Search results for "G400"

showing 3 items of 3 documents

Validating retinal fundus image analysis algorithms: issues and a proposal.

2013

This paper concerns the validation of automatic retinal image analysis (ARIA) algorithms. For reasons of space and consistency, we concentrate on the validation of algorithms processing color fundus camera images, currently the largest section of the ARIA literature. We sketch the context (imaging instruments and target tasks) of ARIA validation, summarizing the main image analysis and validation techniques. We then present a list of recommendations focusing on the creation of large repositories of test data created by international consortia, easily accessible via moderated Web sites, including multicenter annotations by multiple experts, specific to clinical tasks, and capable of running …

Computer programFundus OculiCost effectivenessbusiness.industryComputer scienceReproducibility of ResultsContext (language use)Image processingArticlesG400 Computer ScienceReference StandardsSketchOphthalmoscopyConsistency (database systems)SoftwareRetinal DiseasesImage Processing Computer-AssistedHumansbusinessAlgorithmAlgorithmsSoftwareTest data
researchProduct

Getting Connected

2009

The large scale deployment of mobile applications inevitably impacts upon our culture as a whole and affects more intimately our daily lives. Not all of these effects are desirable. In a market economy, ethical issues are not the most important drivers in the development of technology. In this article, we ask whether the mobile human-computer interaction community could take an active role in discussing ethical issues. In so doing we could focus our attention on developing technology for ‘human beings’ rather than fine tuning our emerging gadgets.

Human-Computer InteractionEthical issuesManagement scienceSoftware deploymentbusiness.industryG400Scale (social sciences)Internet privacyBusinessInternational Journal of Mobile Human Computer Interaction
researchProduct

Using protection motivation theory in the design of nudges to improve online security behavior

2019

Abstract We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote se…

Online securityCoping (psychology)Nudge theoryG40005 social sciencesApplied psychologyGeneral EngineeringAppealHuman Factors and Ergonomics02 engineering and technologyBehavioral economicsFear appealC800EducationHuman-Computer InteractionProtection motivation theoryHardware and Architecture020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingInternet usersPsychologySoftwareInternational Journal of Human-Computer Studies
researchProduct