tools, describing both the "how" and the "why" of creating vodcasts. Interested readers are encouraged to examine both the print and online versions of this article to gain a more comprehensive knowledge of the ideas presented by the authors. Online supplemental material is available for this article. ©RSNA, 2014.

  17. Trends In Academic Content for Mobile Devices [video

    Directory of Open Access Journals (Sweden)

    Dan D'Agostino

    2012-06-01

    Full Text Available This presentation by Sarah Forbes and Dan D'Agostino was given at the Ontario Library Association's Super Conference in Toronto, Ontario, on February 3, 2012. Session Abstract from the Super Conference Program: As ownership of mobile devices continues to proliferate, libraries are finding it difficult to provide academic content that works well in the mobile world. Discover how various e-book and e-journal formats can be made to work with mobile devices of all kinds, and will explore the next generation of digital content designed for mobile devices – new formats that may re-invent how information is used by readers. Partnership would like to thank the authors and the Ontario Library Association for their generous permission to publish an Open Access version of this conference session. This is one of several Super Conference 2012 video presentations available for purchase from Super Conference: the Virtual Experience - http://ola.scholarlab.ca/.

  18. Audio scene segmentation for video with generic content

    Science.gov (United States)

    Niu, Feng; Goela, Naveen; Divakaran, Ajay; Abdel-Mottaleb, Mohamed

    2008-01-01

    In this paper, we present a content-adaptive audio texture based method to segment video into audio scenes. The audio scene is modeled as a semantically consistent chunk of audio data. Our algorithm is based on "semantic audio texture analysis." At first, we train GMM models for basic audio classes such as speech, music, etc. Then we define the semantic audio texture based on those classes. We study and present two types of scene changes, those corresponding to an overall audio texture change and those corresponding to a special "transition marker" used by the content creator, such as a short stretch of music in a sitcom or silence in dramatic content. Unlike prior work using genre specific heuristics, such as some methods presented for detecting commercials, we adaptively find out if such special transition markers are being used and if so, which of the base classes are being used as markers without any prior knowledge about the content. Our experimental results show that our proposed audio scene segmentation works well across a wide variety of broadcast content genres.

  19. Evolution-based Virtual Content Insertion with Visually Virtual Interactions in Videos

    Science.gov (United States)

    Chang, Chia-Hu; Wu, Ja-Ling

    With the development of content-based multimedia analysis, virtual content insertion has been widely used and studied for video enrichment and multimedia advertising. However, how to automatically insert a user-selected virtual content into personal videos in a less-intrusive manner, with an attractive representation, is a challenging problem. In this chapter, we present an evolution-based virtual content insertion system which can insert virtual contents into videos with evolved animations according to predefined behaviors emulating the characteristics of evolutionary biology. The videos are considered not only as carriers of message conveyed by the virtual content but also as the environment in which the lifelike virtual contents live. Thus, the inserted virtual content will be affected by the videos to trigger a series of artificial evolutions and evolve its appearances and behaviors while interacting with video contents. By inserting virtual contents into videos through the system, users can easily create entertaining storylines and turn their personal videos into visually appealing ones. In addition, it would bring a new opportunity to increase the advertising revenue for video assets of the media industry and online video-sharing websites.

  20. Virtual muscularity: a content analysis of male video game characters.

    Science.gov (United States)

    Martins, Nicole; Williams, Dmitri C; Ratan, Rabindra A; Harrison, Kristen

    2011-01-01

    The 150 top-selling video games were content analyzed to study representations of male bodies. Human males in the games were captured via screenshot and body parts measured. These measurements were then compared to anthropometric data drawn from a representative sample of 1120 North American men. Characters at high levels of photorealism were larger than the average American male, but these characters did not mirror the V-shaped ideal found in mainstream media. Characters at low levels of photorealism were also larger than the average American male, but these characters were so much larger that they appeared cartoonish. Idealized male characters were more likely to be found in games for children than in games for adults. Implications for cultivation theory are discussed. Copyright © 2010 Elsevier Ltd. All rights reserved.

  1. Video retargeting for stereoscopic content under 3D viewing constraints

    Science.gov (United States)

    Chamaret, C.; Boisson, G.; Chevance, C.

    2012-03-01

    The imminent deployment of new devices such as TV, tablet, smart phone supporting stereoscopic display creates a need for retargeting the content. New devices bring their own aspect ratio and potential small screen size. Aspect ratio conversion becomes mandatory and an automatic solution will be of high value especially if it maximizes the visual comfort. Some issues inherent to 3D domain are considered in this paper: no vertical disparity, no object having negative disparity (outward perception) on the border of the cropping window. A visual attention model is applied on each view and provides saliency maps with most attractive pixels. Dedicated 3D retargeting correlates the 2D attention maps for each view as well as additional computed information to ensure the best cropping window. Specific constraints induced by 3D experience influence the retargeted window through the map computation presenting objects that should not be cropped. The comparison with original content of 2:35 ratio having black stripes provide limited 3D experience on TV screen, while the automatic cropping and exploitation of full screen show more immersive experience. The proposed system is fully automatic, ensures a good final quality without missing fundamental parts for the global understanding of the scene. Eye-tracking data recorded on stereoscopic content have been confronted to retargeted window in order to ensure that the most attractive areas are inside the final video.

  2. Study of the effects of video content on quality of experience

    Science.gov (United States)

    Paudyal, Pradip; Battisti, Federica; Carli, Marco

    2015-01-01

    In this article the effects of video content on Quality of Experience (QoE) have been presented. Delivery of the video content with high level of QoE from bandwidth-limited and error-prone network is of crucial importance for the service providers. Therefore, it is of fundamental importance to analyse the impact of the network impairments and video content on perceived quality during the QoE metric design. The major contributions of the article are in the study of i)the impact of network impairments together with video content, ii) impact of the video content and ii) the impact of video content related parameters: spatial-temporal perceptual information, video content, and frame size on QoE has been presented. The results show that when the impact of impairments on perceived quality is low, the quality is significantly influenced by video content, and video content itself also has a significant impact on QoE. Finally, the results strengthen the need for new parameter characterization, for better QoE metric design.

  3. Alcohol, tobacco and illicit substances in music videos: a content analysis of prevalence and genre.

    Science.gov (United States)

    Gruber, Enid L; Thau, Helaine M; Hill, Douglas L; Fisher, Deborah A; Grube, Joel W

    2005-07-01

    Content analyses examined mention of alcohol, tobacco, and illicit substances in music videos (n = 359) broadcast in 2001, as well as genre and presence of humor. Findings indicated that references to illicit substances were more prevalent than tobacco in music videos. Humor was 2.5 times as likely to appear in videos containing references to substances than those without substances.

  4. An Automatic Multimedia Content Summarization System for Video Recommendation

    Science.gov (United States)

    Yang, Jie Chi; Huang, Yi Ting; Tsai, Chi Cheng; Chung, Ching I.; Wu, Yu Chieh

    2009-01-01

    In recent years, using video as a learning resource has received a lot of attention and has been successfully applied to many learning activities. In comparison with text-based learning, video learning integrates more multimedia resources, which usually motivate learners more than texts. However, one of the major limitations of video learning is…

  5. South African banks and their online privacy policy statements: A content analysis

    Directory of Open Access Journals (Sweden)

    Salah K. Kabanda

    2010-08-01

    Full Text Available In Internet banking and Internet-related transactions, security and privacy are of great concern. To alleviate these concerns, the South African government has promulgated the Electronic Communications and Transactions (ECT Act No. 25 of 2002. The Act regulates all electronic communication transactions in South Africa. Business organisations implement the Act by, for example, posting a privacy policy statement on their websites, which, in accordance with the requirements of the ECT Act, states how the organisation will use any personal identifiable information provided by the client. This study investigates whether South African banks that subscribe to the ECT Act comply with the principles relating to the protection of a consumer’s personal information. The study employed the research methods of content analysis and interviews. The findings indicate that some banks only complied with a few of the ECT Act principles, which, according to the interview respondents, undermines the levels of trust which are in play between their banks and themselves. The respondents themselves were not fully aware of all the ECT Act requirements. This lack of awareness results in consumers failing to assess the comprehensiveness of their bank’s policy statements and to what extent such banks comply with the ECT Act.

  6. 100 Million Views of Electronic Cigarette YouTube Videos and Counting: Quantification, Content Evaluation, and Engagement Levels of Videos.

    Science.gov (United States)

    Huang, Jidong; Kornfield, Rachel; Emery, Sherry L

    2016-03-18

    The video-sharing website, YouTube, has become an important avenue for product marketing, including tobacco products. It may also serve as an important medium for promoting electronic cigarettes, which have rapidly increased in popularity and are heavily marketed online. While a few studies have examined a limited subset of tobacco-related videos on YouTube, none has explored e-cigarette videos' overall presence on the platform. To quantify e-cigarette-related videos on YouTube, assess their content, and characterize levels of engagement with those videos. Understanding promotion and discussion of e-cigarettes on YouTube may help clarify the platform's impact on consumer attitudes and behaviors and inform regulations. Using an automated crawling procedure and keyword rules, e-cigarette-related videos posted on YouTube and their associated metadata were collected between July 1, 2012, and June 30, 2013. Metadata were analyzed to describe posting and viewing time trends, number of views, comments, and ratings. Metadata were content coded for mentions of health, safety, smoking cessation, promotional offers, Web addresses, product types, top-selling brands, or names of celebrity endorsers. As of June 30, 2013, approximately 28,000 videos related to e-cigarettes were captured. Videos were posted by approximately 10,000 unique YouTube accounts, viewed more than 100 million times, rated over 380,000 times, and commented on more than 280,000 times. More than 2200 new videos were being uploaded every month by June 2013. The top 1% of most-viewed videos accounted for 44% of total views. Text fields for the majority of videos mentioned websites (70.11%); many referenced health (13.63%), safety (10.12%), smoking cessation (9.22%), or top e-cigarette brands (33.39%). The number of e-cigarette-related YouTube videos was projected to exceed 65,000 by the end of 2014, with approximately 190 million views. YouTube is a major information-sharing platform for electronic cigarettes

  7. Automatic Annotation of Formula 1 Races for Content-Based Video Retrieval

    NARCIS (Netherlands)

    Mihajlovic, V.; Petkovic, M.

    2001-01-01

    Content-based video retrieval is emerging as an important part in the process of utilization of various multimedia documents. In this report we present a novel system for the automatic indexing and content-based retrieval of multimedia documents. We chose the domain of Formula 1 sport videos because

  8. Celebrity over science? An analysis of Lyme disease video content on YouTube.

    Science.gov (United States)

    Yiannakoulias, N; Tooby, R; Sturrock, S L

    2017-10-01

    Lyme disease has been a subject of medical controversy for several decades. In this study we looked at the availability and type of content represented in a (n = 700) selection of YouTube videos on the subject of Lyme disease. We classified video content into a small number of content areas, and studied the relationship between these content areas and 1) video views and 2) video likeability. We found very little content uploaded by government or academic institutions; the vast majority of content was uploaded by independent users. The most viewed videos tend to contain celebrity content and personal stories; videos with prevention information tend to be of less interest, and videos with science and medical information tend to be less liked. Our results suggest that important public health information on YouTube is very likely to be ignored unless it is made more appealing to modern consumers of online video content. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. 100 Million Views of Electronic Cigarette YouTube Videos and Counting: Quantification, Content Evaluation, and Engagement Levels of Videos

    Science.gov (United States)

    2016-01-01

    Background The video-sharing website, YouTube, has become an important avenue for product marketing, including tobacco products. It may also serve as an important medium for promoting electronic cigarettes, which have rapidly increased in popularity and are heavily marketed online. While a few studies have examined a limited subset of tobacco-related videos on YouTube, none has explored e-cigarette videos’ overall presence on the platform. Objective To quantify e-cigarette-related videos on YouTube, assess their content, and characterize levels of engagement with those videos. Understanding promotion and discussion of e-cigarettes on YouTube may help clarify the platform’s impact on consumer attitudes and behaviors and inform regulations. Methods Using an automated crawling procedure and keyword rules, e-cigarette-related videos posted on YouTube and their associated metadata were collected between July 1, 2012, and June 30, 2013. Metadata were analyzed to describe posting and viewing time trends, number of views, comments, and ratings. Metadata were content coded for mentions of health, safety, smoking cessation, promotional offers, Web addresses, product types, top-selling brands, or names of celebrity endorsers. Results As of June 30, 2013, approximately 28,000 videos related to e-cigarettes were captured. Videos were posted by approximately 10,000 unique YouTube accounts, viewed more than 100 million times, rated over 380,000 times, and commented on more than 280,000 times. More than 2200 new videos were being uploaded every month by June 2013. The top 1% of most-viewed videos accounted for 44% of total views. Text fields for the majority of videos mentioned websites (70.11%); many referenced health (13.63%), safety (10.12%), smoking cessation (9.22%), or top e-cigarette brands (33.39%). The number of e-cigarette-related YouTube videos was projected to exceed 65,000 by the end of 2014, with approximately 190 million views. Conclusions YouTube is a major

  10. Tobacco Content in Video Games: Categorization of Tobacco Typologies and Gamer Recall.

    Science.gov (United States)

    Forsyth, Susan R; Malone, Ruth E

    2017-11-15

    Tobacco content has been identified in popular video games played by adolescents. To date, there are no established instruments for categorizing tobacco content. We describe development and demonstrate the use of an instrument to categorize types of tobacco content. Interviews were conducted with 61 participants: 20 adolescents (mean age 17.7), and 41 adults (mean age 23.9), who discussed favorite games and recalled tobacco content. All games mentioned were examined for tobacco content by watching movies of game play on YouTube, examining individual game Wiki sites, and reviewing content descriptors provided by the Entertainment Software Rating Board (ESRB), Common Sense Media and the Internet Movie Database (IMDb). A typology of tobacco content was created and correlated with gamer recall of tobacco content. Participants together mentioned 366 games, of which 152 were unique. Tobacco content was verified in 39.5% (60/152) of games. Six categories of content were identified, including "no tobacco content." Of games containing tobacco, 88% (53/60) contained at least two categories of content. Games with more categories were associated with greater gamer recall of tobacco content. Tobacco content is present in video games and consciously recalled by players, with higher accuracy of recall associated with games featuring multiple types of tobacco content and more engaging, player-active content. Playing video games is now a daily part of most adolescents' lives. Tobacco content is present in many popular games. Currently there are no published instruments to assist in categorizing tobacco content in video games. This study describes a systematic approach to categorizing tobacco content in video games and demonstrates that games featuring more categories of tobacco content are associated with more accurate gamer recall of the presence of tobacco content when compared with games with fewer categories of content. Understanding the extent of such content will be essential

  11. Content Area Vocabulary Videos in Multiple Contexts: A Pedagogical Tool

    Science.gov (United States)

    Webb, C. Lorraine; Kapavik, Robin Robinson

    2015-01-01

    The authors challenged pre-service teachers to digitally define a social studies or mathematical vocabulary term in multiple contexts using a digital video camera. The researchers sought to answer the following questions: 1. How will creating a video for instruction affect pre-service teachers' attitudes about teaching with technology, if at all?…

  12. The most widely viewed YouTube videos with content related to multivitamins

    Directory of Open Access Journals (Sweden)

    Corey H. Basch

    2016-10-01

    Full Text Available Background: Use of multivitamin/multimineral (MVM and other dietary supplements is common among American adults. The purpose of this study was to describe the source and content of the most widely viewed YouTube videos associated with MVM supplements. Methods: Videos were filtered by number of views and the source of the video upload was recorded. A comparison of video characteristics and differences in video content was conducted. Results: Cumulatively, the videos in this sample were viewed 25 573 055 times. The majority of videos found in this sample were uploaded by a nutrition, wellness, or fitness channels. Most videos mentioned benefits (80.4%, 95% CI:72.5%, 88.3% and advocated for use of the supplement (72.2%, 95% CI: 63.3%, 81.1%. Over 84% (84.5%, 95% CI: 77.3, 91.7% of the videos did not mention risks associated with taking a particular vitamin or supplement. Conclusion: The findings of this study indicate that MVMs are often promoted and encouraged, yet risks associated with MVMs were infrequently mentioned. Health professionals should be aware of the extent to which MVM related content appears on social media and, more importantly, be attuned to the content, which can be misleading, or missing information regarding risks and/or evidence of possible benefits.

  13. Revisiting video game ratings: Shift from content-centric to parent-centric approach

    Directory of Open Access Journals (Sweden)

    Jiow Hee Jhee

    2017-01-01

    Full Text Available The rapid adoption of video gaming among children has placed tremendous strain on parents’ ability to manage their children’s consumption. While parents refer online to video games ratings (VGR information to support their mediation efforts, there are many difficulties associated with such practice. This paper explores the popular VGR sites, and highlights the inadequacies of VGRs to capture the parents’ concerns, such as time displacement, social interactions, financial spending and various video game effects, beyond the widespread panics over content issues, that is subjective, ever-changing and irrelevant. As such, this paper argues for a shift from content-centric to a parent-centric approach in VGRs, that captures the evolving nature of video gaming, and support parents, the main users of VGRs, in their management of their young video gaming children. This paper proposes a Video Games Repository for Parents to represent that shift.

  14. Age and violent-content labels make video games forbidden fruits for youth

    NARCIS (Netherlands)

    Nije Bijvank, M.; Konijn, E.A.; Bushman, B.J.; Roelofsma, P.H.M.P.

    2009-01-01

    OBJECTIVE. To protect minors from exposure to video games with objectionable content (eg, violence and sex), the Pan European Game Information developed a classification system for video games (eg, 18+). We tested the hypothesis that this classification system may actually increase the

  15. Making it Real: Faculty Collaboration to Create Video Content

    Directory of Open Access Journals (Sweden)

    Claudia Jennifer Dold

    2012-04-01

    Full Text Available Interest in integrative health care is a growing area of health practice, combining conventional medical treatments with safe and effective complementary and alternative medicine. These modalities relate to both improving physical and psychological well-being, and enhancing conventional talk therapy. In an interdisciplinary collaboration, teaching and library faculty have created a series of sixteen on-line video interviews that introduce practitioner-relevant experiences to students as supplemental course material. These videos are available through the department web-pages to students in other related disciplines as well, including Social Work, Counselor Education, Psychology, and the Colleges of Public Health, Nursing, and Medicine. The video series was undertaken as part of the educational mission of the library, bringing to the classroom new material that is essential to the professional development of future counselors.

  16. Sources and content of popular online videos about autism spectrum disorders.

    Science.gov (United States)

    Kollia, Betty; Kamowski-Shakibai, Margaret T; Basch, Corey H; Clark, Ashley

    2017-01-01

    Background: Our study aimed to determine source of upload and content portrayed in the100 most-viewed videos on autism spectrum disorders (ASDs) on the video sharing public forum, YouTube. ASDs have become highly prevalent in the last decade, arousing a significant response from the media and psycho-educational health professions. Utilization of and reliance on social media for information on health matters has also proliferated. Some suggest that online videos could promote early detection (and intervention) of ASD by prompting caregivers to seek guidance. However, the usefulness of the available videos is unclear. Methods: The 100 most popular YouTube videos were examined for source of upload and information provided. Popularity was determined by number of views, using the filter tool. Results: The videos had more than 121 million views combined. Only one video had been uploaded by a professional (a clinical psychologist). The 99 (non-professional) videos provided minimal data and research into known ASD risk factors. Interestingly, discredited vaccine-associated risks were promoted in 16% (95% CI = 09%-25%) of the 100 videos analyzed. Many videos featured a child with ASD exhibiting some characteristic patterns, such as engaging in a repetitive behavior (73%, 95% CI = 63%-81%); about as many videos referenced various therapies (75%, 95% CI = 65%-83%); and 54% (95% CI = 44%-64%) and 61% (95% CI =51%-71%) of the videos mentioned the economic and emotional toll of ASD on the family,respectively. Additional variables are discussed. Conclusion: The most popular online videos were primarily uploaded by non-professionals and provided limited content regarding ASD. Given the wide reach of social media and its potential for providing valuable information and guidance to the public on matters pertaining to ASD, we wish to underscore the necessity for a professional presence in this medium.

  17. Alzheimer's Disease in Social Media: Content Analysis of YouTube Videos.

    Science.gov (United States)

    Tang, Weizhou; Olscamp, Kate; Choi, Seul Ki; Friedman, Daniela B

    2017-10-19

    Approximately 5.5 million Americans are living with Alzheimer's disease (AD) in 2017. YouTube is a popular platform for disseminating health information; however, little is known about messages specifically regarding AD that are being communicated through YouTube. This study aims to examine video characteristics, content, speaker characteristics, and mobilizing information (cues to action) of YouTube videos focused on AD. Videos uploaded to YouTube from 2013 to 2015 were searched with the term "Alzheimer's disease" on April 30th, 2016. Two coders viewed the videos and coded video characteristics (the date when a video was posted, Uniform Resource Locator, video length, audience engagement, format, author), content, speaker characteristics (sex, race, age), and mobilizing information. Descriptive statistics were used to examine video characteristics, content, audience engagement (number of views), speaker appearances in the video, and mobilizing information. Associations between variables were examined using Chi-square and Fisher's exact tests. Among the 271 videos retrieved, 25.5% (69/271) were posted by nonprofit organizations or universities. Informal presentations comprised 25.8% (70/271) of all videos. Although AD symptoms (83/271, 30.6%), causes of AD (80/271, 29.5%), and treatment (76/271, 28.0%) were commonly addressed, quality of life of people with AD (34/271, 12.5%) had more views than those more commonly-covered content areas. Most videos featured white speakers (168/187, 89.8%) who were adults aged 20 years to their early 60s (164/187, 87.7%). Only 36.9% (100/271) of videos included mobilizing information. Videos about AD symptoms were significantly less likely to include mobilizing information compared to videos without AD symptoms (23/83, 27.7% vs 77/188, 41.0% respectively; P=.03). This study contributes new knowledge regarding AD messages delivered through YouTube. Findings of the current study highlight a potential gap between available information

  18. Perceptual quality of 4K-resolution video content compared to HD

    OpenAIRE

    Van Wallendael, Glenn; Coppens, Paulien; Paridaens, Tom; Van Kets, Niels; Van den Broeck, Wendy; Lambert, Peter

    2016-01-01

    With the introduction of 4K UHD video and display resolution, questions arise on the perceptual differences between 4K UHD and upsampled HD video content. In this paper, a striped pair comparison has been performed on a diverse set of 4K UHD video sources. The goal was to subjectively assess the perceived sharpness of 4K UHD and downscaled/upscaled HD video. A striped pair comparison has been applied in order to make the test as straightforward as possible for a non-expert participant populat...

  19. AViTExt: Automatic Video Text Extraction, A new Approach for video content indexing Application

    OpenAIRE

    Bouaziz, Baseem; Zlitni, Tarek; Walid MAHDI

    2013-01-01

    In this paper, we propose a spatial temporal video-text detection technique which proceed in two principal steps:potential text region detection and a filtering process. In the first step we divide dynamically each pair of consecutive video frames into sub block in order to detect change. A significant difference between homologous blocks implies the appearance of an important object which may be a text region. The temporal redundancy is then used to filter these regions and forms an effectiv...

  20. Enhancing Secondary Science Content Accessibility with Video Games

    Science.gov (United States)

    Marino, Matthew T.; Becht, Kathleen M.; Vasquez, Eleazar, III; Gallup, Jennifer L.; Basham, James D.; Gallegos, Benjamin

    2014-01-01

    Mobile devices, including iPads, tablets, and so on, are common in high schools across the country. Unfortunately, many secondary teachers see these devices as distractions rather than tools for scaffolding instruction. This article highlights current research related to the use of video games as a means to increase the cognitive and social…

  1. Lyme Disease and YouTubeTM: A Cross-Sectional Study of Video Contents.

    Science.gov (United States)

    Basch, Corey H; Mullican, Lindsay A; Boone, Kwanza D; Yin, Jingjing; Berdnik, Alyssa; Eremeeva, Marina E; Fung, Isaac Chun-Hai

    2017-08-01

    Lyme disease is the most common tick-borne disease. People seek health information on Lyme disease from YouTubeTM videos. In this study, we investigated if the contents of Lyme disease-related YouTubeTM videos varied by their sources. Most viewed English YouTubeTM videos (n = 100) were identified and manually coded for contents and sources. Within the sample, 40 videos were consumer-generated, 31 were internet-based news, 16 were professional, and 13 were TV news. Compared with consumer-generated videos, TV news videos were more likely to mention celebrities (odds ratio [OR], 10.57; 95% confidence interval [CI], 2.13-52.58), prevention of Lyme disease through wearing protective clothing (OR, 5.63; 95% CI, 1.23-25.76), and spraying insecticides (OR, 7.71; 95% CI, 1.52-39.05). A majority of the most popular Lyme disease-related YouTubeTM videos were not created by public health professionals. Responsible reporting and creative video-making facilitate Lyme disease education. Partnership with YouTubeTM celebrities to co-develop educational videos may be a future direction.

  2. Youth access, creation, and content of smokeless tobacco ("dip") videos in social media.

    Science.gov (United States)

    Seidenberg, Andrew B; Rodgers, Elizabeth J; Rees, Vaughan W; Connolly, Gregory N

    2012-04-01

    Smokeless tobacco (SLT) use among white adolescent males has increased in recent years, and prevalence of SLT use among adolescent males exceeds that for smoking in several U.S. states. Recent reports have described the presence of cigarette-related content on social media Web sites popular among youth; however, little has been reported on SLT content. The YouTube video search engine was searched for the popular SLT brand Skoal, and the first 50 search results were downloaded. Video statistics data were collected for and content analysis was performed on all videos featuring smokeless use (82%). Access to SLT YouTube videos by youth was also determined by assessing whether YouTube permits youth viewing and creation of SLT videos. Mean number of views for videos analyzed was 15,422, and the most watched video had 124,276 views. Descriptions of SLT flavor/smell and social references/interactions were found in 48.8% and 63.4% of videos, respectively. By contrast, references to drug (nicotine) effects (12.2%) and public health messaging (9.8%) were less common. None of the SLT videos in the sample had restrictions that would block youth viewing. In addition, evidence of self-identified youth creating SLT videos was found for 13% of unique users in the sample. YouTube does not restrict youth from creating or viewing "dip videos." Proactive efforts are needed to ensure that YouTube and other online media do not become influential vehicles for tobacco promotion to youth. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. Zika Virus on YouTube: An Analysis of English-language Video Content by Source

    Directory of Open Access Journals (Sweden)

    Corey H. Basch

    2017-03-01

    Full Text Available Objectives The purpose of this study was to describe the source, length, number of views, and content of the most widely viewed Zika virus (ZIKV-related YouTube videos. We hypothesized that ZIKV-related videos uploaded by different sources contained different content. Methods The 100 most viewed English ZIKV-related videos were manually coded and analyzed statistically. Results Among the 100 videos, there were 43 consumer-generated videos, 38 Internet-based news videos, 15 TV-based news videos, and 4 professional videos. Internet news sources captured over two-thirds of the total of 8 894 505 views. Compared with consumer-generated videos, Internet-based news videos were more likely to mention the impact of ZIKV on babies (odds ratio [OR], 6.25; 95% confidence interval [CI], 1.64 to 23.76, the number of cases in Latin America (OR, 5.63; 95% CI, 1.47 to 21.52; and ZIKV in Africa (OR, 2.56; 95% CI, 1.04 to 6.31. Compared with consumer-generated videos, TV-based news videos were more likely to express anxiety or fear of catching ZIKV (OR, 6.67; 95% CI, 1.36 to 32.70; to highlight fear of ZIKV among members of the public (OR, 7.45; 95% CI, 1.20 to 46.16; and to discuss avoiding pregnancy (OR, 3.88; 95% CI, 1.13 to 13.25. Conclusions Public health agencies should establish a larger presence on YouTube to reach more people with evidence-based information about ZIKV.

  4. Zika Virus on YouTube: An Analysis of English-language Video Content by Source.

    Science.gov (United States)

    Basch, Corey H; Fung, Isaac Chun-Hai; Hammond, Rodney N; Blankenship, Elizabeth B; Tse, Zion Tsz Ho; Fu, King-Wa; Ip, Patrick; Basch, Charles E

    2017-03-01

    The purpose of this study was to describe the source, length, number of views, and content of the most widely viewed Zika virus (ZIKV)-related YouTube videos. We hypothesized that ZIKV-related videos uploaded by different sources contained different content. The 100 most viewed English ZIKV-related videos were manually coded and analyzed statistically. Among the 100 videos, there were 43 consumer-generated videos, 38 Internet-based news videos, 15 TV-based news videos, and 4 professional videos. Internet news sources captured over two-thirds of the total of 8 894 505 views. Compared with consumer-generated videos, Internet-based news videos were more likely to mention the impact of ZIKV on babies (odds ratio [OR], 6.25; 95% confidence interval [CI], 1.64 to 23.76), the number of cases in Latin America (OR, 5.63; 95% CI, 1.47 to 21.52); and ZIKV in Africa (OR, 2.56; 95% CI, 1.04 to 6.31). Compared with consumer-generated videos, TV-based news videos were more likely to express anxiety or fear of catching ZIKV (OR, 6.67; 95% CI, 1.36 to 32.70); to highlight fear of ZIKV among members of the public (OR, 7.45; 95% CI, 1.20 to 46.16); and to discuss avoiding pregnancy (OR, 3.88; 95% CI, 1.13 to 13.25). Public health agencies should establish a larger presence on YouTube to reach more people with evidence-based information about ZIKV.

  5. Classification of dual language audio-visual content: Introduction to the VideoCLEF 2008 pilot benchmark evaluation task

    NARCIS (Netherlands)

    Larson, M.; Newman, E.; Jones, G.J.F.; Köhler, J.; Larson, M.; de Jong, F.M.G.; Kraaij, W.; Ordelman, R.J.F.

    2008-01-01

    VideoCLEF is a new track for the CLEF 2008 campaign. This track aims to develop and evaluate tasks in analyzing multilingual video content. A pilot of a Vid2RSS task involving assigning thematic class labels to video kicks off the VideoCLEF track in 2008. Task participants deliver classification

  6. Content-Adaptive Packetization and Streaming of Wavelet Video over IP Networks

    Directory of Open Access Journals (Sweden)

    Chien-Peng Ho

    2007-03-01

    Full Text Available This paper presents a framework of content-adaptive packetization scheme for streaming of 3D wavelet-based video content over lossy IP networks. The tradeoff between rate and distortion is controlled by jointly adapting scalable source coding rate and level of forward error correction (FEC protection. A content dependent packetization mechanism with data-interleaving and Reed-Solomon protection for wavelet-based video codecs is proposed to provide unequal error protection. This paper also tries to answer an important question for scalable video streaming systems: given extra bandwidth, should one increase the level of channel protection for the most important packets, or transmit more scalable source data? Experimental results show that the proposed framework achieves good balance between quality of the received video and level of error protection under bandwidth-varying lossy IP networks.

  7. Content-Adaptive Packetization and Streaming of Wavelet Video over IP Networks

    Directory of Open Access Journals (Sweden)

    Ho Chien-Peng

    2007-01-01

    Full Text Available This paper presents a framework of content-adaptive packetization scheme for streaming of 3D wavelet-based video content over lossy IP networks. The tradeoff between rate and distortion is controlled by jointly adapting scalable source coding rate and level of forward error correction (FEC protection. A content dependent packetization mechanism with data-interleaving and Reed-Solomon protection for wavelet-based video codecs is proposed to provide unequal error protection. This paper also tries to answer an important question for scalable video streaming systems: given extra bandwidth, should one increase the level of channel protection for the most important packets, or transmit more scalable source data? Experimental results show that the proposed framework achieves good balance between quality of the received video and level of error protection under bandwidth-varying lossy IP networks.

  8. Overview of VideoCLEF 2008: Automatic Generation of Topic-based Feeds for Dual Language Audio-Visual Content

    NARCIS (Netherlands)

    Larson, M.; Newman, E.; Jones, G.J.F.

    2009-01-01

    The VideoCLEF track, introduced in 2008, aims to develop and evaluate tasks related to analysis of and access to multilingual multimedia content. In its first year, VideoCLEF piloted the Vid2RSS task, whose main subtask was the classification of dual language video (Dutch-language television content

  9. Overview of VideoCLEF 2008: Automatic generation of topic-based feeds for dual language audio-visual content

    NARCIS (Netherlands)

    Larson, M.; Newman, E.; Jones, G.

    2008-01-01

    The VideoCLEF track, introduced in 2008, aims to develop and evaluate tasks related to analysis of and access to multilingual multimedia content. In its first year, VideoCLEF piloted the Vid2RSS task, whose main subtask was the classification of dual language video (Dutch-language television content

  10. Adolescents' exposure to tobacco and alcohol content in YouTube music videos.

    Science.gov (United States)

    Cranwell, Jo; Murray, Rachael; Lewis, Sarah; Leonardi-Bee, Jo; Dockrell, Martin; Britton, John

    2015-04-01

    To quantify tobacco and alcohol content, including branding, in popular contemporary YouTube music videos; and measure adolescent exposure to such content. Ten-second interval content analysis of alcohol, tobacco or electronic cigarette imagery in all UK Top 40 YouTube music videos during a 12-week period in 2013/14; on-line national survey of adolescent viewing of the 32 most popular high-content videos. Great Britain. A total of 2068 adolescents aged 11-18 years who completed an on-line survey. Occurrence of alcohol, tobacco and electronic cigarette use, implied use, paraphernalia or branding in music videos and proportions and estimated numbers of adolescents who had watched sampled videos. Alcohol imagery appeared in 45% [95% confidence interval (CI) = 33-51%] of all videos, tobacco in 22% (95% CI = 13-27%) and electronic cigarettes in 2% (95% CI = 0-4%). Alcohol branding appeared in 7% (95% CI = 2-11%) of videos, tobacco branding in 4% (95% CI = 0-7%) and electronic cigarettes in 1% (95% CI = 0-3%). The most frequently observed alcohol, tobacco and electronic cigarette brands were, respectively, Absolut Tune, Marlboro and E-Lites. At least one of the 32 most popular music videos containing alcohol or tobacco content had been seen by 81% (95% CI = 79%, 83%) of adolescents surveyed, and of these 87% (95% CI = 85%, 89%) had re-watched at least one video. The average number of videos seen was 7.1 (95% CI = 6.8, 7.4). Girls were more likely to watch and also re-watch the videos than boys, P YouTube music videos watched by a large number of British adolescents, particularly girls, include significant tobacco and alcohol content, including branding. © 2014 The Authors. Addiction published by John Wiley & Sons Ltd on behalf of Society for the Study of Addiction.

  11. Augmenting a TV Broadcast with Synchronised User Generated Video and Relevant Social Network Content

    NARCIS (Netherlands)

    Stokking, H.M.; Veenhuizen, A.T.; Kaptein, A.M.; Niamut, O.A.

    2014-01-01

    As TNO, we have developed an Augmented Live Broadcast use case, using components from the FP7 STEER project. In this use case, a television broadcast of a live event is augmented with user generated content. This user generated content consists of videos made by users at the event, and also of

  12. The Impact of Rock Videos and Music with Suicidal Content on Thoughts and Attitudes about Suicide.

    Science.gov (United States)

    Rustad, Robin A.; Small, Jacob E.; Jobes, David A.; Safer, Martin A.; Peterson, Rebecca J.

    2003-01-01

    Two experiments exposed college student volunteers to rock music with or without suicidal content. Music and videos with suicide content appeared to prime implicit cognitions related to suicide but did not affect variables associated with increased suicide risk. (Contains 60 references and 3 tables.) (Author/JBJ)

  13. Protecting Teachers' Privacy Rights.

    Science.gov (United States)

    Spencer, Ray C.; Hoffman, Darlene Haffner

    2001-01-01

    Addresses concerns about school personnel records and legal precedents regarding privacy. Recommends inclusion in teacher education of content about teachers' privacy rights. Lists fair information practices for schools regarding the accuracy of and access to personnel records. (SK)

  14. Blind summarization: content-adaptive video summarization using time-series analysis

    Science.gov (United States)

    Divakaran, Ajay; Radhakrishnan, Regunathan; Peker, Kadir A.

    2006-01-01

    Severe complexity constraints on consumer electronic devices motivate us to investigate general-purpose video summarization techniques that are able to apply a common hardware setup to multiple content genres. On the other hand, we know that high quality summaries can only be produced with domain-specific processing. In this paper, we present a time-series analysis based video summarization technique that provides a general core to which we are able to add small content-specific extensions for each genre. The proposed time-series analysis technique consists of unsupervised clustering of samples taken through sliding windows from the time series of features obtained from the content. We classify content into two broad categories, scripted content such as news and drama, and unscripted content such as sports and surveillance. The summarization problem then reduces to finding either finding semantic boundaries of the scripted content or detecting highlights in the unscripted content. The proposed technique is essentially an event detection technique and is thus best suited to unscripted content, however, we also find applications to scripted content. We thoroughly examine the trade-off between content-neutral and content-specific processing for effective summarization for a number of genres, and find that our core technique enables us to minimize the complexity of the content-specific processing and to postpone it to the final stage. We achieve the best results with unscripted content such as sports and surveillance video in terms of quality of summaries and minimizing content-specific processing. For other genres such as drama, we find that more content-specific processing is required. We also find that judicious choice of key audio-visual object detectors enables us to minimize the complexity of the content-specific processing while maintaining its applicability to a broad range of genres. We will present a demonstration of our proposed technique at the conference.

  15. Legal drug content in music video programs shown on Australian television on saturday mornings.

    Science.gov (United States)

    Johnson, Rebecca; Croager, Emma; Pratt, Iain S; Khoo, Natalie

    2013-01-01

    To examine the extent to which legal drug references (alcohol and tobacco) are present in the music video clips shown on two music video programs broadcast in Australia on Saturday mornings. Further, to examine the music genres in which the references appeared and the dominant messages associated with the references. Music video clips shown on the music video programs 'Rage' (ABC TV) and [V] 'Music Video Chart' (Channel [V]) were viewed over 8 weeks from August 2011 to October 2011 and the number of clips containing verbal and/or visual drug references in each program was counted. The songs were classified by genre and the dominant messages associated with drug references were also classified and analysed. A considerable proportion of music videos (approximately one-third) contained drug references. Alcohol featured in 95% of the music videos that contained drug references. References to alcohol generally associated it with fun and humour, and alcohol and tobacco were both overwhelmingly presented in contexts that encouraged, rather than discouraged, their use. In Australia, Saturday morning is generally considered a children's television viewing timeslot, and several broadcaster Codes of Practice dictate that programs shown on Saturday mornings must be appropriate for viewing by audiences of all ages. Despite this, our findings show that music video programs aired on Saturday mornings contain a considerable level of drug-related content.

  16. Augmenting a TV Broadcast with Synchronised User Generated Video and Relevant Social Network Content

    OpenAIRE

    Stokking, H.M.; Veenhuizen, A.T.; Kaptein, A.M.; Niamut, O.A.

    2014-01-01

    As TNO, we have developed an Augmented Live Broadcast use case, using components from the FP7 STEER project. In this use case, a television broadcast of a live event is augmented with user generated content. This user generated content consists of videos made by users at the event, and also of relevant social network content. The current implementation uses timestamps inserted in the media streams to synchronise related media streams. Social networks are searched using EPG information as a st...

  17. Age and violent-content labels make video games forbidden fruits for youth.

    Science.gov (United States)

    Bijvank, Marije Nije; Konijn, Elly A; Bushman, Brad J; Roelofsma, Peter H M P

    2009-03-01

    To protect minors from exposure to video games with objectionable content (eg, violence and sex), the Pan European Game Information developed a classification system for video games (eg, 18+). We tested the hypothesis that this classification system may actually increase the attractiveness of games for children younger than the age rating. Participants were 310 Dutch youth. The design was a 3 (age group: 7-8, 12-13, and 16-17 years) x 2 (participant gender) x 7 (label: 7+, 12+, 16+, 18+, violence, no violence, or no label control) x 2 (game description: violent or nonviolent) mixed factorial. The first 2 factors were between subjects, whereas the last 2 factors were within subjects. Three personality traits (ie, reactance, trait aggressiveness, and sensation seeking) were also included in the analyses. Participants read fictitious video game descriptions and rated how much they wanted to play each game. Results revealed that restrictive age labels and violent-content labels increased the attractiveness of video games for all of the age groups (even 7- to 8-year-olds and girls). Although the Pan European Game Information system was developed to protect youth from objectionable content, this system actually makes such games forbidden fruits. Pediatricians should be aware of this forbidden-fruit effect, because video games with objectionable content can have harmful effects on children and adolescents.

  18. Sexual content in video games: an analysis of the Entertainment Software Rating Board classification from 1994 to 2013.

    Science.gov (United States)

    Vidaña-Pérez, Dèsirée; Braverman-Bronstein, Ariela; Basto-Abreu, Ana; Barrientos-Gutierrez, Inti; Hilscher, Rainer; Barrientos-Gutierrez, Tonatiuh

    2018-01-11

    Background: Video games are widely used by children and adolescents and have become a significant source of exposure to sexual content. Despite evidence of the important role of media in the development of sexual attitudes and behaviours, little attention has been paid to monitor sexual content in video games. Methods: Data was obtained about sexual content and rating for 23722 video games from 1994 to 2013 from the Entertainment Software Rating Board database; release dates and information on the top 100 selling video games was also obtained. A yearly prevalence of sexual content according to rating categories was calculated. Trends and comparisons were estimated using Joinpoint regression. Results: Sexual content was present in 13% of the video games. Games rated 'Mature' had the highest prevalence of sexual content (34.5%) followed by 'Teen' (30.7%) and 'E10+' (21.3%). Over time, sexual content decreased in the 'Everyone' category, 'E10+' maintained a low prevalence and 'Teen' and 'Mature' showed a marked increase. Both top and non-top video games showed constant increases, with top selling video games having 10.1% more sexual content across the period of study. Conclusion: Over the last 20 years, the prevalence of sexual content has increased in video games with a 'Teen' or 'Mature' rating. Further studies are needed to quantify the potential association between sexual content in video games and sexual behaviour in children and adolescents.

  19. Content-Aware Scalability-Type Selection for Rate Adaptation of Scalable Video

    Directory of Open Access Journals (Sweden)

    Tekalp A Murat

    2007-01-01

    Full Text Available Scalable video coders provide different scaling options, such as temporal, spatial, and SNR scalabilities, where rate reduction by discarding enhancement layers of different scalability-type results in different kinds and/or levels of visual distortion depend on the content and bitrate. This dependency between scalability type, video content, and bitrate is not well investigated in the literature. To this effect, we first propose an objective function that quantifies flatness, blockiness, blurriness, and temporal jerkiness artifacts caused by rate reduction by spatial size, frame rate, and quantization parameter scaling. Next, the weights of this objective function are determined for different content (shot types and different bitrates using a training procedure with subjective evaluation. Finally, a method is proposed for choosing the best scaling type for each temporal segment that results in minimum visual distortion according to this objective function given the content type of temporal segments. Two subjective tests have been performed to validate the proposed procedure for content-aware selection of the best scalability type on soccer videos. Soccer videos scaled from 600 kbps to 100 kbps by the proposed content-aware selection of scalability type have been found visually superior to those that are scaled using a single scalability option over the whole sequence.

  20. Know your data: understanding implicit usage versus explicit action in video content classification

    Science.gov (United States)

    Yew, Jude; Shamma, David A.

    2011-02-01

    In this paper, we present a method for video category classification using only social metadata from websites like YouTube. In place of content analysis, we utilize communicative and social contexts surrounding videos as a means to determine a categorical genre, e.g. Comedy, Music. We hypothesize that video clips belonging to different genre categories would have distinct signatures and patterns that are reflected in their collected metadata. In particular, we define and describe social metadata as usage or action to aid in classification. We trained a Naive Bayes classifier to predict categories from a sample of 1,740 YouTube videos representing the top five genre categories. Using just a small number of the available metadata features, we compare the classifications produced by our Naive Bayes classifier with those provided by the uploader of that particular video. Compared to random predictions with the YouTube data (21% accurate), our classifier attained a mediocre 33% accuracy in predicting video genres. However, we found that the accuracy of our classifier significantly improves by nominal factoring of the explicit data features. By factoring the ratings of the videos in the dataset, the classifier was able to accurately predict the genres of 75% of the videos. We argue that the patterns of social activity found in the metadata are not just meaningful in their own right, but are indicative of the meaning of the shared video content. The results presented by this project represents a first step in investigating the potential meaning and significance of social metadata and its relation to the media experience.

  1. Attitudes towards schizophrenia on YouTube: A content analysis of Finnish and Greek videos.

    Science.gov (United States)

    Athanasopoulou, Christina; Suni, Sanna; Hätönen, Heli; Apostolakis, Ioannis; Lionis, Christos; Välimäki, Maritta

    2016-01-01

    To investigate attitudes towards schizophrenia and people with schizophrenia presented in YouTube videos. We searched YouTube using the search terms "schizophrenia" and "psychosis" in Finnish and Greek language on April 3rd, 2013. The first 20 videos from each search (N = 80) were retrieved. Deductive content analysis was first applied for coding and data interpretation and it was followed by descriptive statistical analysis. A total of 52 videos were analyzed (65%). The majority of the videos were in the "Music" category (50%, n = 26). Most of the videos (83%, n = 43) tended to present schizophrenia in a negative way, while less than a fifth (17%, n = 9) presented schizophrenia in a positive or neutral way. Specifically, the most common negative attitude towards schizophrenia was dangerousness (29%, n = 15), while the most often identified positive attitude was objective, medically appropriate beliefs (21%, n = 11). All attitudes identified were similarly present in the Finnish and Greek videos, without any statistically significant difference. Negative presentations of schizophrenia are most likely to be accessed when searching YouTube for schizophrenia in Finnish and Greek language. More research is needed to investigate to what extent, if any, YouTube viewers' attitudes are affected by the videos they watch.

  2. A Joint Compression Scheme of Video Feature Descriptors and Visual Content.

    Science.gov (United States)

    Zhang, Xiang; Ma, Siwei; Wang, Shiqi; Zhang, Xinfeng; Sun, Huifang; Gao, Wen

    2017-02-01

    High-efficiency compression of visual feature descriptors has recently emerged as an active topic due to the rapidly increasing demand in mobile visual retrieval over bandwidth-limited networks. However, transmitting only those feature descriptors may largely restrict its application scale due to the lack of necessary visual content. To facilitate the wide spread of feature descriptors, a hybrid framework of jointly compressing the feature descriptors and visual content is highly desirable. In this paper, such a content-plus-feature coding scheme is investigated, aiming to shape the next generation of video compression system toward visual retrieval, where the high-efficiency coding of both feature descriptors and visual content can be achieved by exploiting the interactions between each other. On the one hand, visual feature descriptors can achieve compact and efficient representation by taking advantages of the structure and motion information in the compressed video stream. To optimize the retrieval performance, a novel rate-accuracy optimization technique is proposed to accurately estimate the retrieval performance degradation in feature coding. On the other hand, the already compressed feature data can be utilized to further improve the video coding efficiency by applying feature matching-based affine motion compensation. Extensive simulations have shown that the proposed joint compression framework can offer significant bitrate reduction in representing both feature descriptors and video frames, while simultaneously maintaining the state-of-the-art visual retrieval performance.

  3. Automating the construction of scene classifiers for content-based video retrieval

    NARCIS (Netherlands)

    Khan, L.; Israël, Menno; Petrushin, V.A.; van den Broek, Egon; van der Putten, Peter

    2004-01-01

    This paper introduces a real time automatic scene classifier within content-based video retrieval. In our envisioned approach end users like documentalists, not image processing experts, build classifiers interactively, by simply indicating positive examples of a scene. Classification consists of a

  4. Control and Innovation on Digital Platforms : the case of Netflix and streaming of video content

    OpenAIRE

    Vigeland, Eirik

    2012-01-01

    In this thesis I investigate innovation processes on innovation platforms, and look at the role played by content release for innovation in digital distribution of home entertainment. I argue that innovation platforms rely on several aspects of innovation in order to succeed, and this thesis is concerned with one of these, namely release of digital entertainment content. I use the American video streaming service Netflix as a case and example of such an innovation platform. By using techno...

  5. Increasing availability, data privacy and copyrights of digital content via a pilot project of the National Library of Finland

    Directory of Open Access Journals (Sweden)

    Tuula Pääkkönen

    2016-12-01

    Full Text Available Availability, data privacy and copyrights are topics which the National Library of Finland (NLF is currently working on to increase the availability of digital content. Currently, in Finland, the digital collection of newspapers, journals and ephemera at the digi.kansalliskirjasto.fi service is available for everyone, where, e.g., newspapers are available for the years 1771-1910. The material after that period is visible in the six legal deposit libraries all over Finland. Researchers, especially, but also other customer segments are demanding better access to digital content.  We at the NLF are searching for ways to open the collections to wider audiences.  Therefore, we have established a pilot project, where we are experimenting with new modes of operation in opening digital content for education and research. In the pilot project, Aviisi, the participants are media houses, copyright organisations, universities, schools, public libraries, archives, museums and research organisations.We are creating tailored contract models to improve our responsiveness to copyright and data privacy issues. Beside the contract modes, we are also working with the technical solutions and communicating with the participants about possible ways to utilise digital content. Our objective is that, by the end of the project, we will have clarified legal, technical and availability questions, so that we will be prepared for most common scenarios and can proceed with the pilot projects, and then onwards after the overall success of all our pilot projects.Currently, we have fifteen pilot projects (hereafter, pilots running, which cover about 40,000 people in the Mikkeli region, where about 4,000 of those people are directly involved in the pilots as an estimate of students, teachers, researchers or other contact points. In this paper, we will discuss the pilots, how we have approached them to use digital content and attempted to increase the availability to the content

  6. Adaptive Content Management for UGC Video Delivery in Mobile Internet Era

    Directory of Open Access Journals (Sweden)

    Qilin Fan

    2016-01-01

    Full Text Available The demand of storing and transferring user generated content (UGC has been rapidly growing with the popularization of mobile devices equipped with video recording and playback capabilities. As a typical application of software-defined networks/network functions virtualization-based pervasive communications infrastructure, content delivery networks (CDNs have been widely leveraged to distribute contents across different geographical locations. Nevertheless, the content delivery for UGC is inefficient with the existing “pull-based” caching mechanism in traditional CDNs, because there exists a huge volume of lukewarm or cold UGC which results in a low cache hit ratio. In this paper, we propose a “push-based” caching mechanism to efficiently and economically deliver UGC videos. Different from traditional CDNs which separate the original content storage and caching, we directly store UGC videos into selective servers which serve as both reliable storages and user-facing uploading servers. By carefully and dynamically selecting the storage locations of each UGC object based on its popularity and locality, we not only guarantee the data availability but also remarkably improve the content distribution performance and reduce the distribution cost.

  7. Video content analysis on body-worn cameras for retrospective investigation

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; ter Haar, Frank B.; Eendebak, Pieter T.; den Hollander, Richard J. M.; Burghouts, Gertjan J.; Wijn, Remco; van den Broek, Sebastiaan P.; van Rest, Jeroen H. C.

    2015-10-01

    In the security domain, cameras are important to assess critical situations. Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence between police and citizens. However, the increased use of bodycams also creates potential challenges. For example: how can end-users extract information from the abundance of video, how can the information be presented, and how can an officer retrieve information efficiently? Nevertheless, such video gives the opportunity to stimulate the professionals' memory, and support complete and accurate reporting. In this paper, we show how video content analysis (VCA) can address these challenges and seize these opportunities. To this end, we focus on methods for creating a complete summary of the video, which allows quick retrieval of relevant fragments. The content analysis for summarization consists of several components, such as stabilization, scene selection, motion estimation, localization, pedestrian tracking and action recognition in the video from a bodycam. The different components and visual representations of summaries are presented for retrospective investigation.

  8. Automatic Synthesis of Background Music Track Data by Analysis of Video Contents

    Science.gov (United States)

    Modegi, Toshio

    This paper describes an automatic creation technique of background music track data for given video file. Our proposed system is based on a novel BGM synthesizer, called “Matrix Music Player”, which can produce 3125 kinds of high-quality BGM contents by dynamically mixing 5 audio files, which are freely selected from total 25 audio waveform files. In order to retrieve appropriate BGM mixing patterns, we have constructed an acoustic analysis database, which records acoustic features of total 3125 synthesized patterns. Developing a video analyzer which generates image parameters of given video data and converts them to acoustic parameters, we will access the acoustic analysis database and retrieve an appropriate synthesized BGM signal, which can be included in the audio track of the source video file. Based on our proposed method, we have tried BGM synthesis experiments using several around 20-second video clips. The automatically inserted BGM audio streams for all of our given video clips have been objectively acceptable. In this paper, we describe briefly our proposed BGM synthesized method and its experimental results.

  9. Assessing the Content of YouTube Videos in Educating Patients Regarding Common Imaging Examinations.

    Science.gov (United States)

    Rosenkrantz, Andrew B; Won, Eugene; Doshi, Ankur M

    2016-12-01

    To assess the content of currently available YouTube videos seeking to educate patients regarding commonly performed imaging examinations. After initial testing of possible search terms, the first two pages of YouTube search results for "CT scan," "MRI," "ultrasound patient," "PET scan," and "mammogram" were reviewed to identify educational patient videos created by health organizations. Sixty-three included videos were viewed and assessed for a range of features. Average views per video were highest for MRI (293,362) and mammography (151,664). Twenty-seven percent of videos used a nontraditional format (eg, animation, song, humor). All videos (100.0%) depicted a patient undergoing the examination, 84.1% a technologist, and 20.6% a radiologist; 69.8% mentioned examination lengths, 65.1% potential pain/discomfort, 41.3% potential radiation, 36.5% a radiology report/results, 27.0% the radiologist's role in interpretation, and 13.3% laboratory work. For CT, 68.8% mentioned intravenous contrast and 37.5% mentioned contrast safety. For MRI, 93.8% mentioned claustrophobia, 87.5% noise, 75.0% need to sit still, 68.8% metal safety, 50.0% intravenous contrast, and 0.0% contrast safety. For ultrasound, 85.7% mentioned use of gel. For PET, 92.3% mentioned radiotracer injection, 61.5% fasting, and 46.2% diabetic precautions. For mammography, unrobing, avoiding deodorant, and possible additional images were all mentioned by 63.6%; dense breasts were mentioned by 0.0%. Educational patient videos on YouTube regarding common imaging examinations received high public interest and may provide a valuable patient resource. Videos most consistently provided information detailing the examination experience and less consistently provided safety information or described the presence and role of the radiologist. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  10. A content analysis of smoking fetish videos on YouTube: regulatory implications for tobacco control.

    Science.gov (United States)

    Kim, Kyongseok; Paek, Hye-Jin; Lynn, Jordan

    2010-03-01

    This study examined the prevalence, accessibility, and characteristics of eroticized smoking portrayal, also referred to as smoking fetish, on YouTube. The analysis of 200 smoking fetish videos revealed that the smoking fetish videos are prevalent and accessible to adolescents on the website. They featured explicit smoking behavior by sexy, young, and healthy females, with the content corresponding to PG-13 and R movie ratings. We discuss a potential impact of the prosmoking image on youth according to social cognitive theory, and implications for tobacco control.

  11. Axiological and educational analysis of video-games with violence contents

    Directory of Open Access Journals (Sweden)

    José Antonio ORTEGA CARRILLO

    2017-07-01

    Full Text Available A high percentage of video-games now in the market have contents related with physical and psychological violence. There are investigations that show that this kind of games is mainly used by children and adolescents. This fact reinitiates the polemic of the possible influence in the formation of their personality and, very specially, in the construction of the value scale that will direct their present and future behaviour as citizens. This paper shows the partial results of a recent research in which adult players related with the education area (future teachers analyzed critically the axiological component of a very important group of video-games which are important in the sales lists. For that purpose, a very specific scale has been used, with indicators related to the argument, the initial and final videos, the protagonist’s behaviour, the stenography, clothes, actions and partial and final results obtained by players.

  12. BDVC (Bimodal Database of Violent Content): A database of violent audio and video

    Science.gov (United States)

    Rivera Martínez, Jose Luis; Mijes Cruz, Mario Humberto; Rodríguez Vázqu, Manuel Antonio; Rodríguez Espejo, Luis; Montoya Obeso, Abraham; García Vázquez, Mireya Saraí; Ramírez Acosta, Alejandro Álvaro

    2017-09-01

    Nowadays there is a trend towards the use of unimodal databases for multimedia content description, organization and retrieval applications of a single type of content like text, voice and images, instead bimodal databases allow to associate semantically two different types of content like audio-video, image-text, among others. The generation of a bimodal database of audio-video implies the creation of a connection between the multimedia content through the semantic relation that associates the actions of both types of information. This paper describes in detail the used characteristics and methodology for the creation of the bimodal database of violent content; the semantic relationship is stablished by the proposed concepts that describe the audiovisual information. The use of bimodal databases in applications related to the audiovisual content processing allows an increase in the semantic performance only and only if these applications process both type of content. This bimodal database counts with 580 audiovisual annotated segments, with a duration of 28 minutes, divided in 41 classes. Bimodal databases are a tool in the generation of applications for the semantic web.

  13. Headless, hungry, and unhealthy: a video content analysis of obese persons portrayed in online news.

    Science.gov (United States)

    Puhl, Rebecca M; Peterson, Jamie Lee; DePierre, Jenny A; Luedicke, Joerg

    2013-01-01

    The news media has substantial influence on public perceptions of social and health issues. This study conducted a video content analysis to examine portrayals of obese persons in online news reports about obesity. The authors downloaded online news videos about obesity (N = 371) from 5 major news websites and systematically coded visual portrayals of obese and nonobese adults and youth in these videos. The authors found that 65% of overweight/obese adults and 77% of overweight/obese youth were portrayed in a negative, stigmatizing manner across multiple obesity-related topics covered in online news videos. In particular, overweight/obese individuals were significantly more likely than were nonoverweight individuals to be portrayed as headless, with an unflattering emphasis on isolated body parts, from an unflattering rear view of their excess weight, eating unhealthy foods, engaging in sedentary behavior, and dressed in inappropriately fitting clothing. Nonoverweight individuals were significantly more likely to be portrayed positively. In conclusion, obese children and adults are frequently stigmatized in online news videos about obesity. These findings have important implications for public perceptions of obesity and obese persons and may reinforce negative societal weight bias.

  14. Organ donation on Web 2.0: content and audience analysis of organ donation videos on YouTube.

    Science.gov (United States)

    Tian, Yan

    2010-04-01

    This study examines the content of and audience response to organ donation videos on YouTube, a Web 2.0 platform, with framing theory. Positive frames were identified in both video content and audience comments. Analysis revealed a reciprocity relationship between media frames and audience frames. Videos covered content categories such as kidney, liver, organ donation registration process, and youth. Videos were favorably rated. No significant differences were found between videos produced by organizations and individuals in the United States and those produced in other countries. The findings provide insight into how new communication technologies are shaping health communication in ways that differ from traditional media. The implications of Web 2.0, characterized by user-generated content and interactivity, for health communication and health campaign practice are discussed.

  15. Fast repurposing of high-resolution stereo video content for mobile use

    Science.gov (United States)

    Karaoglu, Ali; Lee, Bong Ho; Boev, Atanas; Cheong, Won-Sik; Gotchev, Atanas

    2012-06-01

    3D video content is captured and created mainly in high resolution targeting big cinema or home TV screens. For 3D mobile devices, equipped with small-size auto-stereoscopic displays, such content has to be properly repurposed, preferably in real-time. The repurposing requires not only spatial resizing but also properly maintaining the output stereo disparity, as it should deliver realistic, pleasant and harmless 3D perception. In this paper, we propose an approach to adapt the disparity range of the source video to the comfort disparity zone of the target display. To achieve this, we adapt the scale and the aspect ratio of the source video. We aim at maximizing the disparity range of the retargeted content within the comfort zone, and minimizing the letterboxing of the cropped content. The proposed algorithm consists of five stages. First, we analyse the display profile, which characterises what 3D content can be comfortably observed in the target display. Then, we perform fast disparity analysis of the input stereoscopic content. Instead of returning the dense disparity map, it returns an estimate of the disparity statistics (min, max, meanand variance) per frame. Additionally, we detect scene cuts, where sharp transitions in disparities occur. Based on the estimated input, and desired output disparity ranges, we derive the optimal cropping parameters and scale of the cropping window, which would yield the targeted disparity range and minimize the area of cropped and letterboxed content. Once the rescaling and cropping parameters are known, we perform resampling procedure using spline-based and perceptually optimized resampling (anti-aliasing) kernels, which have also a very efficient computational structure. Perceptual optimization is achieved through adjusting the cut-off frequency of the anti-aliasing filter with the throughput of the target display.

  16. Is Content Really King? An Objective Analysis of the Public's Response to Medical Videos on YouTube

    Science.gov (United States)

    Desai, Tejas; Shariff, Afreen; Dhingra, Vibhu; Minhas, Deeba; Eure, Megan; Kats, Mark

    2013-01-01

    Medical educators and patients are turning to YouTube to teach and learn about medical conditions. These videos are from authors whose credibility cannot be verified & are not peer reviewed. As a result, studies that have analyzed the educational content of YouTube have reported dismal results. These studies have been unable to exclude videos created by questionable sources and for non-educational purposes. We hypothesize that medical education YouTube videos, authored by credible sources, are of high educational value and appropriately suited to educate the public. Credible videos about cardiovascular diseases were identified using the Mayo Clinic's Center for Social Media Health network. Content in each video was assessed by the presence/absence of 7 factors. Each video was also evaluated for understandability using the Suitability Assessment of Materials (SAM). User engagement measurements were obtained for each video. A total of 607 videos (35 hours) were analyzed. Half of all videos contained 3 educational factors: treatment, screening, or prevention. There was no difference between the number of educational factors present & any user engagement measurement (p NS). SAM scores were higher in videos whose content discussed more educational factors (pYouTube. PMID:24367517

  17. Dry facts are not always inviting: a content analysis of Korean videos regarding Parkinson's disease on YouTube.

    Science.gov (United States)

    Kim, Ryul; Park, Hye-Young; Kim, Han-Joon; Kim, Aryun; Jang, Mi-Hee; Jeon, Beomseok

    2017-12-01

    This study aimed to evaluate the accuracy of Korean videos regarding Parkinson's disease (PD) on YouTube and viewers' responses to them. YouTube search was performed using the search term "Parkinson disease" in Korean language on March 28, 2017. Two independent neurologists categorized the videos into "reliable", "misleading" or "patient experiences". The number of views, days since upload, video length, number of "likes" and "dislikes", and upload source were collected for each video. A total of 138 videos were included in this study. Of these, 91 videos (65.9%) were reliable; 31 (22.5%) were misleading, and 16 (11.6%) were of patient experiences. The videos with patient experiences had the highest number of mean views with 9710.4±3686.9, followed by misleading videos with 5075.0±1198.6, and reliable videos with 2146.8±353.4 (ANOVA, pYouTube provide reliable information. More importantly, the videos with reliable contents were less popular than videos with misleading contents. Further efforts are warranted to effectively increase the dissemination of accurate and scientifically proven PD information to YouTube users. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Alcohol and Tobacco Content in UK Video Games and Their Association with Alcohol and Tobacco Use Among Young People

    OpenAIRE

    Cranwell, J.C.; Whitamore, Kathy; Britton, John; Leonardi-Bee, Jo

    2016-01-01

    Abstract To determine the extent to which video games include alcohol and tobacco content and assess the association between playing them and alcohol and smoking behaviors in adolescent players in Great Britain. Assessment of substance in the 32 UK bestselling video games of 2012/2013; online survey of adolescent playing of 17 games with substance content; and content analysis of the five most popular games. A total of 1,094 adolescents aged 11?17 years were included as participants. Reported...

  19. Axiological and educational analysis of video-games with violence contents

    OpenAIRE

    José Antonio ORTEGA CARRILLO; Mª Carmen ROBLES VILCHEZ

    2017-01-01

    A high percentage of video-games now in the market have contents related with physical and psychological violence. There are investigations that show that this kind of games is mainly used by children and adolescents. This fact reinitiates the polemic of the possible influence in the formation of their personality and, very specially, in the construction of the value scale that will direct their present and future behaviour as citizens. This paper shows the partial results of a recent researc...

  20. HATE BENEATH THE COUNTER SPEECH? A QUALITATIVE CONTENT ANALYSIS OF USER COMMENTS ON YOUTUBE RELATED TO COUNTER SPEECH VIDEOS

    OpenAIRE

    Julian Ernst; Schmitt, Josephine B.; Diana Rieger; Ann Kristin Beier; Peter Vorderer; Gary Bente; Hans Joachim Roth

    2017-01-01

    The odds in stumbling over extremist material in the internet are high. Counter speech videos, such as those of the German campaign Begriffswelten Islam (Concepts of Islam; Bundeszentrale für politische Bildung, 2015a) published on YouTube, offer alternative perspectives and democratic ideas to counteract extremist content. YouTube users may discuss these videos in the comment sections below the video. Yet, it remains open which topics these users bring up in their comments. Moreover, it is u...

  1. The influence of sexual music videos on adolescents' misogynistic beliefs: the role of video content, gender, and affective engagement

    NARCIS (Netherlands)

    van Oosten, J.M.F.; Peter, J.; Valkenburg, P.M.

    2015-01-01

    Research on how sexual music videos affect beliefs related to sexual aggression is rare and has not differentiated between the effects of music videos by male and female artists. Moreover, little is known about the affective processes that underlie the effects of sexual music videos. Using data from

  2. 2D/3D video content adaptation decision engine based on content classification and user assessment

    Science.gov (United States)

    Fernandes, Rui; Andrade, M. T.

    2017-07-01

    Multimedia adaptation depends on several factors, such as the content itself, the consumption device and its characteristics, the transport and access networks and the user. An adaptation decision engine, in order to provide the best possible Quality of Experience to a user, needs to have information about all variables that may influence its decision. For the aforementioned factors, we implement content classification, define device classes, consider limited bandwidth scenarios and categorize user preferences based on a subjective quality evaluation test. The results of these actions generate vital information to pass to the adaptation decision engine so that its operation may provide the indication of the most suitable adaptation to perform that delivers the best possible outcome for the user under the existing constraints.

  3. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses

    National Research Council Canada - National Science Library

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-01-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics...

  4. Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

    Science.gov (United States)

    Kim, Kyung-Su; Lee, Hae-Yeoun; Im, Dong-Hyuck; Lee, Heung-Kyu

    Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.

  5. Direct ophthalmoscopy on YouTube: analysis of instructional YouTube videos' content and approach to visualization.

    Science.gov (United States)

    Borgersen, Nanna Jo; Henriksen, Mikael Johannes Vuokko; Konge, Lars; Sørensen, Torben Lykke; Thomsen, Ann Sofia Skou; Subhi, Yousif

    2016-01-01

    Direct ophthalmoscopy is well-suited for video-based instruction, particularly if the videos enable the student to see what the examiner sees when performing direct ophthalmoscopy. We evaluated the pedagogical effectiveness of instructional YouTube videos on direct ophthalmoscopy by evaluating their content and approach to visualization. In order to synthesize main themes and points for direct ophthalmoscopy, we formed a broad panel consisting of a medical student, junior and senior physicians, and took into consideration book chapters targeting medical students and physicians in general. We then systematically searched YouTube. Two authors reviewed eligible videos to assess eligibility and extract data on video statistics, content, and approach to visualization. Correlations between video statistics and contents were investigated using two-tailed Spearman's correlation. We screened 7,640 videos, of which 27 were found eligible for this study. Overall, a median of 12 out of 18 points (interquartile range: 8-14 key points) were covered; no videos covered all of the 18 points assessed. We found the most difficulties in the approach to visualization of how to approach the patient and how to examine the fundus. Time spent on fundus examination correlated with the number of views per week (Spearman's ρ=0.53; P=0.029). Videos may help overcome the pedagogical issues in teaching direct ophthalmoscopy; however, the few available videos on YouTube fail to address this particular issue adequately. There is a need for high-quality videos that include relevant points, provide realistic visualization of the examiner's view, and give particular emphasis on fundus examination.

  6. Organising co-existence in cyberspace: Content regulation and privacy compared

    OpenAIRE

    Engel, Christoph

    2002-01-01

    The Internet globalizes the world. National regulatory autonomy shrinks. Transferring data from one country to another is almost costless. Foreign content is just a click away. Why is it that states have been able to re-install co-existence in some policy areas, and not in others? In data protection, the safe-harbour compromise between the US and the EU found a way out. In the area of content regulation, transnational conflict is no less pronounced. The Europeans are preoccupied with Nazi pub...

  7. Mobile Video in Everyday Social Interactions

    Science.gov (United States)

    Reponen, Erika; Lehikoinen, Jaakko; Impiö, Jussi

    Video recording has become a spontaneous everyday activity for many people, thanks to the video capabilities of modern mobile phones. Internet connectivity of mobile phones enables fluent sharing of captured material even real-time, which makes video an up-and-coming everyday interaction medium. In this article we discuss the effect of the video camera in the social environment, everyday life situations, mainly based on a study where four groups of people used digital video cameras in their normal settings. We also reflect on another study of ours, relating to real-time mobile video communication and discuss future views. The aim of our research is to understand the possibilities in the domain of mobile video. Live and delayed sharing seem to have their special characteristics, live video being used as a virtual window between places whereas delayed video usage has more scope for good-quality content. While this novel way of interacting via mobile video enables new social patterns, it also raises new concerns for privacy and trust between participating persons in all roles, largely due to the widely spreading possibilities of videos. Video in a social situation affects cameramen (who record), targets (who are recorded), passers-by (who are unintentionally in the situation), and the audience (who follow the videos or recording situations) but also the other way around, the participants affect the video by their varying and evolving personal and communicational motivations for recording.

  8. Through the looking glass of a chemistry video game: Evaluating the effects of different MLEs presenting identical content material

    Science.gov (United States)

    Hillman, Dustin S.

    The primary goal of this study is to evaluate the effects of different media-based learning environments (MLEs) that present identical chemistry content material. This is done with four different MLEs that utilize some or all components of a chemistry-based media-based prototype video game. Examination of general chemistry student volunteers purposefully randomized to one of four different MLEs did not provide evidence that the higher the level of interactivity resulted in a more effective MLE for the chemistry content. Data suggested that the cognitive load to play the chemistry-based video game may impaired the chemistry content being presented and recalled by the students while the students watching the movie of the chemistry-based video game were able to recall the chemistry content more efficiently. Further studies in this area need to address the overall cognitive load of the different MLEs to potentially better determine what the most effective MLE may be for this chemistry content.

  9. Impairment-Factor-Based Audiovisual Quality Model for IPTV: Influence of Video Resolution, Degradation Type, and Content Type

    Directory of Open Access Journals (Sweden)

    Garcia MN

    2011-01-01

    Full Text Available This paper presents an audiovisual quality model for IPTV services. The model estimates the audiovisual quality of standard and high definition video as perceived by the user. The model is developed for applications such as network planning and packet-layer quality monitoring. It mainly covers audio and video compression artifacts and impairments due to packet loss. The quality tests conducted for model development demonstrate a mutual influence of the perceived audio and video quality, and the predominance of the video quality for the overall audiovisual quality. The balance between audio quality and video quality, however, depends on the content, the video format, and the audio degradation type. The proposed model is based on impairment factors which quantify the quality-impact of the different degradations. The impairment factors are computed from parameters extracted from the bitstream or packet headers. For high definition video, the model predictions show a correlation with unknown subjective ratings of 95%. For comparison, we have developed a more classical audiovisual quality model which is based on the audio and video qualities and their interaction. Both quality- and impairment-factor-based models are further refined by taking the content-type into account. At last, the different model variants are compared with modeling approaches described in the literature.

  10. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks.

    Directory of Open Access Journals (Sweden)

    Zobeida Jezabel Guzman-Zavaleta

    Full Text Available Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness. Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes

  11. Celiac disease on YouTube - a study of the Polish content available on the popular video-sharing website.

    Science.gov (United States)

    Kiedrowski, Mirosław; Mróz, Andrzej; Gajewska, Danuta; Nurzyński, Paweł; Deptała, Andrzej

    2017-10-23

    Celiac disease affects about 1% of the population. Since most Polish households have a broadband Internet connection, a lot of people use web resources to learn about health and disease. YouTube service (www.youtube.com) offers a lot of videos concerning celiac disease. However, the credibility of the Polish videos available on YouTube and concerning celiac disease has never been analyzed. The aim of the study was to determine whether the YouTube service offers valuable content for Polish people affected by celiac disease. One hundred and fifty-four unique videos devoted to celiac disease and available in the Polish language were identified and critically assessed. Each video was categorized due to its topic(s), and evaluated for its credibility by two independent researchers. In general, 127 (82.5%) videos were found to be credible. The most credible categories of content presented organizations and events related to celiac disease/celiac society, followed by culinary recipes (100.0, 100.0, and 95.6% of credible videos, respectively). The least trustworthy categories were devoted to pathobiology and advertisements (55.6 and 54.3% of credible videos, respectively). YouTube service can serve as a supplementary source of knowledge for people affected by celiac disease, after careful selection of trustworthy content.

  12. Gender (In)equality in Internet Pornography: A Content Analysis of Popular Pornographic Internet Videos.

    Science.gov (United States)

    Klaassen, Marleen J E; Peter, Jochen

    2015-01-01

    Although Internet pornography is widely consumed and researchers have started to investigate its effects, we still know little about its content. This has resulted in contrasting claims about whether Internet pornography depicts gender (in)equality and whether this depiction differs between amateur and professional pornography. We conducted a content analysis of three main dimensions of gender (in)equality (i.e., objectification, power, and violence) in 400 popular pornographic Internet videos from the most visited pornographic Web sites. Objectification was depicted more often for women through instrumentality, but men were more frequently objectified through dehumanization. Regarding power, men and women did not differ in social or professional status, but men were more often shown as dominant and women as submissive during sexual activities. Except for spanking and gagging, violence occurred rather infrequently. Nonconsensual sex was also relatively rare. Overall, amateur pornography contained more gender inequality at the expense of women than professional pornography did.

  13. Multiple Moving Object Detection for Fast Video Content Description in Compressed Domain

    Directory of Open Access Journals (Sweden)

    Boris Mansencal

    2007-11-01

    Full Text Available Indexing deals with the automatic extraction of information with the objective of automatically describing and organizing the content. Thinking of a video stream, different types of information can be considered semantically important. Since we can assume that the most relevant one is linked to the presence of moving foreground objects, their number, their shape, and their appearance can constitute a good mean for content description. For this reason, we propose to combine both motion information and region-based color segmentation to extract moving objects from an MPEG2 compressed video stream starting only considering low-resolution data. This approach, which we refer to as “rough indexing,” consists in processing P-frame motion information first, and then in performing I-frame color segmentation. Next, since many details can be lost due to the low-resolution data, to improve the object detection results, a novel spatiotemporal filtering has been developed which is constituted by a quadric surface modeling the object trace along time. This method enables to effectively correct possible former detection errors without heavily increasing the computational effort.

  14. Preschoolers' Recall of Science Content From Educational Videos Presented With and Without Songs

    Science.gov (United States)

    Schechter, Rachel L.

    This experimental investigation evaluated the impact of educational songs on a child's ability to recall scientific content from an educational television program. Preschoolers' comprehension of the educational content was examined by measuring children's ability to recall the featured science content (the function of a pulley and its parts) and their use of the precise scientific terms presented in the episode. A total of 91 preschoolers were included (3-5 years old). Clusters of children were randomly assigned to a control group or one of three video groups: (a) Dialogue Only, which did not include a song; (b) Dialogue Plus Lyrics, which included a song; or (c) Lyrics Only, which consisted of a song, played twice. Results from interviews suggested that children from all video groups (lyrics and/or dialogue) were able to explain the form and function of a pulley better than the control group. The data suggested that children from the Lyrics Only group understood the science content because of the visual imagery, not through the information provided in the lyrics. In terms of precise vocabulary terms, significantly more children in the Dialogue Only group recalled at least one precise term from the program compared to the Lyrics Only group. Looking at the interview as a whole, the children's responses suggested different levels of scientific understanding. Children would require additional teacher-led instruction to deepen their scientific understanding and to clarify any misconceptions. This paper discusses implications of these findings for teachers using multi-media tools in the science classroom and producers creating new educational programming for television and other platforms.

  15. A content analysis of the portrayal of alcohol in televised music videos in New Zealand: changes over time.

    Science.gov (United States)

    Sloane, Kate; Wilson, Nick; Imlach Gunasekara, Fiona

    2013-01-01

    We aimed to: (i) document the extent and nature of alcohol portrayal in televised music videos in New Zealand in 2010; and (ii) assess trends over time by comparing with a similar 2005 sample. We undertook a content analysis for references to alcohol in 861 music videos shown on a youth-orientated television channel in New Zealand. This was compared with a sample in 2005 (564 music videos on the same channel plus sampling from two other channels). The proportion of alcohol content in the music videos was slightly higher in 2010 than for the same channel in the 2005 sample (19.5% vs. 15.7%) but this difference was not statistically significant. Only in the genre 'Rhythm and Blues' was the increase over time significant (P = 0.015). In both studies, the portrayal of alcohol was significantly more common in music videos where the main artist was international (not from New Zealand). Furthermore, in the music videos with alcohol content, at least a third of the time, alcohol was shown being consumed and the main artist was involved with alcohol. In only 2% (in 2005) and 4% (in 2010) of these videos was the tone explicitly negative towards alcohol. In both these studies, the portrayal of alcohol was relatively common in music videos. Nevertheless, there are various ways that policy makers can denormalise alcohol in youth-orientated media such as music videos or to compensate via other alcohol control measures such as higher alcohol taxes. © 2012 Australasian Professional Society on Alcohol and other Drugs.

  16. Alcohol and Tobacco Content in UK Video Games and Their Association with Alcohol and Tobacco Use Among Young People.

    Science.gov (United States)

    Cranwell, Jo; Whittamore, Kathy; Britton, John; Leonardi-Bee, Jo

    2016-07-01

    To determine the extent to which video games include alcohol and tobacco content and assess the association between playing them and alcohol and smoking behaviors in adolescent players in Great Britain. Assessment of substance in the 32 UK bestselling video games of 2012/2013; online survey of adolescent playing of 17 games with substance content; and content analysis of the five most popular games. A total of 1,094 adolescents aged 11-17 years were included as participants. Reported presence of substance content in the 32 games; estimated numbers of adolescents who had played games; self-reported substance use; semiquantitative measures of substance content by interval coding of video game cut scenes. Nonofficial sources reported substance content in 17 (44 percent) games but none was reported by the official Pan European Game Information (PEGI) system. Adolescents who had played at least one game were significantly more likely ever to have tried smoking (adjusted odds ratio [OR] 2.70, 95 percent confidence interval [CI] 1.75-4.17) or consumed alcohol (adjusted OR 2.35, 95 percent CI 1.70-3.23). In the five most popular game episodes of alcohol actual use, implied use and paraphernalia occurred in 31 (14 percent), 81 (37 percent), and 41 (19 percent) intervals, respectively. Tobacco actual use, implied use, and paraphernalia occurred in 32 (15 percent), 27 (12 percent), and 53 (24 percent) intervals, respectively. Alcohol and tobacco content is common in the most popular video games but not reported by the official PEGI system. Content analysis identified substantial substance content in a sample of those games. Adolescents who play these video games are more likely to have experimented with tobacco and alcohol.

  17. Alcohol and Tobacco Content in UK Video Games and Their Association with Alcohol and Tobacco Use Among Young People

    Science.gov (United States)

    Whittamore, Kathy; Britton, John; Leonardi-Bee, Jo

    2016-01-01

    Abstract To determine the extent to which video games include alcohol and tobacco content and assess the association between playing them and alcohol and smoking behaviors in adolescent players in Great Britain. Assessment of substance in the 32 UK bestselling video games of 2012/2013; online survey of adolescent playing of 17 games with substance content; and content analysis of the five most popular games. A total of 1,094 adolescents aged 11–17 years were included as participants. Reported presence of substance content in the 32 games; estimated numbers of adolescents who had played games; self-reported substance use; semiquantitative measures of substance content by interval coding of video game cut scenes. Nonofficial sources reported substance content in 17 (44 percent) games but none was reported by the official Pan European Game Information (PEGI) system. Adolescents who had played at least one game were significantly more likely ever to have tried smoking (adjusted odds ratio [OR] 2.70, 95 percent confidence interval [CI] 1.75–4.17) or consumed alcohol (adjusted OR 2.35, 95 percent CI 1.70–3.23). In the five most popular game episodes of alcohol actual use, implied use and paraphernalia occurred in 31 (14 percent), 81 (37 percent), and 41 (19 percent) intervals, respectively. Tobacco actual use, implied use, and paraphernalia occurred in 32 (15 percent), 27 (12 percent), and 53 (24 percent) intervals, respectively. Alcohol and tobacco content is common in the most popular video games but not reported by the official PEGI system. Content analysis identified substantial substance content in a sample of those games. Adolescents who play these video games are more likely to have experimented with tobacco and alcohol. PMID:27428030

  18. Prevalence of Behavior Changing Strategies in Fitness Video Games: Theory-Based Content Analysis

    Science.gov (United States)

    Hatkevich, Claire

    2013-01-01

    Background Fitness video games are popular, but little is known about their content. Because many contain interactive tools that mimic behavioral strategies from weight loss intervention programs, it is possible that differences in content could affect player physical activity and/or weight outcomes. There is a need for a better understanding of what behavioral strategies are currently available in fitness games and how they are implemented. Objective The purpose of this study was to investigate the prevalence of evidence-based behavioral strategies across fitness video games available for home use. Games available for consoles that used camera-based controllers were also contrasted with games available for a console that used handheld motion controllers. Methods Fitness games (N=18) available for three home consoles were systematically identified and play-tested by 2 trained coders for at least 3 hours each. In cases of multiple games from one series, only the most recently released game was included. The Sony PlayStation 3 and Microsoft Xbox360 were the two camera-based consoles, and the Nintendo Wii was the handheld motion controller console. A coding list based on a taxonomy of behavioral strategies was used to begin coding. Codes were refined in an iterative process based on data found during play-testing. Results The most prevalent behavioral strategies were modeling (17/18), specific performance feedback (17/18), reinforcement (16/18), caloric expenditure feedback (15/18), and guided practice (15/18). All games included some kind of feedback on performance accuracy, exercise frequency, and/or fitness progress. Action planning (scheduling future workouts) was the least prevalent of the included strategies (4/18). Twelve games included some kind of social integration, with nine of them providing options for real-time multiplayer sessions. Only two games did not feature any kind of reward. Games for the camera-based consoles (mean 12.89, SD 2.71) included a

  19. Prevalence of behavior changing strategies in fitness video games: theory-based content analysis.

    Science.gov (United States)

    Lyons, Elizabeth Jane; Hatkevich, Claire

    2013-05-07

    Fitness video games are popular, but little is known about their content. Because many contain interactive tools that mimic behavioral strategies from weight loss intervention programs, it is possible that differences in content could affect player physical activity and/or weight outcomes. There is a need for a better understanding of what behavioral strategies are currently available in fitness games and how they are implemented. The purpose of this study was to investigate the prevalence of evidence-based behavioral strategies across fitness video games available for home use. Games available for consoles that used camera-based controllers were also contrasted with games available for a console that used handheld motion controllers. Fitness games (N=18) available for three home consoles were systematically identified and play-tested by 2 trained coders for at least 3 hours each. In cases of multiple games from one series, only the most recently released game was included. The Sony PlayStation 3 and Microsoft Xbox360 were the two camera-based consoles, and the Nintendo Wii was the handheld motion controller console. A coding list based on a taxonomy of behavioral strategies was used to begin coding. Codes were refined in an iterative process based on data found during play-testing. The most prevalent behavioral strategies were modeling (17/18), specific performance feedback (17/18), reinforcement (16/18), caloric expenditure feedback (15/18), and guided practice (15/18). All games included some kind of feedback on performance accuracy, exercise frequency, and/or fitness progress. Action planning (scheduling future workouts) was the least prevalent of the included strategies (4/18). Twelve games included some kind of social integration, with nine of them providing options for real-time multiplayer sessions. Only two games did not feature any kind of reward. Games for the camera-based consoles (mean 12.89, SD 2.71) included a greater number of strategies than those

  20. HATE BENEATH THE COUNTER SPEECH? A QUALITATIVE CONTENT ANALYSIS OF USER COMMENTS ON YOUTUBE RELATED TO COUNTER SPEECH VIDEOS

    Directory of Open Access Journals (Sweden)

    Julian Ernst

    2017-03-01

    Full Text Available The odds in stumbling over extremist material in the internet are high. Counter speech videos, such as those of the German campaign Begriffswelten Islam (Concepts of Islam; Bundeszentrale für politische Bildung, 2015a published on YouTube, offer alternative perspectives and democratic ideas to counteract extremist content. YouTube users may discuss these videos in the comment sections below the video. Yet, it remains open which topics these users bring up in their comments. Moreover, it is unknown how far user comments in this context may promote hate speech—the very opposite of what counter speeches intent to evoke. By applying a qualitative content analysis on a randomly selected sample of user comments, which appeared beneath the counter speech videos of Concepts of Islam, we found that comments dominated, which dealt with devaluating prejudices and stereotypes towards Muslims and/or Islam. However, we also discovered that users in a large scale discussed the content of the videos. Moreover, we identified user comments, which hint at hateful speech either in comments themselves or the discourse the comments are embedded in. Based on these results, we discuss implications for researchers, practitioners and security agencies.

  1. A New Tool for Collaborative Video Search via Content-based Retrieval and Visual Inspection

    NARCIS (Netherlands)

    Hürst, W.O.; Ip Vai Ching, Algernon; Hudelist, Marco A.; Primus, Manfred J.; Schoeffmann, Klaus; Beecks, Chrisitan

    2016-01-01

    We present a new approach for collaborative video search and video browsing relying on a combination of traditional, indexbased video retrieval complemented with large-scale human-based visual inspection. In particular, a traditional PC interface is used for query-based search using advanced

  2. Comprehensive depth estimation algorithm for efficient stereoscopic content creation in three-dimensional video systems

    Science.gov (United States)

    Xu, Huihui; Jiang, Mingyan

    2015-07-01

    Two-dimensional to three-dimensional (3-D) conversion in 3-D video applications has attracted great attention as it can alleviate the problem of stereoscopic content shortage. Depth estimation is an essential part of this conversion since the depth accuracy directly affects the quality of a stereoscopic image. In order to generate a perceptually reasonable depth map, a comprehensive depth estimation algorithm that considers the scenario type is presented. Based on the human visual system mechanism, which is sensitive to a change in the scenario, this study classifies the type of scenario into four classes according to the relationship between the movements of the camera and the object, and then leverages different strategies on the basis of the scenario type. The proposed strategies efficiently extract the depth information from different scenarios. In addition, the depth generation method for a scenario in which there is no motion, neither of the object nor the camera, is also suitable for the single image. Qualitative and quantitative evaluation results demonstrate that the proposed depth estimation algorithm is very effective for generating stereoscopic content and providing a realistic visual experience.

  3. Good clean fun? A content analysis of profanity in video games and its prevalence across game systems and ratings.

    Science.gov (United States)

    Ivory, James D; Williams, Dmitri; Martins, Nicole; Consalvo, Mia

    2009-08-01

    Although violent video game content and its effects have been examined extensively by empirical research, verbal aggression in the form of profanity has received less attention. Building on preliminary findings from previous studies, an extensive content analysis of profanity in video games was conducted using a sample of the 150 top-selling video games across all popular game platforms (including home consoles, portable consoles, and personal computers). The frequency of profanity, both in general and across three profanity categories, was measured and compared to games' ratings, sales, and platforms. Generally, profanity was found in about one in five games and appeared primarily in games rated for teenagers or above. Games containing profanity, however, tended to contain it frequently. Profanity was not found to be related to games' sales or platforms.

  4. The Use of Eye Tracking in Research on Video-Based Second Language (L2) Listening Assessment: A Comparison of Context Videos and Content Videos

    Science.gov (United States)

    Suvorov, Ruslan

    2015-01-01

    Investigating how visuals affect test takers' performance on video-based L2 listening tests has been the focus of many recent studies. While most existing research has been based on test scores and self-reported verbal data, few studies have examined test takers' viewing behavior (Ockey, 2007; Wagner, 2007, 2010a). To address this gap, in the…

  5. Sexually Explicit Media on the Internet: A Content Analysis of Sexual Behaviors, Risk, and Media Characteristics in Gay Male Adult Videos

    OpenAIRE

    Downing, Martin J.; Schrimshaw, Eric W.; Antebi, Nadav; Siegel, Karolynn

    2013-01-01

    Recent research suggests that viewing sexually explicit media (SEM), i.e., adult videos, may influence sexual risk taking among men who have sex with men (MSM). Despite this evidence, very little is known about the content of gay male SEM on the Internet, including the prevalence of sexual risk behaviors and their relation to video- and performer-characteristics, viewing frequency, and favorability. The current study content analyzed 302 sexually explicit videos featuring male same-sex perfor...

  6. Channel Allocation Based on Content Characteristics for Video Transmission in Time-Domain-Based Multichannel Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Md. Jalil Piran

    2015-01-01

    Full Text Available This paper proposes a method for channel allocation based on video content requirements and the quality of the available channels in cognitive radio networks (CRNs. Our objective is to save network bandwidth and achieve high-quality video delivery. In this method, the content is divided into clusters based on scene complexity and PSNR. To allocate channel to the clusters over multichannel CRNs, we first need to identify the licensee’s activity and then maximize the opportunistic usage accordingly. Therefore, we classify short and long time transmission opportunities based on the licensee’s activities using a Bayesian nonparametric inference model. Furthermore, to prevent transmission interruption, we consider the underlay mode for transmission of the clusters with a lower bitrate. Next, we map the available spectrum opportunities to the content clusters according to both the quality of the channels and the requirements of the clusters. Then, a distortion optimization model is constructed according to the network transmission mechanism. Finally, to maximize the average quality of the delivered video, an optimization problem is defined to determine the best bitrate for each cluster by maximizing the sum of the logarithms of the frame rates. Our extensive simulation results prove the superior performance of the proposed method in terms of spectrum efficiency and the quality of delivered video.

  7. Performance evaluation of real-time video content analysis systems in the CANDELA project

    Science.gov (United States)

    Desurmont, Xavier; Wijnhoven, Rob; Jaspers, Egbert; Caignart, Olivier; Barais, Mike; Favoreel, Wouter; Delaigle, Jean-Francois

    2005-02-01

    The CANDELA project aims at realizing a system for real-time image processing in traffic and surveillance applications. The system performs segmentation, labels the extracted blobs and tracks their movements in the scene. Performance evaluation of such a system is a major challenge since no standard methods exist and the criteria for evaluation are highly subjective. This paper proposes a performance evaluation approach for video content analysis (VCA) systems and identifies the involved research areas. For these areas we give an overview of the state-of-the-art in performance evaluation and introduce a classification into different semantic levels. The proposed evaluation approach compares the results of the VCA algorithm with a ground-truth (GT) counterpart, which contains the desired results. Both the VCA results and the ground truth comprise description files that are formatted in MPEG-7. The evaluation is required to provide an objective performance measure and a mean to choose between competitive methods. In addition, it enables algorithm developers to measure the progress of their work at the different levels in the design process. From these requirements and the state-of-the-art overview we conclude that standardization is highly desirable for which many research topics still need to be addressed.

  8. Effective evaluation of privacy protection techniques in visible and thermal imagery

    Science.gov (United States)

    Nawaz, Tahir; Berg, Amanda; Ferryman, James; Ahlberg, Jörgen; Felsberg, Michael

    2017-09-01

    Privacy protection may be defined as replacing the original content in an image region with a (less intrusive) content having modified target appearance information to make it less recognizable by applying a privacy protection technique. Indeed, the development of privacy protection techniques also needs to be complemented with an established objective evaluation method to facilitate their assessment and comparison. Generally, existing evaluation methods rely on the use of subjective judgments or assume a specific target type in image data and use target detection and recognition accuracies to assess privacy protection. An annotation-free evaluation method that is neither subjective nor assumes a specific target type is proposed. It assesses two key aspects of privacy protection: "protection" and "utility." Protection is quantified as an appearance similarity, and utility is measured as a structural similarity between original and privacy-protected image regions. We performed an extensive experimentation using six challenging datasets (having 12 video sequences), including a new dataset (having six sequences) that contains visible and thermal imagery. The new dataset is made available online for the community. We demonstrate effectiveness of the proposed method by evaluating six image-based privacy protection techniques and also show comparisons of the proposed method over existing methods.

  9. Content analysis of antismoking videos on YouTube: message sensation value, message appeals, and their relationships with viewer responses.

    Science.gov (United States)

    Paek, Hye-Jin; Kim, Kyongseok; Hove, Thomas

    2010-12-01

    Focusing on several message features that are prominent in antismoking campaign literature, this content-analytic study examines 934 antismoking video clips on YouTube for the following characteristics: message sensation value (MSV) and three types of message appeal (threat, social and humor). These four characteristics are then linked to YouTube's interactive audience response mechanisms (number of viewers, viewer ratings and number of comments) to capture message reach, viewer preference and viewer engagement. The findings suggest the following: (i) antismoking messages are prevalent on YouTube, (ii) MSV levels of online antismoking videos are relatively low compared with MSV levels of televised antismoking messages, (iii) threat appeals are the videos' predominant message strategy and (iv) message characteristics are related to viewer reach and viewer preference.

  10. Content-Based Indexing and Teaching Focus Mining for Lecture Videos

    Science.gov (United States)

    Lin, Yu-Tzu; Yen, Bai-Jang; Chang, Chia-Hu; Lee, Greg C.; Lin, Yu-Chih

    2010-01-01

    Purpose: The purpose of this paper is to propose an indexing and teaching focus mining system for lecture videos recorded in an unconstrained environment. Design/methodology/approach: By applying the proposed algorithms in this paper, the slide structure can be reconstructed by extracting slide images from the video. Instead of applying…

  11. Movie Ratings and the Content of Adult Videos: The Sex-Violence Ratio.

    Science.gov (United States)

    Yang, Ni; Linz, Daniel

    1990-01-01

    Quantifies sexual, violent, sexually violent, and prosocial behaviors in a sample of R-rated and X-rated videocassettes. Finds the predominant behavior in both X- and XXX-rated videos is sexual. Finds the predominant behavior in R-rated videos was violence followed by prosocial behavior. (RS)

  12. What arguments on vaccinations run through YouTube videos in Italy? A content analysis.

    Science.gov (United States)

    Covolo, Loredana; Ceretti, Elisabetta; Passeri, Chiara; Boletti, Michela; Gelatti, Umberto

    2017-07-03

    The suspension of compulsory scheduling of some pediatric vaccines has been discussed for a long time by health authorities in Italy but the current decrease of vaccination rates is a matter of concern. YouTube is the most popular video-based social media website. Considering the demonstrated impact of internet on vaccination decision-making and the increasing use of social media to share and disseminate health information, the aim of this study was to explore the message available on YouTube videos about vaccination. An observational study was conducted searching for YouTube videos in September 2015 and updated in January 2016, by using the keyword "vaccinations." We included recently posted videos in Italian on child vaccination (2014-2015). Videos were classified according to the message tone. A total of 123 videos were selected. Pro-vaccination videos were 62 (50%), anti-vaccination 28 (23%), neutral or without a clear position in favor or against vaccination 33 (27%). Focusing on the first 2 groups, pro-vaccination videos had a higher number of views compared with those unfavorable (1602 ± 6544 vs 1482 ± 2735) (p viewers (17.8 ± 31.3) than positive ones (13.2 ± 44.7) (p viewers, it is important to monitor the web to understand audience characteristics and what influences public opinions to use communication strategies more effectively.

  13. How violent video games communicate violence: A literature review and content analysis of moral disengagement factors

    NARCIS (Netherlands)

    Hartmann, T.; Krakowiak, M.; Tsay-Vogel, M.

    2014-01-01

    Mechanisms of moral disengagement in violent video game play have recently received considerable attention among communication scholars. To date, however, no study has analyzed the prevalence of moral disengagement factors in violent video games. To fill this research gap, the present approach

  14. Obesity in the new media: a content analysis of obesity videos on YouTube.

    Science.gov (United States)

    Yoo, Jina H; Kim, Junghyun

    2012-01-01

    This study examines (1) how the topics of obesity are framed and (2) how obese persons are portrayed on YouTube video clips. The analysis of 417 obesity videos revealed that a newer medium like YouTube, similar to traditional media, appeared to assign responsibility and solutions for obesity mainly to individuals and their behaviors, although there was a tendency that some video categories have started to show other causal claims or solutions. However, due to the prevailing emphasis on personal causes and solutions, numerous YouTube videos had a theme of weight-based teasing, or showed obese persons engaging in stereotypical eating behaviors. We discuss a potential impact of YouTube videos on shaping viewers' perceptions about obesity and further reinforcing stigmatization of obese persons.

  15. The Effects of Profanity in Violent Video Game Content on Players' Hostile Expectations, Accessibility of Aggressive Thoughts, Aggressive Feelings, and Other Responses

    OpenAIRE

    Ivory, Adrienne Holz

    2010-01-01

    Although the effects of violent video games on aggression in users have been researched extensively and the resulting body of research shows that violent video games can increase aggressive behaviors, aggression-related feelings and thoughts, and physiological arousal, no empirical studies to date have examined whether there are similar and parallel effects of verbal aggression (e.g., profanity) in video game content. A 2 X 2 between-subjects factorial experiment (N = 321) tested the effects ...

  16. Future-saving audiovisual content for Data Science: Preservation of geoinformatics video heritage with the TIB|AV-Portal

    Science.gov (United States)

    Löwe, Peter; Plank, Margret; Ziedorn, Frauke

    2015-04-01

    of Science and Technology. The web-based portal allows for extended search capabilities based on enhanced metadata derived by automated video analysis. By combining state-of-the-art multimedia retrieval techniques such as speech-, text-, and image recognition with semantic analysis, content-based access to videos at the segment level is provided. Further, by using the open standard Media Fragment Identifier (MFID), a citable Digital Object Identifier is displayed for each video segment. In addition to the continuously growing footprint of contemporary content, the importance of vintage audiovisual information needs to be considered: This paper showcases the successful application of the TIB|AV-Portal in the preservation and provision of a newly discovered version of a GRASS GIS promotional video produced by US Army -Corps of Enginers Laboratory (US-CERL) in 1987. The video is provides insight into the constraints of the very early days of the GRASS GIS project, which is the oldest active Free and Open Source Software (FOSS) GIS project which has been active for over thirty years. GRASS itself has turned into a collaborative scientific platform and a repository of scientific peer-reviewed code and algorithm/knowledge hub for future generation of scientists [1]. This is a reference case for future preservation activities regarding semantic-enhanced Web 2.0 content from geospatial software projects within Academia and beyond. References: [1] Chemin, Y., Petras V., Petrasova, A., Landa, M., Gebbert, S., Zambelli, P., Neteler, M., Löwe, P.: GRASS GIS: a peer-reviewed scientific platform and future research Repository, Geophysical Research Abstracts, Vol. 17, EGU2015-8314-1, 2015 (submitted)

  17. Evaluation of stereoscopic medical video content on an autostereoscopic display for undergraduate medical education

    Science.gov (United States)

    Ilgner, Justus F. R.; Kawai, Takashi; Shibata, Takashi; Yamazoe, Takashi; Westhofen, Martin

    2006-02-01

    Introduction: An increasing number of surgical procedures are performed in a microsurgical and minimally-invasive fashion. However, the performance of surgery, its possibilities and limitations become difficult to teach. Stereoscopic video has evolved from a complex production process and expensive hardware towards rapid editing of video streams with standard and HDTV resolution which can be displayed on portable equipment. This study evaluates the usefulness of stereoscopic video in teaching undergraduate medical students. Material and methods: From an earlier study we chose two clips each of three different microsurgical operations (tympanoplasty type III of the ear, endonasal operation of the paranasal sinuses and laser chordectomy for carcinoma of the larynx). This material was added by 23 clips of a cochlear implantation, which was specifically edited for a portable computer with an autostereoscopic display (PC-RD1-3D, SHARP Corp., Japan). The recording and synchronization of left and right image was performed at the University Hospital Aachen. The footage was edited stereoscopically at the Waseda University by means of our original software for non-linear editing of stereoscopic 3-D movies. Then the material was converted into the streaming 3-D video format. The purpose of the conversion was to present the video clips by a file type that does not depend on a television signal such as PAL or NTSC. 25 4th year medical students who participated in the general ENT course at Aachen University Hospital were asked to estimate depth clues within the six video clips plus cochlear implantation clips. Another 25 4th year students who were shown the material monoscopically on a conventional laptop served as control. Results: All participants noted that the additional depth information helped with understanding the relation of anatomical structures, even though none had hands-on experience with Ear, Nose and Throat operations before or during the course. The monoscopic

  18. Digital Media Platforms and the Use of TV Content: Binge Watching and Video-on-Demand in Germany

    Directory of Open Access Journals (Sweden)

    Lothar Mikos

    2016-07-01

    Full Text Available The advancing digitalization and media convergence demands TV broadcasting companies to adjust their content to various platforms and distribution channels. The internet, as convergent carrier medium, is increasingly taking on a central role for additional media. Classical linear TV is still important, but for some audiences it has been developing from a primary medium to a secondary medium. Owing to the growing melding of classical-linear TV contents with online offerings (e.g. video-on-demand platforms or Web–TV, a great dynamic can be seen which has triggered numerous discussions about the future of TV for some time now. This article will summarize the results of two different audience studies. Film and television shows are meanwhile distributed online via Video-on-Demand platforms such as Netflix or Amazon Prime Video. The first audience study has dealt with the use of VoD-platforms in Germany investigating user rituals, user motivation to watch films and TV shows on these platforms, and the meaning of VoD in everyday life. Most of the participants in this study reported that they mainly watch TV drama series at Netflix or Amazon Prime. Therefore, the second audience study focused the online use of television drama series of individuals and couples elaborating the phenomenon of binge watching. In relating the audience practice to the new structures of the television market the article will shed light on the future of television.

  19. The Design and Use of Planetary Science Video Games to Teach Content while Enhancing Spatial Reasoning Skills

    Science.gov (United States)

    Ziffer, Julie; Nadirli, Orkhan; Rudnick, Benjamin; Pinkham, Sunny; Montgomery, Benjamin

    2016-10-01

    Traditional teaching of Planetary Science requires students to possess well developed spatial reasoning skills (SRS). Recent research has demonstrated that SRS, long known to be crucial to math and science success, can be improved among students who lack these skills (Sorby et al., 2009). Teaching spatial reasoning is particularly valuable to women and minorities who, through societal pressure, often doubt their abilities (Hill et al., 2010). To address SRS deficiencies, our team is developing video games that embed SRS training into Planetary Science content. Our first game, on Moon Phases, addresses the two primary challenges faced by students trying to understand the Sun-Earth-Moon system: 1) visualizing the system (specifically the difference between the Sun-Earth orbital plane and the Earth-Moon orbital plane) and 2) comprehending the relationship between time and the position-phase of the Moon. In our second video game, the student varies an asteroid's rotational speed, shape, and orientation to the light source while observing how these changes effect the resulting light curve. To correctly pair objects to their light curves, students use spatial reasoning skills to imagine how light scattering off a three dimensional rotating object is imaged on a sensor plane and is then reduced to a series of points on a light curve plot. These two games represent the first of our developing suite of high-interest video games designed to teach content while increasing the student's competence in spatial reasoning.

  20. "Get Lucky!" Sexual Content in Music Lyrics, Videos and Social Media and Sexual Cognitions and Risk among Emerging Adults in the USA and Australia

    Science.gov (United States)

    Wright, Chrysalis L.; Rubin, Mark

    2017-01-01

    This study examined the relationship between sexual content in music and sexual cognitions and risk among emerging adults in the USA and Australia. Music content was examined via lyrics, videos and social media. It was hypothesised that there would be a positive association between sexual content in music and sexual cognitions and risk. Sexual…

  1. The Role of Violent Video Game Content in Adolescent Development: Boys' Perspectives

    Science.gov (United States)

    Olson, Cheryl K.; Kutner, Lawrence A.; Warner, Dorothy E.

    2008-01-01

    Numerous policies have been proposed at the local, state, and national level to restrict youth access to violent video and computer games. Although studies are cited to support policies, there is no published research on how children perceive the uses and influence of violent interactive games. The authors conduct focus groups with 42 boys ages 12…

  2. Learning from video modeling examples : Content kept equal, adults are more effective models than peers

    NARCIS (Netherlands)

    Hoogerheide, Vincent; van Wermeskerken, Margot; Loyens, Sofie M M; van Gog, Tamara

    2016-01-01

    Learning from (video) modeling examples in which a model demonstrates how to perform a task is an effective instructional strategy. The model-observer similarity (MOS) hypothesis postulates that (perceived) similarity between learners and the model in terms of age or expertise moderates the

  3. Hi YouTube! Personality Impressions and Verbal Content in Social Video

    OpenAIRE

    Biel, Joan-Isaac; Gatica-Perez, Daniel; Dines, John; Tsminiaki, Vagia

    2013-01-01

    Despite the evidence that social video conveys rich human personality information, research investigating the automatic prediction of personality impressions in vlogging has shown that, amongst the Big-Five traits, automatic nonverbal be- havioral cues are useful to predict mainly the Extraversion trait. This finding, also reported in other conversational settings, indicates that personality information may be coded in other behavioral dimensions like the verbal channel, which has been less s...

  4. Can Clinical Scenario Videos Improve Dental Students' Perceptions of the Basic Sciences and Ability to Apply Content Knowledge?

    Science.gov (United States)

    Miller, Cynthia Jayne; Metz, Michael James

    2015-12-01

    Dental students often have difficulty understanding the importance of basic science classes, such as physiology, for their future careers. To help alleviate this problem, the aim of this study was to create and evaluate a series of video modules using simulated patients and custom-designed animations that showcase medical emergencies in the dental practice. First-year students in a dental physiology course formatively assessed their knowledge using embedded questions in each of the three videos; 108 to 114 of the total 120 first-year students answered the questions, for a 90-95% response rate. These responses indicated that while the students could initially recognize the cause of the medical emergency, they had difficulty in applying their knowledge of physiology to the scenario. In two of the three videos, students drastically improved their ability to answer high-level clinical questions at the conclusion of the video. Additionally, when compared to the previous year of the course, there was a significant improvement in unit exam scores on clinically related questions (6.2% increase). Surveys were administered to the first-year students who participated in the video modules and fourth-year students who had completed the course prior to implementation of any clinical material. The response rate for the first-year students was 96% (115/120) and for the fourth-year students was 57% (68/120). The first-year students indicated a more positive perception of the physiology course and its importance for success on board examinations and their dental career than the fourth-year students. The students perceived that the most positive aspects of the modules were the clear applications of physiology to real-life dental situations, the interactive nature of the videos, and the improved student comprehension of course concepts. These results suggest that online modules may be used successfully to improve students' perceptions of the basic sciences and enhance their ability to

  5. Quantitative analysis of Internet television and video (WebTV: A study of formats, content, and source

    Directory of Open Access Journals (Sweden)

    José Borja ARJONA MARTÍN

    2014-07-01

    Full Text Available Due to the significant increase in the last five years of audiovisual content distribution over the web, this paper is focused on a study aimed at the description and classification of a wide sample of audiovisual initiatives whose access is carried out by means of the World Wide Web. The purpose of this study is to promote the debate concerning the different names of these incipient media, as well as their categorization and description so that an organised universe of the WebTV phenomenon could be provided. An analysis of formats and content is carried out on the basis of quantitative techniques in order to propose a categorization typology. These formats and content will be studied under three key variables: "Content", "Origin" and "Domain .tv". "Content" will help us define the programmatic lines of our study sample; “Source” refers to the source of a particular item of study (“Native WebTV or WebTV representative of a conventional media and "Domain.tv" will specify the proportion of case studies hosted with domain .tv. The results obtained in this study will offer the researchers and the professionals a comprehensive description of the models currently adopted in the field of video and television on the net.

  6. Cool, callous and in control: superior inhibitory control in frequent players of video games with violent content.

    Science.gov (United States)

    Stockdale, Laura; Morrison, Robert G; Palumbo, Robert; Garbarino, James; Silton, Rebecca L

    2017-12-01

    Research on the effects of media violence exposure has shown robust associations among violent media exposure, increased aggressive behavior, and decreased empathy. Preliminary research indicates that frequent players of violent video games may have differences in emotional and cognitive processes compared to infrequent or nonplayers, yet research examining the amount and content of game play and the relation of these factors with affective and cognitive outcomes is limited. The present study measured neural correlates of response inhibition in the context of implicit attention to emotion, and how these factors are related to empathic responding in frequent and infrequent players of video games with graphically violent content. Participants completed a self-report measure of empathy as well as an affective stop-signal task that measured implicit attention to emotion and response inhibition during electroencephalography. Frequent players had lower levels of empathy as well as a reduction in brain activity as indicated by P100 and N200/P300 event related potentials. Reduced P100 amplitude evoked by happy facial expressions was observed in frequent players compared to infrequent players, and this effect was moderated by empathy, such that low levels of empathy further reduced P100 amplitudes for happy facial expressions for frequent players compared to infrequent players. Compared to infrequent players, frequent players had reduced N200/P300 amplitude during response inhibition, indicating less neural resources were recruited to inhibit behavior. Results from the present study illustrate that chronic exposure to violent video games modulates empathy and related neural correlates associated with affect and cognition. © The Author (2017). Published by Oxford University Press.

  7. Cool, callous and in control: superior inhibitory control in frequent players of video games with violent content

    Science.gov (United States)

    Morrison, Robert G; Palumbo, Robert; Garbarino, James; Silton, Rebecca L

    2017-01-01

    Abstract Research on the effects of media violence exposure has shown robust associations among violent media exposure, increased aggressive behavior, and decreased empathy. Preliminary research indicates that frequent players of violent video games may have differences in emotional and cognitive processes compared to infrequent or nonplayers, yet research examining the amount and content of game play and the relation of these factors with affective and cognitive outcomes is limited. The present study measured neural correlates of response inhibition in the context of implicit attention to emotion, and how these factors are related to empathic responding in frequent and infrequent players of video games with graphically violent content. Participants completed a self-report measure of empathy as well as an affective stop-signal task that measured implicit attention to emotion and response inhibition during electroencephalography. Frequent players had lower levels of empathy as well as a reduction in brain activity as indicated by P100 and N200/P300 event related potentials. Reduced P100 amplitude evoked by happy facial expressions was observed in frequent players compared to infrequent players, and this effect was moderated by empathy, such that low levels of empathy further reduced P100 amplitudes for happy facial expressions for frequent players compared to infrequent players. Compared to infrequent players, frequent players had reduced N200/P300 amplitude during response inhibition, indicating less neural resources were recruited to inhibit behavior. Results from the present study illustrate that chronic exposure to violent video games modulates empathy and related neural correlates associated with affect and cognition. PMID:29040750

  8. Adult and adolescent exposure to tobacco and alcohol content in contemporary YouTube music videos in Great Britain: a population estimate.

    Science.gov (United States)

    Cranwell, Jo; Opazo-Breton, Magdalena; Britton, John

    2016-05-01

    We estimate exposure of British adults and adolescents to tobacco and alcohol content from a sample of popular YouTube music videos. British viewing figures were generated from 2 representative online national surveys of adult and adolescent viewing of the 32 most popular videos containing content. 2068 adolescents aged 11-18 years (1010 boys, 1058 girls), and 2232 adults aged 19+years (1052 male, 1180 female) completed the surveys. We used the number of 10 s intervals in the 32 most popular videos containing content to estimate the number of impressions. We extrapolated gross and per capita impressions for the British population from census data and estimated numbers of adults and adolescents who had ever watched the sampled videos. From video release to the point of survey, the videos delivered an estimated 1006 million gross impressions of alcohol (95% CI 748 to 1264 million), and 203 million of tobacco (95% CI 151 to 255 million), to the British population. Per capita exposure was around 5 times higher for alcohol than for tobacco, and nearly 4 times higher in adolescents, who were exposed to an average of 52.1 (95% CI 43.4 to 60.9) and 10.5 (95% CI 8.8 to 12.3) alcohol and tobacco impressions, respectively, than in adults (14.1 (95% CI 10.2 to 18.1) and 2.9 (95% CI 2.1 to 3.6)). Exposure rates were higher in girls than in boys. YouTube music videos deliver millions of gross impressions of alcohol and tobacco content. Adolescents are exposed much more than adults. Music videos are a major global medium of exposure to such content. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Content-aware video quality assessment: predicting human perception of quality using peak signal to noise ratio and spatial/temporal activity

    Science.gov (United States)

    Ortiz-Jaramillo, B.; Niño-Castañeda, J.; Platiša, L.; Philips, W.

    2015-03-01

    Since the end-user of video-based systems is often a human observer, prediction of human perception of quality (HPoQ) is an important task for increasing the user satisfaction. Despite the large variety of objective video quality measures, one problem is the lack of generalizability. This is mainly due to the strong dependency between HPoQ and video content. Although this problem is well-known, few existing methods directly account for the influence of video content on HPoQ. This paper propose a new method to predict HPoQ by using simple distortion measures and introducing video content features in their computation. Our methodology is based on analyzing the level of spatio-temporal activity and combining HPoQ content related parameters with simple distortion measures. Our results show that even very simple distortion measures such as PSNR and simple spatio-temporal activity measures lead to good results. Results over four different public video quality databases show that the proposed methodology, while faster and simpler, is competitive with current state-of-the-art methods, i.e., correlations between objective and subjective assessment higher than 80% and it is only two times slower than PSNR.

  10. "F*ck It! Let's Get to Drinking-Poison our Livers!": a Thematic Analysis of Alcohol Content in Contemporary YouTube MusicVideos.

    Science.gov (United States)

    Cranwell, Jo; Britton, John; Bains, Manpreet

    2017-02-01

    The purpose of the present study is to describe the portrayal of alcohol content in popular YouTube music videos. We used inductive thematic analysis to explore the lyrics and visual imagery in 49 UK Top 40 songs and music videos previously found to contain alcohol content and watched by many British adolescents aged between 11 and 18 years and to examine if branded content contravened alcohol industry advertising codes of practice. The analysis generated three themes. First, alcohol content was associated with sexualised imagery or lyrics and the objectification of women. Second, alcohol was associated with image, lifestyle and sociability. Finally, some videos showed alcohol overtly encouraging excessive drinking and drunkenness, including those containing branding, with no negative consequences to the drinker. Our results suggest that YouTube music videos promote positive associations with alcohol use. Further, several alcohol companies adopt marketing strategies in the video medium that are entirely inconsistent with their own or others agreed advertising codes of practice. We conclude that, as a harm reduction measure, policies should change to prevent adolescent exposure to the positive promotion of alcohol and alcohol branding in music videos.

  11. Text de-identification for privacy protection: a study of its impact on clinical text information content.

    Science.gov (United States)

    Meystre, Stéphane M; Ferrández, Óscar; Friedlin, F Jeffrey; South, Brett R; Shen, Shuying; Samore, Matthew H

    2014-08-01

    As more and more electronic clinical information is becoming easier to access for secondary uses such as clinical research, approaches that enable faster and more collaborative research while protecting patient privacy and confidentiality are becoming more important. Clinical text de-identification offers such advantages but is typically a tedious manual process. Automated Natural Language Processing (NLP) methods can alleviate this process, but their impact on subsequent uses of the automatically de-identified clinical narratives has only barely been investigated. In the context of a larger project to develop and investigate automated text de-identification for Veterans Health Administration (VHA) clinical notes, we studied the impact of automated text de-identification on clinical information in a stepwise manner. Our approach started with a high-level assessment of clinical notes informativeness and formatting, and ended with a detailed study of the overlap of select clinical information types and Protected Health Information (PHI). To investigate the informativeness (i.e., document type information, select clinical data types, and interpretation or conclusion) of VHA clinical notes, we used five different existing text de-identification systems. The informativeness was only minimally altered by these systems while formatting was only modified by one system. To examine the impact of de-identification on clinical information extraction, we compared counts of SNOMED-CT concepts found by an open source information extraction application in the original (i.e., not de-identified) version of a corpus of VHA clinical notes, and in the same corpus after de-identification. Only about 1.2-3% less SNOMED-CT concepts were found in de-identified versions of our corpus, and many of these concepts were PHI that was erroneously identified as clinical information. To study this impact in more details and assess how generalizable our findings were, we examined the overlap between

  12. [Viewing of horror and violence videos by adolescence. A study of speech samples of video consumers with the Gottschalk-Gleser Speech Content analysis].

    Science.gov (United States)

    Hopf, H; Weiss, R H

    1996-01-01

    In 1990 pupils of different schools in Württemberg were interviewed about their television and video consumption. It turned out that a high percentage of mainly male pupils of Hauptschulen (upper division of elementary schools) and special schools excessively and regularly consumed films which were on the index (X-rated) or seized depicting horror and violence. Subsequent to the inquiry through questionnaires and different personality tests, speech samples of 51 test persons were recorded on tape. 5 speech samples had to be excluded from further investigation since they contained less than 70 words. The transcribed and anonymized records were examined according to the Gottschalk-Gleser content analysis of verbal behavior, and two groups of so-called seldom lookers (n = 22) and frequent lookers (n = 24) were compared to each other. The frequent lookers significantly often reported about film contents which presumably means that their imagination is more restricted and less productive than that of the other group. In addition, this group of frequent lookers had significantly higher scores concerning death anxiety and guilt anxiety. With regard to hostility affects, their scores were also significantly raised concerning outward-overt hostility, outward-covert hostility, and ambivalent hostility. Probably the group of frequent lookers comprised more test persons with relationship disorders, with borderline risks, dissocial personality features, and problems to cope with their aggressiveness. So they show on the one hand a raised affinity to watch such films, but simultaneously unconscious and conscious learning processes take place which stimulate further aggressive fantasies (and possibly also actions).

  13. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  14. The effects of intrinsic motivation, extrinsic motivation and toolkits onuser participation in User-generated content for video games: : A quantitative study of product development in online communities

    OpenAIRE

    Lundmark, Joakim; Sandström Lindberg, Eric

    2015-01-01

    In this thesis we will discuss the subject of user participation in the development process of products, specifically video games, through a concept called User-generated content. Product development demands speed and flexibility in the development process and it has been suggested that managers should revise the process of product development to become more flexible and integrate the consumer in increasingly more steps of the process. Video games will often be modified after its release. In ...

  15. Sexually explicit media on the internet: a content analysis of sexual behaviors, risk, and media characteristics in gay male adult videos.

    Science.gov (United States)

    Downing, Martin J; Schrimshaw, Eric W; Antebi, Nadav; Siegel, Karolynn

    2014-05-01

    Recent research suggests that viewing sexually explicit media (SEM), i.e., adult videos, may influence sexual risk taking among men who have sex with men. Despite this evidence, very little is known about the content of gay male SEM on the Internet, including the prevalence of sexual risk behaviors and their relation to video- and performer-characteristics, viewing frequency, and favorability. The current study content analyzed 302 sexually explicit videos featuring male same-sex performers that were posted to five highly trafficked adult-oriented websites. Findings revealed that gay male SEM on the Internet features a variety of conventional and nonconventional sexual behaviors. There was a substantial prevalence of unprotected anal intercourse (UAI) (34 %) and was virtually the same as the prevalence of anal sex with a condom (36 %). The presence of UAI was not associated with video length, amateur production, number of video views, favorability, or website source. However, the presence of other potentially high-risk behaviors (e.g., ejaculation in the mouth, and ejaculation on/in/rubbed into the anus) was associated with longer videos, more views, and group sex videos (three or more performers). The findings of high levels of sexual risk behavior and the fact that there was virtually no difference in the prevalence of anal sex with and without a condom in gay male SEM have important implications for HIV prevention efforts, future research on the role of SEM on sexual risk taking, and public health policy.

  16. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  17. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  18. Development of a Coding Instrument to Assess the Quality and Content of Anti-Tobacco Video Games.

    Science.gov (United States)

    Alber, Julia M; Watson, Anna M; Barnett, Tracey E; Mercado, Rebeccah; Bernhardt, Jay M

    2015-07-01

    Previous research has shown the use of electronic video games as an effective method for increasing content knowledge about the risks of drugs and alcohol use for adolescents. Although best practice suggests that theory, health communication strategies, and game appeal are important characteristics for developing games, no instruments are currently available to examine the quality and content of tobacco prevention and cessation electronic games. This study presents the systematic development of a coding instrument to measure the quality, use of theory, and health communication strategies of tobacco cessation and prevention electronic games. Using previous research and expert review, a content analysis coding instrument measuring 67 characteristics was developed with three overarching categories: type and quality of games, theory and approach, and type and format of messages. Two trained coders applied the instrument to 88 games on four platforms (personal computer, Nintendo DS, iPhone, and Android phone) to field test the instrument. Cohen's kappa for each item ranged from 0.66 to 1.00, with an average kappa value of 0.97. Future research can adapt this coding instrument to games addressing other health issues. In addition, the instrument questions can serve as a useful guide for evidence-based game development.

  19. Development of a Coding Instrument to Assess the Quality and Content of Anti-Tobacco Video Games

    Science.gov (United States)

    Alber, Julia M.; Watson, Anna M.; Barnett, Tracey E.; Mercado, Rebeccah

    2015-01-01

    Abstract Previous research has shown the use of electronic video games as an effective method for increasing content knowledge about the risks of drugs and alcohol use for adolescents. Although best practice suggests that theory, health communication strategies, and game appeal are important characteristics for developing games, no instruments are currently available to examine the quality and content of tobacco prevention and cessation electronic games. This study presents the systematic development of a coding instrument to measure the quality, use of theory, and health communication strategies of tobacco cessation and prevention electronic games. Using previous research and expert review, a content analysis coding instrument measuring 67 characteristics was developed with three overarching categories: type and quality of games, theory and approach, and type and format of messages. Two trained coders applied the instrument to 88 games on four platforms (personal computer, Nintendo DS, iPhone, and Android phone) to field test the instrument. Cohen's kappa for each item ranged from 0.66 to 1.00, with an average kappa value of 0.97. Future research can adapt this coding instrument to games addressing other health issues. In addition, the instrument questions can serve as a useful guide for evidence-based game development. PMID:26167842

  20. Gender (in)equality in internet pornography: a content analysis of popular pornographic internet videos

    NARCIS (Netherlands)

    Klaassen, M.J.E.; Peter, J.

    2015-01-01

    Although Internet pornography is widely consumed and researchers have started to investigate its effects, we still know little about its content. This has resulted in contrasting claims about whether Internet pornography depicts gender (in)equality and whether this depiction differs between amateur

  1. Research-Based Strategies for Teaching Content to Students with Intellectual Disabilities: Adapted Videos

    Science.gov (United States)

    Evmenova, Anna S.; Behrmann, Michael M.

    2011-01-01

    Teachers are always seeking any visual and/or auditory supports to facilitate students' comprehension and acquisition of difficult concepts associated with academic content. Such supports are even more important for students with intellectual disabilities who regardless of their abilities and needs are required to have access and active…

  2. Complex event processing for content-based text, image, and video retrieval

    NARCIS (Netherlands)

    Bowman, E.K.; Broome, B.D.; Holland, V.M.; Summers-Stay, D.; Rao, R.M.; Duselis, J.; Howe, J.; Madahar, B.K.; Boury-Brisset, A.C.; Forrester, B.; Kwantes, P.; Burghouts, G.; Huis, J. van; Mulayim, A.Y.

    2016-01-01

    This report summarizes the findings of an exploratory team of the North Atlantic Treaty Organization (NATO) Information Systems Technology panel into Content-Based Analytics (CBA). The team carried out a technical review into the current status of theoretical and practical developments of methods,

  3. Improving student learning via mobile phone video content: Evidence from the BridgeIT India project

    Science.gov (United States)

    Wennersten, Matthew; Quraishy, Zubeeda Banu; Velamuri, Malathi

    2015-08-01

    Past efforts invested in computer-based education technology interventions have generated little evidence of affordable success at scale. This paper presents the results of a mobile phone-based intervention conducted in the Indian states of Andhra Pradesh and Tamil Nadu in 2012-13. The BridgeIT project provided a pool of audio-visual learning materials organised in accordance with a system of syllabi pacing charts. Teachers of Standard 5 and 6 English and Science classes were notified of the availability of new videos via text messages (SMS), which they downloaded onto their phones using an open-source application and showed, with suggested activities, to students on a TV screen using a TV-out cable. In their evaluation of this project, the authors of this paper found that the test scores of children who experienced the intervention improved by 0.36 standard deviations in English and 0.98 standard deviations in Science in Andhra Pradesh, relative to students in similar classrooms who did not experience the intervention. Differences between treatment and control schools in Tamil Nadu were less marked. The intervention was also cost-effective, relative to other computer-based interventions. Based on these results, the authors argue that is possible to use mobile phones to produce a strong positive and statistically significant effect in terms of teaching and learning quality across a large number of classrooms in India at a lower cost per student than past computer-based interventions.

  4. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  5. Examining the Use of Video Study Groups for Developing Literacy Pedagogical Content Knowledge of Critical Elements of Strategy Instruction with Elementary Teachers

    Science.gov (United States)

    Shanahan, Lynn E.; Tochelli, Andrea L.

    2014-01-01

    This collective case study explored what nine elementary teachers' video study group discussions revealed about their understanding of pedagogical content knowledge for an explicit reading strategy instruction framework, Critical Elements of Strategy Instruction (CESI). Qualitative methods were used to inductively and deductively analyze…

  6. Somali asylum seekers' perceptions of privacy in healthcare.

    Science.gov (United States)

    Eklöf, Niina; Abdulkarim, Hibag; Hupli, Maija; Leino-Kilpi, Helena

    2016-08-01

    Privacy has been recognized as a basic human right and a part of quality of care. However, little is known about the privacy of Somali asylum seekers in healthcare, even though they are one of the largest asylum seeker groups in the world. The aim of the study was to describe the content and importance of privacy and its importance in healthcare from the perspective of Somali asylum seekers. The data of this explorative qualitative study were collected by four focus group interviews with 18 Somali asylum seekers with the help of an interpreter. The data were analysed by inductive content analysis. Research permissions were obtained from the director of the reception centre and from the Department of Social Services. Ethical approval was obtained from the Ethics Committee of Turku University. The content of privacy includes visual privacy, physical privacy and informational privacy. All contents can be shared with healthcare professionals. The importance of privacy includes respect, dignity and freedom. Privacy is strongly connected to the collectivism of Somali culture and religion. Unlike the Western cultures, privacy is not important only for the individual; most of all, it is seen to support collectivism. Even though all contents of privacy can be shared with healthcare professionals, it is important to recognize the cultural aspect of privacy especially when using interpreters with Somali background. © The Author(s) 2015.

  7. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  8. Cryptographic framework for analyzing the privacy of recommender algorithms

    NARCIS (Netherlands)

    Tang, Qiang

    2012-01-01

    Recommender algorithms are widely used, ranging from traditional Video on Demand to a wide variety of Web 2.0 services. Unfortunately, the related privacy concerns have not received much attention. In this paper, we study the privacy concerns associated with recommender algorithms and present a

  9. Implications of the law on video recording in clinical practice

    NARCIS (Netherlands)

    Henken, K.R.; Jansen, F.W.; Klein, J.; Stassen, L.P.S.; Dankelman, J.; Van den Dobbelsteen, J.J.

    2012-01-01

    Background Technological developments allow for a variety of applications of video recording in health care, including endoscopic procedures. Although the value of video registration is recognized, medicolegal concerns regarding the privacy of patients and professionals are growing. A clear

  10. The Secret Life of Your Classmates: Understanding Communication Privacy Management

    Science.gov (United States)

    Nodulman, Jessica A.

    2011-01-01

    This article presents an activity that combines this popular website, Postsecret.com, with college students' love for the internet, and course content on privacy boundaries and theory, disclosure, communicative control, and privacy rule development. By taking part in this activity, students practice privacy disclosure and are able to examine their…

  11. Protecting Children's Online Privacy.

    Science.gov (United States)

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  12. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  13. Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol

    Directory of Open Access Journals (Sweden)

    Monchai Lertsutthiwong

    2008-07-01

    Full Text Available Limited bandwidth and high packet loss rate pose a serious challenge for video streaming applications over wireless networks. Even when packet loss is not present, the bandwidth fluctuation, as a result of an arbitrary number of active flows in an IEEE 802.11 network, can significantly degrade the video quality. This paper aims to enhance the quality of video streaming applications in wireless home networks via a joint optimization of video layer-allocation technique, admission control algorithm, and medium access control (MAC protocol. Using an Aloha-like MAC protocol, we propose a novel admission control framework, which can be viewed as an optimization problem that maximizes the average quality of admitted videos, given a specified minimum video quality for each flow. We present some hardness results for the optimization problem under various conditions and propose some heuristic algorithms for finding a good solution. In particular, we show that a simple greedy layer-allocation algorithm can perform reasonably well, although it is typically not optimal. Consequently, we present a more expensive heuristic algorithm that guarantees to approximate the optimal solution within a constant factor. Simulation results demonstrate that our proposed framework can improve the video quality up to 26% as compared to those of the existing approaches.

  14. You can't take it with you? Effects of handheld portable media consoles on physiological and psychological responses to video game and movie content.

    Science.gov (United States)

    Ivory, James D; Magee, Robert G

    2009-06-01

    Portable media consoles are becoming extremely popular devices for viewing a number of different types of media content, both for entertainment and for educational purposes. Given the increasingly heavy use of portable consoles as an alternative to traditional television-style monitors, it is important to investigate how physiological and psychological effects of portable consoles may differ from those of television-based consoles, because such differences in physiological and psychological responses may precipitate differences in the delivered content's effectiveness. Because portable consoles are popular as a delivery system for multiple types of media content, such as movies and video games, it is also important to investigate whether differences between the effects of portable and television-based consoles are consistent across multiple types of media. This article reports a 2 x 2 (console: portable or television-based x medium: video game or movie) mixed factorial design experiment with physiological arousal and self-reported flow experience as dependent variables, designed to explore whether console type affects media experiences and whether these effects are consistent across different media. Results indicate that portable media consoles evoke lower levels of physiological arousal and flow experience and that this effect is consistent for both video games and movies. These findings suggest that even though portable media consoles are often convenient compared to television-based consoles, the convenience may come at a cost in terms of the user experience.

  15. Characterization of social video

    Science.gov (United States)

    Ostrowski, Jeffrey R.; Sarhan, Nabil J.

    2009-01-01

    The popularity of social media has grown dramatically over the World Wide Web. In this paper, we analyze the video popularity distribution of well-known social video websites (YouTube, Google Video, and the AOL Truveo Video Search engine) and characterize their workload. We identify trends in the categories, lengths, and formats of those videos, as well as characterize the evolution of those videos over time. We further provide an extensive analysis and comparison of video content amongst the main regions of the world.

  16. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  17. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  18. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  19. Millennials sex differences on Snapchat perceived privacy

    Directory of Open Access Journals (Sweden)

    Antonietta Rauzzino

    2017-07-01

    Full Text Available Snapchat offers a distinctive feature from other social networks in that its users control the visibility of the contents they share with others by defining how long these contents may be available. Snapchat is changing the way men and women perceive online information privacy and content management. This paper aims to illustrate the relevance of social representation theory to evaluate perceived privacy in Snapchat users, with a sample of 268 young adults residing in Bogotá. A survey method was employed for data collection purposes. The results reveal that Snapchat users are concerned about their networks’ privacy, with no significant sex differences, although men's perception of Snapchat privacy is safer than that of women. Finally, a discussion is presented as to the limitations and implications of these results for further studies.

  20. Content, Interaction, or Both? Synthesizing Two German Traditions in a Video Study on Learning to Explain in Mathematics Classroom Microcultures

    Science.gov (United States)

    Prediger, Susanne; Erath, Kirstin

    2014-01-01

    How do students learn to explain? We take this exemplary research question for presenting two antagonist traditions in German mathematics education research and their synthesis in an ongoing video study. These two traditions are (1) the German Didaktik approach that can be characterized by its epistemologically sensitive analyses and…

  1. Supported eText in Captioned Videos: A Comparison of Expanded versus Standard Captions on Student Comprehension of Educational Content

    Science.gov (United States)

    Anderson-Inman, Lynne; Terrazas-Arellanes, Fatima E.

    2009-01-01

    Expanded captions are designed to enhance the educational value by linking unfamiliar words to one of three types of information: vocabulary definitions, labeled illustrations, or concept maps. This study investigated the effects of expanded captions versus standard captions on the comprehension of educational video materials on DVD by secondary…

  2. Making good physics videos

    Science.gov (United States)

    Lincoln, James

    2017-05-01

    Online videos are an increasingly important way technology is contributing to the improvement of physics teaching. Students and teachers have begun to rely on online videos to provide them with content knowledge and instructional strategies. Online audiences are expecting greater production value, and departments are sometimes requesting educators to post video pre-labs or to flip our classrooms. In this article, I share my advice on creating engaging physics videos.

  3. Dynamic Privacy Management in Pervasive Sensor Networks

    Science.gov (United States)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  4. Content

    DEFF Research Database (Denmark)

    Keiding, Tina Bering

    Aim, content and methods are fundamental categories of both theoretical and practical general didactics. A quick glance in recent pedagogical literature on higher education, however, reveals a strong preoccupation with methods, i.e. how teaching should be organized socially (Biggs & Tang, 2007...... a theoretical approach, which takes complexity as fundamental premise for modern society (Luhmann, 1985, 2002). In educational situations conditionally valuable content generally will exceed what can actually be taught within the frames of an education. In pedagogy this situation is often referred...... to as ‘abundance of material’, and in many cases it is not obvious, how the line between actually chosen and conditionally relevant content can be draw. Difficulties in drawing the line between actual educational content and conditionally relevant content can be handled in different way. One way, quite efficient...

  5. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  6. Random Differential Privacy

    OpenAIRE

    Hall, Rob; Rinaldo, Alessandro; Wasserman, Larry

    2011-01-01

    We propose a relaxed privacy definition called {\\em random differential privacy} (RDP). Differential privacy requires that adding any new observation to a database will have small effect on the output of the data-release procedure. Random differential privacy requires that adding a {\\em randomly drawn new observation} to a database will have small effect on the output. We show an analog of the composition property of differentially private procedures which applies to our new definition. We sh...

  7. Heterogeneous Differential Privacy

    OpenAIRE

    Alaggan, Mohammad; Gambs, Sébastien; Kermarrec, Anne-Marie

    2015-01-01

    The massive collection of personal data by personalization systems has rendered the preservation of privacy of individuals more and more difficult. Most of the proposed approaches to preserve privacy in personalization systems usually address this issue uniformly across users, thus ignoring the fact that users have different privacy attitudes and expectations (even among their own personal data). In this paper, we propose to account for this non-uniformity of privacy expectations by introduci...

  8. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  9. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  10. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  11. A typology of privacy

    NARCIS (Netherlands)

    Koops, Bert Jaap; Newell, Bryce; Timan, Tjerk; Skorvánek, Ivan; Chokrevski, Tomislav; Galič, Maša

    2017-01-01

    Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types

  12. Toward privacy-preserving JPEG image retrieval

    Science.gov (United States)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  13. Enhancing student interactions with the instructor and content using pen-based technology, YouTube videos, and virtual conferencing.

    Science.gov (United States)

    Cox, James R

    2011-01-01

    This report describes the incorporation of digital learning elements in organic chemistry and biochemistry courses. The first example is the use of pen-based technology and a large-format PowerPoint slide to construct a map that integrates various metabolic pathways and control points. Students can use this map to visualize the integrated nature of metabolism and how various hormones impact metabolic regulation. The second example is the embedding of health-related YouTube videos directly into PowerPoint presentations. These videos become a part of the course notes and can be viewed within PowerPoint as long as students are online. The third example is the use of a webcam to show physical models during online sessions using web-conferencing software. Various molecular conformations can be shown through the webcam, and snapshots of important conformations can be incorporated into the notes for further discussion and annotation. Each of the digital learning elements discussed in this report is an attempt to use technology to improve the quality of educational resources available outside of the classroom to foster student engagement with ideas and concepts. Biochemistry and Molecular Biology Education Vol. 39, No. 1, pp. 4-9, 2011. Copyright © 2011 Wiley Periodicals, Inc.

  14. History of Privacy

    Science.gov (United States)

    Holvast, Jan

    Discussion on privacy issues is as old as mankind. Starting with the protection of one’s body and home, it soon evolved in the direction of controlling one’s personal information. In 1891, the American lawyers Samuel Warren and Louis Brandeis described the right to privacy in a famous article: it is the right to be let alone. In 1967 a new milestone was reached with the publication of Alan Westin’s Privacy and Freedom when he defined privacy in terms of self determination: privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.

  15. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  16. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2016-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation...

  17. Development of Technological and Pedagogical Content Knowledge of the Chemistry by Teachers in Training Through the Reflection of PaP-eRs and Videos

    Directory of Open Access Journals (Sweden)

    Boris Fernando Candela

    2018-01-01

    Full Text Available This article described how trainee teachers identified and developed some elements of the Technological and Pedagogical Knowledge of Chemistry Content (CTPC, along the course of educational and pedagogical context by "reflective orientation". The methodological perspective was qualitative by case study, which was configured by two interwoven areas of reflection, namely: (a reflecting on the opinions of experts about the teaching of a content, through the readings proposed in the training programs; and (b reflecting on the teaching carried out by experienced teachers through case videos and the Repertoire of Professional and Pedagogical Experiences (PaP-eRs. This heuristic reduced the complexity of teaching in a manageable story located in a specific context, so that teachers could identify and reflect on their theories about the teaching and learning of chemistry. This study showed that teachers in training identified and developed the following elements of the CTPC of chemistry: general pedagogy, language as a learning tool, difficulties and alternative conceptions, knowledge of technology as an instrument to represent the contents and manage the chemistry classroom, and the formative evaluation. Definitely, the reflection of the critical events of the PaP-eRs and videos of cases was considered an appropriate heuristic that allowed the future teachers to articulate the knowledge coming from the literature in education in chemistry, with the virtual experiences of teaching-learning of a real context. Of course, this reflection was mediated by reading, discussing and reflecting on the intelligent actions of an exemplary teacher when guiding singular students from a sociocultural perspective, with the purpose of beginning to refine their theories of teaching and learning chemistry.

  18. Michezo Video: Nairobi’s gamers and the developers who are promoting local content\\ud Michezo Vidéo: Les joueurs et les développeurs de Nairobi promouvant le contenu local

    OpenAIRE

    Callus, Paula; Potter, C.

    2017-01-01

    In Kenya, the rise of digital technologies and related new media, and an infrastructure able to support them, has seen the emergence of a growing local video games industry and a new generation of Kenyan video game developers, players and promoters. This article focuses upon the particular design strategies employed by young producers of creative digital content for games and the current networks of practice, play and support unfolding around these new gaming technologies. Interviewees for th...

  19. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  20. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the Federal...) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act..., and applicants for Board employment, for access to their records under the Privacy Act; the amendment...

  1. WCAM: secured video surveillance with digital rights management

    Science.gov (United States)

    Sadourny, Yulen; Conan, Vania; Serrao, Carlos; Fonseca, Pedro

    2005-03-01

    The WCAM project aims to provide an integrated system for secure delivery of video surveillance data over a wireless network, while remaining scalable and robust to transmission errors. To achieve these goals, the content is encoded in Motion-JPEG2000 and streamed with a specific RTP protocol encapsulation to prevent the loss of packets containing the most essential data. Protection of the video data is performed at content level using the standardized JPSEC syntax, along with flexible encryption of quality layers or resolution levels. This selective encryption respects the JPEG2000 structure of the stream, not only ensuring end-to-end ciphered delivery, but also enabling dynamic content adaptation within the wireless network (quality of service, adaptation to the user's terminal). A DRM (Digital Rights Management) solution, called OpenSDRM is added to manage all authenticated peers on the WLAN (from end-users to cameras), as well as to manage the rights to access and display conditionally the video data. This whole integrated architecture addresses several security problems such as data encryption, integrity, access control and rights management. Using several protection layers, the level of confidentiality can depend both on content characteristics and user rights, thus also addressing the critical issue of privacy.

  2. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    Science.gov (United States)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  3. Preserving Location and Absence Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Freni, Dario; Vicente, Carmen Ruiz; Mascetti, Sergio

    2010-01-01

    Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal coordinates that may then be used in services. For example, a service may retrieve photos taken in a certain region....... The resulting geo-aware social networks (GeoSNs) pose privacy threats beyond those found in location-based services. Con- tent published in a GeoSN is often associated with references to multiple users, without the publisher being aware of the privacy preferences of those users. Moreover, this content is often...... accessible to multiple users. This renders it dicult for GeoSN users to control which information about them is available and to whom it is available. This paper addresses two privacy threats that occur in GeoSNs: location privacy and absence privacy. The former concerns the availability of information about...

  4. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  5. Tweens' Conceptions of Privacy Online: Implications for Educators

    Science.gov (United States)

    Davis, Katie; James, Carrie

    2013-01-01

    There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…

  6. Differential Privacy with Compression

    OpenAIRE

    Zhou, Shuheng; Ligett, Katrina; Wasserman, Larry

    2009-01-01

    This work studies formal utility and privacy guarantees for a simple multiplicative database transformation, where the data are compressed by a random linear or affine transformation, reducing the number of data records substantially, while preserving the number of original input variables. We provide an analysis framework inspired by a recent concept known as differential privacy (Dwork 06). Our goal is to show that, despite the general difficulty of achieving the differential privacy guaran...

  7. Renyi Differential Privacy

    OpenAIRE

    Mironov, Ilya

    2017-01-01

    We propose a natural relaxation of differential privacy based on the Renyi divergence. Closely related notions have appeared in several recent papers that analyzed composition of differentially private mechanisms. We argue that the useful analytical tool can be used as a privacy definition, compactly and accurately representing guarantees on the tails of the privacy loss. We demonstrate that the new definition shares many important properties with the standard definition of differential priva...

  8. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  9. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  10. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  11. Contents

    Directory of Open Access Journals (Sweden)

    Editor IJRED

    2012-11-01

    Full Text Available International Journal of Renewable Energy Development www.ijred.com Volume 1             Number 3            October 2012                ISSN 2252- 4940   CONTENTS OF ARTICLES page Design and Economic Analysis of a Photovoltaic System: A Case Study 65-73 C.O.C. Oko , E.O. Diemuodeke, N.F. Omunakwe, and E. Nnamdi     Development of Formaldehyde Adsorption using Modified Activated Carbon – A Review 75-80 W.D.P Rengga , M. Sudibandriyo and M. Nasikin     Process Optimization for Ethyl Ester Production in Fixed Bed Reactor Using Calcium Oxide Impregnated Palm Shell Activated Carbon (CaO/PSAC 81-86 A. Buasri , B. Ksapabutr, M. Panapoy and N. Chaiyut     Wind Resource Assessment in Abadan Airport in Iran 87-97 Mojtaba Nedaei       The Energy Processing by Power Electronics and its Impact on Power Quality 99-105 J. E. Rocha and B. W. D. C. Sanchez       First Aspect of Conventional Power System Assessment for High Wind Power Plants Penetration 107-113 A. Merzic , M. Music, and M. Rascic   Experimental Study on the Production of Karanja Oil Methyl Ester and Its Effect on Diesel Engine 115-122 N. Shrivastava,  , S.N. Varma and M. Pandey  

  12. Making Good Physics Videos

    Science.gov (United States)

    Lincoln, James

    2017-01-01

    Online videos are an increasingly important way technology is contributing to the improvement of physics teaching. Students and teachers have begun to rely on online videos to provide them with content knowledge and instructional strategies. Online audiences are expecting greater production value, and departments are sometimes requesting educators…

  13. The Video Generation.

    Science.gov (United States)

    Provenzo, Eugene F., Jr.

    1992-01-01

    Video games are neither neutral nor harmless but represent very specific social and symbolic constructs. Research on the social content of today's video games reveals that sex bias and gender stereotyping are widely evident throughout the Nintendo games. Violence and aggression also pervade the great majority of the games. (MLF)

  14. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  15. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  16. Toward practicing privacy.

    Science.gov (United States)

    Dwork, Cynthia; Pottenger, Rebecca

    2013-01-01

    Private data analysis-the useful analysis of confidential data-requires a rigorous and practicable definition of privacy. Differential privacy, an emerging standard, is the subject of intensive investigation in several diverse research communities. We review the definition, explain its motivation, and discuss some of the challenges to bringing this concept to practice.

  17. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  18. Perception Games and Privacy

    OpenAIRE

    Gradwohl, Ronen; Smorodinsky, Rann

    2014-01-01

    Players (people, firms, states, etc.) have privacy concerns that may affect their choice of actions in strategic settings. We use a variant of signaling games to model this effect and study its relation to pooling behavior, misrepresentation of information, and inefficiency. We discuss these issues and show that common intuitions may lead to inaccurate conclusions about the implications of privacy concerns.

  19. Formal Methods for Privacy

    Science.gov (United States)

    2009-09-01

    automated enforcement [52]. Other policy languages such as P3P [15], which has a formal notation, inform website visitors of the site’s privacy practices...Lorrie Faith Cranor. Web Privacy with P3P . O’Reilly, September 2002. [16] Lorrie Faith Cranor, Praveen Guduru, and Manjula Arjula. User interfaces for

  20. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  1. Video-Based Big Data Analytics in Cyberlearning

    Science.gov (United States)

    Wang, Shuangbao; Kelly, William

    2017-01-01

    In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…

  2. What Do Social Media Say About Makeovers? A Content Analysis of Cosmetic Surgery Videos and Viewers' Responses on YouTube.

    Science.gov (United States)

    Wen, Nainan; Chia, Stella C; Hao, Xiaoming

    2015-01-01

    This study examines portrayals of cosmetic surgery on YouTube, where we found a substantial number of cosmetic surgery videos. Most of the videos came from cosmetic surgeons who appeared to be aggressively using social media in their practices. Except for videos that explained cosmetic surgery procedures, most videos in our sample emphasized the benefits of cosmetic surgery, and only a small number of the videos addressed the involved risks. We also found that tactics of persuasive communication-namely, related to message source and message sensation value (MSV)-have been used in Web-based social media to attract viewers' attention and interests. Expert sources were used predominantly, although typical-consumer sources tended to generate greater viewer interest in cosmetic surgery than other types of message sources. High MSV, moreover, was found to increase a video's popularity.

  3. Privacy and social network applications

    OpenAIRE

    Roig, Antoni

    2009-01-01

    Privacy technological threatens are no limited to data protection. Social Network Applications (SNA) and ubiquitous computing or Ambient Intelligence face other privacy risks. The business model of SNA and the improvement of data mining allow social computation. SNA regulation should favor privacy-by-design and Privacy Enhancing Technologies (PET). Default friendly-privacy policies should also be adopted. The data portability of the applications shifts SNA into a new field of ubiquitous compu...

  4. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  5. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  6. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  7. Automated analysis and annotation of basketball video

    Science.gov (United States)

    Saur, Drew D.; Tan, Yap-Peng; Kulkarni, Sanjeev R.; Ramadge, Peter J.

    1997-01-01

    Automated analysis and annotation of video sequences are important for digital video libraries, content-based video browsing and data mining projects. A successful video annotation system should provide users with useful video content summary in a reasonable processing time. Given the wide variety of video genres available today, automatically extracting meaningful video content for annotation still remains hard by using current available techniques. However, a wide range video has inherent structure such that some prior knowledge about the video content can be exploited to improve our understanding of the high-level video semantic content. In this paper, we develop tools and techniques for analyzing structured video by using the low-level information available directly from MPEG compressed video. Being able to work directly in the video compressed domain can greatly reduce the processing time and enhance storage efficiency. As a testbed, we have developed a basketball annotation system which combines the low-level information extracted from MPEG stream with the prior knowledge of basketball video structure to provide high level content analysis, annotation and browsing for events such as wide- angle and close-up views, fast breaks, steals, potential shots, number of possessions and possession times. We expect our approach can also be extended to structured video in other domains.

  8. Social Properties of Mobile Video

    Science.gov (United States)

    Mitchell, April Slayden; O'Hara, Kenton; Vorbau, Alex

    Mobile video is now an everyday possibility with a wide array of commercially available devices, services, and content. These new technologies have created dramatic shifts in the way video-based media can be produced, consumed, and delivered by people beyond the familiar behaviors associated with fixed TV and video technologies. Such technology revolutions change the way users behave and change their expectations in regards to their mobile video experiences. Building upon earlier studies of mobile video, this paper reports on a study using diary techniques and ethnographic interviews to better understand how people are using commercially available mobile video technologies in their everyday lives. Drawing on reported episodes of mobile video behavior, the study identifies the social motivations and values underpinning these behaviors that help characterize mobile video consumption beyond the simplistic notion of viewing video only to kill time. This paper also discusses the significance of user-generated content and the usage of video in social communities through the description of two mobile video technology services that allow users to create and share content. Implications for adoption and design of mobile video technologies and services are discussed as well.

  9. COMPOSITIONAL AND CONTENT-RELATED PARTICULARITIES OF POLITICAL MEDIA TEXTS (THROUGH THE EXAMPLE OF THE TEXTS OF POLITICAL VIDEO CLIPS ISSUED BY THE CANDIDATES FOR PRESIDENCY IN FRANCE IN 2017

    Directory of Open Access Journals (Sweden)

    Dmitrieva, A.V.

    2017-09-01

    Full Text Available The article examines the texts of political advertising video clips issued by the candidates for presidency in France during the campaign before the first round of elections in 2017. The mentioned examples of media texts are analysed from the compositional point of view as well as from that of the content particularities which are directly connected to the text structure. In general, the majority of the studied clips have a similar structure and consist of three parts: introduction, main part and conclusion. However, as a result of the research, a range of advantages marking well-structured videos was revealed. These include: addressing the voters and stating the speech topic clearly at the beginning of the clip, a relevant attention-grabbing opening phrase, consistency and clarity of the information presentation, appropriate use of additional video plots, conclusion at the end of the clip.

  10. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  11. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  12. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  13. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Laboratory. The policy outlined below establishes how Frederick National Laboratory will use the information we gather about you from your visit to our website. We may coll

  14. Common Privacy Myths

    Science.gov (United States)

    ... cannot discuss your care with your family members – FALSE The Privacy Rule permits healthcare provides to share information that is directly relevant to the involvement of a spouse, family members, friends, or other persons identified by you regarding your ...

  15. Privacy and Anonymity

    OpenAIRE

    Yanes, Adrian

    2014-01-01

    Since the beginning of the digital area, privacy and anonymity have been impacted drastically (both, positively and negatively), by the different technologies developed for communications purposes. The broad possibilities that the Internet offers since its conception, makes it a mandatory target for those entities that are aiming to know and control the different channels of communication and the information that flows through. In this paper, we address the current threats against privacy and...

  16. Privacy of juridical bodies

    OpenAIRE

    Tiujo, Edson Mitsuo; CESUMAR

    2007-01-01

    According to art. 52 of the present Civil Code, juridical bodies may be titular to personality rights. The legal provision, however, has not defined what are personality rights attributable to juridical bodies, leaving the interpretation to the judges. Among personality rights, there is the right to privacy, which unfolds in other types such as the right to intimacy, to private life and to secrecy, from which juridical dobies have granted a privacy sphere (right to secrecy), from which third ...

  17. A Multilevel Analysis of Diverse Learners Playing Life Science Video Games: Interactions between Game Content, Learning Disability Status, Reading Proficiency, and Gender

    Science.gov (United States)

    Israel, Maya; Wang, Shuai; Marino, Matthew T.

    2016-01-01

    Extant research reports differential effects related to the efficacy of video games as a means to enhance science instruction. However, there are very few studies examining differences in learning outcomes across student-level independent variables. This study used multilevel modeling to examine the effects of three video game-enhanced life…

  18. Query-by-Emoji Video Search

    NARCIS (Netherlands)

    Cappallo, S.; Mensink, T.; Snoek, C.G.M.

    2015-01-01

    This technical demo presents Emoji2Video, a query-by-emoji interface for exploring video collections. Ideogram-based video search and representation presents an opportunity for an intuitive, visual interface and concise non-textual summary of video contents, in a form factor that is ideal for small

  19. Video microblogging

    DEFF Research Database (Denmark)

    Bornoe, Nis; Barkhuus, Louise

    2010-01-01

    Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of electronic communication: video microblogging. In this study we examine video microblogging, which is the broadcasting...... of short videos. A series of semi-structured interviews offers an understanding of why and how video microblogging is used and what the users post and broadcast....

  20. The Privacy Jungle:On the Market for Data Protection in Social Networks

    Science.gov (United States)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  1. Representing videos in tangible products

    Science.gov (United States)

    Fageth, Reiner; Weiting, Ralf

    2014-03-01

    Videos can be taken with nearly every camera, digital point and shoot cameras, DSLRs as well as smartphones and more and more with so-called action cameras mounted on sports devices. The implementation of videos while generating QR codes and relevant pictures out of the video stream via a software implementation was contents in last years' paper. This year we present first data about what contents is displayed and how the users represent their videos in printed products, e.g. CEWE PHOTOBOOKS and greeting cards. We report the share of the different video formats used, the number of images extracted out of the video in order to represent the video, the positions in the book and different design strategies compared to regular books.

  2. Video demystified

    CERN Document Server

    Jack, Keith

    2004-01-01

    This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field. Video Demystified, Fourth Edition is a "one stop" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats. *This essential reference is the "bible" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards.

  3. Improving Peer-to-Peer Video Systems

    NARCIS (Netherlands)

    Petrocco, R.P.

    2016-01-01

    Video Streaming is nowadays the Internet’s biggest source of consumer traffic. Traditional content providers rely on centralised client-server model for distributing their video streaming content. The current generation is moving from being passive viewers, or content consumers, to active content

  4. 3D video

    CERN Document Server

    Lucas, Laurent; Loscos, Céline

    2013-01-01

    While 3D vision has existed for many years, the use of 3D cameras and video-based modeling by the film industry has induced an explosion of interest for 3D acquisition technology, 3D content and 3D displays. As such, 3D video has become one of the new technology trends of this century.The chapters in this book cover a large spectrum of areas connected to 3D video, which are presented both theoretically and technologically, while taking into account both physiological and perceptual aspects. Stepping away from traditional 3D vision, the authors, all currently involved in these areas, provide th

  5. NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging

    OpenAIRE

    Halpin, Harry

    2017-01-01

    International audience; Identity systems today link users to all of their actions and serve as centralized points of control and data collection. NEXTLEAP proposes an alternative decentralized and privacy-enhanced architecture. First, NEXTLEAP is building privacy-enhanced federated identity systems, using blind signatures based on Algebraic MACs to improve OpenID Connect. Second, secure messaging applications ranging from Signal to WhatsApp may deliver the content in an encrypted form, but th...

  6. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  7. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Science.gov (United States)

    Cheung, Cynthia; Bietz, Matthew J; Patrick, Kevin; Bloss, Cinnamon S

    2016-01-01

    Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters. This study sought to understand privacy attitudes of early adopters of emerging health technologies. Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis. Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science. Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  8. Video surveillance using JPEG 2000

    Science.gov (United States)

    Dufaux, Frederic; Ebrahimi, Touradj

    2004-11-01

    This paper describes a video surveillance system which is composed of three key components, smart cameras, a server, and clients, connected through IP-networks in wired or wireless configurations. The system has been designed so as to protect the privacy of people under surveillance. Smart cameras are based on JPEG 2000 compression where an analysis module allows for events detection and regions of interest identification. The resulting regions of interest can then be encoded with better quality and scrambled. Compressed video streams are scrambled and signed for the purpose of privacy and data integrity verification using JPSEC compliant methods. The same bitstream may also be protected for robustness to transmission errors based on JPWL compliant methods. The server receives, stores, manages and transmits the video sequences on wired and wireless channels to a variety of clients and users with different device capabilities, channel characteristics and preferences. Use of seamless scalable coding of video sequences prevents any need for transcoding operations at any point in the system.

  9. Differential Privacy via Wavelet Transforms

    OpenAIRE

    Xiao, Xiaokui; Wang, Guozhang; Gehrke, Johannes

    2009-01-01

    Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, {\\em $\\epsilon$-differential privacy} provides one of the strongest privacy guarantees. Existing data publishing methods that achieve $\\epsilon$-differential privacy, however, offer little data utility. In particular, if the output dataset is used to answer count queries, the noise in the query answers can be proportional to the number of tuples in the data, which ren...

  10. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  11. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  12. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  13. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  14. Digital video transcoding for transmission and storage

    CERN Document Server

    Sun, Huifang; Chen, Xuemin

    2004-01-01

    Professionals in the video and multimedia industries need a book that explains industry standards for video coding and how to convert the compressed information between standards. Digital Video Transcoding for Transmission and Storage answers this demand while also supplying the theories and principles of video compression and transcoding technologies. Emphasizing digital video transcoding techniques, this book summarizes its content via examples of practical methods for transcoder implementation. It relates almost all of its featured transcoding technologies to practical applications.This vol

  15. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  16. Privacy Policy | Smokefree 60+

    Science.gov (United States)

    The National Cancer Institute (NCI) respects the privacy of users of its websites. This is why we have taken the time to disclose our privacy policy and information collection practices. NCI does not disclose, give, sell, or transfer any personal information about visitors unless required to do so by law. NCI automatically collects a limited amount of information about the use of websites for statistical purposes — that is, to measure the numbers of visitors. This information may be helpful when considering changes that improve our websites for future visitors.

  17. Twofold Video Hashing with Automatic Synchronization

    OpenAIRE

    Li, Mu; Monga, Vishal

    2014-01-01

    Video hashing finds a wide array of applications in content authentication, robust retrieval and anti-piracy search. While much of the existing research has focused on extracting robust and secure content descriptors, a significant open challenge still remains: Most existing video hashing methods are fallible to temporal desynchronization. That is, when the query video results by deleting or inserting some frames from the reference video, most existing methods assume the positions of the dele...

  18. Efficient data replication for the delivery of high-quality video content over P2P VoD advertising networks

    Science.gov (United States)

    Ho, Chien-Peng; Yu, Jen-Yu; Lee, Suh-Yin

    2011-12-01

    Recent advances in modern television systems have had profound consequences for the scalability, stability, and quality of transmitted digital data signals. This is of particular significance for peer-to-peer (P2P) video-on-demand (VoD) related platforms, faced with an immediate and growing demand for reliable service delivery. In response to demands for high-quality video, the key objectives in the construction of the proposed framework were user satisfaction with perceived video quality and the effective utilization of available resources on P2P VoD networks. This study developed a peer-based promoter to support online advertising in P2P VoD networks based on an estimation of video distortion prior to the replication of data stream chunks. The proposed technology enables the recovery of lost video using replicated stream chunks in real time. Load balance is achieved by adjusting the replication level of each candidate group according to the degree-of-distortion, thereby enabling a significant reduction in server load and increased scalability in the P2P VoD system. This approach also promotes the use of advertising as an efficient tool for commercial promotion. Results indicate that the proposed system efficiently satisfies the given fault tolerances.

  19. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  20. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... for distributed clustering that limits information leakage to the untrusted service provider that performs the clustering. To achieve this goal, we rely on cryptographic techniques, in particular homomorphic encryption, and further improve the state of the art of processing encrypted data in terms of efficiency...

  1. Indexed Captioned Searchable Videos: A Learning Companion for STEM Coursework

    Science.gov (United States)

    Tuna, Tayfun; Subhlok, Jaspal; Barker, Lecia; Shah, Shishir; Johnson, Olin; Hovey, Christopher

    2017-01-01

    Videos of classroom lectures have proven to be a popular and versatile learning resource. A key shortcoming of the lecture video format is accessing the content of interest hidden in a video. This work meets this challenge with an advanced video framework featuring topical indexing, search, and captioning (ICS videos). Standard optical character…

  2. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  3. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  4. Privacy Policy | FNLCR Staging

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  5. Video Pulses: User-Based Modeling of Interesting Video Segments

    Directory of Open Access Journals (Sweden)

    Markos Avlonitis

    2014-01-01

    Full Text Available We present a user-based method that detects regions of interest within a video in order to provide video skims and video summaries. Previous research in video retrieval has focused on content-based techniques, such as pattern recognition algorithms that attempt to understand the low-level features of a video. We are proposing a pulse modeling method, which makes sense of a web video by analyzing users' Replay interactions with the video player. In particular, we have modeled the user information seeking behavior as a time series and the semantic regions as a discrete pulse of fixed width. Then, we have calculated the correlation coefficient between the dynamically detected pulses at the local maximums of the user activity signal and the pulse of reference. We have found that users' Replay activity significantly matches the important segments in information-rich and visually complex videos, such as lecture, how-to, and documentary. The proposed signal processing of user activity is complementary to previous work in content-based video retrieval and provides an additional user-based dimension for modeling the semantics of a social video on the web.

  6. Characteristics of "Music Education" Videos Posted on Youtube

    Science.gov (United States)

    Whitaker, Jennifer A.; Orman, Evelyn K.; Yarbrough, Cornelia

    2014-01-01

    This content analysis sought to determine information related to users uploading, general content, and specific characteristics of music education videos on YouTube. A total of 1,761 videos from a keyword search of "music education" were viewed and categorized. Results for relevant videos indicated users posted videos under 698 different…

  7. Women as Video Game Consumers

    OpenAIRE

    Kiviranta, Hanna

    2017-01-01

    The purpose of this Thesis is to study women as video game consumers through the games that they play. This was done by case studies on the content of five video games from genres that statistically are popular amongst women. To introduce the topic and to build the theoretical framework, the key terms and the video game industry are introduced. The reader is acquainted with theories on consumer behaviour, buying processes and factors that influence our consuming habits. These aspects are...

  8. Digital video.

    Science.gov (United States)

    Johnson, Don; Johnson, Mike

    2004-04-01

    The process of digital capture, editing, and archiving video has become an important aspect of documenting arthroscopic surgery. Recording the arthroscopic findings before and after surgery is an essential part of the patient's medical record. The hardware and software has become more reasonable to purchase, but the learning curve to master the software is steep. Digital video is captured at the time of arthroscopy to a hard disk, and written to a CD at the end of the operative procedure. The process of obtaining video of open procedures is more complex. Outside video of the procedure is recorded on digital tape with a digital video camera. The camera must be plugged into a computer to capture the video on the hard disk. Adobe Premiere software is used to edit the video and render the finished video to the hard drive. This finished video is burned onto a CD. We outline the choice of computer hardware and software for the manipulation of digital video. The techniques of backup and archiving the completed projects and files also are outlined. The uses of digital video for education and the formats that can be used in PowerPoint presentations are discussed.

  9. Collaborative Privacy - A Community-Based Privacy Infrastructure

    Science.gov (United States)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  10. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    Directory of Open Access Journals (Sweden)

    An Braeken

    2016-01-01

    Full Text Available Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side.

  11. Surveillance Video Synopsis in GIS

    Directory of Open Access Journals (Sweden)

    Yujia Xie

    2017-10-01

    Full Text Available Surveillance videos contain a considerable amount of data, wherein interesting information to the user is sparsely distributed. Researchers construct video synopsis that contain key information extracted from a surveillance video for efficient browsing and analysis. Geospatial–temporal information of a surveillance video plays an important role in the efficient description of video content. Meanwhile, current approaches of video synopsis lack the introduction and analysis of geospatial-temporal information. Owing to the preceding problems mentioned, this paper proposes an approach called “surveillance video synopsis in GIS”. Based on an integration model of video moving objects and GIS, the virtual visual field and the expression model of the moving object are constructed by spatially locating and clustering the trajectory of the moving object. The subgraphs of the moving object are reconstructed frame by frame in a virtual scene. Results show that the approach described in this paper comprehensively analyzed and created fusion expression patterns between video dynamic information and geospatial–temporal information in GIS and reduced the playback time of video content.

  12. Reflections of Girls in the Media: A Content Analysis. A Study of Television Shows and Commercials, Movies, Music Videos, and Teen Magazine Articles and Ads. An Executive Summary.

    Science.gov (United States)

    Signorielli, Nancy

    This document presents an executive summary of a study that examined messages sent to adolescent girls (ages 10 to 17) across 6 types of media most heavily used by adolescent girls: television, movies, magazines, music videos, television commercials, and magazine advertisements. The study asked what messages are sent about gender roles--primarily…

  13. Reflections of Girls in the Media: A Content Analysis. A Study of Television Shows and Commercials, Movies, Music Videos, and Teen Magazine Articles and Ads.

    Science.gov (United States)

    Signorielli, Nancy

    A study examined kinds of messages prevalent in the media used by preteen and teenage girls, asking what messages are sent about goals, dating, careers, behavior, and appearance and its relationship to well being. Four media were the subject of the study, which comprised 12 samples from television programs, theatrical films, music videos, and teen…

  14. Self-evaluation and peer-feedback of medical students' communication skills using a web-based video annotation system. Exploring content and specificity

    NARCIS (Netherlands)

    Hulsman, Robert L.; van der Vloodt, Jane

    2015-01-01

    Objective: Self-evaluation and peer-feedback are important strategies within the reflective practice paradigm for the development and maintenance of professional competencies like medical communication. Characteristics of the self-evaluation and peer-feedback annotations of medical students' video

  15. Violence-related content in video game may lead to functional connectivity changes in brain networks as revealed by fMRI-ICA in young men.

    Science.gov (United States)

    Zvyagintsev, M; Klasen, M; Weber, R; Sarkheil, P; Esposito, F; Mathiak, K A; Schwenzer, M; Mathiak, K

    2016-04-21

    In violent video games, players engage in virtual aggressive behaviors. Exposure to virtual aggressive behavior induces short-term changes in players' behavior. In a previous study, a violence-related version of the racing game "Carmageddon TDR2000" increased aggressive affects, cognitions, and behaviors compared to its non-violence-related version. This study investigates the differences in neural network activity during the playing of both versions of the video game. Functional magnetic resonance imaging (fMRI) recorded ongoing brain activity of 18 young men playing the violence-related and the non-violence-related version of the video game Carmageddon. Image time series were decomposed into functional connectivity (FC) patterns using independent component analysis (ICA) and template-matching yielded a mapping to established functional brain networks. The FC patterns revealed a decrease in connectivity within 6 brain networks during the violence-related compared to the non-violence-related condition: three sensory-motor networks, the reward network, the default mode network (DMN), and the right-lateralized frontoparietal network. Playing violent racing games may change functional brain connectivity, in particular and even after controlling for event frequency, in the reward network and the DMN. These changes may underlie the short-term increase of aggressive affects, cognitions, and behaviors as observed after playing violent video games. Copyright © 2016 IBRO. Published by Elsevier Ltd. All rights reserved.

  16. Estimation of Web video multiplicity

    Science.gov (United States)

    Cheung, SenChing S.; Zakhor, Avideh

    1999-12-01

    With ever more popularity of video web-publishing, many popular contents are being mirrored, reformatted, modified and republished, resulting in excessive content duplication. While such redundancy provides fault tolerance for continuous availability of information, it could potentially create problems for multimedia search engines in that the search results for a given query might become repetitious, and cluttered with a large number of duplicates. As such, developing techniques for detecting similarity and duplication is important to multimedia search engines. In addition, content providers might be interested in identifying duplicates of their content for legal, contractual or other business related reasons. In this paper, we propose an efficient algorithm called video signature to detect similar video sequences for large databases such as the web. The idea is to first form a 'signature' for each video sequence by selection a small number of its frames that are most similar to a number of randomly chosen seed images. Then the similarity between any tow video sequences can be reliably estimated by comparing their respective signatures. Using this method, we achieve 85 percent recall and precision ratios on a test database of 377 video sequences. As a proof of concept, we have applied our proposed algorithm to a collection of 1800 hours of video corresponding to around 45000 clips from the web. Our results indicate that, on average, every video in our collection from the web has around five similar copies.

  17. Immersive video

    Science.gov (United States)

    Moezzi, Saied; Katkere, Arun L.; Jain, Ramesh C.

    1996-03-01

    Interactive video and television viewers should have the power to control their viewing position. To make this a reality, we introduce the concept of Immersive Video, which employs computer vision and computer graphics technologies to provide remote users a sense of complete immersion when viewing an event. Immersive Video uses multiple videos of an event, captured from different perspectives, to generate a full 3D digital video of that event. That is accomplished by assimilating important information from each video stream into a comprehensive, dynamic, 3D model of the environment. Using this 3D digital video, interactive viewers can then move around the remote environment and observe the events taking place from any desired perspective. Our Immersive Video System currently provides interactive viewing and `walkthrus' of staged karate demonstrations, basketball games, dance performances, and typical campus scenes. In its full realization, Immersive Video will be a paradigm shift in visual communication which will revolutionize television and video media, and become an integral part of future telepresence and virtual reality systems.

  18. Privacy and Data Protection in Japan.

    Science.gov (United States)

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  19. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  20. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  1. Colourful Privacy: Designing Visible Privacy Settings with Teenage Hospital Patients

    OpenAIRE

    van der Velden, Maja; Machniak, Margaret

    2014-01-01

    The paper reports from a qualitative study based on the analysis of semi-structured interviews and Participatory Design activities with hospitalised teenagers with chronic health challenges. We studied how teenage patients manage their online privacy, with a focus on the design and use of privacy settings. We found that the majority of participants preferred to visualise privacy settings through the use colours and to personalise access control. They also considered these necessary on more se...

  2. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals

    Science.gov (United States)

    Rubel, Alan; Zhang, Mei

    2015-01-01

    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for…

  3. Does the HIPAA Privacy Rule Allow Parents the Right to See Their Children's Medical Records?

    Science.gov (United States)

    ... Does the HIPAA Privacy Rule allow parents the right to see their children’s medical records? Answer: Yes, the Privacy Rule generally ... as the child’s personal representative could endanger the child. Date Created: 12/19/2002 Content ... last reviewed on July 26, 2013 ...

  4. Video games

    OpenAIRE

    Kolář, Vojtěch

    2012-01-01

    This thesis is based on a detailed analysis of various topics related to the question of whether video games can be art. In the first place it analyzes the current academic discussion on this subject and confronts different opinions of both supporters and objectors of the idea, that video games can be a full-fledged art form. The second point of this paper is to analyze the properties, that are inherent to video games, in order to find the reason, why cultural elite considers video games as i...

  5. CHARACTER RECOGNITION OF VIDEO SUBTITLES\\

    Directory of Open Access Journals (Sweden)

    Satish S Hiremath

    2016-11-01

    Full Text Available An important task in content based video indexing is to extract text information from videos. The challenges involved in text extraction and recognition are variation of illumination on each video frame with text, the text present on the complex background and different font size of the text. Using various image processing algorithms like morphological operations, blob detection and histogram of oriented gradients the character recognition of video subtitles is implemented. Segmentation, feature extraction and classification are the major steps of character recognition. Several experimental results are shown to demonstrate the performance of the proposed algorithm

  6. Scaffolding With and Through Videos

    DEFF Research Database (Denmark)

    Otrel-Cass, Kathrin; Khoo, Elaine; Cowie, Bronwen

    2012-01-01

    to consider must be expanded. This article explicates theoretical and practical ideas related to teachers’ application of their ICT technology, pedagogy, and content knowledge (TPACK) in science. The article unpacks the social and technological dimensions of teachers’ use of TPACK when they use digital videos...... to scaffold learning. It showcases the intricate interplay between teachers’ knowledge about content, digital video technology, and students’ learning needs based on a qualitative study of two science teachers and their students in a New Zealand primary school....

  7. Self-evaluation and peer-feedback of medical students' communication skills using a web-based video annotation system. Exploring content and specificity.

    Science.gov (United States)

    Hulsman, Robert L; van der Vloodt, Jane

    2015-03-01

    Self-evaluation and peer-feedback are important strategies within the reflective practice paradigm for the development and maintenance of professional competencies like medical communication. Characteristics of the self-evaluation and peer-feedback annotations of medical students' video recorded communication skills were analyzed. Twenty-five year 4 medical students recorded history-taking consultations with a simulated patient, uploaded the video to a web-based platform, marked and annotated positive and negative events. Peers reviewed the video and self-evaluations and provided feedback. Analyzed were the number of marked positive and negative annotations and the amount of text entered. Topics and specificity of the annotations were coded and analyzed qualitatively. Students annotated on average more negative than positive events. Additional peer-feedback was more often positive. Topics most often related to structuring the consultation. Students were most critical about their biomedical topics. Negative annotations were more specific than positive annotations. Self-evaluations were more specific than peer-feedback and both show a significant correlation. Four response patterns were detected that negatively bias specificity assessment ratings. Teaching students to be more specific in their self-evaluations may be effective for receiving more specific peer-feedback. Videofragmentrating is a convenient tool to implement reflective practice activities like self-evaluation and peer-feedback to the classroom in the teaching of clinical skills. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  8. Automatic content-based analysis of georeferenced image data: Detection of Beggiatoa mats in seafloor video mosaics from the HÅkon Mosby Mud Volcano

    Science.gov (United States)

    Jerosch, K.; Lüdtke, A.; Schlüter, M.; Ioannidis, G. T.

    2007-02-01

    The combination of new underwater technology as remotely operating vehicles (ROVs), high-resolution video imagery, and software to compute georeferenced mosaics of the seafloor provides new opportunities for marine geological or biological studies and applications in offshore industry. Even during single surveys by ROVs or towed systems large amounts of images are compiled. While these underwater techniques are now well-engineered, there is still a lack of methods for the automatic analysis of the acquired image data. During ROV dives more than 4200 georeferenced video mosaics were compiled for the HÅkon Mosby Mud Volcano (HMMV). Mud volcanoes as HMMV are considered as significant source locations for methane characterised by unique chemoautotrophic communities as Beggiatoa mats. For the detection and quantification of the spatial distribution of Beggiatoa mats an automated image analysis technique was developed, which applies watershed transformation and relaxation-based labelling of pre-segmented regions. Comparison of the data derived by visual inspection of 2840 video images with the automated image analysis revealed similarities with a precision better than 90%. We consider this as a step towards a time-efficient and accurate analysis of seafloor images for computation of geochemical budgets and identification of habitats at the seafloor.

  9. Online Learning via Differential Privacy

    OpenAIRE

    Abernethy, Jacob; Lee, Chansoo; McMillan, Audra; Tewari, Ambuj

    2017-01-01

    We explore the use of tools from differential privacy in the design and analysis of online learning algorithms. We develop a simple and powerful analysis technique for Follow-The-Leader type algorithms under privacy-preserving perturbations. This leads to the minimax optimal algorithm for k-sparse online PCA and the best-known perturbation based algorithm for the dense online PCA. We also show that the differential privacy is the core notion of algorithm stability in various online learning p...

  10. Crowdsourcing visual detectors for video search

    NARCIS (Netherlands)

    Freiburg, B.; Kamps, J.; Snoek, C.G.M.

    2011-01-01

    In this paper we study social tagging at the video fragment-level using a combination of automated content understanding and the wisdom of the crowds. We are interested in the question whether crowdsourcing can be beneficial to a video search engine that automatically recognizes video fragments on a

  11. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  12. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  13. Privacy Practices of Health Social Networking Sites: Implications for Privacy and Data Security in Online Cancer Communities.

    Science.gov (United States)

    Charbonneau, Deborah H

    2016-08-01

    While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.

  14. User aware video streaming

    Science.gov (United States)

    Kerofsky, Louis; Jagannath, Abhijith; Reznik, Yuriy

    2015-03-01

    We describe the design of a video streaming system using adaptation to viewing conditions to reduce the bitrate needed for delivery of video content. A visual model is used to determine sufficient resolution needed under various viewing conditions. Sensors on a mobile device estimate properties of the viewing conditions, particularly the distance to the viewer. We leverage the framework of existing adaptive bitrate streaming systems such as HLS, Smooth Streaming or MPEG-DASH. The client rate selection logic is modified to include a sufficient resolution computed using the visual model and the estimated viewing conditions. Our experiments demonstrate significant bitrate savings compare to conventional streaming methods which do not exploit viewing conditions.

  15. Security Vs. Liberty: How to Measure Privacy Costs in Domestic Surveillance Programs

    Science.gov (United States)

    2014-03-01

    with video , infrared imagery, and multispectral sensors, collect their biometric signatures, uniquely identify them, and presumably provide a...to include video , agile 105 Ibid., 9. 106 Ibid., 10. 107 Ibid., 10–11. 108 Ibid., 11. 109 Ibid., A-21. 25...maintain the same level of privacy intended by the framers of the Constitution. Chapter III concluded that a person exhibits a subjective expectation of

  16. Apples to Oranges: Comparing Streaming Video Platforms

    OpenAIRE

    Milewski, Steven; Threatt, Monique

    2017-01-01

    Librarians rely on an ever-increasing variety of platforms to deliver streaming video content to our patrons. These two presentations will examine different aspects of video streaming platforms to gain guidance from the comparison of platforms. The first will examine the accessibility compliance of the various video streaming platforms for users with disabilities by examining accessibility features of the platforms. The second will be a comparison of subject usage of two of the larger video s...

  17. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  18. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency (CIA) has undertaken and completed a... Act (PA), the CIA has undertaken and completed a review of its public PA regulations. As a result of...

  19. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice of... (``OPIC'') Privacy Act (``PA'') regulations by making substantive and administrative changes. These... confidential or inappropriate for public disclosure. Regulatory Flexibility Act (5 U.S.C. 601 et seq.) Pursuant...

  20. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  1. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  2. Privacy and the News Media.

    Science.gov (United States)

    Cooper, Stephen

    1995-01-01

    States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)

  3. A Framework for Advanced Video Traces: Evaluating Visual Quality for Video Transmission Over Lossy Networks

    Directory of Open Access Journals (Sweden)

    Reisslein Martin

    2006-01-01

    Full Text Available Conventional video traces (which characterize the video encoding frame sizes in bits and frame quality in PSNR are limited to evaluating loss-free video transmission. To evaluate robust video transmission schemes for lossy network transport, generally experiments with actual video are required. To circumvent the need for experiments with actual videos, we propose in this paper an advanced video trace framework. The two main components of this framework are (i advanced video traces which combine the conventional video traces with a parsimonious set of visual content descriptors, and (ii quality prediction schemes that based on the visual content descriptors provide an accurate prediction of the quality of the reconstructed video after lossy network transport. We conduct extensive evaluations using a perceptual video quality metric as well as the PSNR in which we compare the visual quality predicted based on the advanced video traces with the visual quality determined from experiments with actual video. We find that the advanced video trace methodology accurately predicts the quality of the reconstructed video after frame losses.

  4. Money is privacy

    OpenAIRE

    Kahn, Charles M.; McAndrews, James; Roberds, William

    2004-01-01

    An extensive literature in monetary theory has emphasized the role of money as a record-keeping device. Money assumes this role in situations where using credit would be too costly, and some might argue that this role will diminish as the cost of information, and thus the cost of credit-based transactions, continues to fall. ; In this paper we investigate another use for money: the provision of privacy. That is, a money purchase does not identify the purchaser while a credit purchase does. In...

  5. Performing privacy in schools

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Andersen, Lars Bo

    . School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social...

  6. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  7. Quo vadis, data privacy?

    Science.gov (United States)

    Gehrke, Johannes

    2012-07-01

    Society can gain much value from Big Data. We can study census data to learn where to allocate public resources, medical records from hospitals to fight diseases, or data about students and teachers to evaluate the effectiveness of various approaches to learning and teaching. In all of these scenarios, we need to limit statistical disclosure: we want to release accurate statistics about the data while preserving the privacy of the individuals who contributed it. This paper gives an overview of recent advances and open challenges in the field, focusing on methods that probably limit how much an adversary can learn from a data release. © 2012 New York Academy of Sciences.

  8. Video Podcasts

    DEFF Research Database (Denmark)

    Nortvig, Anne Mette; Sørensen, Birgitte Holm

    2016-01-01

    This project’s aim was to support and facilitate master’s students’ preparation and collaboration by making video podcasts of short lectures available on YouTube prior to students’ first face-to-face seminar. The empirical material stems from group interviews, from statistical data created through...... YouTube analytics and from surveys answered by students after the seminar. The project sought to explore how video podcasts support learning and reflection online and how students use and reflect on the integration of online activities in the videos. Findings showed that students engaged actively...

  9. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  10. Efficient privacy-enhanced familiarity-based recommender system

    NARCIS (Netherlands)

    Jeckmans, Arjan; Peter, Andreas; Hartel, Pieter H.

    Recommender systems can help users to find interesting content, often based on similarity with other users. However, studies have shown that in some cases familiarity gives comparable results to similarity. Using familiarity has the added bonus of increasing privacy between users and utilizing a

  11. 78 FR 46929 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-02

    ... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Ms. Jeanette Weathers-Jenkins, DISA....gov/privacy/SORNs/component/disa/index.html . The proposed changes to the record system being amended... procedures: Delete entry and replace with ``DISA's rules for accessing records, for contesting contents and...

  12. 12 CFR Appendix A to Part 716 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution shares... not share my personal information with other financial institutions to jointly market to me.” (h... institution, including a group of financial institutions that use a common privacy notice, to meet the content...

  13. 12 CFR Appendix A to Part 573 - Model Privacy Form

    Science.gov (United States)

    2010-01-01

    ... personal information to market to me.” (4) Nonaffiliate opt-out. If the financial institution shares... not share my personal information with other financial institutions to jointly market to me.” (h... institution, including a group of financial institutions that use a common privacy notice, to meet the content...

  14. Advanced real-time manipulation of video streams

    CERN Document Server

    Herling, Jan

    2014-01-01

    Diminished Reality is a new fascinating technology that removes real-world content from live video streams. This sensational live video manipulation actually removes real objects and generates a coherent video stream in real-time. Viewers cannot detect modified content. Existing approaches are restricted to moving objects and static or almost static cameras and do not allow real-time manipulation of video content. Jan Herling presents a new and innovative approach for real-time object removal with arbitrary camera movements.

  15. Evaluating the privacy properties of telephone metadata.

    Science.gov (United States)

    Mayer, Jonathan; Mutchler, Patrick; Mitchell, John C

    2016-05-17

    Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.

  16. Generic Film Forms for Dynamic Virtual Video Synthesis

    NARCIS (Netherlands)

    C.A. Lindley

    1999-01-01

    textabstractThe FRAMES project within the RDN CRC (Cooperative Research Centre for Research Data Networks) is developing an experimental environment for video content-based retrieval and dynamic virtual video synthesis from archives of video data. The FRAMES research prototype is a video synthesis

  17. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  18. Privacy in Social Networks: A Survey

    Science.gov (United States)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  19. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  20. Employee Privacy Rights: A Management Guide.

    Science.gov (United States)

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  1. Rethinking Privacy: A Feminist Approach to Privacy Rights after Snowden

    OpenAIRE

    Weinberg, Lindsay

    2017-01-01

    Tim Cook’s message to Apple customers, regarding Apple’s refusal to provide the FBI with a backdoor to the San Bernardino shooter’s iPhone, typifies the corporate appropriation of privacy rights discourse. In light of this appropriation, I propose a reconsideration of the sovereign subject presupposed by privacy rights discourse through a comparative approach to the US and EU’s treatments of privacy rights. I then apply feminist theories of the non-sovereign subject, which challenge liberal d...

  2. Community health workers' experiences of using video teaching tools during home visits-A pilot study.

    Science.gov (United States)

    Coetzee, Bronwyné; Kohrman, Hannah; Tomlinson, Mark; Mbewu, Nokwanele; Le Roux, Ingrid; Adam, Maya

    2017-09-05

    Innovations in health, such as the use of tablet computers, show promise in broadening the scope of work of community health workers (CHWs), and play an important role in keeping CHWs and their clients up to date with advancements in health. While the use of mobile phones and tablets is innovative, the applicability of these technologies in different contexts remains poorly understood. Furthermore, little is known about the acceptability and feasibility of the use of video teaching tools on such devices across diverse contexts. In this study, we aimed to explore the acceptability and feasibility of using tablets with teaching videos (about HIV, alcohol, nutrition and breastfeeding) to support the health promotion efforts of 24 CHWs who work with pregnant mothers and mothers of young children in an urban township in South Africa. Between November 2015 and May 2016, we conducted focus groups and identified four key themes (with several sub-themes) that demonstrated factors related to the acceptability and feasibility of these devices and their content. Focus group transcripts were analysed thematically using qualitative data analysis software. The findings indicated that while the devices contained several supportive features (such as lightening the workload, and stimulating interest in their work), they also contained several restrictive features (safety and confidentiality). CHWs considered the video content an important tool to engage not only their clients but also family members and the community at large. Issues surrounding safety, privacy and confidentiality of using these devices require careful consideration prior to implementation in large-scale studies. Furthermore, stigma associated with household visits by CHWs and the nature of their work also need to be addressed by researchers and programme implementers. Overall, CHWs deemed the devices and the video content an acceptable and feasible means with which to provide health promotion and education among

  3. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  4. Nursing professional facing patient privacy

    Directory of Open Access Journals (Sweden)

    Fidel López Espuela

    2010-05-01

    Full Text Available Privacy of patients admitted to the hospital is played down in favour of other needs considered more basic by the healthcare system and more related to the disease than to patients themselves. Situations and factors where privacy is damaged are frequent, but it is known that when these are avoided by professionals’ attitude, through strategies and different mechanisms, it becomes one of the most satisfactory elements to patients.Objectives: To identify and analyze situations and factors which affect privacy in hospital environment as well as the adaptation capacity of patients to them.Methodology: Phenomenological, qualitative research. By means of discussion groups with professionals, the following questions where answered: ‘What do professionals understand by privacy? Which situations and factors jeopardize it during the hospital stay? How do they think patients get adapted?Results: The concept of privacy is complex, personal and non-transferable. Situations in which it is jeopardized were divided in 5 main areas. Numerous behaviors regarding adaptation of patients to these were collected.Discussion: Although there is little nursery research referring to privacy and its defense in the professional-patient relationship field, concern about this aspect always shown by nursery staff stands out.As a conclussion, we observe the need to complement this research with the perception patients have about these same questions, establishing the importance they give to privacy.

  5. Know Stroke: Know the Signs, Act in Time Video

    Medline Plus

    Full Text Available ... Radio PSAs » Videos and TV PSAs » Widgets » Infographics Health Professional Resources Campaign Partners Research Programs Español Research ... 830K) » Home | About the Campaign | Stroke Materials | Health Professional Resources | Campaign Partners | Research Programs | Contact | Disclaimer | Privacy | ...

  6. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure.

    Science.gov (United States)

    Kang, Hyunjin; Shin, Wonsun

    2016-03-01

    This study examines how consumers' competence at using smartphone technology (i.e., power usage) affects their privacy protection behaviors. A survey conducted with smartphone users shows that power usage influences privacy protection behavior not only directly but also indirectly through privacy concerns and trust placed in mobile service providers. A follow-up experiment indicates that the effects of power usage on smartphone users' information management can be a function of content personalization. Users, high on power usage, are less likely to share personal information on personalized mobile sites, but they become more revealing when they interact with nonpersonalized mobile sites.

  7. Privacy v Freedom of Speech: A Comparative Study on the Law of Privacy and Freedom of Expression in Relation to the Press, in the UK and the USA

    OpenAIRE

    Ogunsola, Oludolapo (GSM)

    2014-01-01

    The principal objective of this paper is to critically examine how freedom of expression is balanced with rights to privacy against media intrusion. This study compares the right of privacy and the right to freedom of expression in the federal republic of the United States of America (USA) and the sovereign state of the United Kingdom (UK). The contention of this study is that there is a need for a more strictly enforced protection of privacy by media regulatory bodies in both countries and t...

  8. A Privacy Manager for Cloud Computing

    Science.gov (United States)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  9. A Conceptual Characterization of Online Videos Explaining Natural Selection

    Science.gov (United States)

    Bohlin, Gustav; Göransson, Andreas; Höst, Gunnar E.; Tibell, Lena A. E.

    2017-01-01

    Educational videos on the Internet comprise a vast and highly diverse source of information. Online search engines facilitate access to numerous videos claiming to explain natural selection, but little is known about the degree to which the video content match key evolutionary content identified as important in evolution education research. In…

  10. Trigger Videos on the Web: Impact of Audiovisual Design

    Science.gov (United States)

    Verleur, Ria; Heuvelman, Ard; Verhagen, Plon W.

    2011-01-01

    Audiovisual design might impact emotional responses, as studies from the 1970s and 1980s on movie and television content show. Given today's abundant presence of web-based videos, this study investigates whether audiovisual design will impact web-video content in a similar way. The study is motivated by the potential influence of video-evoked…

  11. Effects of Mathematics Content Knowledge on Pre-School Teachers' Performance: A Video-Based Assessment of Perception and Planning Abilities in Informal Learning Situations

    Science.gov (United States)

    Dunekacke, Simone; Jenßen, Lars; Blömeke, Sigrid

    2015-01-01

    This study addresses the relation of pre-school teachers' mathematics content knowledge and their performance--how they perceive mathematical learning situations and whether they are able to plan adequate actions that foster children's learning--in the informal settings of pre-schools. It thus addresses a serious gap in teacher research that has…

  12. Health data privacy.

    Science.gov (United States)

    Benjamin, G C; Kennan, S A

    1997-01-01

    How can the tradition of patient-provider confidentiality be preserved and still meet the changing information needs of insurers, employers, public health agencies, policy analysts, and researchers? As countries grapple with the issue of a patient's right to medical record privacy, actions that the U.S. takes in this area will set precedents and have implications for nearly every health care electronic transaction. The Health Insurance Portability and Accountability Act requires the Secretary of Health and Human Services (HHS) to recommend standards for electronic financial and administrative transactions. The HHS focused on the confidentially of patient's health care information, guided by five principles in developing recommendations: (1) Boundaries; (2) Security; (3) Consumer Control; (4) Accountability; and (5) Public Responsibility.

  13. Parasiteware: Unlocking Personal Privacy

    Directory of Open Access Journals (Sweden)

    Daniel B. Garrie

    2006-09-01

    Full Text Available Spyware presents a threat of privacy infringement to unassuming internet users irrespective of their country of citizenship. European legislation attempts to protect end-users from unethical processing of their personal data. Spyware technologies, however, skirts these laws and often break them in their entirety. Outlawing the spyware and strengthening the legal consent requirement to mine data are statutory solutions that can prevent spyware users from skirting the law. An internationally standardized technology education system for the judiciaries in Europe and the U.S. can help ensure that when spyware users do break the law, they cannot hide by escaping from one nation to another without being held accountable. Transnational improvements are necessary to remedy the global spyware epidemic.

  14. Parkinson's Disease Videos

    Medline Plus

    Full Text Available ... Press Room Ask a Doctor Sign In Privacy & Terms Contact Us Connect With Us: Press Room Ask a Doctor Sign In Privacy & Terms Contact Us © 2017 Parkinson's Foundation Miami: 200 SE ...

  15. Parkinson's Disease Videos

    Medline Plus

    Full Text Available ... org Press Room Ask a Doctor Sign In Privacy & Terms Contact Us Connect With Us: Press Room Ask a Doctor Sign In Privacy & Terms Contact Us © 2018 Parkinson's Foundation Miami: 200 ...

  16. Developing an accessible video player

    Directory of Open Access Journals (Sweden)

    Juan José Rodríguez Soler

    2012-05-01

    Full Text Available Online Channels in financial institutions allows customers with disabilities to access services in a convenient way for them.However, one of the current challenges of this sector is to improve web accessibility and to incorporate technological resources to provide access to multimedia and video content, which has become a new form of internet communication.The present work shows in detail the strategy followed when designing and developing the new video player used by Bankinter for these purposes.

  17. Children's Privacy in the Big Data Era: Research Opportunities.

    Science.gov (United States)

    Montgomery, Kathryn C; Chester, Jeff; Milosevic, Tijana

    2017-11-01

    This article focuses on the privacy implications of advertising on social media, mobile apps, and games directed at children. Academic research on children's privacy has primarily focused on the safety risks involved in sharing personal information on the Internet, leaving market forces (such as commercial data collection) as a less discussed aspect of children's privacy. Yet, children's privacy in the digital era cannot be fully understood without examining marketing practices, especially in the context of "big data." As children increasingly consume content on an ever-expanding variety of digital devices, media and advertising industries are creating new ways to track their behaviors and target them with personalized content and marketing messages based on individual profiles. The advent of the so-called Internet of Things, with its ubiquitous sensors, is expanding these data collection and profiling practices. These trends raise serious concerns about digital dossiers that could follow young people into adulthood, affecting their access to education, employment, health care, and financial services. Although US privacy law provides some safeguards for children younger than 13 years old online, adolescents are afforded no such protections. Moreover, scholarship on children and privacy continues to lag behind the changes taking place in global media, advertising, and technology. This article proposes collaboration among researchers from a range of fields that will enable cross-disciplinary studies addressing not only the developmental issues related to different age groups but also the design of digital media platforms and the strategies used to influence young people. Copyright © 2017 by the American Academy of Pediatrics.

  18. Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial

    Directory of Open Access Journals (Sweden)

    Novita Astin

    2016-12-01

    Full Text Available This paper presents about the transmission of Digital Video Broadcasting system with streaming video resolution 640x480 on different IQ rate and modulation. In the video transmission, distortion often occurs, so the received video has bad quality. Key frames selection algorithm is flexibel on a change of video, but on these methods, the temporal information of a video sequence is omitted. To minimize distortion between the original video and received video, we aimed at adding methodology using sequential distortion minimization algorithm. Its aim was to create a new video, better than original video without significant loss of content between the original video and received video, fixed sequentially. The reliability of video transmission was observed based on a constellation diagram, with the best result on IQ rate 2 Mhz and modulation 8 QAM. The best video transmission was also investigated using SEDIM (Sequential Distortion Minimization Method and without SEDIM. The experimental result showed that the PSNR (Peak Signal to Noise Ratio average of video transmission using SEDIM was an increase from 19,855 dB to 48,386 dB and SSIM (Structural Similarity average increase 10,49%. The experimental results and comparison of proposed method obtained a good performance. USRP board was used as RF front-end on 2,2 GHz.

  19. Akademisk video

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2017-01-01

    Dette kapitel har fokus på metodiske problemstillinger, der opstår i forhold til at bruge (digital) video i forbindelse med forskningskommunikation, ikke mindst online. Video har længe været benyttet i forskningen til dataindsamling og forskningskommunikation. Med digitaliseringen og internettet er...... der dog opstået nye muligheder og udfordringer i forhold til at formidle og distribuere forskningsresultater til forskellige målgrupper via video. Samtidig er klassiske metodologiske problematikker som forskerens positionering i forhold til det undersøgte stadig aktuelle. Både klassiske og nye...... problemstillinger diskuteres i kapitlet, som rammesætter diskussionen ud fra forskellige positioneringsmuligheder: formidler, historiefortæller, eller dialogist. Disse positioner relaterer sig til genrer inden for ’akademisk video’. Afslutningsvis præsenteres en metodisk værktøjskasse med redskaber til planlægning...

  20. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  1. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  2. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  3. MedlinePlus FAQ: Is audio description available for videos on MedlinePlus?

    Science.gov (United States)

    ... audiodescription.html Question: Is audio description available for videos on MedlinePlus? To use the sharing features on ... page, please enable JavaScript. Answer: Audio description of videos helps make the content of videos accessible to ...

  4. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...... World Videos. The workshops were run on December 4, 2016, in Cancun in Mexico. The two workshops together received 13 papers. Each paper was then reviewed by at least two expert reviewers in the field. In all, 11 papers were accepted to be presented at the workshops. The topics covered in the papers...

  5. Privacy in Online Social Networks

    OpenAIRE

    Raad, Elie; Chbeir, Richard

    2013-01-01

    Online social networks have become an important part of the online activities on the web and one of the most influencing media. Unconstrained by physical spaces, online social networks offer to web users new interesting means to communicate, interact, and socialize. While these networks make frequent data sharing and inter-user communications instantly possible, privacy-related issues are their obvious much discussed immediate consequences. Although the notion of privacy may take different fo...

  6. Lower bounds in differential privacy

    OpenAIRE

    De, Anindya

    2011-01-01

    This is a paper about private data analysis, in which a trusted curator holding a confidential database responds to real vector-valued queries. A common approach to ensuring privacy for the database elements is to add appropriately generated random noise to the answers, releasing only these {\\em noisy} responses. In this paper, we investigate various lower bounds on the noise required to maintain different kind of privacy guarantees.

  7. Deep Learning with Differential Privacy

    OpenAIRE

    Abadi, Martín; Chu, Andy; Goodfellow, Ian; McMahan, H. Brendan; Mironov, Ilya; Talwar, Kunal; Zhang, Li

    2016-01-01

    Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information. The models should not expose private information in these datasets. Addressing this goal, we develop new algorithmic techniques for learning and a refined analysis of privacy costs within the framework of differential privacy. Our implementation and...

  8. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  9. Veterans Crisis Line: Videos About Reaching out for Help

    Science.gov (United States)

    Veterans Crisis Line Skip to Main Content SuicidePreventionLifeline.org Get Help Materials Get Involved Crisis Centers About Be There ... see more videos from Veterans Health Administration Veterans Crisis Line -- After the Call see more videos from ...

  10. Videography-Based Unconstrained Video Analysis.

    Science.gov (United States)

    Li, Kang; Li, Sheng; Oh, Sangmin; Fu, Yun

    2017-05-01

    Video analysis and understanding play a central role in visual intelligence. In this paper, we aim to analyze unconstrained videos, by designing features and approaches to represent and analyze videography styles in the videos. Videography denotes the process of making videos. The unconstrained videos are defined as the long duration consumer videos that usually have diverse editing artifacts and significant complexity of contents. We propose to construct a videography dictionary, which can be utilized to represent every video clip as a sequence of videography words. In addition to semantic features, such as foreground object motion and camera motion, we also incorporate two novel interpretable features to characterize videography, including the scale information and the motion correlations. We then demonstrate that, by using statistical analysis methods, the unique videography signatures extracted from different events can be automatically identified. For real-world applications, we explore the use of videography analysis for three types of applications, including content-based video retrieval, video summarization (both visual and textual), and videography-based feature pooling. In the experiments, we evaluate the performance of our approach and other methods on a large-scale unconstrained video dataset, and show that the proposed approach significantly benefits video analysis in various ways.

  11. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real W...

  12. Online scene change detection of multicast (MBone) video

    Science.gov (United States)

    Zhou, Wensheng; Shen, Ye; Vellaikal, Asha; Kuo, C.-C. Jay

    1998-10-01

    Many multimedia applications, such as multimedia data management systems and communication systems, require efficient representation of multimedia content. Thus semantic interpretation of video content has been a popular research area. Currently, most content-based video representation involves the segmentation of video based on key frames which are generated using scene change detection techniques as well as camera/object motion. Then, video features can be extracted from key frames. However most of such research performs off-line video processing in which the whole video scope is known as a priori which allows multiple scans of the stored video files during video processing. In comparison, relatively not much research has been done in the area of on-line video processing, which is crucial in video communication applications such as on-line collaboration, news broadcasts and so on. Our research investigates on-line real-time scene change detection of multicast video over the Internet. Our on-line processing system are designed to meet the requirements of real-time video multicasting over the Internet and to utilize the successful video parsing techniques available today. The proposed algorithms extract key frames from video bitstreams sent through the MBone network, and the extracted key frames are multicasted as annotations or metadata over a separate channel to assist in content filtering such as those anticipated to be in use by on-line filtering proxies in the Internet. The performance of the proposed algorithms are demonstrated and discussed in this paper.

  13. Fragile watermarking scheme for H.264 video authentication

    Science.gov (United States)

    Wang, Chuen-Ching; Hsu, Yu-Chang

    2010-02-01

    A novel H.264 advanced video coding fragile watermarking method is proposed that enables the authenticity and integrity of the video streams to be verified. The effectiveness of the proposed scheme is demonstrated by way of experimental simulations. The results show that by embedding the watermark information in the last nonzero-quantized coefficient in each discrete cosine transform block, the proposed scheme induces no more than a minor distortion of the video content. In addition, we show that the proposed scheme is able to detect unauthorized changes in the watermarked video content without the original video. The experimental results demonstrate the feasibility of the proposed video authentication system.

  14. The Educational Efficacy of Distinct Information Delivery Systems in Modified Video Games

    Science.gov (United States)

    Moshirnia, Andrew; Israel, Maya

    2010-01-01

    Despite the increasing popularity of many commercial video games, this popularity is not shared by educational video games. Modified video games, however, can bridge the gap in quality between commercial and education video games by embedding educational content into popular commercial video games. This study examined how different information…

  15. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2011-05-01

    Full Text Available In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP videoconferencing software used between patients and therapists to provide telerehabilitation (TR therapy.  In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010, encryption (p=0.006, and security evaluation (p=0.005. Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR.  Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.Keywords: Voice over the Internet Protocol (VOIP, telerehabilitation, HIPAA, privacy, security, evaluation

  16. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  17. Performance evaluation software moving object detection and tracking in videos

    CERN Document Server

    Karasulu, Bahadir

    2013-01-01

    Performance Evaluation Software: Moving Object Detection and Tracking in Videos introduces a software approach for the real-time evaluation and performance comparison of the methods specializing in moving object detection and/or tracking (D&T) in video processing. Digital video content analysis is an important item for multimedia content-based indexing (MCBI), content-based video retrieval (CBVR) and visual surveillance systems. There are some frequently-used generic algorithms for video object D&T in the literature, such as Background Subtraction (BS), Continuously Adaptive Mean-shift (CMS),

  18. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  19. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... publishes with the Agency's systems of records under the Privacy Act of 1974. This notice publishes those...

  20. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of the retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to...

  1. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  2. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records. SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise two Privacy Act Systems of...

  3. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-24

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is...

  4. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  5. Video Analytics

    DEFF Research Database (Denmark)

    This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...... include: re-identification, consumer behavior analysis, utilizing pupillary response for task difficulty measurement, logo detection, saliency prediction, classification of facial expressions, face recognition, face verification, age estimation, super-resolution, pose estimation, and pain recognition...

  6. Video Analytics

    DEFF Research Database (Denmark)

    include: re-identification, consumer behavior analysis, utilizing pupillary response for task difficulty measurement, logo detection, saliency prediction, classification of facial expressions, face recognition, face verification, age estimation, super-resolution, pose estimation, and pain recognition......This book collects the papers presented at two workshops during the 23rd International Conference on Pattern Recognition (ICPR): the Third Workshop on Video Analytics for Audience Measurement (VAAM) and the Second International Workshop on Face and Facial Expression Recognition (FFER) from Real...

  7. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  8. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  9. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  10. Risk analysis for privacy and identity management

    OpenAIRE

    Wangen, Gaute Bjørklund

    2012-01-01

    ENGELSK: The concept of privacy was recognized as early as the time of Aristotle, and has been a theme of debate since. Risks to privacy are problematic because the concept of "privacy" holds different meaning and importance to different people and cultures. What is considered private in Europe, may not be considered private in China, and vice versa. This makes defining and detecting risks to privacy a complex matter. As people become increasingly dependent on online services, ...

  11. Violent video games affecting our children.

    Science.gov (United States)

    Vessey, J A; Lee, J E

    2000-01-01

    Exposure to media violence is associated with increased aggression and its sequelae. Unfortunately, the majority of entertainment video games contain violence. Moreover, children of both genders prefer games with violent content. As there is no compulsory legislative standards to limit the type and amount of violence in video games, concerned adults must assume an oversight role.

  12. Multimodal Emotion Recognition in Response to Videos

    NARCIS (Netherlands)

    Soleymani, Mohammad; Pantic, Maja; Pun, Thierry

    This paper presents a user-independent emotion recognition method with the goal of recovering affective tags for videos using electroencephalogram (EEG), pupillary response and gaze distance. We first selected 20 video clips with extrinsic emotional content from movies and online resources. Then,

  13. Improving video event retrieval by user feedback

    NARCIS (Netherlands)

    Boer, M. de; Pingen, G.; Knook, D.; Schutte, K.; Kraaij, W.

    2017-01-01

    In content based video retrieval videos are often indexed with semantic labels (concepts) using pre-trained classifiers. These pre-trained classifiers (concept detectors), are not perfect, and thus the labels are noisy. Additionally, the amount of pre-trained classifiers is limited. Often automatic

  14. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece......Report from the EU H2020 Research Project Ps2Share:Participation, Privacy, and Power in the Sharing Economy. This paper gives an in-depth overview of the topic of power in the sharing economy. It forms one part of a European Union Horizon 2020 Research Project on the sharing economy: "Ps2Share...... Participation, Privacy, and Power in the Sharing Economy". We aim to foster better awareness of the consequences which the sharing economy has on the way people behave, think, interact, and socialize across Europe. Our overarching objective is to identify key challenges of the sharing economy and improve Europe...

  15. On genomics, kin, and privacy.

    Science.gov (United States)

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies.

  16. MediaEval 2013 Visual Privacy Task: Warping-based Privacy Protection Tool

    OpenAIRE

    Korshunov, Pavel; Ebrahimi, Touradj

    2013-01-01

    In this paper, we describe EPFL privacy protection tool submitted to the MediaEval 2013 Visual Privacy task. The goal of the task is to obscure faces and other personal items of people in the provided surveillance clips to preserve their personal privacy. In the privacy protection tool, we used a combination of reversible privacy protection filter based on geometric warping transformation, randomized saturation filter, masking with partial opacity, and pixelization. The aim of the implementat...

  17. Privacy Notice | IDRC - International Development Research Centre

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC respects the privacy concerns of users of this website. This Privacy Notice explains how personal information that is collected from and about the visitors to IDRC's website is handled. All personal information held or collected by IDRC is protected under Canada's Privacy Act. Information automatically collected from all ...

  18. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  19. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    are subject to crucial privacy threats. Inspired by the usability and privacy limitations of existing design solutions, we identify, describe and qualitatively evaluate four drawbacks to be avoided when designing ubiquitous social networking applications. By addressing these drawbacks, services become more...... functional and more oriented to ensure the end users' privacy, thus contributing to the long–term success of this technology....

  20. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  1. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  2. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  3. Urban forests and parks as privacy refuges

    Science.gov (United States)

    William E. Hammitt

    2002-01-01

    Urban forests and parks are forested areas that can serve as refuges for privacy. This article presents a conceptual argument for urban forests and parks as privacy refuges, and data that support the argument. On-site visitors (n = 610) to four Cleveland, Ohio, U.S., Metroparks were surveyed in 1995. Results indicated that considerable amounts of privacy were obtained...

  4. Effective Management of Information Security and Privacy

    Science.gov (United States)

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  5. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  6. 42 CFR 457.1110 - Privacy protections.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Privacy protections. 457.1110 Section 457.1110... Requirements: Applicant and Enrollee Protections § 457.1110 Privacy protections. The State must ensure that... disclosure, including those laws addressing the confidentiality of information about minors and the privacy...

  7. 21 CFR 1314.45 - Privacy protections.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Privacy protections. 1314.45 Section 1314.45 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.45 Privacy protections. To protect the privacy of...

  8. Indexed Captioned Searchable Videos: A Learning Companion for STEM Coursework

    Science.gov (United States)

    Tuna, Tayfun; Subhlok, Jaspal; Barker, Lecia; Shah, Shishir; Johnson, Olin; Hovey, Christopher

    2017-02-01

    Videos of classroom lectures have proven to be a popular and versatile learning resource. A key shortcoming of the lecture video format is accessing the content of interest hidden in a video. This work meets this challenge with an advanced video framework featuring topical indexing, search, and captioning (ICS videos). Standard optical character recognition (OCR) technology was enhanced with image transformations for extraction of text from video frames to support indexing and search. The images and text on video frames is analyzed to divide lecture videos into topical segments. The ICS video player integrates indexing, search, and captioning in video playback providing instant access to the content of interest. This video framework has been used by more than 70 courses in a variety of STEM disciplines and assessed by more than 4000 students. Results presented from the surveys demonstrate the value of the videos as a learning resource and the role played by videos in a students learning process. Survey results also establish the value of indexing and search features in a video platform for education. This paper reports on the development and evaluation of ICS videos framework and over 5 years of usage experience in several STEM courses.

  9. Video streaming into the mainstream.

    Science.gov (United States)

    Garrison, W

    2001-12-01

    Changes in Internet technology are making possible the delivery of a richer mixture of media through data streaming. High-quality, dynamic content, such as video and audio, can be incorporated into Websites simply, flexibly and interactively. Technologies such as G3 mobile communication, ADSL, cable and satellites enable new ways of delivering medical services, information and learning. Systems such as Quicktime, Windows Media and Real Video provide reliable data streams as video-on-demand and users can tailor the experience to their own interests. The Learning Development Centre at the University of Portsmouth have used streaming technologies together with e-learning tools such as dynamic HTML, Flash, 3D objects and online assessment successfully to deliver on-line course content in economics and earth science. The Lifesign project--to develop, catalogue and stream health sciences media for teaching--is described and future medical applications are discussed.

  10. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  11. The Privacy War: Enabling Siblings the Right to Privacy.

    Science.gov (United States)

    Sagarese, Margaret; Giannetti, Charlene

    2003-01-01

    Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…

  12. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme.

    Science.gov (United States)

    Padilla-López, José Ramón; Chaaraoui, Alexandros Andre; Gu, Feng; Flórez-Revuelta, Francisco

    2015-06-04

    Privacy in image and video data has become an important subject since cameras are being installed in an increasing number of public and private spaces. Specifically, in assisted living, intelligent monitoring based on computer vision can allow one to provide risk detection and support services that increase people's autonomy at home. In the present work, a level-based visualisation scheme is proposed to provide visual privacy when human intervention is necessary, such as at telerehabilitation and safety assessment applications. Visualisation levels are dynamically selected based on the previously modelled context. In this way, different levels of protection can be provided, maintaining the necessary intelligibility required for the applications. Furthermore, a case study of a living room, where a top-view camera is installed, is presented. Finally, the performed survey-based evaluation indicates the degree of protection provided by the different visualisation models, as well as the personal privacy preferences and valuations of the users.

  13. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  14. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies.

    Science.gov (United States)

    Townsend, Daphne; Knoefel, Frank; Goubran, Rafik

    2011-01-01

    Smart homes are proposed as a new location for the delivery of healthcare services. They provide healthcare monitoring and communication services, by using integrated sensor network technologies. We validate a hypothesis regarding older adults' adoption of home monitoring technologies by conducting a literature review of articles studying older adults' attitudes and perceptions of sensor technologies. Using current literature to support the hypothesis, this paper applies the tradeoff model to decisions about sensor acceptance. Older adults are willing to trade privacy (by accepting a monitoring technology), for autonomy. As the information captured by the sensor becomes more intrusive and the infringement on privacy increases, sensors are accepted if the loss in privacy is traded for autonomy. Even video cameras, the most intrusive sensor type were accepted in exchange for the height of autonomy which is to remain in the home.

  15. A video for teaching english tenses

    Directory of Open Access Journals (Sweden)

    Frida Unsiah

    2017-04-01

    Students of English Language Education Program in Faculty of Cultural Studies Universitas Brawijaya ideally master Grammar before taking the degree of Sarjana Pendidikan. However, the fact shows that they are still weak in Grammar especially tenses. Therefore, the researchers initiate to develop a video as a media to teach tenses. Objectively, by using video, students get better understanding on tenses so that they can communicate using English accurately and contextually. To develop the video, the researchers used ADDIE model (Analysis, Design, Development, Implementation, Evaluation. First, the researchers analyzed the students’ learning need to determine the product that would be developed, in this case was a movie about English tenses. Then, the researchers developed a video as the product. The product then was validated by media expert who validated attractiveness, typography, audio, image, and usefulness and content expert and validated by a content expert who validated the language aspects and tenses of English used by the actors in the video dealing with the grammar content, pronunciation, and fluency performed by the actors. The result of validation shows that the video developed was considered good. Theoretically, it is appropriate to be used English Grammar classes. However, the media expert suggests that it still needs some improvement for the next development especially dealing with the synchronization between lips movement and sound on the scenes while the content expert suggests that the Grammar content of the video should focus on one tense only to provide more detailed concept of the tense.

  16. A comprehensive review on privacy preserving data mining.

    Science.gov (United States)

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.

  17. Geoblocking and global video culture.

    NARCIS (Netherlands)

    Lobato, Ramon; Meese, James; Rasch, Mirjam

    How do global audiences use streaming platforms like YouTube, Netflix and iPlayer? How does the experience of digital video change according to location? What strategies do people use to access out-of-region content? What are the commercial and governmental motivations behind geoblocking?

  18. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  19. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  20. Privacy in Recommender Systems

    NARCIS (Netherlands)

    Jeckmans, Arjan; Beye, Michael; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Ramzan, Naeem; van Zwol, Roelof; Lee, Jong-Seok; Clüver, Kai; Hua, Xian-Sheng

    In many online applications, the range of content that is offered to users is so wide that a need for automated recommender systems arises. Such systems can provide a personalized selection of relevant items to users. In practice, this can help people find entertaining movies, boost sales through

  1. A Comparison of Video Formats for Online Teaching

    Science.gov (United States)

    Malaga, Ross A.; Koppel, Nicole B.

    2017-01-01

    The use of video to deliver content to students online has become increasingly popular. However, educators are often plagued with the question of which format to use to deliver asynchronous video material. Whether it is a College or University committing to a common video format or an individual instructor selecting the method that works best for…

  2. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  3. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as... 1954.'' are added at the end of the definition of Act. BILLING CODE 1505-01-D ...

  4. Privacy concerns in smart cities

    NARCIS (Netherlands)

    E.A. van Zoonen (Liesbet)

    2016-01-01

    textabstractIn this paper a framework is constructed to hypothesize if and how smart city technologies and urban big data produce privacy concerns among the people in these cities (as inhabitants, workers, visitors, and otherwise). The framework is built on the basis of two recurring dimensions in

  5. Privacy and disclosure in psychoanalysis.

    Science.gov (United States)

    Kantrowitz, Judy L

    2009-08-01

    The tension between privacy and disclosure in psychoanalysis operates in various ways in analyst, supervisee, and supervisor. Analysts need to maintain the privacy of their patients by keeping their material confidential; they also need to know and share their own internal conscious conflicts to be able to discover unconscious conflicts and their characterological ramifications. Clinical writing is one vehicle for the exploration, discovery, and communication of transference-countertransference issues and other conflicts stimulated by clinical work, but it does not provide the perspective that comes from sharing with another person. Telling a trusted colleague what we think and feel in relation to our patients and ourselves enables us to see our blind spots, as well as providing perspective and affect containment in our work. Mutuality in peer supervision tends to reduce the transference. The special problems of privacy and disclosure in psychoanalytic training are addressed, as are the ways the analyst's belief in maintaining privacy may affect the analytic process and therapeutic relationship.

  6. Privacy in Online Social Networks

    NARCIS (Netherlands)

    Beye, Michael; Jeckmans, Arjan; Erkin, Zekeriya; Erkin, Zekeriya; Hartel, Pieter H.; Lagendijk, Reginald; Tang, Qiang; Abraham, A.

    Online Social Networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated

  7. PROTECTION OF PRIVACY THROUGH MICROAGGREGATION

    OpenAIRE

    Feige, Edgar L.; Harold W. Watts

    2005-01-01

    A proposal for maintaining privacy protection in large data bases by the use of partially aggregated data instead of the original individual data. Proper micro aggregation techniques can serve to protect the confidential nature of the individual data with minimumal information loss. Reference:Data base4s, Computers and the Social Sciences, R. Bisco (ed.),Wiley, 1970, pp. 261-272

  8. Facebook: When Education Meets Privacy

    Science.gov (United States)

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  9. Cross-Cultural Privacy Prediction

    Directory of Open Access Journals (Sweden)

    Li Yao

    2017-04-01

    Full Text Available The influence of cultural background on people’s privacy decisions is widely recognized. However, a cross-cultural approach to predicting privacy decisions is still lacking. Our paper presents a first integrated cross-cultural privacy prediction model that merges cultural, demographic, attitudinal and contextual prediction. The model applies supervised machine learning to users’ decisions on the collection of their personal data, collected from a large-scale quantitative study in eight different countries. We find that adding culture-related predictors (i.e. country of residence, language, Hofstede’s cultural dimensions to demographic, attitudinal and contextual predictors in the model can improve the prediction accuracy. Hofstede’s variables - particularly individualism and indulgence - outperform country and language. We further apply generalized linear mixed-effect regression to explore possible interactions between culture and other predictors. We find indeed that the impact of contextual and attitudinal predictors varies between different cultures. The implications of such models in developing privacy-enabling technologies are discussed.

  10. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing

  11. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  12. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    Science.gov (United States)

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  13. Smartphone lost - Privacy gone

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Who doesn't own an iPhone, Android or Blackberry mobile phone today? Lucky you if you don’t! In previous issues (Issue 06/07, 2012 and Issue 32/33/34, 2011) we have pointed out their lack of security. But what happens if you lose your smartphone or it gets stolen?   Today, a smartphone clones your personality into the digital world. Your phone archives all your emails and messaging communications with your family, friends, peers and colleagues; contains photos and videos of the top moments of your life; holds your favourite music and movies and zillions of other bits of personal information stored in the apps of your choice (like GPS information of your jogging paths, a vault of your passwords, access to your Facebook or Twitter profiles, bank access information, flight and hotel bookings). In the future, your phone might also be used for making payments in shops. Have you ever thought of how you would feel if you lost your smartphone or it got stolen? Nak...

  14. Web Audio/Video Streaming Tool

    Science.gov (United States)

    Guruvadoo, Eranna K.

    2003-01-01

    In order to promote NASA-wide educational outreach program to educate and inform the public of space exploration, NASA, at Kennedy Space Center, is seeking efficient ways to add more contents to the web by streaming audio/video files. This project proposes a high level overview of a framework for the creation, management, and scheduling of audio/video assets over the web. To support short-term goals, the prototype of a web-based tool is designed and demonstrated to automate the process of streaming audio/video files. The tool provides web-enabled users interfaces to manage video assets, create publishable schedules of video assets for streaming, and schedule the streaming events. These operations are performed on user-defined and system-derived metadata of audio/video assets stored in a relational database while the assets reside on separate repository. The prototype tool is designed using ColdFusion 5.0.

  15. Scalable video on demand adaptive Internet-based distribution

    CERN Document Server

    Zink, Michael

    2013-01-01

    In recent years, the proliferation of available video content and the popularity of the Internet have encouraged service providers to develop new ways of distributing content to clients. Increasing video scaling ratios and advanced digital signal processing techniques have led to Internet Video-on-Demand applications, but these currently lack efficiency and quality. Scalable Video on Demand: Adaptive Internet-based Distribution examines how current video compression and streaming can be used to deliver high-quality applications over the Internet. In addition to analysing the problems

  16. Improving the pedagogical effectiveness of medical videos.

    Science.gov (United States)

    Iorio-Morin, Christian; Brisebois, Simon; Becotte, Annick; Mior, Frédéric

    2017-07-01

    Videos are often employed in medical cursus, yet few guidelines are available to help with their production. Mayer's cognitive theory of multimedia learning is the most cited evidence-based framework for improving pedagogical effectiveness of multimedia content. Based on this framework, we identified four workflow interventions to improve the effectiveness of video content in the context of medical education: (1) choosing appropriate content; (2) optimizing the voiceover; (3) optimizing the supporting visuals and (4) planning the shooting schedule in advance. Content creators should think about pedagogical effectiveness and aim to improve their work by applying evidence-based principles.

  17. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  18. Mining Crowdsourced First Impressions in Online Social Video

    OpenAIRE

    Biel, Joan-Isaac; Gatica-Perez, Daniel

    2014-01-01

    While multimedia and social computing research have used crowdsourcing techniques to annotate objects, actions, and scenes in social video sites like YouTube, little work has ad- dressed the crowdsourcing of personal and social traits in online social video or social media content in general. In this paper, we address the problems of (1) crowdsourcing the annotation of first impressions of video bloggers (vloggers) personal and social traits in conversational YouTube videos, and (2) mining th...

  19. Web-Mediated Augmentation and Interactivity Enhancement of Omni-Directional Video in Both 2D and 3D

    OpenAIRE

    Wijnants, Maarten; Van Erum, Kris; QUAX, Peter; Lamotte, Wim

    2015-01-01

    Video consumption has since the emergence of the medium largely been a passive affair. This paper proposes augmented Omni-Directional Video (ODV) as a novel format to engage viewers and to open up new ways of interacting with video content. Augmented ODV blends two important contemporary technologies: Augmented Video Viewing and 360 degree video. The former allows for the addition of interactive features to Web-based video playback, while the latter unlocks spatial video navigation opportunit...

  20. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  1. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  2. Quantifying Differential Privacy under Temporal Correlations

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  3. Quantifying Differential Privacy under Temporal Correlations.

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  4. Biobank research and the right to privacy.

    Science.gov (United States)

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  5. Privacy protection for HealthGrid applications.

    Science.gov (United States)

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  6. Multi-Modal Surrogates for Retrieving and Making Sense of Videos: Is Synchronization between the Multiple Modalities Optimal?

    Science.gov (United States)

    Song, Yaxiao

    2010-01-01

    Video surrogates can help people quickly make sense of the content of a video before downloading or seeking more detailed information. Visual and audio features of a video are primary information carriers and might become important components of video retrieval and video sense-making. In the past decades, most research and development efforts on…

  7. Display device-adapted video quality-of-experience assessment

    Science.gov (United States)

    Rehman, Abdul; Zeng, Kai; Wang, Zhou

    2015-03-01

    Today's viewers consume video content from a variety of connected devices, including smart phones, tablets, notebooks, TVs, and PCs. This imposes significant challenges for managing video traffic efficiently to ensure an acceptable quality-of-experience (QoE) for the end users as the perceptual quality of video content strongly depends on the properties of the display device and the viewing conditions. State-of-the-art full-reference objective video quality assessment algorithms do not take into account the combined impact of display device properties, viewing conditions, and video resolution while performing video quality assessment. We performed a subjective study in order to understand the impact of aforementioned factors on perceptual video QoE. We also propose a full reference video QoE measure, named SSIMplus, that provides real-time prediction of the perceptual quality of a video based on human visual system behaviors, video content characteristics (such as spatial and temporal complexity, and video resolution), display device properties (such as screen size, resolution, and brightness), and viewing conditions (such as viewing distance and angle). Experimental results have shown that the proposed algorithm outperforms state-of-the-art video quality measures in terms of accuracy and speed.

  8. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... NEI YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration ... Retinopathy of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: ...

  9. NEI You Tube Videos: Amblyopia

    Medline Plus

    Full Text Available ... YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia ... of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia ...

  10. NEI You Tube Videos: Amblyopia

    Science.gov (United States)

    ... YouTube Videos > NEI YouTube Videos: Amblyopia NEI YouTube Videos YouTube Videos Home Age-Related Macular Degeneration Amblyopia ... of Prematurity Science Spanish Videos Webinars NEI YouTube Videos: Amblyopia Embedded video for NEI YouTube Videos: Amblyopia ...

  11. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Science.gov (United States)

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice AGENCY: Privacy and Civil Liberties Oversight Board. ACTION: Notice of Privacy Act system of records...

  12. A Research on Protection of Consumer Privacy in E - Commerce

    Directory of Open Access Journals (Sweden)

    Serpil Karlıdağ

    2015-12-01

    Full Text Available As consumers benefit from online shopping they are concerned with the protection of their personal information. Thisstudy aims to analyze what kind of policies e-shopping websites implement to protect their customers’ personal information. Data of the study have been obtained by examining Turkey’s 50 leading e-shopping web sites. Content analysis has been used to examine the collected data. The coding categories have been derived directly from the privacy policy texts. Privacy texts have been coded in the same way by two different people and the validity of inferences has been provided. Accordingly, the shopping web sites explain that they do nottransfer the personal information to the third parties without any notification. However they have exceptions. Some businesses see the customers’ information as their own property and use them for their own gain. Moreover, theydonottake any responsibilities to protect customer’s information.

  13. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  14. Video Analytics for Business Intelligence

    CERN Document Server

    Porikli, Fatih; Xiang, Tao; Gong, Shaogang

    2012-01-01

    Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...

  15. Rheumatoid Arthritis Educational Video Series

    Medline Plus

    Full Text Available ... Rheumatoid Arthritis Educational Video Series Rheumatoid Arthritis Educational Video Series This series of five videos was designed ... Activity Role of Body Weight in Osteoarthritis Educational Videos for Patients Rheumatoid Arthritis Educational Video Series Psoriatic ...

  16. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place yet. The study therefore indicates that online privacy is rather new on the corporate social responsibility agenda, currently playing only a minor role....

  17. On the Fly Porn Video Blocking Using Distributed Multi-Gpu and Data Mining Approach

    OpenAIRE

    Urvesh Devani; Valmik B Nikam; Meshram, B B

    2014-01-01

    Preventing users from accessing adult videos and at the same time allowing them to access good educational videos and other materials through campus wide network is a big challenge for organizations. Major existing web filtering systems are textual content or link analysis based. As a result, potential users cannot access qualitative and informative video content which is available online. Adult content detection in video based on motion features or skin detection requires sig...

  18. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  19. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  20. Refilming with depth-inferred videos.

    Science.gov (United States)

    Zhang, Guofeng; Dong, Zilong; Jia, Jiaya; Wan, Liang; Wong, Tien-Tsin; Bao, Hujun

    2009-01-01

    Compared to still image editing, content-based video editing faces the additional challenges of maintaining the spatiotemporal consistency with respect to geometry. This brings up difficulties of seamlessly modifying video content, for instance, inserting or removing an object. In this paper, we present a new video editing system for creating spatiotemporally consistent and visually appealing refilming effects. Unlike the typical filming practice, our system requires no labor-intensive construction of 3D models/surfaces mimicking the real scene. Instead, it is based on an unsupervised inference of view-dependent depth maps for all video frames. We provide interactive tools requiring only a small amount of user input to perform elementary video content editing, such as separating video layers, completing background scene, and extracting moving objects. These tools can be utilized to produce a variety of visual effects in our system, including but not limited to video composition, "predator" effect, bullet-time, depth-of-field, and fog synthesis. Some of the effects can be achieved in real time.

  1. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  2. 61214++++','DOAJ-ART-EN'); return false;" href="+++++https://jual.nipissingu.ca/wp-content/uploads/sites/25/2014/06/v61214.m4v">61214++++">Jailed - Video

    Directory of Open Access Journals (Sweden)

    Cameron CULBERT

    2012-07-01

    Full Text Available As the public education system in Northern Ontario continues to take a downward spiral, a plethora of secondary school students are being placed in an alternative educational environment. Juxtaposing the two educational settings reveals very similar methods and characteristics of educating our youth as opposed to using a truly alternative approach to education. This video reviews the relationship between public education and alternative education in a remote Northern Ontario setting. It is my belief that the traditional methods of teaching are not appropriate in educating at risk students in alternative schools. Paper and pencil worksheets do not motivate these students to learn and succeed. Alternative education should emphasize experiential learning, a just in time curriculum based on every unique individual and the students true passion for everyday life. Cameron Culbert was born on February 3rd, 1977 in North Bay, Ontario. His teenage years were split between attending public school and his willed curriculum on the ski hill. Culbert spent 10 years (1996-2002 & 2006-2010 competing for Canada as an alpine ski racer. His passion for teaching and coaching began as an athlete and has now transferred into the classroom and the community. As a graduate of Nipissing University (BA, BEd, MEd. Camerons research interests are alternative education, physical education and technology in the classroom. Currently Cameron is an active educator and coach in Northern Ontario.

  3. Objective video presentation QoE predictor for smart adaptive video streaming

    Science.gov (United States)

    Wang, Zhou; Zeng, Kai; Rehman, Abdul; Yeganeh, Hojatollah; Wang, Shiqi

    2015-09-01

    How to deliver videos to consumers over the network for optimal quality-of-experience (QoE) has been the central goal of modern video delivery services. Surprisingly, regardless of the large volume of videos being delivered everyday through various systems attempting to improve visual QoE, the actual QoE of end consumers is not properly assessed, not to say using QoE as the key factor in making critical decisions at the video hosting, network and receiving sites. Real-world video streaming systems typically use bitrate as the main video presentation quality indicator, but using the same bitrate to encode different video content could result in drastically different visual QoE, which is further affected by the display device and viewing condition of each individual consumer who receives the video. To correct this, we have to put QoE back to the driver's seat and redesign the video delivery systems. To achieve this goal, a major challenge is to find an objective video presentation QoE predictor that is accurate, fast, easy-to-use, display device adaptive, and provides meaningful QoE predictions across resolution and content. We propose to use the newly developed SSIMplus index (https://ece.uwaterloo.ca/~z70wang/research/ssimplus/) for this role. We demonstrate that based on SSIMplus, one can develop a smart adaptive video streaming strategy that leads to much smoother visual QoE impossible to achieve using existing adaptive bitrate video streaming approaches. Furthermore, SSIMplus finds many more applications, in live and file-based quality monitoring, in benchmarking video encoders and transcoders, and in guiding network resource allocations.

  4. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  5. Privacy preservation without compromising data integrity

    OpenAIRE

    Sabrina, Tishna

    2017-01-01

    In people-centric applications, participants voluntarily report data to service providers for community benefits. As most of the applications demand high-quality data, straightforward representation of even seemingly benign data may pose significant privacy risks through inference. Retaining high data quality without compromising participants’ privacy is a challenging research problem since these goals are inherently orthogonal. The existing techniques attempt to protect user privacy by re...

  6. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  7. Social Network Privacy via Evolving Access Control

    Science.gov (United States)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  8. Trigger videos on the Web: Impact of audiovisual design

    NARCIS (Netherlands)

    Verleur, R.; Heuvelman, A.; Verhagen, Pleunes Willem

    2011-01-01

    Audiovisual design might impact emotional responses, as studies from the 1970s and 1980s on movie and television content show. Given today's abundant presence of web-based videos, this study investigates whether audiovisual design will impact web-video content in a similar way. The study is

  9. Identifying Suitable YouTube Videos for Children

    NARCIS (Netherlands)

    C. Eickhoff (Carsten); A.P. de Vries (Arjen)

    2010-01-01

    htmlabstractContent-sharing platforms such as YouTube or MyVideo are experiencing huge user numbers that are still rising very quickly. Among the users there is a steadily growing share of children. In spite of this tendency the content of many popular videos is not suitable for children and should

  10. 78 FR 19744 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-04-02

    ... workstations within the NASA Intranet. RETENTION AND DISPOSAL: Records are retained in a computer database and... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of a Privacy Act system of records. SUMMARY: Each Federal...

  11. 78 FR 19745 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-04-02

    ... approved authentication methods can access the system. RETENTION AND DISPOSAL: Records are maintained and... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal...

  12. Video Design Games

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Christensen, Kasper Skov; Iversen, Ole Sejer

    We introduce Video Design Games to train educators in teaching design. The Video Design Game is a workshop format consisting of three rounds in which participants observe, reflect and generalize based on video snippets from their own practice. The paper reports on a Video Design Game workshop...

  13. Compact video synopsis via global spatiotemporal optimization.

    Science.gov (United States)

    Nie, Yongwei; Xiao, Chunxia; Sun, Hanqiu; Li, Ping

    2013-10-01

    Video synopsis aims at providing condensed representations of video data sets that can be easily captured from digital cameras nowadays, especially for daily surveillance videos. Previous work in video synopsis usually moves active objects along the time axis, which inevitably causes collisions among the moving objects if compressed much. In this paper, we propose a novel approach for compact video synopsis using a unified spatiotemporal optimization. Our approach globally shifts moving objects in both spatial and temporal domains, which shifting objects temporally to reduce the length of the video and shifting colliding objects spatially to avoid visible collision artifacts. Furthermore, using a multilevel patch relocation (MPR) method, the moving space of the original video is expanded into a compact background based on environmental content to fit with the shifted objects. The shifted objects are finally composited with the expanded moving space to obtain the high-quality video synopsis, which is more condensed while remaining free of collision artifacts. Our experimental results have shown that the compact video synopsis we produced can be browsed quickly, preserves relative spatiotemporal relationships, and avoids motion collisions.

  14. 75 FR 65229 - Privacy Act; Implementation

    Science.gov (United States)

    2010-10-22

    ... FURTHER INFORMATION CONTACT: Dale Underwood, Privacy Act officer, Department of the Treasury, 1500....underwood@do.treas.gov . SUPPLEMENTARY INFORMATION: The Department of the Treasury is publishing separately...

  15. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  16. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  17. An overview of human genetic privacy

    National Research Council Canada - National Science Library

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    .... With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed...

  18. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  19. Video visual analytics

    OpenAIRE

    Höferlin, Markus Johannes

    2013-01-01

    The amount of video data recorded world-wide is tremendously growing and has already reached hardly manageable dimensions. It originates from a wide range of application areas, such as surveillance, sports analysis, scientific video analysis, surgery documentation, and entertainment, and its analysis represents one of the challenges in computer science. The vast amount of video data renders manual analysis by watching the video data impractical. However, automatic evaluation of video material...

  20. Lingual orthodontic treatment: A YouTube™ video analysis.

    Science.gov (United States)

    Lena, Yağmur; Dindaroğlu, Furkan

    2017-12-19

    The aim of this study was to examine the quality of information offered for patients seeking information on lingual orthodontic treatment. YouTube™ was searched for videos about lingual orthodontic treatment using the key word "lingual braces" from the Google Trends application. One hundred and four videos were selected to be analyzed from the first 120 results. The video content was evaluated using a 10-point score, which was used for classifying low- and high-content video groups. The video information and quality index (VIQI) was applied to determine the quality of the videos. The Mann-Whitney U-test, Chi-square test, and logistic regression analysis were used, and the Pearson correlation coefficient was calculated for statistical evaluations. We classified 32 videos as high-content and 72 as low-content. Most videos were uploaded by laypeople (58.7%, n = 61). Definition of lingual braces and psychological impact were the most commonly discussed topics (51.0%), followed by speech performance (47.1%), pain (44.2%), tongue soreness (37.5%), and biomechanics (14.4%). Compared to the low-content group, the high-content video group had a significantly higher mean number of views (19,867.41 vs 6720.08, P = .002) and more "likes" (135.88 vs 13.01, P comments" (26.28 vs 5.31, P = .002). There was no difference in the total VIQI score between the groups ( P = .009). The content of YouTube™ videos for lingual orthodontics was generally incomplete. Most videos mentioned psychological effects, but few videos discussed the biomechanics or procedure. Orthodontists should be aware of the information available on YouTube™.

  1. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  2. Violence in Teen-Rated Video Games

    Science.gov (United States)

    Haninger, Kevin; Ryan, M. Seamus; Thompson, Kimberly M

    2004-01-01

    Context: Children's exposure to violence in the media remains a source of public health concern; however, violence in video games rated T (for “Teen”) by the Entertainment Software Rating Board (ESRB) has not been quantified. Objective: To quantify and characterize the depiction of violence and blood in T-rated video games. According to the ESRB, T-rated video games may be suitable for persons aged 13 years and older and may contain violence, mild or strong language, and/or suggestive themes. Design: We created a database of all 396 T-rated video game titles released on the major video game consoles in the United States by April 1, 2001 to identify the distribution of games by genre and to characterize the distribution of content descriptors for violence and blood assigned to these games. We randomly sampled 80 game titles (which included 81 games because 1 title included 2 separate games), played each game for at least 1 hour, and quantitatively assessed the content. Given the release of 2 new video game consoles, Microsoft Xbox and Nintendo GameCube, and a significant number of T-rated video games released after we drew our random sample, we played and assessed 9 additional games for these consoles. Finally, we assessed the content of 2 R-rated films, The Matrix and The Matrix: Reloaded, associated with the T-rated video game Enter the Matrix. Main Outcome Measures: Game genre; percentage of game play depicting violence; depiction of injury; depiction of blood; number of human and nonhuman fatalities; types of weapons used; whether injuring characters, killing characters, or destroying objects is rewarded or is required to advance in the game; and content that may raise concerns about marketing T-rated video games to children. Results: Based on analysis of the 396 T-rated video game titles, 93 game titles (23%) received content descriptors for both violence and blood, 280 game titles (71%) received only a content descriptor for violence, 9 game titles (2

  3. Violence in teen-rated video games.

    Science.gov (United States)

    Haninger, Kevin; Ryan, M Seamus; Thompson, Kimberly M

    2004-03-11

    Children's exposure to violence in the media remains a source of public health concern; however, violence in video games rated T (for "Teen") by the Entertainment Software Rating Board (ESRB) has not been quantified. To quantify and characterize the depiction of violence and blood in T-rated video games. According to the ESRB, T-rated video games may be suitable for persons aged 13 years and older and may contain violence, mild or strong language, and/or suggestive themes. We created a database of all 396 T-rated video game titles released on the major video game consoles in the United States by April 1, 2001 to identify the distribution of games by genre and to characterize the distribution of content descriptors for violence and blood assigned to these games. We randomly sampled 80 game titles (which included 81 games because 1 title included 2 separate games), played each game for at least 1 hour, and quantitatively assessed the content. Given the release of 2 new video game consoles, Microsoft Xbox and Nintendo GameCube, and a significant number of T-rated video games released after we drew our random sample, we played and assessed 9 additional games for these consoles. Finally, we assessed the content of 2 R-rated films, The Matrix and The Matrix: Reloaded, associated with the T-rated video game Enter the Matrix. Game genre; percentage of game play depicting violence; depiction of injury; depiction of blood; number of human and nonhuman fatalities; types of weapons used; whether injuring characters, killing characters, or destroying objects is rewarded or is required to advance in the game; and content that may raise concerns about marketing T-rated video games to children. Based on analysis of the 396 T-rated video game titles, 93 game titles (23%) received content descriptors for both violence and blood, 280 game titles (71%) received only a content descriptor for violence, 9 game titles (2%) received only a content descriptor for blood, and 14 game titles

  4. Using video-based observation research methods in primary care health encounters to evaluate complex interactions

    Directory of Open Access Journals (Sweden)

    Onur Asan

    2014-08-01

    Full Text Available Objective The purpose of this paper is to describe the use of video-based observation research methods in primary care environment and highlight important methodological considerations and provide practical guidance for primary care and human factors researchers conducting video studies to understand patient–clinician interaction in primary care settings.Methods We reviewed studies in the literature which used video methods in health care research, and we also used our own experience based on the video studies we conducted in primary care settings.Results This paper highlighted the benefits of using video techniques, such as multi-channel recording and video coding, and compared “unmanned” video recording with the traditional observation method in primary care research. We proposed a list that can be followed step by step to conduct an effective video study in a primary care setting for a given problem. This paper also described obstacles, researchers should anticipate when using video recording methods in future studies.Conclusion With the new technological improvements, video-based observation research is becoming a promising method in primary care and HFE research. Video recording has been under-utilised as a data collection tool because of confidentiality and privacy issues. However, it has many benefits as opposed to traditional observations, and recent studies using video recording methods have introduced new research areas and approaches.

  5. Using video-based observation research methods in primary care health encounters to evaluate complex interactions.

    Science.gov (United States)

    Asan, Onur; Montague, Enid

    2014-01-01

    The purpose of this paper is to describe the use of video-based observation research methods in primary care environment and highlight important methodological considerations and provide practical guidance for primary care and human factors researchers conducting video studies to understand patient-clinician interaction in primary care settings. We reviewed studies in the literature which used video methods in health care research, and we also used our own experience based on the video studies we conducted in primary care settings. This paper highlighted the benefits of using video techniques, such as multi-channel recording and video coding, and compared "unmanned" video recording with the traditional observation method in primary care research. We proposed a list that can be followed step by step to conduct an effective video study in a primary care setting for a given problem. This paper also described obstacles, researchers should anticipate when using video recording methods in future studies. With the new technological improvements, video-based observation research is becoming a promising method in primary care and HFE research. Video recording has been under-utilised as a data collection tool because of confidentiality and privacy issues. However, it has many benefits as opposed to traditional observations, and recent studies using video recording methods have introduced new research areas and approaches.

  6. ?Not all my friends need to know?: a qualitative study of teenage patients, privacy, and social media

    OpenAIRE

    van der Velden, Maja; El Emam, Khaled

    2013-01-01

    Background The literature describes teenagers as active users of social media, who seem to care about privacy, but who also reveal a considerable amount of personal information. There have been no studies of how they manage personal health information on social media. Objective To understand how chronically ill teenage patients manage their privacy on social media sites. Design A qualitative study based on a content analysis of semistructured interviews with 20 hospital patients (12?18?years)...

  7. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  8. An Evaluation of Educational Neurological Eye Movement Disorder Videos Posted on Internet Video Sharing Sites.

    Science.gov (United States)

    Hickman, Simon J

    2016-03-01

    Internet video sharing sites allow the free dissemination of educational material. This study investigated the quality and educational content of videos of eye movement disorders posted on such sites. Educational neurological eye movement videos were identified by entering the titles of the eye movement abnormality into the search boxes of the video sharing sites. Also, suggested links were followed from each video. The number of views, likes, and dislikes for each video were recorded. The videos were then rated for their picture and sound quality. Their educational value was assessed according to whether the video included a description of the eye movement abnormality, the anatomical location of the lesion (if appropriate), and the underlying diagnosis. Three hundred fifty-four of these videos were found on YouTube and Vimeo. There was a mean of 6,443 views per video (range, 1-195,957). One hundred nineteen (33.6%) had no form of commentary about the eye movement disorder shown apart from the title. Forty-seven (13.3%) contained errors in the title or in the text. Eighty (22.6%) had excellent educational value by describing the eye movement abnormality, the anatomical location of the lesion, and the underlying diagnosis. Of these, 30 also had good picture and sound quality. The videos with excellent educational value had a mean of 9.84 "likes" per video compared with 2.37 for those videos without a commentary (P educational value with good picture and sound quality had a mean of 10.23 "likes" per video (P = 0.004 vs videos with no commentary). There was no significant difference in the mean number of "dislikes" between those videos that had no commentary or which contained errors and those with excellent educational value. There are a large number of eye movement videos freely available on these sites; however, due to the lack of peer review, a significant number have poor educational value due to having no commentary or containing errors. The number of "likes

  9. Partitioning-based mechanisms under personalized differential privacy.

    Science.gov (United States)

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  10. Encrypted Signal Processing for Privacy Protection

    NARCIS (Netherlands)

    Cavallaro, A.; Lagendijk, R. (Inald) L.; Erkin, Zekeriya; Erkin, Zekeriya; Kwasinski, A.; Barni, Mauro

    In recent years, signal processing applications that deal with user-related data have aroused privacy concerns. For instance, face recognition and personalized recommendations rely on privacy-sensitive information that can be abused if the signal processing is executed on remote servers or in the

  11. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  12. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  13. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  14. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  15. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  16. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  17. Reconsidering the Right to Privacy in Canada

    Science.gov (United States)

    Shade, Leslie Regan

    2008-01-01

    This article argues that post-September 11 political debates and legislation around security necessitates a reconsideration of a right to privacy in Canada. It looks at the proposal for a Canadian Charter of Privacy Rights promoted by Senator Sheila Finestone in the late 1990s and the current challenges of emergent material technologies…

  18. Revocable Privacy 2011 – use cases

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2012-01-01

    In this document we have described and partially analysed a number of use cases where revocable privacy can help in providing more privacy for the user. We have seen that the use cases can be classified based primarily on the type of rule they encode. We classified threshold based, time based and

  19. Technology, Privacy, and Electronic Freedom of Speech.

    Science.gov (United States)

    McDonald, Frances M.

    1986-01-01

    Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…

  20. Revocable privacy: Principles, use cases, and technologies

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the

  1. 77 FR 4645 - Privacy Act Implementation

    Science.gov (United States)

    2012-01-31

    ... toll-free numbers), Federal Housing Finance Agency, 400 Seventh Street, SW., Eighth Floor, Washington... Part 1204 Amendment, Appeals, Correction, Disclosure, Exemptions, Fees, Privacy, Privacy Act, Records... G Street, NW., Washington, DC 20552'' to read as ``400 Seventh Street, SW., Eighth Floor, Washington...

  2. Mobile video with mobile IPv6

    CERN Document Server

    Minoli, Daniel

    2012-01-01

    Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of traditional advertising revenues. Infrastructure providers also need to position themselves to take advantage of these trends. Mobile Video with Mobile IPv6provides an overview of the current mobile landscape, then delves specifically into the capabilities and operational details of IPv6. The book also addresses 3G and 4G services, the application of Mobile IPv6 to streaming and other mobil

  3. Playing prosocial video games increases the accessibility of prosocial thoughts.

    Science.gov (United States)

    Greitemeyer, Tobias; Osswald, Silvia

    2011-01-01

    Past research has provided abundant evidence that playing violent video games increases aggressive tendencies. In contrast, evidence on possible positive effects of video game exposure on prosocial tendencies has been relatively sparse. The present research tested and found support for the hypothesis that exposure to prosocial video games increases the accessibility of prosocial thoughts. These results provide support to the predictive validity of the General Learning Model (Buckley & Anderson, 2006) for the effects of exposure to prosocial media on social tendencies. Thus, depending on the content of the video game, playing video games can harm but may also benefit social relations.

  4. Designing with video focusing the user-centred design process

    CERN Document Server

    Ylirisku, Salu Pekka

    2007-01-01

    Digital video for user-centered co-design is an emerging field of design, gaining increasing interest in both industry and academia. It merges the techniques and approaches of design ethnography, participatory design, interaction analysis, scenario-based design, and usability studies. This book covers the complete user-centered design project. It illustrates in detail how digital video can be utilized throughout the design process, from early user studies to making sense of video content and envisioning the future with video scenarios to provoking change with video artifacts. The text includes

  5. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  6. An improvement analysis on video compression using file segmentation

    Science.gov (United States)

    Sharma, Shubhankar; Singh, K. John; Priya, M.

    2017-11-01

    From the past two decades the extreme evolution of the Internet has lead a massive rise in video technology and significantly video consumption over the Internet which inhabits the bulk of data traffic in general. Clearly, video consumes that so much data size on the World Wide Web, to reduce the burden on the Internet and deduction of bandwidth consume by video so that the user can easily access the video data.For this, many video codecs are developed such as HEVC/H.265 and V9. Although after seeing codec like this one gets a dilemma of which would be improved technology in the manner of rate distortion and the coding standard.This paper gives a solution about the difficulty for getting low delay in video compression and video application e.g. ad-hoc video conferencing/streaming or observation by surveillance. Also this paper describes the benchmark of HEVC and V9 technique of video compression on subjective oral estimations of High Definition video content, playback on web browsers. Moreover, this gives the experimental ideology of dividing the video file into several segments for compression and putting back together to improve the efficiency of video compression on the web as well as on the offline mode.

  7. Compression evaluation of surgery video recordings retaining diagnostic credibility (compression evaluation of surgery video)

    Science.gov (United States)

    Duplaga, M.; Leszczuk, M. I.; Papir, Z.; Przelaskowski, A.

    2008-12-01

    Wider dissemination of medical digital video libraries is affected by two correlated factors, resource effective content compression that directly influences its diagnostic credibility. It has been proved that it is possible to meet these contradictory requirements halfway for long-lasting and low motion surgery recordings at compression ratios close to 100 (bronchoscopic procedures were a case study investigated). As the main supporting assumption, it has been accepted that the content can be compressed as far as clinicians are not able to sense a loss of video diagnostic fidelity (a visually lossless compression). Different market codecs were inspected by means of the combined subjective and objective tests toward their usability in medical video libraries. Subjective tests involved a panel of clinicians who had to classify compressed bronchoscopic video content according to its quality under the bubble sort algorithm. For objective tests, two metrics (hybrid vector measure and hosaka Plots) were calculated frame by frame and averaged over a whole sequence.

  8. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user......’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus’ discussion of self......-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy...

  9. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  10. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  11. Privacy Preservation in Distributed Subgradient Optimization Algorithms.

    Science.gov (United States)

    Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng

    2017-07-31

    In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.

  12. HIPAA compliance and patient privacy protection.

    Science.gov (United States)

    Grandison, Tyrone; Bhatti, Rafae

    2010-01-01

    Recent prosecution of violations of the Health Insurance Portability and Accountability Act (HIPAA), and the amendments currently in process to strengthen the Act of 1996, has led many companies to take serious notice of the measures they must take to be a compliance. A company's privacy policy states the business' privacy practices and embodies the firm's commitments to its users and is normally mandatory step in reaching legislative compliance. in the face of this, the patient has to decipher if the company's privacy practices are congruent with their thoughts on the level of privacy protection they should be receiving. This is the core of our investigation. In this paper, we explore the question "Is a healthcare entity's compliance with regulation sufficient to provide the patient with adequate privacy protection?" in the context of the United States of America.

  13. A system for endobronchial video analysis

    Science.gov (United States)

    Byrnes, Patrick D.; Higgins, William E.

    2017-03-01

    Image-guided bronchoscopy is a critical component in the treatment of lung cancer and other pulmonary disorders. During bronchoscopy, a high-resolution endobronchial video stream facilitates guidance through the lungs and allows for visual inspection of a patient's airway mucosal surfaces. Despite the detailed information it contains, little effort has been made to incorporate recorded video into the clinical workflow. Follow-up procedures often required in cancer assessment or asthma treatment could significantly benefit from effectively parsed and summarized video. Tracking diagnostic regions of interest (ROIs) could potentially better equip physicians to detect early airway-wall cancer or improve asthma treatments, such as bronchial thermoplasty. To address this need, we have developed a system for the postoperative analysis of recorded endobronchial video. The system first parses an input video stream into endoscopic shots, derives motion information, and selects salient representative key frames. Next, a semi-automatic method for CT-video registration creates data linkages between a CT-derived airway-tree model and the input video. These data linkages then enable the construction of a CT-video chest model comprised of a bronchoscopy path history (BPH) - defining all airway locations visited during a procedure - and texture-mapping information for rendering registered video frames onto the airwaytree model. A suite of analysis tools is included to visualize and manipulate the extracted data. Video browsing and retrieval is facilitated through a video table of contents (TOC) and a search query interface. The system provides a variety of operational modes and additional functionality, including the ability to define regions of interest. We demonstrate the potential of our system using two human case study examples.

  14. Exploring University Students' Engagement with Online Video Lectures in a Blended Introductory Mechanics Course

    CERN Document Server

    Lin, Shih-Yin; Seaton, Daniel T; Douglas, Scott S; Greco, Edwin F; Thoms, Brian D; Schatz, Michael F

    2016-01-01

    The advent of MOOCs has stimulated interest in using online videos to deliver content in university courses. We examined student engagement with 78 online videos that we created and were incorporated into a one-semester blended introductory mechanics course at the Georgia Institute of Technology. We found that students were more engaged with videos that supported laboratory activities than with videos that presented lecture content. In particular, the percentage of students accessing laboratory videos was consistently greater than 80 percent throughout the semester while the percentage of students accessing lecture videos dropped to less than 40 percent by the end of the term. Moreover, students were more likely to access the entirety of a laboratory video than a lecture video. Our results suggest that students may access videos based on perceived value: students appear to consider the laboratory videos as essential for successfully completing the laboratories while students appear to consider the lecture vid...

  15. Social Media Users’ Legal Consciousness About Privacy

    Directory of Open Access Journals (Sweden)

    Katharine Sarikakis

    2017-02-01

    Full Text Available This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.

  16. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...... space with the stonecutters, the cemetery, and the grave, and the emotional space of significance and forms of expression. In this study, the gravestones with QR codes act as a prism for cultural change within the subjects of death, bereavement and memorials. The ongoing negotiation of definitions...

  17. 77 FR 64340 - Announcement of Requirements and Registration for Cancer Care Video Challenge

    Science.gov (United States)

    2012-10-19

    ... employee of an affiliate, subsidiary, advertising agency, or any other company involved in marketing a..., effort to show quality of the video content, narrative and visual appearance will be assessed.) 4. Video...

  18. Smoking in Video Games: A Systematic Review.

    Science.gov (United States)

    Forsyth, Susan R; Malone, Ruth E

    2016-06-01

    Video games are played by a majority of adolescents, yet little is known about whether and how video games are associated with smoking behavior and attitudes. This systematic review examines research on the relationship between video games and smoking. We searched MEDLINE, psycINFO, and Web of Science through August 20, 2014. Twenty-four studies met inclusion criteria. Studies were synthesized qualitatively in four domains: the prevalence and incidence of smoking imagery in video games (n = 6), video game playing and smoking behavior (n = 11), video game addiction and tobacco addiction (n = 5) and genre-specific game playing and smoking behavior (n = 3). Tobacco content was present in a subset of video games. The literature is inconclusive as to whether exposure to video games as a single construct is associated with smoking behavior. Four of five studies found an association between video game addiction and smoking. For genre-specific game playing, studies suggest that the type of game played affected association with smoking behavior. Research on how playing video games influences adolescents' perceptions of smoking and smoking behaviors is still in its nascence. Further research is needed to understand how adolescents respond to viewing and manipulating tobacco imagery, and whether engaging in game smoking translates into changes in real-world attitudes or behavior. Smoking imagery in video games may contribute to normalizing adolescent smoking. A large body of research has shown that smoking imagery in a variety of media types contributes to adolescent smoking uptake and the normalization of smoking behavior, and almost 90% of adolescents play video games, yet there has never been a published systematic review of the literature on this important topic. This is the first systematic review to examine the research on tobacco and video games.We found that tobacco imagery is indeed present in video games, the relationship between video game playing and smoking

  19. Do-It-Yourself Whiteboard-Style Physics Video Lectures

    Science.gov (United States)

    Douglas, Scott Samuel; Aiken, John Mark; Greco, Edwin; Schatz, Michael; Lin, Shih-Yin

    2017-01-01

    Video lectures are increasingly being used in physics instruction. For example, video lectures can be used to "flip" the classroom, i.e., to deliver, via the Internet, content that is traditionally transmitted by in-class lectures (e.g., presenting concepts, working examples, etc.), thereby freeing up classroom time for more interactive instruction. To date, most video lectures are live lecture recordings or screencasts. The hand-animated "whiteboard" video is an alternative to these more common styles and affords unique creative opportunities such as stop-motion animation or visual "demonstrations" of phenomena that would be difficult to demo in a classroom. In the spring of 2013, a series of whiteboard-style videos were produced to provide video lecture content for Georgia Tech introductory physics instruction, including flipped courses and a MOOC. This set of videos (which also includes screencasts and live recordings) can be found on the "Your World is Your Lab" YouTube channel. In this article, we describe this method of video production, which is suitable for an instructor working solo or in collaboration with students; we explore students' engagement with these videos in a separate work. A prominent example of whiteboard animation is the "Minute Physics" video series by Henry Reich, whose considerable popularity and accessible, cartoony style were the original inspiration for our own video lectures.

  20. Acoustic Neuroma Educational Video

    Medline Plus

    Full Text Available ... support group for me? Find a Group Upcoming Events Video Library Photo Gallery One-on-One Support ... group for me? Find a group Back Upcoming events Video Library Photo Gallery One-on-One Support ...