You are on page 1of 98

Web Science

Centre for Doctoral Training

October 2015

Web Science
Centre for Doctoral Training
The Centre for Doctoral Training in Web Science is funded by the
EPSRC, and underlines Southamptons pre-eminence in this new
research discipline. Web Science has an ambitious agenda. It is
inherently interdisciplinary as much about social and organisational
behaviour as about technology. Its research programme targets the
Web as a primary focus of attention, adding to our understanding of
its architectural principles, its development and growth, its capacity
for furthering global knowledge and communication, and its inherent
values of trustworthiness, privacy and respect for social boundaries.
The first year of the training programme is a taught MSc and includes
short courses and project work tailored to each students research
interests. This is followed by three years of challenging and original
research at PhD level.
This booklet details the current MSc students academic and
professional backgrounds along with their research plans for the future.
It also includes a research poster from each of our PhD researchers.
The Digital Economy Theme is a Research Councils UK cross council
initiative led by EPSRC and contributed to by AHRC, ESRC, and MRC.
This work was supported by the EPSRC through grants EP/G036926/1
and EP/L016117/1.

Content
Biography | MSc Students 2015
Lia ANGGRAINI

Clarissa BROUGH

Jo DIXON

Ryan JAVANSHIR

Louise KEEN

Anna KENT-MULLER

Daniella MALLER

Bartosz PASCZA

Maria PRIESTLEY

Fernando Santos SANCHEZ

Vera SHCHERBINA

Chira TOCHIA

Clare WALSH

Research Posters | PhD Researchers 2014 2018


Christopher ADETUNJI

Enterprise Mobility And Big Data Analytics: A Leverage For Corporate Knowledge
Management

Nada AL BUNNI

Investigating The Online Public Sphere For The Arabic World

Neil AMOS

Social Media And The Far Right: Web 2.0, Opportunity For The English Defence
League?

10

Nicholas BENNETT

Team Sponsorship in eSports: Legitimising Or Corrupting Play?

11

Nicholas FAIR

A Framework For Understanding Personal Learning Networks

12

Paul GILBERT

A Web Observatory For Mapping Web Information

13

Briony GRAY

Social Media And Natural Disasters: A Framework For Web 2.0

14

Sarah HEWITT

Misogynist Language On Twitter: The New Lingua Franca?

15

Dola MAJEKODUNMI

Investigating Customer Attitudes And Preferences In Social Media Banking

16

Rafael MELGAREJO-HEREDIA

Public Web

17

Keisha TAYLOR

Moving Beyond Local To Assess How Intangible Assets Are Developed By Micro, Small
And Medium Enterprises (MSMEs) On The Global Web

18

Gefion THUERMER

Use Of The Web In Decision-Making Processes In Political Parties

19

Niko TSAKALAKIS

Identity Assurance: Technical Implementation In The UK And Its Legal Implications

20

Jack WEBSTER

Music Recommender Systems As Cultural Intermediaries: A Theoretical Framework

21

Research Posters | PhD Researchers 2013 2017


Mark ANDERSON

Hypertext Knowledge:// Farmers, Fettlers Or Flaneurs?

22

Elisabeth COSKUN

Emerging A Web Science Curriculum Overview

23

Emma CRADOCK

Understanding How To Talk Formally About Personal Data To Make Data Processing
More Transparent

24

Michael DAY

Digital Citizenship: An Interdisciplinary Reconstruction Of Digital Citizenship To Build


A Stronger Foundation For A Future Pro-Human Web

25

Conrad DSOUZA

Predicting Selections From Past Performance Data: A Case Study Predicting Winners
Of Horse Racing

26

Faranak HARDCASTLE

Back On The Track Of Do Not Track: Raising Transparency In The Online Behavioural
Tracking Ecosystem

27

Laura HYRJAK

Youth, Drugs And The Web: Exploring Youths Use Of The Web To Access And
Research NPS

28

Sami KANZA

Bringing The Modern Power Of The Web To Chemical Research

29

Amy LYNCH

Examining The Activated Patient: A Qualitative Study Of How And Why Diabetic
Patients Use The Web To Aid Self-Management Of Their Disease

30

Neil MACEWAN

Navigating The Dangers Of Victim Blaming And Scapegoating Within UK Cyber


Security

31

Joanna MUNSON

Online Grocery Consumption

32

Jessica OGDEN

Institutional Repositories On The Web: Intersecting Narratives And Technical Code

33

Tim ORIORDAN

Measuring Cognitive Activity In Online Comments

34

Alexander OWEN

Styling The Internet Of Things

35

Sophie PARSONS

Exploring The Use Of Social Media In UK Emergency Response

36

Alan PONCE

Open Data And Entrepreneurship: An Economic Perspective

37

Neal REEVES

From Crowd To Community: Use Of Community Features To Encourage


Contributions In Online Citizen Science

38

Gert JAN VAN HARDEVELD

Online Criminal Transaction Processes: Using Crime Script Analysis To Identify


Interceptive Opportunities

39

Johanna WALKER

The Risks And Barriers Of Open Data: An Entrepreneurial Perspective

40

Anna WESTON

Developing A Framework For Understanding (Dis)Engagement In Digital Behaviour


Change Interventions

41

Peter WEST

The Quantified Self In Clinical Decision Making

42

Steven WHITE

Aligning Learning Theory, Learning Design And Trust In MOOCs

43

Research Posters | PhD Researchers 2012 2016


James BAKER

Immersion In Serious Games: A Model For Immersive Factors In Educational Games

44

Gareth BEESTON

Innovation Competitions On The Web: An Analysis Of Open Data Usage In Innovation


Production To Tackle Social Challenges

45

Robert BLAIR

Is Social Media Being Used To Support Non-Formal Learning By School Children?

46

Ian BROWN

The DNA Of Web Observatories

47

Jennifer GASKELL

The Role Of ICTs For Post-Conflict Peacebuilding

48

Lawrence GREEN

Using Web Based Information In Decision Making

49

Caroline HALCROW

Modeling Online/Offline Community

50

William LAWRENCE

The Investor Decision Making Process - A Web Science Perspective

51

Manuel LEN URRUTIA

Understanding Attitudes Towards MOOCs In Higher Education Institutions

52

Evangelia PAPADAKI

The Role Of Internet Service Providers In Improving Cybersecurity: An


Interdisciplinary Approach

53

Elzabi RIMMINGTON

How Do We Build Society In Game Worlds?

54

Keiran RONES

The Web And Digital Pirates: Who Are Pirates And Do They Understand The Law?

55

Eamonn WALLS

How To Make The World A Better Place In 5 Easy Steps

56

Abigail WHITMARSH

Revenge Pornography

57

Research Posters | PhD Researchers 2011 2015


Reuben BINNS

Personal Data And Transparency

58

Paul BOOTH

Visual Analytics: The Framing Of Data & User Behaviour

59

Timothy DAVIES

Shaping The Civic Impacts Of Open Data On The Web

60

Maire BYRNE-EVANS

Classifying Policing Social Machines

61

Gemma FITZSIMMONS

Skim Reading: An Adaptive Strategy For Reading On The Web

62

Mark FRANK

Open Data And Democratic Participation In UK Local Government

63

Dominic HOBSON

What Impact Has The Technology Behind Cryptocurrencies Had On Cybercrime,


Security And Policing?

64

Alison KNIGHT

Identity Linkability And Attribution: Digital Challenges For Law And Policy

65

Ching Man (Mandy) LO

Handwriting Recognition For Online Mathematics Communication

66

David MATTHEWS

Expanding Graphs: Symmetry In Complex Networks

67

Rebecca NASH

Making Bodies: What Is The Role Of The Web On Womens Engagement With
Aesthetic Surgery??

68

Javier PEREDA

Enhancing Engagement With Online Cultural Heritage

69

Research Posters | PhD Researchers 2010 2014


Craig ALLISON

Orienting Within Complex Digital Environments: Bridging The Gap Between The
Inside And Out To Reduce Disorientation

70

Nicole BEALE

Memory Institutions And The Web

71

Jaymie CAPLEN

Online Behaviour Of States: The Effect Of Different Strategies On Populations And


International Relations

72

Huw DAVIES

Abandoned Youth? The Problem Of Youths Lack Of Digital Literacy

73

Huw FRYER

Reimagining The Public Health Analogy For Web Security

74

William FYSON

Dissemination & Disaggregation

75

Paul GASKELL

Predicting Stock Prices With Online Information

76

Richard GOMER

Privacy Choices & Informed Consent

77

Christopher HUGHES

A Multi-Dimensional Framework Of The ICT Innovation System: An Agent Based


Approach For Policy Making

78

Terhi NURMIKKO

Web Science For Ancient History: Deciphering Proto-Elamite Online

79

Christopher PHETHEAN

Revealing The Value Of Social Media For Charitable Organisations

80

Olivier PHILIPPE

How Can We Develop Sociological Approaches To Design A New Model For


Understanding Relationships On The Web

81

Lisa SUGIURA

Buying Medicine From The Web

82

Jack TOWNSEND

Digital Taxonomy For Sustainability

83

Philip WADDELL

Exploring The Use Of The Web In Global Justice Networks

84

Research Posters | PhD Researchers 2009 2013


Laura GERMAN

Academic Research Data Re-usage In A Digital Age: Modelling Best Practice

85

Sarosh KHAN

The Emergent Threat Of Defamation Online: The Need For A New Model Governing
Online Defamation With The Emergence Of Social Web Technologies

86

Russell NEWMAN

Modelling Speculative Behaviour In Web 2.0 And Social Media Companies

87

Ramine TINATI

Flow140: Tracing The Flow Of Conversations

88

Michael YIP

A Social Network Approach to Cybercrime Disruption

89

Aristea-Maria ZAFEIROPOULOU

A Framework For Analysing Location Data

90

MSc Students 2015

Lia ANGGRAINI
lpa1u14@soton.ac.uk
BA Computer Science, Kwik Kian Gie School of Business
Upper Second Class Honours (2:1)
I am interested in the implementation of integrated e-government systems. These
allow seamless interconnectivity and automated interaction between citizen and
government, and other stakeholders. A Web-based solution will empower the
government to optimise their activities (especially in solving public issues) and to
reduce potential misconduct in bureaucracy.

Clarissa BROUGH
cb1g15@soton.ac.uk
MRes Humanities (Music), Keele University
Merit
BA Dual Honours, English and Music, Keele University
1st Class Honours
My research interests reside in investigating how sociological behaviours and the
technical processes of the Web can construct our identity, in particular our musical
identity. This area of research is becoming ever more relevant with the growth of
online music networks, such as Spotify and Apple Music. These services provide
open forums for listening, sharing and rating music. Users can create dedicated
artist and genre communities by sharing and recommending music, or posting
messages. I am interested in researching how these online music networks serve as
arenas for an internet based reality where individual and collective identities can be
formed, a type of self-definition. I am particularly looking forward to how the iPhD
will broaden my knowledge of the alliance between technology and identity as well
as the technical processes behind online music networks.

MSc Students 2015

Jo DIXON
jmd3g10@soton.ac.uk
PGCE, University of Southampton
Pass
M.Ed English Language Teaching, University of Sheffield
Pass
BA Modern Languages, University of Sheffield
1st Class Honours
While I have found it easy to make the Web work for me, personally and
professionally, I am acutely aware that not everybody does. I work with people
who face various barriers to accessing or making effective use of the Internet, and
Im interested in the best ways of supporting them to develop Web literacy (and,
indeed, what that means, or should mean, or might come to mean), especially adults
with language or literacy difficulties. I have a particular interest in the mobile Web
and its implications for teaching and learning with and about the Web.

Ryan JAVANSHIR
rj1g15@soton.ac.uk
MSc Computing, Oxford Brookes University
Pass
LLB Law, University of Portsmouth
Upper Second Class Honours (2:1)
I am interested in e-learning, specifically learning through simulations using Virtual
Reality technologies. I am also interested in computer games, how the Web has
affected them and the future of playing games online.

@OhMyReza
www.kuchalu.co.uk

MSc Students 2015

Louise KEEN
lk1g15@soton.ac.uk
BSc Information and Library Studies, Aberystwyth University
1st Class Honours
My undergraduate dissertation focused around how public libraries use social
media for the marketing of their services. I plan to expand upon this and investigate
how libraries could use social media. I also find website design, information
architecture, infographics and online gaming interesting.

uk.linkedin.com/in/louisejkeen
@louisylou

Anna KENT-MULLER
alkm1g12@soton.ac.uk
BA in Music, University of Southampton
1st Class Honours
I am interested in the link between music and the Web. This research area includes
investigating the role of the Web in the evolution of the music business, specifically
focusing on music distribution applications, and the changes affecting the
recording industry. I am also interested in online music representation, looking into
music encoding, and how we can develop these initiatives to enable greater music
distribution and music access online.

uk.linkedin.com/in/annalouisekentmuller
@Anna_93
annakentmuller.wordpress.com

MSc Students 2015

Daniella MALLER
dm4g15@soton.ac.uk
MSc Information Science, University College London
Distinction
BA Fine Art, London Metropolitan University
Upper Second Class Honours (2:1)
The Internet and the Web are considered to be the main facilitators of the
Information Revolution. World history attests that revolutions do not always
deliver the result they intended. Among pioneers who developed the Web were
Libertarians that believed it will promote personal and social freedoms. Yet
nowadays it is also used for surveillance and for curtailing freedom. It is almost
inevitable that the Web will further influence the way we participate in politics
and economics, what is not clear is how and to what extent. I am interested in
considering the possible ways the Web could change the structures of democratic
societies and how individuals will relate to it. The sharing economy, online petitions
and e-governments are only a few examples of areas I would like to research.

Bartosz PASCZA
bp11g12@soton.ac.uk
BSc Physics, University of Southampton
1st Class Honours
One of my fields of interest is scientific communication on the Web and
the development of metrics of Science. In my opinion, the Web provides an
opportunity for more accurately and successfully measuring the quality of scientific
work. In addition, I am interested in how data analysis can benefit cities. The term
Smart Cities seems to be not only a buzzword, but also a real opportunity to foster
community governance, transparency of local government, and improve municipal
services.

uk.linkedin.com/in/paszcza
@bpaszcza
about.me/bartosz_paszcza

MSc Students 2015

Maria PRIESTLEY
mp5g15@soton.ac.uk
BSc Biological Anthropology, Durham University
1st Class Honours
Currently I am interested in applying evolutionary approaches to study the dynamic
nature of the Web. This includes trying to understand the processes through which
cultural norms and social networks develop, as well as identifying factors that
influence the spread and popularity of online content.

Fernando Santos SANCHEZ


fss1g15@soton.ac.uk
MSc Electrical Engineering, University of Guadalajara
Distinction
BSc Computer Engineering, University of Guadalajara
1st Class Honours
I regard the Web as a tool. Specifically, its a platform that enables the
communication and sharing resources between users at a global level. But I have
also realized that is not only a network of computers and cables but the conjunction
of ideas, views, problems and solutions for every area in modern societies. As a
result, I am interested in exploring the idea of Emotional and Sentimental Analysis
within the Web.

MSc Students 2015

Vera SHCHERBINA
vss2g15@soton.ac.uk
MA Religious Studies, Lomonosov Moscow State University
Merit
Im particularly interested in remote working through the Web and the social
transformation caused by this phenomenon. In addition, I would like to explore how
user generated content (usage logs) can be used in Social research. However, I am
also intrigued by the role of the Web in Russia and Eastern Europe.

Chira TOCHIA
cnt1g15@soton.ac.uk
BA Advertising and Marketing Communication,
Bournemouth University
Upper Second Class Honours (2:1)
Although I want to further my research on social networks and the challenges
it puts on what are considered to be social behaviour norms. Im really looking
forward to the module on Computational Thinking so I can build a solid foundation
of knowledge in the more hands on and technical aspects of Web Science.

linkedin.com/pub/chira-tochia/33/604/906
@chiratochia

MSc Students 2015

Clare WALSH
cew2g15@soton.ac.uk
Post Graduate Study in Education, University of Javeriana
Pass
BA English and American Studies, Keele University
Lower Second Class Honours (2:2)
I am interested in teaching methodologies in e-learning, and Learner Analytics with
a view to supporting and enhancing learning. There is a lack of inter-disciplinary
skills in this field, and an urgent need for more qualified people to interpret the way
that technology can be used to enhance learning in a traditional ESL (English as a
Second Language) classroom environment. I am hoping through Web Science to be
able to understand the potential for Learner Analytics, and other technologies, to
be used in an integrated manner with other existing teaching methodologies.

linkedin.com/pub/clare-walsh/8/9b0/8a0

Research Posters | PhD Researchers 2014 2018

Web Science Institute


School of Electronics
and Computer Science

Enterprise Mobility and Big Data Analytics:


A Leverage for Corporate Knowledge Management

Corporate
Knowledge Flow

Corporate
Knowledge Flow

Introduction

Research Questions

The consumerisation of mobile devices has helped in popularising the trends and

1. What factors influence the awareness and adoption of these innovative Web
technological trends within a corporate organisation?

concepts of Enterprise Mobility and Social Networking as they have pervaded within
the spectrums of Employee-owned and/or company-owned devices. Consequently, an
enormous amount of rapid and varied data is being produced and also available for

2. To what extent has Enterprise Mobility enhanced social networking within the
organisation and how have both trends impacted employee engagement and
knowledge sharing?

organisations insight like never before, resulting in the exigency of Big Data
Analytics. This research is therefore, focused on how to exploit the convergence of

3. How can Big Data Analytics be exploited to elicit knowledge from a convergence of
Enterprise Mobility, Social Networking and external data sources?

Enterprise Mobility and Big Data Analytic for knowledge capture and sharing, with
the aim of making KM deliver value to corporate organisations.!

Hypothesis

Preliminary Experiment

1. Given the effective use of current and emerging Web innovations and
technologies, Knowledge Management will remain a viable and sustainable
management tool and field of practice for the foreseeable future.

A case of a medium-scale enterprise with about 200 employees in Hampshire was


studied. Having recently deployed a suite of mobile apps and devices in support of its
operations, the experiment explored the value of hardening the enterprise mobility
agenda with knowledge sharing and discovery from Enterprise Social Networking.

2. Liberalised Enterprise Mobility policies would improve employees motivation and


engagement and thereby help organisations derive values from Knowledge
Management.
3. There are measurable and valuable insights to be derived from a corporate
implementation of Big Data Analytics of its mobility and social data.

A Ph.D Research by:


Christopher Adetunji
(ca6g14@soton.ac.uk)

To prove the concept, about 150,000 domain-specific tweets were polled from Twitters
Streaming API in a week. Using text analytics techniques, actionable knowledge and
strategic insights were discovered from the data polled. As the value of the discovery is
in its potential to drive it towards strategic competitive advantage, the company
officially decided to uphold and implement the knowledge gained from the experiment.

Supervisors:
Prof. Leslie Carr
(lac@soton.ac.uk)

Research Posters | PhD Researchers 2014 2018

The Studied Problem


Arab states have experienced tremendous social and
political upheaval recently. These upheavals are
significant not only for those states, but also the
consequences on traditional social patterns and the
impact on radically altered lives. Traditions have lost
their decisive role in the destiny of the people in
these situations.
Social divisions caused by civil war and the diasporas
that follow wholesale destruction have, however,
been penetrated by the use of new networking
technology that provides people with different
opportunities of connectivity and opens new venues
for diverse civil society groups to act as political
agents.
Social media has provided people with a medium not
only to vent their rage and despair, but also to
rethink their identities and values beyond the
traditional forms . This paper examines the transition
from highly regulated and controlled web by
authoritarian regimes over the mass media and all
other traditional mediums to the current context of
online connectivity. Some authors suggest that the
online social networks are enabling the emergence
of a new Arab public sphere.

Proposed Approach
A macro-level exploration of the Arab public sphere is

Abstract
The political and social movements in the Arab world have received wide media
coverage in the western countries and have emphasized the role of social media in
such movements. The literature on the Arab Spring has generated many questions
yet to be addressed in order to fully understand how the social media affected and
continue to affect the public in the Arab states. This work aims to study the
emergence of online public sphere for the Arab users. The concept of public sphere
identifies historical formation of democratic societies and it also posits a model of
what an ideal society should be. This makes it a good candidate to use as
theoretical framework in order to understand the role of social media in the Arab
states. The statistical indicators suggest Facebook is providing a sphere for public
to discuss their public concerns. This research will use the techniques of social
network analysis to analyse the structure and the participants of this sphere and
how it is evolving during the political and social movements.

Research Motivations
Although there is a rich literature that has been dedicated to
study the recent social and political movements in the Arab
states as a manifestation of the potentials of the online social
networks, this literature has generated more questions to
research on.
o Why Arab states have experienced different scenarios and
various outcomes of their uprisings during the Arab Spring.
o The impact of social media on politics is continuous and it
requires ongoing observation and analysis.
o Identifying the actors and explore how web empowers them.
o Recognize the
spheres.

identities chosen by users

in the online

problematic as the generalisation over the states would


minimise the effect of different scenarios of the events and
the initial political and economical differences of these
countries. My work proposes understanding the macro
phenomenon of the upheavals of the Arab states by

Research Questions

exploring the meso and micro views of these changes.

The research questions we would like to answer are:

This work is suggesting network science as a method to do this. In particular

the study of the social graph of Facebook over time to observe the changes
in Arab public sphere as they manifest in the pattern of fragmentation in the
Facebook network.
Dr Jeff Vass
Dr David Milland
jmv@soton.ac.uk
dem@soton.ac.uk
Social Sciences
Web Science DTC
University of
University of
Southampton
Southampton
Nada AL BUNNI
na11g10@soton.ac.uk
Web Science DTC
University of
Southampton

Are the social patterns that exist in the offline


world reproduced in the online public sphere?

Do these social patterns in the online public


spaces evolve over the time?

What strategies have the Arab users adapted to


deal with the social patterns?

Research Posters | PhD Researchers 2014 2018

10

Research Posters | PhD Researchers 2014 2018

11

Research Posters | PhD Researchers 2014 2018

Nic Fair N.S.R.Fair@soton.ac.uk


www.nicfair.co.uk

A Framework for understanding Personal Learning Networks


In a networked society, many individuals learn by autonomously creating, cultivating and activating relationships with the
people, organisations, devices and services around them in order to efficiently gather information from distributed on- and
offline sources. These relationships form their Personal Learning Network (PLN). PLNs are egocentric, socio-contextually
dependent, complex and used in different ways for different purposes in different learning contexts. They are a powerful,
modern tool through which formal and non-formal learning can occur, as they reflect the wider social changes resulting
from the World Wide Web and mobile communication technology.
The Framework for Understanding Personal Learning Networks draws conceptually on the Social Sciences approaches of
Actor Network Theory and Situational Analysis; the Educational theory of Connectivism; and the Network Science
toolkit of Social Network Analysis. It uses quantitative data to describe what PLNs look like and qualitative data to explain
why they look like that. Interaction patterns occurring across PLNs can be identified and used to inform educational
pedagogy, methodology and instructional design.
Example Social Network Graph

Example Technological Network Graph

Example Purposive Network Graph


A single Case Study records all PLN interactions over a given period using a
bespoke recording table designed for maximum data capture with minimum effort. Three network graphs are the result, representing the component Social Network / Technological Network / Purposive Network.
Where relevant the graphs can be filtered by mode of interaction (on/
offline) and learning context (formal/non-formal) - see example opposite.
The Case Study sits at the centre of each network and the frequency of
interaction between nodes is represented by the width of the edges. It is
also possible to weight interactions by their duration.
Interaction patterns can be easily identified and then explained with the
socio-contextual data captured in post-data-collection, structured interview. Patterns can therefore be categorised as either specific to the Case
Studys context or generalizable across PLNs. General patterns can be used
to inform educational developments in networked learning.

12

Example Filtered Purposive Network Graph

Research Posters | PhD Researchers 2014 2018

13

Research Posters | PhD Researchers 2014 2018

Social Media and


Natural Disasters: A
Framework for Web 2.0

Briony Gray
University of
Southampton
Bjg1g11@soton.ac.uk

Background
In the past decade social media and the Web have played an increasing role in emergencies and disasters,
primarily as they offer a means of two-way reliable and accessible communication. Examples of social media
include Facebook, Twitter, blogs such as Wordpress, video channels such as Youtube, professional sites such
as LinkedIn and general forums. They are used in a number of ways which range from individuals passing on
warning information, to governments distributing real-time updates or advice during an event. Social media
and Web use during disasters may be conceptualised into two broad categories: the first is used to
disseminate information and to receive communications, the second is used as a management tool.
The impact of social media in disaster situations however is reliant on a number of underlying factors. These
have been synthesised into key overriding themes that existing literature highlight at emergent areas which
require further study. Firstly, accessibility to the Web and subsequently social media is a vital consideration
to the effectiveness of online disaster management strategies. Secondly, the reliability of online information
shared on social media and other forms of communication has a direct link to the level of risk an individual
is subject to. Thirdly, usability of online sources, tools, applications and channels has clear connotations to
how effective these resources may be used. While the utility of social media during disasters remains
intriguing, many applications, tools and platforms remain either speculative, in their infancy, or have been
subject to unexplained underlying factors that subvert their potential.

Methodology
In order for social media uses to be fully understood and integrated into disaster management the Web must also be
studied as it represents the intermediary between the individual, and online information. Related works synthesise
information regarding social media use/users and benefits/limitations in analysis frameworks for application to specific
disaster events, however these are lacking in key areas required for better understanding and improvements, and fail to
synthesise broad ranging information designed to be applied across multiple different disasters. This study sought to
address these gaps in knowledge by assessing the role of the Web in online disaster communications and questioning
whether this can be synthesised into disaster frameworks. Secondly, it questioned whether the incorporation of recent
literature is able to produce a more insightful analysis framework, and thus more detailed application. Finally, it sought
to evaluate whether the incorporation of an interdisciplinary perspective may broaden the explanations of said
framework, leading to more effective social media disaster management tools.
The qualitative nature of the study data, and the application to a number of varying case studies meant that a framework
was the most suitable way of synthesising information. To generate such a framework the study followed a number of
steps:
1.
2.
3.
4.
5.

Relevant literature was searched for and a database made of suitable articles. These were identified through
key term searches using Google and Academic databases. The shortlist contained 59 individual papers.
Grounded theory and inductive coding were applied to the shortlist of papers, which produced a series of
categories explaining how and why social media was used during disasters (according to the literature).
Each category had appropriate sections of papers slotted in according to theme and content. This produced
a framework of 44 categories which illustrated the range of uses for social media during a disaster.
The framework was then applied to a case study to demonstrate relevancy and insight to a disaster situation
where social media and Web 2.0 had been used, which exceeded the usefulness of other existing frameworks.
Suitable conclusions were drawn from the framework application, and future suggestions provided.

Results
The study produced a framework featuring 44 categories which took a number of considerations into account. These were broken down into the four key themes
highlighted by the literature review (accessibility, usability, reliability and effectiveness). They indicated several trends within the literature that previous
frameworks had not fully discussed or explained: firstly, there had been a rapid development in technology and software that was able to be utilised by disaster
management strategies. Secondly, there was a growing evaluation of the Web as the intermediary to social media. Finally, it was evident that offline and online
situations still differed dramatically, and that confusion between the two was a considerable limitation to the effective use of social media during disasters.

Accessibility A number of categories in the analysis framework indicated that Web accessibility remained a vital issue. This is because geographical differences
in location, household income, poverty levels, geographical internet spread and online authentication issues impacted who was able to gain access to the Web,
and therefore social media. Less economically developed countries were shown to have the lowest access to the Web during disasters, with ethnicity and location
also having a direct affect to Web access.

Reliability The reliability of information spread on social media was shown to be impacted in a number of ways throughout many framework categories. These
included unintentional spread of false information, malicious spread of information or terrorism, sharing information without verified sources or information
filtering systems not functioning as they were intended to. The categories however highlighted the fact that information reliability was an area in which individuals
and organisations were becoming increasingly critical of, leading to improved online information standards.

Usability The usability of the Web was broken down into two categories. The first was technical usability which involved the technical design, proficiency and
success of software and hardware during disasters. The framework found that this was the area in which huge improvements and investments were being made
both in research groups and on a governmental scale. These took the form of innovative tools, applications and protocols. Social usability involved the ability of
individuals to use the Web effectively and to understand the information on it. The framework showed that differences in computer literacy, the age at which
someone was first exposed to the Web, and how many technical devices and individual owned made an impact in management effectiveness.

Application and Future


Work

The framework was applied to a dataset of Tweets from Nepal during the earthquake in April 2015, demonstrating its applicability. This case was chosen as there was little academic literature that
analysed communications in detail from the disaster. In addition to this, the disaster saw high usage of social media during all phases of the event making analysis clearer and broader. The dataset
was collected by the Southampton Web Observatory and has a sample size of 10,000 tweets. The dataset was searched for key terms highlighted by previous Twitter studies as being relevant to
identify communication patterns. Key terms included words or phrases from the framework categories to show tweets with immediate relevancy such as #earthquake, help, #nepal,
#nepalearthquake2015, aid, donate, and support.
Accessibility issues were demonstrated by tweets which stated that local Nepalese people did not own, or owned fewer, devices that could connect to the Web throughout the disaster. Reliability
issues were highlighted by the general confusion of the Facebook safety check application, which was made use of by individuals on a global scale rather than in Nepal alone. This confused rescue
efforts, and created discrepancies between online and offline situations. Reliability was also demonstrated by the lower than expected count of the standardised disaster hashtag #NepalEarthquake
in comparison to other hashtags, meaning that the spread of online information was not as easily traceable. Usability issues were shown in the manifestation of public unrest regarding the Nepalese
government. Tweets which called individuals around the world to invest in charities rather than to donate to the government for fear of corruption evidently represents underlying social factors and
political friction. The assessment of the Web as an intermediary to social media produced valuable insight to the analysis framework application, which was evidenced by the range of accessibility
issues shown in the Nepal tweet dataset. The range and depth of issues attributed to accessibility barriers meant that emerging theories regarding the Web, such as online identities and Web
perception, were able to be discussed unlike in related frameworks. Similarly, the incorporation of an interdisciplinary perspective allowed for the identification of underlying factors often overlooked
in related general frameworks, such as the presence of political frictions between the public and government.
Future development of the framework should focus on the creation of a translation system where a minimum of three individuals would translate and interpret the context of a tweet. This would ensure
a reduction in human error and/or bias, and develop a clearer idea of tweet context than individual translation alone. The application of the framework to the Nepal dataset demonstrated that the
research questions had been addressed, and that interdisciplinary, recent and Web-focus literature have produced a valuable insight to the case study. Consequently, in the future the framework may
be utilised by various tools, applications and online resources for improvements to online disaster management strategies that are both interdisciplinary and relevant.

14

Research Posters | PhD Researchers 2014 2018

Misogynist language on Twitter:

the new lingua franca?


The background......
Social Psychology
The scientific study of behaviour and
mental processes.

Gaming Facts
46% of gamers aged 16-64 are
female.
Most games:
- feature male-gendered activities;
- are advertised to males;
- feature males in the advertising.

Is it deindividuation that leads to


abuse (the crowd or mob mentality)?
Is this aided by priming: the
repetition of stereotypes in the
media and popular culture, and
especially in video games?

Most games that feature women


represent them as passive or
sexualised.

Perhans the normative social


influence persuades us that we
must go along to get along?
All these approaches may help to
explain why a) misogyny seems to
have pervaded western ciulture in
spite of the feminist movement, and
b) why some people engage is
misogynist abuse online when they
would not do so in face-to-face
communications.

Other Facts
Only 29% of the House of
Commons is made up of women.
Only 16.7% of Directors of
FTSE-100 companies are women.
Only 17.6% of senior police
officers are women.
Only 15.1% of ICT professionals
are women.
It is suggested that as little as 4%
of all programmers and engineers
in the video game industry are
women.

Flaming,
cyberbullying,
or e-bile?

@Glinner Frankly, not


one of my guildmates or
other players in WoW
knows Im female and Im
keeping it that way.

"First, the misogyny here is


truly gobsmacking the whole
"cunt" talk and the kind of stuff
represented by the photo is
more than a few steps into
sadism. It would be quite
enough to put many women off
appearing in public, contributing
to political debate, especially as
all of this comes up on Google."

The research......

ur whe
avio
n
eh

ded in
bed
re
m

g online
min
e
ga

The Psychology
of Play

What academic research has


been conducted to date into
the prevalence of misogynist
abuse online?

slut

Mixed method:

bitch

cunt

Used positively:
Slut jokes are so whoreable
Used negatively:
RT: And it ranges from casual
(using 'bitch' when you meant
to say 'woman') to the horrid
shit I just RTd. I am tired.
Neutral use:
Karmas a bitch
Disregarded: partial or
complete foreign language;
unintelligible; tweets promoting
porn sites.

1. A qualitative review of the


research carried out on the related
subjects of flaming, trolling, sexist
humour, and misogynist abuse, all of
which can be categorised under the
helpful term provided by Emma Jane
as e-bile.
2. A sentiment analysis of the
contents of a sample of tweets from
Twitter.

he magic circ
et
l
sid The magic circle is e

play happe
ni
oes
n
rd

Is there any evidence to


suggest that misogynist
language is becoming a
lingua franca on twitter?

Methodologies

Tweets will be gathered over


a week, at different times, in
batches of 200 using NodeXL.

To what extent is misogynist


language used as a form of
abuse on Twitter?

Selected keywords:

a theory that has


been challenged. It
has been suggested
that it should be
treated as a
boundary where
behaviour is
negotiated with
other participants.

?
ply
ap

Research Questions

different ru
ere
les
wh

...if we are to accept the


view advanced by scholars
such as Malpas or Miller
(Malpas 2009, Miller
2012), the on-and off-line
worlds are as one

life?
al

Is
b

The evidence....
200

180

160

140

120
Disregarded
Positive

100

Neutral
Negative

80

60

40

20

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

Bitch can be used in


different ways , however,
given that the final sample of
just over 5,000 tweets is so
small when compared with a
possible total of over 2 million
tweets using one or more of
the key words over the same
time period, there is
insufficient evidence to
declare that misogynist
language is used extensively.

In particular, with regard to the use of the word bitch, it would be helpful
to know if the word was used as a form of misogynist abuse by just one
demographic, or whether it had become representative of the lingua
franca generally. While the Twitter search API is both useful and easily
accessible, it has limitations.

It is only later, particularly from scholars such as Jane, the point begins
to be made that the abuse is very deliberately misogynist and very deliberately designed to reclaim sections of the online space (which is directly linked with the corresponding offline space) for men only.

r
e
t
t
i
w
re T

!
s
a
Bi

a
w
e
B

Misogyny: hatred or dislike of, or prejudice against, women.


Sarah Hewitt
University of Southampton, 2014
@s2hewitt
sarahhewittsblog.wordpress.com

15

Research Posters | PhD Researchers 2014 2018

Investigating Customer Attitudes and Preferences in Social


Media Banking
Dola Majekodunmi oam1g14@soton.ac.uk
Lead supervisor: Lisa Harris, Co-Supervisor: Yvonne Howard
What is Social Media
Banking?

Research Objectives
Social media banking refers to
the use of social media as a
form of delivery channel for To explore the adoption and
usage of social media by banks.
banking services.
To identify what set of
attributes influence customers
perception and attitude
towards social media banking.

Attitudes and intention to adopt


Social Media Banking

Theoretical Framework
Rogers Diffusion of Innovation
Relative Advantage

Compatibility

Complexity

Trialability

Observability

Methodology
A quantitative method approach was chosen for the study. The data used
for the study were in two categories, the primary data and secondary
data. The secondary data included a theoretical background from
journals, financial reports and market reviews of banks. The primary data
for this study was obtained directly from participants using a structured
questionnaire sent by email to University students. The questionnaire
had two sections- section one comprised of questions to obtain
information on the demographics of the respondents and section two
contained questions that collected data related to the influence of the
five attributes of innovation on the perception and attitude of
respondents to social media banking. A 5 point Likert scale (a
psychometric scale) was used and they were coded accordingly. The
questionnaire consisted of 34 questions measuring five variables. A
reliability test using Cronbachs Alpha method was done to ensure
internal reliability of the multiple scale items used in the questionnaire.

Main findings
The study identified Facebook, Twitter and YouTube as the most
frequently used social channels by UK banks .
Convenience and ease of use were the major incentives for the use of
social media banking for the respondents .
Overall the respondents perceived data security and privacy as barriers to
adoption of social media banking .
The results showed that relative advantage, compatibility and trialability
were statistically significantly associated with attitudes of respondents
towards social media banking.
Reference
Rogers, E. M. (2003). Diffusion of
innovations, 5th edition New York: Simon &
Schuster Adult Publishing Group.

16

Research Posters | PhD Researchers 2014 2018


Rafael Melgarejo-Heredia
rm2e14@soton.ac.uk

PUBLIC WEB

Supervisors: Prof. Leslie Carr,


Prof. Susan Halford

While humans communicate, they create interaction spaces, where we integrate,


share, express, collaborate, and coordinate actions, within either a community
or a social structure. The Web and its infrastructure the Internet add speed
and breadth to this interaction, to this communication, to the point that,
conversations may take overall dimensions, giving
the sensation of a
community entanglement, which spontaneously creates an interdependent global
space, an immeasurable transductive virtual contact-zone, through a flow of
coordination of actions that affects all participants.
Human interaction can occur in a public place, in a private area, specific
virtual environments, or within the Web.
Government locates public places
for dialogue. Government transforms web-interactive spaces into functional
spaces.
State-regulated media limits public sphere for debate, narrows
communication, distorting freedom of expression.
Within a hierarchical structure, communication is seen as a social function. Someone who
has power gives voice, controlling interaction space. What is the interest of claiming
voice for those who are not within the structure? Nevertheless, the Web permits all to be
connected clustering them according cultural, political and economical aspects.

GOVERNMENTS

CORPORATIONS

DARK WEB

APPROACHES TO THE PUBLIC WEB


TOP DOWN
Socio-technical structure

BOTTOM-UP
Interdependent community

Give voice

Co-creation through languaging

Value on data
A secure social machine
Mechanism
Surveillance
Disruption, threat > Order

Value on action
A harmful free space
Organism
Community entanglement
Spontaneous, endogenous, emergent > Adaptation, innovation, self-organization

Functional
Ruled by a few, roles preassigned

Enactive
Erratic mass participation
Dynamic Balancing

Damping
Allopoietic

Conformational
Autopoietic

Is the Public Web a languaging space?

17

Research Posters | PhD Researchers 2014 2018


Keisha'Candice'Taylor'
keisha.taylor@soton.ac.uk'

Moving'Beyond'Local'to'Assess'how'Intangible'
Assets'are'Developed'by'Micro,'Small'and'Medium'
Enterprises'(MSMEs)'on'the'Global'Web!!
!

Tacit = Local Codified = Global!


!

Resource Based View Theory!

Business!

(Strategic Management)!

Why'this'research?'

Resource! based! view! theory! (RBV)! analyses! the!


importance!of!developing!intangible!resources!for!a!
business.! The! idea! that! tacit! knowledge! is! more!
local! than! codied! knowledge! is! expressed! in!
economic! geography! and! examines! the! eect! of!
spaBality! on! businesses.! Both! assess! how! this!
aects!a!businesss!compeBBveness,!however!they!
insuciently' consider' the' impact' of' the' web' on!
the! ability! for! MSMEs! to! develop! intangible! assets!
despite! the! pervasiveness! of! the! web! globally,! for!
businesses!and!consumers.!!
!

18

Geography !

(Economic Geography)!

Using! a! case! study! of! a! microIenterprise! in! the!


Netherlands,! a! country! with! a! high! World! Economic!
Forum! Network' Readiness' 2015! score,! this! thesis!
takes! an! interdisciplinary! approach! to! assessing! the!
extent! to! which! locaBon! maQers! in! MSMEs!
development!of!intangible!assets!using!the!web.!!
!
It! does! this! through! incorporaBng! theories! such! as!
born'global,!social'construcPon'of'technology,!small'
world' phenomenon! in! online' social' networks' and!
digital' literacy.! It! also! explores! the! way! that! tacit!
knowledge!is!being!developed!and!exchanged!through!
global! online! interacBon! and! how! the! web! is!
inuencing!the!nature!of!intangible!assets.!

Use of the web in decision-making processes in


political parties Gefion Thuermer
University of Southampton, Web Science CDT, Highfield Campus, Southampton, SO17 1BJ

Democratic decisions require equal participation of all affected individuals. In political parties, all
members are involved in decisions about the parties policies and leadership. The web can be used to
make these decision-making processes more accessible. I researched how much the web is actually
used for member participation in decisions in two German parties.

Green Party Germany

Pirate Party Germany

Founded in 1980, out of ecology and feminist


movements, the party was an alternative to
traditional parties through grass-roots democratic
practice. Political success and responsibility led to less
member influence.
Each member can participate in decisions through
propositions and locally elected delegates.
Motion
development
5

Motion
decision

Founded as part of an international movement in


2006, out of protest against the criminalisation of file
sharing, the party is known as the internet party. It
strives for more direct participation.
Each member can participate in every decision,
through propositions and by attending general
assemblies.

How is the web used?

Photo: CC-BY Tobias M. Eckrich

Research Posters | PhD Researchers 2014 2018

Motion
proposition /
access

Green Party
Pirate Party
Candidate
election

Candidate
announcement

Candidate
introduction

0 No web use
1 Minimal web use, third party
platforms
2 Minimal web use, own platforms

Decision
preparation

Motion
discussion

3 Strong web use, third party platforms


4 Strong web use, own platforms
5 Web use only

Candidate
support

How is the web not used, and why?


Green Party

Pirate Party

Impossibility for all members to participate


equally in discussions

Motion development & discussion

Possibility for all members to participate


equally in discussions

Traditional face to face negotiation

Not possible due to deadlines in statutes

Not required

Consensus development
Candidate support

Cannot ensure equal participation of offline


members. Easier to hold assemblies.

Online / General Members Votes

Cannot ensure secret yet accountable votes;


software not available due to conflicts

More equal participation?


No. At least, not on its own. Assuming that the web
leads to equality, in itself, leads to inequality. The web
can help to form an even ground to start from, but
inequalities must be considered in process
development and implementation.

Conscious filter through assembly

Remaining inequalities
Reinforced, where office staff gives MPs an even
bigger advantage
Transposed, where non-access to the web now
means exclusion from decisions
Generated, where access to information
overwhelms
gt2g14@soton.ac.uk
@GefionT

19

Research Posters | PhD Researchers 2014 2018

Identity Assurance

technical implementation in the UK and its legal implications


Niko Tsakalakis | N.Tsakalakis@southampton.ac.uk

Supervised by:

Dr. Kieron OHara | Dr. Sophie Stalla-Bourdillon

Introduction and Scope

Gov.UK Verify is the first national electronic identity management (eIDM) scheme that uses identification functions provided by the private-sector. While still in evaluation (currently in
public beta), this study examines its acclaimed privacy-preserving implementation against requirements imposed by national and international obligations.

Overview of Identity Management Systems

Gov.UK Verify

eID Management Systems are designed to serve three


functions [1]:

Figure 1: Federated Identity Management architecture [4]

Authentication: A can prove to B that he is A; no one else


can prove to B that they are A.

Software based solution, using HTTP transmissions and


SAML 2.0 assertions

Identification: A can prove to B that he is A; B cannot


prove to anyone that he is A.

User accessible through username/password tokens

Signing: A can prove to B that he is A; B cannot prove even


to himself that he is A.

Public-sector central authority (Central Hub [CH]) acting


as an intermediary between users and providers.

They have been used in national schemes to provide high


certainty in eGovernment transactions:
Ease of use: Single Sign On (SSO)

Multiple private-sector Identity Providers (IdP)

Governmental services through separately contracted


Service Providers (SP)

Security: Multiple-factor authentication


Trust: Auditing trails

Actors bound by G2G (CH with SP), G2B (CH to IdP) and
G2C (CH to users) eGovernance models

They usually complement pre-existing national ID cards


schemes, but other solutions (e.g. username/password) have
been employed.

Regulated by the 9 Identity Assurance Principles (Table 2)

User-centric Federated eIDM

Figure 2: Gov.UK Verify architecture

Federated eIDM (Figure 1) allows for [2]:


Anonymity: Use of a resource without disclosing the users
identity
Unlinkability: A user may re-use a resource without the
system being able to link these uses together

Table 1: Classification of Gov.UK Verify

Unobservability: Third parties cannot observe a resource


is being used

Central databases, single points of failure / attack


Data control under a single entity
Table 2: the 9 Identity Assurance Principles [5]
Principle

In 2014, the EU enacted the eIDAS Regulation. Though the


Regulation was designed to act as a legal framework for
cross-border eID use, it is expected to form the new norm in
eIDM governance. eIDAS sets out minimum requirements:
Technology agnostic legal harmonisation
3 Identity Assurance Levels (Low to High)

Summary of purpose
Identity assurance activities can only take place if the user
User Control
consents or approves them; users can exercise control over
them
Identity assurance only takes place in ways the user knows
Transparency
about and understands
Users can choose and use as many different identity
Multiplicity
providers as they want to
User interactions only use the minimum data necessary to
Data Minimisation
meet system needs
Data Quality
Records are updated only upon users choice
Copies of all data are provided to users upon request; all
Service User Access and Portability
data can be moved / removed if users wish so
All participants of the Identity Assurance Service have to be
Certification
certified against common governance requirements
Dispute Resolution
An independent Third Party handles disputes
Any exception has to be approved by Parliament and is
Exceptional Circumstances
subject to independent scrutiny

Member-states have discretion to notify their national eID


schemes
Notification of the scheme makes it available across
borders
Other member-states are obliged to accommodate
notified schemes
Ultimate liability for the performance of a scheme lies
with the notifying member-state

Relationships between the different actors are shaped by the


different contractual obligations each party has taken up. Still
all functions of the system need to adhere to the Identity
Assurance Principles, the Data Protection Act and
(eventually) the eIDAS Regulation.

Spoke and Hub architecture; concerns that the system


offers partial only unlinkability and pseudonymity [3]
contradict the Identity Assurance Principles it was built
upon.

Federated eIDM is technology agnostic, with possible use of


software or hardware tokens, biometrics etc. It counters
security and privacy risks of earlier implementations, such as:

Legal regulation of eIDM

Implications of implementation

Four areas of concern have been identified:

Pseudonymity: A user does not disclose their identity but


is still accountable for their activity

Easier profiling of activity

Gov.UK Verify is UKs first attempt at eIDM after the


unsuccessful Identity Cards Bill. It is designed around a usercentric federated model (Figure 2).

Selective attribute disclosure; without support for selective


release of attributes, there is a question if the system will
compromise security when inter-operating with more
robust systems that support this function.
User agreements; T&Cs and privacy agreements users have
to sign with each party vary a lot in clarity and detail, with
some not fully conforming to the requirements of the
DPA.
Contractual obligations; service agreements between
parties severely limit the liability of private-sector actors.
This can leave member-state exposed, as it cannot escape
its liability under eIDAS.
Identity rights; with common law lacking a clearly defined
right to identity, questions of sufficient protection against
identity misuse arise compared to jurisdictions with clear
protections of identity rights, such as Germany or France.

References:
[1] Fiat, A. and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, in Advances in Cryptology CRYPTO 86, A.M. Odlyzko,
Editor 1987, Springer Berlin Heidelberg 186-194.
[2] Arora, S., National e-ID card schemes: A European overview. Information Security Technical Report, 2008. 13(2) 46-53.
[3] Brando, L., N. Christin, and G. Danezis, Toward Mending Two Nation-Scale Brokered Identification Systems. Proceedings on Privacy Enhancing Technologies,
2015(2) 135
[4] Clarke, R., Identity Management: The Technologies, Their Business Value, Their Problems, Their Prospects, in Xamax Consultancy Pty Ltd, at
http://www.xamax.com.au/EC/IdMngt.html, March 2004
[5] Cabinet Office, Privacy and Consumer Advisory Group: Draft Identity Assurance Principles, 2013

20

Research Posters | PhD Researchers 2014 2018

Music Recommender Systems as


Cultural Intermediaries:
A Theoretical Framework

Cultural
Consumers

Cultural
Producers

Recommender
Systems
Cultural'intermediaries'are$occupations$defined$by$Pierre$Bourdieu$as$taste$makers$who$
mediate$between$the$production/consumption$of$culture.$They$are$underpinned$ by$their$cultural$
legitimacy$and$expertise$(cultural$capital),$and$they$operate$within$a$structured$field$of$relations

How might Bourdieus theories be extended to think about recommender


systems? How might other theories be combined to achieve this?

Bourdieu

Capital$(economic,$cultural,$social)$is$the$
accumulation$of$labour in$all$its$forms
Cultural$capital is$the$basis$of$legitimacy$and$
expertise$of$intermediaries
Habitus$is$the$internalised norms$of$the$field$of$
relations$and$it$manifests$in$regulated$practice

Actor'Network'Theory

The$social/material$world$understood$in$terms$of$
heterogeneous$(human/non)$actorDnetworks$
There$is$a$delegation$of$labour amongst$actors$in$
order$to$make$technologies$exist$and$function
Delegation$results$in$the$prescription$of$behavior$
between$human/non$actors$in$an$actorDnetwork

Socio9Technical'System'Framework

A'framework'for'examining'how'cultural'capital'might'be'co9constituted'and'how'
habitus'regulates'the'actions'of'socio9technical'(e.g.'recommender)'systems
Cultural'capital'(intermediary$expertise)$can$be$explained$by$the$accumulation$of$
delegated'labour amongst$human/nonDhuman$actors$in$a$socioDtechnical$system
Habitus and$regulatory$norms$of$the$field$manifests$in$the$prescription'of'behavior'
from$human$to$nonDhuman$and$vice$versa

Jack Webster

jw30g11@soton.ac.uk
Prof. Susan Halford, Dr. Brian Hracs &
Dr. Nick Gibbins
Image$Credit:$http://appadvice.com/appnn/2015/06/rockDoutDwithDtheseDstreamingDmusicDservices

21

Research Posters | PhD Researchers 2013 2017

HYPERTEXT KNOWLEDGE://
FARMERS,FETTLERS OR FLANEURS?
Knowledge, stored as hypertext, doesnt naturally retain its relevance. The knowledge
may evolve or become obsolescent, as may its context within the web of other
hypermedia. Curation of the media persists the data but not necessarily its meaning or
relevance. How is this relevance retained:
Are appropriate tools available? How may Spatial Hypertext help?
How is knowledge re-factored without excessive link breakage?
Who undertakes this task in collaborative hypertexts and what is their skill-set?
How is this work privileged over other contributors yet given proper oversight?

Skill-set

Curation
Trust
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Meaning
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Hypertexts

Formalisms

Psychology

Context

Web

Link Breakage

Lorem ipsum dolor sit


amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Lorem ipsum dolor sit


amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Lorem ipsum dolor sit


amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Visualisation

Lorem ipsum dolor sit


amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.

Narrative

Spatial Hypertext

Tyranny of Search

Emergent Structure
Trails

Tools

Mark Anderson
mwra1g13@soton.ac.uk

Supervisor: Professor Les Carr

Web Science
CDT
Mark Anderson: mwra1g13@soton.ac.uk

22

Research Posters | PhD Researchers 2013 2017

Emerging a

The key question:


What is the extent of the Web
Science Subject?

Curriculum
Overview

This study explores the feasibility of creating a


definitive subject definition for Web Science. This
work uses a bottom up approach to document
current Web Science related material, including
compiling details of current Web Science taught
programmes available, in order to answer the
question What is Web Science?

What is taught as Web


Science?

Want to
contribute?

What is the taught definition of Web Science, and


is there a difference between existing subject
definitions and what is taught as Web Science
across the world?

Do you have a background


in Web Science or a related
discipline?

Take the online survey:

https://www.isurvey.soton.ac.uk/16343

(Or scan the QR code)

Further Research
Questions

How is Web Science taught?

How do people structure their web science taught


programmes? What are the different types of
courses offered by institutions?
(e.g. Masters, PhD, or online MOOCs?)
What are the regional variations in how Web
Science is taught?

Web Science Teaching


Institutions

Institutions identified which teach a Web


Science or related programme or module:

Aristotle University of Thessaloniki


Oxford Internet Institute
British university in Egypt - EL
Rensselaer Polytechnic Institute
SHEROUK CITY, Cairo, Egypt
RWTH Aachen University
Cologne University, Germany
Saint-Joseph University of Beirut
Eindhoven University of
The University of Edinburgh:
Technology
School of Social and Political
Georgia Tech University
Science
Goldsmiths London
UAH MediaLab, University of
Johannes Kepler University Linz
Alcal (Spain)
Korea Advanced Institute of
University College London
Science and Technology (KAIST) University of Erlangen-Nrnberg
MIT - Massachusetts Institute of
University of Koblenz-Landau,
Technology
Institute for Web Science and
Northwestern University School of
Technologies,
Communication
University of Liverpool
University of Southampton, UK

For more information


please contact:

Elisabeth Ann Coskun


eac1g09@ecs.soton.ac.uk
Follow me on Twitter
@eacwebsci
Supervisor: Su White
saw@ecs.soton.ac.uk

2nd Supervisor: ThanassisTiropanis


tt2@ecs.soton.ac.uk

23

Research Posters | PhD Researchers 2013 2017

Understanding(How(to(Talk(Formally(
about(Personal(Data(to(Make(Data(
Processing(More(Transparent(
RQ1:$ How$ do$ the$ privacy$ policies$ of$ online$
services$ currently$ talk$ formally$ about$ the$
personal$data$that$they$collect?((

(
(
(
(
(

RQ2:$ Is$ it$ a$ legal$ requirement$ to$ inform$


individuals$ of$ the$ specic$ personal$ data$
which$is$being$collected$from/about$them?$$$
RQ3:$ What$ are$ the$ reasons$ for$ informing$
individuals$ of$ the$ specic$ personal$ data$
being$gathered$about$them?$$$
RQ4:$ What$ are$ the$ issues$ involved$ with$
informing$ individuals$ about$ the$ specic$
personal$ informa+on$ being$ gathered$ about$
them?$$

If(I(asked(to(borrow(an(item(from(your(house(
and(I(told(you:((

(
L Who(I(am((
L The(purpose(for(borrowing(it((
L What(I(would(use(it(for(
L Who(else(I(might(give(it(to((
L Whether(you(have(a(choice(to(give(it(
L How(long(I(would(keep(it(for((
(
Is#there#anything#else#you#would#like#to#know?#

RQ5:$How$can$the$DIKW$Hierarchy$be$adapted$and$applied$to$the$EU$data$protec+on$
framework$to$make$personal$data$processing$more$transparent?$$
Wisdom:$ Accumulated( knowledge.( Allows(
understanding( of( how( to( apply( concepts( from(
one( domain( to( new( situa>ons( or( problems.(
Ability( to( see( beyond( the( horizon( and( to( act(
cri>cally(or(prac>cally(in(any(given(situa>on.(
Knowledge:$ Created( by( establishing( links( with(
e x i s > n g( k n o w l e d g e ,( i n f o r m a > o n ,(
understanding,( capability,( experience,( skills(
and(values.(((

Knowledge$$

Informa+on:$Data(processed(for(a(
purpose,(provides(answers(to(who,(what,(
where(and(when(ques>ons.((

Informa+on$

Data:$ Symbols( without( context,( lacks(


meaning( or( value,( is( unorganised( and(
unprocessed.(

24

$$$$Wisdom$$

Data$

The$hierarchy$is$used$to$contextualize$data,$
informa6on,$ knowledge,$ and$ some6mes$
wisdom,$with$respect$to$one$another$and$to$
iden6fy$and$describe$the$processes$involved$
in$ transforming$ a$ lower$ level$ en6ty$ in$ the$
hierarchy$(e.g.$data)$to$an$en6ty$at$a$higher$
level$in$the$hierarchy$(e.g.$informa6on).$$

Classica>on,( rearranging/sor>ng,( aggrega>ng,(


performing( calcula>ons( upon,( and( selec>on( of( data(
converts(it(into(informa>on.((

Research Posters | PhD Researchers 2013 2017


An#interdisciplinary#reconstruc1on#of#digital#
ci1zenship#to#build#a#stronger#founda1on#for#a#
future#Pro9human#Web.#

Digital(CiEzenship(

IntroducEon#
My# work# is# intended# for# those# interested# in# digital# ci1zenship# and# shaping# a# founda1on# for# a# pro9human# future# for# the# Web,# through#
encouraging#digital#rights#and#responsibili1es#across#what#is#now#rapidly#becoming#a#global,#post9na1onal#digital#community#of#ci1zens.#This#
focuses,#presently,#on#an#intellectually#challenging#discussion,#rather#than#analysis#of#quan1ta1ve#or#qualita1ve#ndings,#though#it#will#build#
upon#both#of#these#in#the#future,#as#well#as#u1lising#a#comprehensive#body#of#interdisciplinary#literature#and#a#range#of#relevant#case#studies.#

Overview#
Digital# ci1zenship# and# the# pro9human# future# of# the# Web# have#
been# fervently# debated,# forming# diverse# interpreta1ons;# only#
now# is# an# emerging# associa1on# being# made,# moving# beyond# an#
implicit# rela1onship.# A# complex# issue# in# its# own# right,# digital#
ci1zenship#requires#deconstruc1on,#as#it#is#a#term#predicated#on#
conceptual#debates,#such#as#Mossberger#et#al.#(2008)#and#Ribble#
(2010),#which#align#a#deni1on#towards#an#extension#of#physical#
na1on9state# ci1zenship.# As# such,# liPle# recogni1on# iden1es# the#
need#to#shape,#as#well#as#the#existence#of,#a#digital#post9na1onal#
ci1zenry,#born#from#the#co9cons1tu1onal#nature#of#the#Web.##
#
Likewise,# a# Pro9human# Web# is# tenta1vely# expressed# as#
fundamental# to# its# future.# Yet,# this# is# dominated# by# a# pressing#
epistemological# vision# to# realise# the# Seman1c# Web# 3.0;# # future#
direc1on# is# ambiguous.# Therefore,# I# propose# a# theore1cal#
argument,#one#strongly#inuenced#by#the#philosophical#paradigm#
of# a# hermeneu1c# circle,# which# u1lises# a# discussion# that# moves#
back# and# forth# between# the# individual# components# of# digital#
ci1zenship# and# the# whole# of# the# Pro9human# Web,# to# illustrate#
their#connec1vity#and#highlight#future#direc1on#for#both.##

Discussion#

#
An#important#aspect#of#re9envisioning#the#future#of#a#Pro9human#
Web# is# grounding# it# in# digital# ci1zenship,# rather# than# seman1cs.#
This#creates,#however,#conict;#it#is#unclear#whether#both#can#be#
realised# simultaneously.# We# must# deconstruct# current# debates#
about# digital# ci1zenship,# ques1oning# their# robustness.# Indeed,#
many# of# these# are# ambiguously# aligned# to# scholarship# of#
ci1zenship#itself,#such#as#T.H.#Marshall#(1950),#describing#what#is#
barely# extended# physical# ci1zenship,# rather# than# actual# digital#
ci1zenship,# so# nega1ng# of# socio9technical# and# co9cons1tu1onal#
views#which#must#be#considered#in#discussion#and#deni1on.##
#
Such# debates,# in# fact,# fail# to# link# digital# ci1zenship# to# digital#
rights#and#responsibili1es.#We#must,#then,#reinforce#the#posi1on#
that# digital# ci1zenship# is# a# post9na1onal# and# postmodernist#
concept,#rather#than#a#ci1zenship#bolt#on.#Whilst#many,#such#as#
Berners9Lee# (2014),# argue# for# such# recogni1on,# this# remains#
largely#abstract#regarding#ci1zenship#scholarship.#Hence,#views#of#
digital#ci1zenship#must#be#reconstructed#with#a#deni1on#rooted#
in# self9determina1on# of# ci1zens# who# are# digitally# situated,# but#
globally# located# and# networked.# To# accomplish# this,# we# must#
realise# a# framework# of# digital# rights# and# responsibili1es# that# are#
oset#against,#but#dis1nct#from,#contemporary#human#rights.#
!(
#

Web 3.0
Digital Citizens, not
Semantics?

PASSPORT
Conclusion#
The# vision# of# a# Seman1c# Web# and# a# Pro9human# Web,#
characterised# by# digital# ci1zenship,# aord# clashing#
epistemological#and#ontological#posi1ons;#top9down,#technically#
determinis1c,# and# boPom9up,# socio9technical# revolu1ons,#
necessita1ng# further# explora1on.# Hence,# both# the# Pro9human#
Web#and#post9na1onal#digital#ci1zenship#necessitate#equality#of#
digital# rights# and# responsibili1es# across# the# global# stage,# with#
scholarship#developing#mechanisms#to#realise#this#universally.##
#
In#future#reconstruc1ons#and#discussions,#we#must#shape#digital#
ci1zenship# within# the# Pro9human# Web# by# ensuring# recogni1on#
of# the# changing# aYtudes# towards# na1onality,# as# individuals#
become#globally#connected#in#a#post9na1onal#globalised#society.#
The# Web# is# dened# by# social# and# the# technical# solu1ons;# we#
need#both#to#ensure#a#future#vision#grounded#in#digital#rights.##

Michael(J.(Day([mjd1g13@soton.ac.uk](
University(of(Southampton(
Web(Science(InsEtute(

BernersGLee,( T.( (2014).( Tim( BernersGLee( on( the( Web( at( 25:( the(
past,(present(and(future.(In:(Wired!Magazine,!March(2014.((
Marshall,( T.H.( (1950).( Ci.zenship! And! Social! Class:! and! other!
essays.(Cambridge:(University(Press.((
Mossberger,( K.,( Tolbert,( J.( McNeal,( R.( (2008).( Digital! Ci.zenship,!
The!Internet,!Society!and!Par.cipa.on.!Cambridge,(Massachuse\s:(
MIT(Press.(
Ribble,(M.((2011).(Digital!Ci.zenship!in!Schools.(Washington:(ISTE.!

25

Research Posters | PhD Researchers 2013 2017

Predicting Selections from Past Performance


Data: A Case Study Predicting Winners of
Horse Racing
Conrad DSouza 1,2, Ruben Sanchez-Garcia 2, Tiejun Ma 3,
Johnnie Johnson 3, Ming-Chien Sung 3
1

Web Science Doctoral Training Centre, 2 Mathematical Sciences, 3 Centre for Risk Research,
University of Southampton

Abstract
We aim to apply Topological Data Analysis (TDA) techniques to predict which alternative will be selected based
on past selections. These selections can refer to the products bought in online marketplaces by consumers or the
behaviour exhibited by users online, amongst other interpretations.
The algorithm used in this project is adapted from
HodgeRank, a method for ranking alternatives and identifying inconsistencies in datasets. Applying a more sophisticated version of the algorithm, we generate rankings
and use them as the basis of the predictions.
Horse racing is used as a case study with the aim of better predicting the winners of horse races from a dataset
of past results from 2008 to 2012.

score functions vary. However, by taking the dierence


between the scores both voters assign a pairwise score
of 2 to the pair {i, j}. Thus pairwise scores reduce the
eect of the subjectivity of the local rankings.
3. Graphical Representation
We can graphically represent score functions and pairwise
scores by a simplicial complex. The vertices (nodes)
of this complex are the alternatives to be ranked. Pairs
of alternatives are joined by an edge if a voter has scored
both alternatives and the direction of the edge indicates
which alternative is preferred.
Figure 1 shows a score function, f0, and pairwise scoring
function, f1, of 4 alternatives.

Applying the ranking as a predictive variable to future,


unseen data, predictions of the winners are made and
compared to the recorded outcomes.

Ranking problems are subject to a variety of challenges


including the heterogeneity of ranking problems and the
number of alternatives.
HodgeRank attempts to reduce the impact of two specific challenges, subjectivity and incompleteness, which
both occur in horse racing.
Subjectivity: Information used to solve ranking
problems may be subjective which can produce inconsistencies in the ranking solution.
Incompleteness: Large databases are prone to containing a significant number of missing entries. Solutions based upon databases containing missing entries
may not be optimal if these entries were complete
Races can be considered as subjective as each race is
dierent. The conditions, including distance, weather
and strength of competition, vary amongst races. Directly comparing the results of races does not factor these
changes in.
A complete dataset would have been formed if every horse
raced in every race. However, the dataset indicated that
each of the 36151 races was competed in by approximately 10 of the 37782 horses which ran over the 5 years.
Thus the dataset contained more than 99.97% missing
entries.

26

Figure 1: Simplicial Complex Representation

There can be missing direct comparisons, as seen in Figure 1 by the lack of an edge between nodes 3 and 4.
However these missing entries are compensated for by
the paths between the nodes which are indirect comparisons of pairs of alternatives.
Using simplicial cohomology to analyse the simplicial
complex, HodgeRank attempts to find a global scoring function, s, which best matches the local pairwise
scores by solving an optimisation problem.
A global ranking can be created by the rule that alternative i is ranked higher than alternative j if s(i) > s(j).
4. Inconsistencies
The error between the global scoring function and the
local pairwise scores is the residual. The size of the
residual measures how well the global scoring function
matches the aggregated pairwise scores formed from all
the voters.
Applying Hodge Theory, we can decompose the residual
into consistent and inconsistent parts to identify which
alternatives are responsible for the errors.
5. Application to Horse Racing

HodgeRank relies on pairwise scores formed from the voters scores. A local score function f is assigned to
each voter where f (i) is the voters score of the i-th
alternative.

Considering horses as alternatives and races as votes, the


HodgeRank method can be applied to rank horses by their
past performances.

If two voters rank alternative i as 3rd and 5th respectively


and alternative j as 4th and 6th respectively, then their

6. Results
We have applied the improved HodgeRank algorithm to
three years of past data and the rankings produced have
been used as a predictive variable for two years of future observations. Two conditional logit models were
created, one with just the betting market information
and the other which included the ranking predictive variable. Comparing these models, the following results were
obtained:

e2
e2 increase
Model
R
LLR
R
Betting Market 0.163754
incl. Ranking 0.164023 0.000269 11.55073

2. Pairwise Scores

For each voter, we calculate local pairwise scores by


taking the dierence between the scores of each pair of alternatives ranked by the voter. If the voter has not scored
both alternatives, the corresponding local pairwise score
is set to 0.

Based on these results, adjustments have made to the


HodgeRank algorithm which have improved the predictive ability of the rankings generated. These alterations
include varying the importance of each race and placing
greater emphasis on better results.

Table 1: Conditional Logit Model Results

1. Ranking Problems
A ranking is an ordering of a collection of n alternatives
V = {1, ..., n} according to some measure of preference.
An optimal ranking is one which is the best solution to
the ranking problem, although this is not well defined.

this ranking information. We can also measure the accuracy of predictions made from both the betting market
information and the ranking.

A conditional logit model is used to make predictions


and testing these predictions, we can assess the predictive ability of the rankings and hence the utility of the
mode.
Each conditional logit model contains a predictive variable based on information from the betting market.
Adding the ranking variable to this model, we can determine whether the betting market already accounts for

e2, as a meaUsing the pseudo correlation coecient, R


sure of predictive ability, the predictive model incorporating the predictive ranking variable had 0.164% greater
predictive ability than the model excluding it.
A Log Likelihood Ratio (LLR) test statistic was calculated for both of the later models. This is a statistical
test which measures whether the information in a model
is also contained in a simpler model which contains less
predictive variables. If this is case, the more complex
model is redundant and unnecessarily complex.
Comparing this statistic to a chi-squared distribution, the
corresponding p-value is 0.000677. Hence there is evidence at the 1% significance level that the information
contained in the global ranking is not accounted for by
the betting market.
These tests indicate that the improved HodgeRank algorithm is able to extract more information from past performance data than the betting market does, resulting in
better predictions.
7. Discussion
Applying an improved version of HodgeRank to horse racing data, we have been able to form predictions for future
races which are better than those of the betting market.
There is scope for improving the underlying method, from
theoretical and practical standpoints, with the aim of producing more accurate predictions and work is currently
being undertaken to explore dierent avenues.
Part of this work will involve identifying inconsistencies
in dataset and understanding their nature. This will lead
to the development of sophisticated tools to measure the
quality of a dataset and identify the areas of it which are
erroneous.
Case studies applying the algorithm to dierent Webbased prediction problems will be conducted. These will
lead to further improvements to the methodology as well
as demonstrating the usefulness and scalability of the improved HodgeRank algorithm and underlying TDA methods.

Research Posters | PhD Researchers 2013 2017


Supervised by Prof. Luc Moreau and Prof. Susan Halford
Web Science Center for Doctoral Training, University of Southampton, Highfield Campus, SO17 1BJ

Back on the Track of Do Not Track:


Raising Transparency in the Online Behavioural Tracking Ecosystem
Faranak Hardcastle (f.hardcastle@soton.ac.uk)
Introduction
In the past decade Online Behavioural Tracking (OBT) has become a common
business model for online advertisers and publishers. OBT refers to a set of
technologies and mechanisms that allow advertisers to collect information about
users online behaviour (e.g. browsing history), infer users interests based on this
information, classify users into profiles, and target users with ads. On the one
hand it is argued that the revenue generated from these business models
supports the free publication of content on the Web. On the other hand, the
evolution of these practices has brought implications in areas such as privacy
and security [1,2,3,4], fairness and equity [4,5,6], and trust and chilling effects
[4,7] for consumers.
Problem
As the experience of viewing a page is seamless to
the viewers, they might not notice that they are actually
interacting with several websites and not only one website.

Transparency and Accountability Tracking Extension


(TATE)
TATE is a sociotechnical intervention that leverages the provisions of W3C DNT
specification to raise visibility of OBT practices and promote accountability in the
OBT ecosystem by empowering Internet Governance to gain oversight on OBT
practices, enabling them to identify issues and intervene if needed, and ultimately
to increase consumers control over the collection, usage and sharing of their data.
TATEs core functionality:
1. Repository: TATEs repository contains information communicated by OBT
companies via DNT, and enables retrieval by user agents in a machine-readable
format.
2.Governance Framework: TATE defines access and usage control for its
repository.

A Lack of Visibility of OBT practices leads to:

A Lack of Control for Consumers


Inability to investigate and study OBT issues, perform
risk-assessment, or reform the OBT ecosystem to
provide protection for consumers.

Figure 1. Illustrating some of the user


agents interactions after visiting bbc.co.uk
and clicking on the News tab [8].

Figure 3.[9]

Conclusion and Future Work


As part of answering how to raise transparency in OBT practices we continue an
iterative process of analysing TATEs technical requirements by overcoming the
shortcomings of DNT in providing the tracking information required whilst
prioritising user requirements (see Figure 2 and Figure 3).

Figure 2.[9]

However, having transparency does not make OBT practices accountable. This
raises a second question: `How to increase accountability in OBT practices? As
part of our future work, we plan to find answers to this by exploring mechanisms
that enable and encourage OBT entities to adopt and engage with DNT and
TATE. Additionally we aim to investigate the potential future implementation of
them from the lens of Science and Technology Studies.

1. Mayer, J. R. & Mitchell, J. C. (2012),Third-party web tracking: Policy and technology. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 413-427. Available at http://dl.acm.org/citation.cfm?id=2310703.
2. Narayanan, A. & Shmatikov, V. ( 2008), Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP '08). IEEE Computer Society, Washington, DC, USA, 111-125. Available at http://dl.acm.org/citation.cfm?id=1398064.
3. Lohr, S. (2013), Sizing up big data, broadening beyond the Internet. The New York Times. Available at http://www.cs.columbia.edu/igert/courses/E6898/Sizing_Up_Big_Data.pdf, Last accessed oct 2015.
4. Ramirez, E. (2013), The Privacy Challenges of Big Data: A View from the Lifeguards Chair. Available at https://www.ftc.gov/sites/default/files/documents/public_statements/privacy-challenges-big-data-view-lifeguards-chair/130819bigdataaspen.pdf, Last accessed June 2015.
5. Singer, N. F.T.C. (2013), F.T.C Member Starts Reclaim Your Name Campaign for Personal Data. The Business of Technology (BITS). Available at http://bits.blogs.nytimes.com/2013/06/26/reclaim-your-name/?_r=0, Last accessed Oct 2015.
6. Barocas, S. (2014), Panic Inducing: Data Mining, Fairness, and Privacy. Phd dissertation, New York University.
7. Madden, M. (2014), Public Perceptions of Privacy and Security. Pew Research Center. at http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf
8. Using an open source platform for measuring dynamic web content developed by Stanford Security Lab and The Center for Internet and Society Available at fourthparty.info .
9. Some of the information used in these diagrams are based on; Acar, G. et al. (2014), The Web never forgets: Persistent tracking mechanisms in the wild. in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 674689. Available at https://dl.acm.org/citation.cfm?id=2660347; and
Cookie Matching, Google Developers, Available at https://developers.google.com/ad-exchange/rtb/cookie-guide?hl=en, Last accessed June 2015.

27

Research Posters | PhD Researchers 2013 2017

Background
Novel psychoactive substances (NPS) can be defined as psychoactive drugs which are not prohibited by the Misuse of Drugs Act
1971, and which people in the UK are seeking for intoxicant use. By declaring NPS as not for human consumption, these substances
can be sold legally online to anyone with a credit or debit card. Within the UK, popular rhetoric has created a connection between NPS,
the web and todays youth, resulting in fear and panic over the ease of access to these substances and the threat this provides to young
people. Within this discourse, the web is posited through a technologically determinist stance, viewed simply as a deviant and dangerous
place which both increases access to, and heavily promotes the use of NPS. Youth are placed as vulnerable, unable to resist the webs
temptations as well as being unable to evaluate the information presented to them. In this way, societal fears are often oversimplified,
ignoring the complexity of the relationship between the web and the NPS user. This research aims to establish how young people
themselves view their relationship with the web, and whether they construct the web as a viable resource for obtaining NPS. By learning
about youths own opinions we are in a better position to tackle the problem of NPS, particularly to assess whether the web can
conversely be used as a site for risk minimisation as opposed to risk amplification.

THE DAILY SUNSHINE


www.dailysun.com

THE WORLDS FAVOURITE NEWSPAPER

- Since 1866

KIDS GETTING HIGH FROM KILLER WEB


Britains youth are
in severe danger
from deadly so called
legal highs that are
threatening
to
overwhelm
the
country. And even
worse, they could be
in your home right
now. Legal highs can
be bought online with
the click of the button
and delivered to your
door the very next
day. Cunning sellers
specifically advertise
to children, marketing
the
drugs
under
popular brand names

Research Questions

How do young people construct the web as a factor in their


NPS use?
How do young peoples peer group effect their interpretations?
Do young people construct their NPS use differently
dependent on the space/social context?
Do beliefs differ in the online/offline environment?
Do different peer groups behave in similar ways?
Do offline factors effect online usage and vice
versa?
Does the web provide a suitable space to administer NPS
harm reduction advice?
What do young NPS users desire from such a
space?

and offering special


services such as
delivery
within
camouflaged
packaging. Detective
Brian Smith from the
Metropolitan
police
yesterday
warned
parents
to
stay
vigilant:
Do
you
really know what your
child
is
ordering
online? These legal
highs cause death
and destruction
you must check the
packages
your
children receive from
online stores.

Methods
A mixed methods approach integrating some quantitative and
predominately qualitative research will be employed with multiple
stages. The proposed form of the research aims to both allow for
online and offline comparisons inter and intra group, and to build
upon information generated through each stage of the research
to inform and structure subsequent parts of the study; for
example data gained from initial surveys will be used to generate
questions for the interviews. Methods used will include:
Online and offline surveys
Online observation
Online and offline interviews
Online and offline focus groups
Laura Hyrjak, PhD student
Email: lnh1g09@soton.ac.uk
Supervisors: Charlie Walker, Catherine Pope and Gethin Rees

28

Research Posters | PhD Researchers 2013 2017


Bringing!the!Modern!Power!of!the!Web!to!Chemical!Research!

Researcher:!Sami!Kanza!(sk11g08@soton.ac.uk),!Supervisors:!Nick!Gibbins!(Computer!Science)!&!Jeremy!Frey!(Chemistry)!

Abstract'

Research''
Ques:ons''

Whilst!Electronic!Lab!Notebooks!(ELNs)!
!have!acQvely!been!studied!over!the!years,!there!!
sQll!exist!many!relevant!concepts!that!have!not!been!!
explored,!such!as!uQlizing!cloud!technologies.!Most!ELNs!
are!commercially!licensed!products,!whose!enQre!notebook!
systems!created!from!scratch;!few!are!plaTorm!independent,!
and!a!majority!do!not!make!use!of!modern!Web!technologies.!
They!therefore!lack!both!the!exibility!and!agility!expected!by!
this!generaQons!students.!While!academia!has!explored!some!
of!these!areas!(e.g!incorporaQng!SemanQc!Web!technologies)!
there!hasnt!been!signicant!uptake!of!the!ELNs!born!out!of!
these!invesQgaQons.!My!research!explores!the!concept!of!
an!ELN!environment!built!upon!an!exisQng!cloud!based!
notebook,!that!uQlizes!SemanQc!Web!technologies!!
and!applies!domain!knowledge!where!necessary.!
This!approach!will!allow!the!power!of!the!
!Web!to!transport!scienQc!research!!
into!the!digitally!driven!!
21st!Century.!!

!
1.!What!are!the!approaches!that!!
!
should!be!taken!into!account!when!
!
creaQng!an!ELN?!
!
2.!What!is!an!appropriate!
environment!to!create!an!
ELN!with?!
!
!

Current''
Research'Objec:ves'

!
!
1.!Notebook!plaTorm!experiments
.!!
!

3.!SemanQc!Web!Tech!IntegraQon!
4.!Research!proper!ELN!pracQce!
5.!Construct!new!ELN.!!
!
!
!
!

Paper! !
Portable!
!
Securely!stored!
No!power!supply! !
Easy!data!entry! !
Robustness!
Rapid!access! !
Mark!pages!!

Market'Research'
AcQve!ELNs!
R&D!
QA/QC!
Chemistry!
Biology!
Life!Sciences!
PharmaceuQcal!
MulQdiscipline!
All!Purpose!
SemanQc!Web!

Chemistry!ELNs!
'
'
''

Requires!Other!
Unspecied!
Mac!
Windows!
Web!Based!
Independent!

Free!Version!
Open!Source!
Commercial!
0!

10!

!
!
1.!Comprehensive!survey!of!!
!
exisQng!ELNss!and!ELN!research.!!
!
!
2.!InvesQgate!cloud!based!!
plaTorms!for!creaQng!an!ELN!
environment!with.!
!
!
!

Paper'vs'Electronic''
Lab'Notebooks''

!
2.!Integrate!domain!specic!services!!

!
!
!
!

Completed''
Research'Objec:ves''

20!

30!

0!

5!

10!

15!

Electronic!!
Searchable!
Shareable!
Replicable!
CollaboraQve!
Electronic!Backup!
Audit!Trail!
Version!Control!
!

Survey'of'Chemistry'So0ware'Usage'
Other!
SemanQc!Web!
Chemistry!Bibliographic!Database!
Chemical!Datacase!&!InformaQcs!

Chemical!KineQcs!&!Process!Simulator!
Nano!Structure!Modelling!
Organic!Synthesis!
Quantum!Chemistry!
Molecular!Editor!
Molecular!Modelling!!
0!

20!

40!

60!

80!

100!

120!

140!

What'other'type'of'so0ware'would'you'like'to'be'created?'

'
''

UCD!!

Approaches'

Ethnography!!

CollaboraQon!!

Cloud!

Solu:on'

'
So#ware( to( draw( all( chemistry( diagrams," Markush! structures," Open"
Source," Convert' all' chemical' formats' to' other' formats," Calculate( mw(
mol( and( yields( from( mass( data( input," Create! rectangular! Nano!
parQcles," Crystal" structure" predic4on," Input' tools' for' LAMMPS,(
Graphing( So#ware," Calculate! funcQonal! groups! connecQng! atom!
classes," Retrosynthesis" probabili4es," Database' of' computa:onal'
results," 3D( data( rendering( so#ware," Bejer! integraQon," Web" based"
chemical"synthesizer,"Video'maker,"Spectroscopy(simula;ons,!Integrate!
exisQng!tools!with!each!other!""
"
"
"
"
"
""
"

Future'Work'

CollaboraQve!
PlaTorm!Independent!

1.!IdenQfy!tools!that!can!be!integrated!into!ELN!
2.!Analyze!strengths!and!weaknesses!of!past!systems!

Domain!Specic!!
SemanQc!

3.!Determine!current!ELN!pracQce!
4.!Develop!a!prototype!

29

Research Posters | PhD Researchers 2013 2017


Examining the activated patient: A qualitative study
of how and why diabetic patients use the Web to aid
self-management of their disease
What is Diabetes?
What causes
Diabetes?

In the UK

A metabolic disease that develops when blood


Blood levels have to be regulated.

Genetics
Obesity

1 in 17 people have diabetes


10% of people have Type 1
90% of people have Type 2
Gestational Diabetes impacts up
to 5% of pregnancies

Age

Amy Lynch
all1g1@soton.ac.uk
Supervisors:
Catherine Pope &
Jeff Vass

glucose is too high.

Ethnicity

Diabetes is expensive. It cost the NHS 24 billion


approx in 2014.
Diabetes prevalence is increasing, so there is a push
for patients to become more efficient self-managers
of their condition.

Self-management may involve


insulin doses, medication, diet
and exercise

Diabetes requires complicated Self-Management

Diabetes prevalence Is increasing and the Web is seen as a useful tool to support disease
management.

Research Questions:

How is chronic illness self-management changing with the continued growth of social networking
sites and personal health tracking devices?
How are technology and policy intersecting to influence healthcare and health service delivery?
Are people with diabetes activated patients? How are activated patients discursively constructed?
How are different groups impacted by these changes?

Sociology

All#images:#ickr.com#
All#stats:#Diabetes#UK#

How are activated


patients discursively
constructed?
How do structural
influences impact selfmanagement in this new
climate?

30

Computer
Science

How can research


influence HCI and
software enginerring to
develop better
sociotechnical systems?

Research Objectives:

Health
Science

Interviews with
healthcare professionals
and patients
Can we implement
sociotechnical systems
in healthcare?

To examine patient activity within public support groups pertaining to different Types of diabetes (Type 1, Type 2 and Gestational Diabetes) on
social networking sites using non-participant ethnography
To interview patients to understand their perspectives on incorporating the Web, particularly social networking sites and internet-connected
wearable technology, into diabetes self-management
To interview healthcare professionals, investigating the integration of online communication and wearable technology into their healthcare
delivery
To examine the discursive construction of the activated patient through policy analysis, as well as content analysis of social networking pages
operated by charities

Research Posters | PhD Researchers 2013 2017

Navigating the dangers of victim blaming


and scapegoating within UK cyber security

In researching cybercrime,
what can critical victimology
tell us that positivist
victimology cannot?

Within cybercrime
discourse, how is
the victim
constructed? And
with what
implications?

Researcher:
Neil MacEwan

In everyday life, do citizens


practice what the
government and their
employers preach to them
on cyber security? And if
not, why not?
Supervisory Team:
Dr Gethin Rees
Dr Tim Chown
Dr Craig Webber

31

Research Posters | PhD Researchers 2013 2017

32

Research Posters | PhD Researchers 2013 2017


Institutional Repositories on the Web:
Intersecting Narratives and Technical Code
Jessica Ogden

jessica.ogden@soton.ac.uk | Supervisors: Susan Halford, Les Carr & Anne Curry

@jessogden

Research Questions

Introduction
Institutional Repositories
The% Web,% insHtuHonal% repositories% (IRs)% and% the% so1ware% that% support% them%
have%led%to%the%creaHon%of%a%new%kind%of%scholarly%acHvity%exhibited%through%
the% ins.tu.onal) management) of) academic) outputs% for% the% benet% of% all%
scholars%[1].%InsHtuHonal%repositories%have%emerged%as%strategies%advocated%by%
the% open% access% movement% [2],% and% have% increasingly% become% the% focus% of%
iniHaHves%for%assessing%the%academic%research%landscape%in%both%the%UK%and%the%
US.% InsHtuHonal% repositories% are% now% set% to% become% everUmore% central% to% the%
management%and%assessment%of%university%outputs.

Sociology of Science and Technology

What) events) drove% the% introducHon% of% the% insHtuHonal%


repository% as% a% means% for% supporHng% scholarly% publicaHon% and%
communicaHon?%What%influence)did%the%open%access%and%digital%
library% communiHes% have% on% the% implementaHon% of% repository%
technologies?
What% values) and) priorities) moHvated% the% development% of%
repository% so1ware% and% have% they% diered% across% so1ware%
pla^orms?

A%wealth%of%sociology%of%science%and%technology%(SST)%literature%acknowledges%
the% implicit% complexity% of% the% interacHon% between% the% technical% capabiliHes%
and%the%moHvaHons%and%interests%of%social%groups,%individuals%and%organisaHons%
[3].% The% technical) design) and) social) values% of% the% creators% (and% users)% of%
technologies% are% interrelated% [4],[5]% and% are% key% to% understanding% both% their%
evoluHon%and%impact%[6].

Methodology
Data Collection
Narrative Analysis
Each% interview% was% recorded% and% then%
transcribed%in%full%using%NVivo.%Each%transcripHon%
underwent% an% iteraHve% process% of% paaern%
recogniHon% and% rst% included% the% iden.ca.on)
of)key)events%and%underlying%mo.va.ons%as%they%
pertained%to%the%history%of%IRs.

Documentary

Previous%research%on%insHtuHonal%repositories%has%o1en%focused%on%their%role%in%
facilitaHng% open% access,% through% studies% centred% on% author% behaviours% and%
impact% analyses% of% selfUarchiving% and% insHtuHonal% mandates.% This% research%
explores% the% impact% of% insHtuHonal% repositories% on% Web% scholarly%
communicaHon% by% shi:ing) the) focus) towards) an) examina.on) of) the) socio<
technical) processes) that) inuenced) the) development) of) digital) repository)
so:ware.

Analysis Strategies

6)inUdepth,%
semi<structured%
interviews

Interviews

Focusing this Research

Results

So1ware%comparison%guides%
and%manuals
Key)reports:%the%Follea%Report,%
JISC%Digital%Repositories%Review
The%Subversive)Proposal)email%
exchange

ParHcipant% narraHves% were% compared% and%


contrasted% for% intersecHng% and% corresponding%
events.% SupporHng% documentary% evidence% was%
sought%to%further%contextualise%each%event,%a1er%
which%an%overall%chronology%was%developed.

Examining the Technical Code

The% interviews% and% accompanying% narraHves% revealed% a% number% of) key)


technical) innova.ons% and% mo.va.ng) factors% that% inuenced% the% creaHon% of%
insHtuHonal% repositories.% It% is% clear% from% the% narraHves% that% both) the) digital)
library) and) open) access) communi.es) have) inuenced) the) evolu.on) of)
repository) technologies.) The% literature% revealed% a% preUexisHng% culture% of% preU
print%sharing%amongst%physicists%and%a%long%standing%debate%over%the%nature%and%
relaHonship%between%informaHon%science,%libraries%and%repositories.

The% second% stage% involved% the% iden.ca.on) and) evalua.on) of) so:ware) design) decisions)
present% in% the% chosen% so1ware,% rst% as% described% by% the% informants.% These% features% were%
then% used) to) extract) explicit) representa.ve) values.% This% process% was% aided% by% relevant%
documentary%evidence%(publicity%statements,%so1ware%manuals,%etc.)%where%appropriate%and%
was%supplemented%by%feature%descripHons%made%by%key%informants%during%the%interviews.

Intersecting Narratives
1994

The arXiv

1994 - 2001

1991 - Present

Paul Ginsparg

Follett Report

eLibs
Programme

eLib Open
Journals Project

1999
CogPrints

Budapest Open
Access Initiative

Stevan Harnad

1991
WWW

Turnkey
Repository
Software

The% narraHve% events% highlight% two% communiHes% using% the%


Internet%and%Web%to%address%the%separate%(but%related)%issues%%
surrounding% the% dissemina.on% and% cura.on) of% scholarship.%
Both%communiHes%saw%the%development%of%free%open)source)
repository)so:ware%as%a%means%for%furthering%these%aims.

The Technical Code of Repository Software


Subversive
Proposal

Santa Fe,
OAI-PMH

1st%meeHng%of%Open%
First%UK%repositories%
O1en%seen%as%a%
Electronic%preUprint%
Archives%IniHaHve%in%Santa%
programme%overseen%
beginning)of)the)Open)
archive%for%scienHc%
Fe,%New%Mexico
by%the%JISC
Access)movement
publicaHon%(webU
Met%to%develop%standards%
Promoted%a%culture)of) A%call%to%acHon%for%
accessible%in%1993)
and%protocols%for%the)
change%towards%the%
academics%to%self<
Emphasised%the%power)
interoperability%of%eUprint%
use%of%eUresources%in%
archive%publicaHons%
of)hypertext)in)
archives%[8]
UK%library%pracHce%[7]
online
scholarly)research
Discussed%the%need%for%
Funded%several%
Foreshadowed%the%
Highlighted%a%
ins.tu.onal)repositories)
experimental)e<print)
need%for%linking)
community%of%
and)turnkey)repository)
repository)projects%
distributed)e<print)
academics%openly)
so:ware
and%electronic%journals%
archives
distribu.ng)their)
Developed%OAI)Protocol)
(e.g.%Open%Journals,%
research%on%the%
for)Metadata)Harves.ng%
CogPrints)
Internet%and%Web.%
standard%to%link%repository%
Note:&This&,meline&is&not&intended&to&be&a&complete&history&of&either&digital&libraries,&repositories&or&the&open&access&
metadata
movement.&It&is&representa,ve&and&only&includes&key&events&as&discussed&by&interviewees.

Conclusions
The%study%highlighted%the%temporary)stabilisa.on)and)technical)limita.ons%inherent%in%
so1ware%development,%as%well%as%the%interpre.ve)exibility)of)developer)priori.es)that%
emerge%during%the%process%of%design.
The%technical%code%revealed%a%series%of%explicit%values%embedded%in%the%workows%and%features%
of%of%DSpace%and%EPrints%that%priori.sed)the)cura.on)of)digital)objects)over)open)accessibility.
Furthermore,%the%use%of%IRs%as%a%mechanism%for%OA%is%sHll%con.ngent)on)the)priori.es)of)the)
communi.es)of)prac.ce%that%use%and%conHnuously%adapt%them%to%suit%their%needs.

Certain% values) and) features) that) were) priori.sed% over% others% during% the%
so1ware% design% process% have% emerged% through% the% importance% placed% on%
certain% funcHonaliHes% by% the% interviewees.% The% presence% of% these% explicit)
values% highlights% the% historical% inuence% of% the% narraHve% events% and% by%
extension%draws%aaenHon%to%possible)sources)of)emergent)tensions%in%IRs%(e.g.%
the% desire% to% collect% certain% metadata% before% providing% open% access% to% a%
record).

adaptability
usability

{
{
{

configurability
open licence

helpdesk, support
graphical interface

interactivity
curation

metadata harvesting
download capabilities

metadata creation
embargo features

References
The%community%may%
have%been%examining%
the%technical%code%of%
IRs%all%along:

What values
should (we)
build into
repositories?

[1]$Carr,%L.,%Pope,%C.,%and%Halford,%S.%Could%the%web%be%a%temporary%glitch?%In%Web$Science$Conference$2010,%Raleigh,%North%
Carolina,%USA,%2010.
[2]$BOAI.%Budapest%Open%Access%IniHaHve,%hJp://www.budapestopenaccessiniHaHve.org.%February%2002.
[3]$Flanagin,%A.%J.,%Farinola,%W.%J.%M.,%and%Metzger,%M.%J.%The%technical%code%of%the%internet/world%wide%web.%Cri0cal$Studies$in$
Media$Communica0on,%17(4):%409%X%428,%December%2000.
[4]$Abbate,%J.%InvenHng%the%Internet.%MIT%Press,%Cambridge,%MA,%1999.
[5]$Friedman,%B.%Human$Values$and$the$Design$of$Computer$Technology.%CSLI%lecture%notes.%Cambridge%University%Press,%
Cambridge,%1997.
[6]%Flanagin,%A.%J.,%Flanagin,%C.%F.,%and%Flanagin,%J.%Technical%code%and%the%social%construcHon%of%the%internet.%New$Media$and$
Society,%12(2):179%X%196,%2010.
[7]%Green,%A.%Towards%the%digital%library:%How%relevant%is%eLib%to%pracHHoners?%New$Review$of$Academic$Librarianship,%3(1):39%X%
48,%1997.
[8]%Ginsparg,%P.,%Luce,%R.,%and%Van%de%Sompel,%H.%Call%for%parHcipaHon%in%the%UPS%iniHaHve%aimed%at%the%further%promoHon%of%
author%selfXarchived%soluHons,%Open%Archives%IniHaHve,%July%1999.

This$study$was$conducted$in$accordance$with$the$University$of$Southampton,$approved$ethics$applica0on$ERGOLFPSEL11629.$Addi$onal)Credits:$All$icons$were$supplied$by$the$NounProject:$Bird$by$OliM,$Envelope$by$Alexandria$Eddings,$Idea$by$Andrew$Laskey,$Ques0on$by$SuperA0c$Labs,$Envelope$by$Alexandria$Eddings,$Gears$by$Cris$Dobbins,$Network$by$Brennan$Novak$and$
Enigma$by$Daniel$Llamas$Soto.$Paul$Ginsparg$image:$hYp://bit.ly/1zvQ8SU,$Stevan$Harnad$image$by$Chris$Balcombe:$hYp://bit.ly/1FOuAld

33

Research Posters | PhD Researchers 2013 2017

34

Research Posters | PhD Researchers 2013 2017

Styling the Internet of Things


Alex Owen alex.owen@soton.ac.uk

Supervisors: Kirk Martinez and Erich Graf

.ceiling.light

.desk.light

.tv
#livingRoom

.washer
#utilityRoom
.dryer

#home

.blind

#bedroom

#kitchen

.hob

.microwave

The number of smart devices in our environments is increasing and controlling them all using individual smartphone apps is
becoming less plausible.
To make these devices more manageable and interoperable we can assign an ID and class to each device and each context (which
could be a room. Then we can select devices individually and in complex groups using CSS (Cascading Style Sheet) selectors.
For example #home #utilityRoom .dryer selects any dryers in the utility room context. Or #home .light selects all lights of all
types in the house.
Beyond this we could make style sheets similar to CSS to control multiple devices at the same time, for example setting up the
same living space for a party, a movie or a study space.
There is also a lot of potential for using this approach in commercial and industrial settings.

Images from the Noun Project (thenounproject.com), by Aaron K. Kim, Crea>ve Stall, Andrew Liebchen, San>ago Arias, Christopher Pond and Edward Boatman

35

Research Posters | PhD Researchers 2013 2017

Sophie'Parsons'

' ! # "   


  !( " "

sp13g10@soton.ac.uk'
'
Supervisors:'
Mark'Weal'
Nathaniel'OGrady'
Peter'Atkinson'

"! : " "  % # ## # 


!( !" "?

 1: # ! # !( !" !" #%#"


!  # "   !( !" "?

 #!( 1
" !":

#UKSn

!"#" # # ! 


!( !" " ($
# !( "!%", 
$#!#", 
 ")
-  %. (2013)

ow201

0'

$#(
":


# "
 #" !!

-  $!%(
- #!%&"
- &##! (""

#Shore

$": 2013
:  !% # "
!( !" " 
!%!(  #".

hamAi

rshow'

ow

#Glasg

 2:  # %#" # ! $"


"    !(?

'
#"
 !:

sh'

erCra
t
p
o
c
i
l
He

 $#(" #( #
# #" $#" 
"#!$#$!" $!  !""
!.
- ! (2006)

o
#UKFlo

ds'

iots'

nR
#Londo

 3: " "   !( !" !"  %#"  
 # !(  !" " #  !( "#$#?

 !(:             


    ;
  
     ;    
     ,    
-    
   2004

36

Research Posters | PhD Researchers 2013 2017

37

Research Posters | PhD Researchers 2013 2017

From Crowd to Community:

Use of community features to encourage contributions in online citizen


science
Neal Reeves (ntr1g09@soton.ac.uk)

Online citizen science projects must attract contributions from large numbers of volunteers to enable
research. Increasingly, such systems make use of online community aspects. This poster describes a
survey of online community features in CS projects aimed at encouraging user contributions.

Goals

Task visibility

Design guidelines:

Design guidelines:

Provide specific, challenging goals, with


deadlines

Provide simple tools, to track


incomplete/essential tasks

Sample mechanisms:

Sample mechanisms:

Opportunities for rare discoveries


Classfication completion goals
Meta challenges (fundraising)
Links to feedback, rewards

Automatic entity assignment


Recent activity notifications
Required input trackers
Percentage completion bars

Feedback

Rewards

Design guidelines:

Design guidelines:

Provide systematic, quantitative


performance feedback

Utilise non-transparent, irregular


reward criteria

Sample mechanisms:

Sample mechanisms:

Task/performance contingent
Gold standard derivation
Majority opinion derivation
Numerical point scores

Status rewards (titles, ranks)


Privilege rewards (tasks, tools)
Tangible rewards (merchandise)
Obscured point calculations

Supervisors: Elena Simperl,


Jeff Vass

38

Research Posters | PhD Researchers 2013 2017

Online Criminal Transaction Processes


Using Crime Script Analysis to Identify Interceptive Opportunities
Gert Jan van Hardeveld

Web Science Centre for Doctoral Training

Online criminal markets

University of Southampton

The aim of my research is to identify the steps users of online criminal marketplaces have to go through
to be successful in committing an illicit transaction on the web. Online criminal marketplaces foster
environments that promote sophisticated measures to protect their members from law enforcement. This
is particularly the case on the Tor network, on which my research will focus. As both buyers and sellers
go through similar steps in the transactional process, their steps can be mapped with crime script
analysis, a method that looks at the procedural aspects of a crime.

Tutorials, guides, how tos

In the forums that users of such marketplaces use,


guides, tutorials and how tos are posted to help (new)
members execute their transactions in the perceived
safest way. In my research I will lay out this process
and highlight at which stages potential interceptive
opportunities can occur. However, I will also interview
law enforcement experts to see at which stages users
tend to improvise and not strictly follow the norms and
to what new chances for interception this may lead.

Carding

Carding forums are used by cybercriminals to buy


and sell stolen credit card data. Members of such
forums use pseudonyms to communicate with one
another to make sure they stay out of hands of law
enforcement. On the left, a representation of carding
in its simplest form can be seen. Sellers obtain
stolen credit card details and offer them on various
carding forums to buyers. However, in this process,
there are many steps that have to be taken and from
which can be deviated. I will map these steps with
crime script analysis.

Drug trade

Online drug trade is similar to carding, but requires


more physical activity, as drugs have to be shipped
to the buyer. However, many safety procedures
will be similar on both types of markets.

Future work

Analyse(
tutorials(

Create(scripts((

Talk(to(LE(
professionals(

Describe(
common(
criminal(
improvisa:ons(

Propose(
feasible(
intercep:ve(
methods(

Deviating from the criminal norm

From interviews with law enforcement I want to find


out to what extent users follow crime scripts. Their
aberrant behaviour may lead to possibilities for
interception. Some deviations from the criminal
norm will overlap on both types of forums, while
other will be criminal domain-specific.

Propose(
preventa:ve(
measures(

39

Research Posters | PhD Researchers 2013 2017

The$Risks$and$Barriers$of$Open$Data:$$
An$Entrepreneurial$Perspec;ve!
Johanna!Walker!jcw2g13@soton.ac.uk!!
Supervisors:!Dr!Lisa!Harris!&!Professor!Leslie!Carr!

Entrepreneurs!
Users!who!aim!to!generate!economic!value!from!Open!Data!!
Goal!is!to!create!rm,!not!just!apps,!to!derive!value!
Specic!moLvaLonal!subgroup!of!users!(not!simply!hackers)!
Popularly!idenLed!as!riskQtakers!but!
Studies!show!they!employ!riskQreducLon!strategies!(1)!
!
!

Data!that!is!most!valuable!to!private!
organisaLons!and!consumers!is!the!data!
that!is!most!protected.!
There!isnt!a!culture!of!transparency!and!
knowledge.!
!
!

I!thought!it!would!be!easyI!was!so!nave.!
You!need!deep!pockets!to!sustain!yourself!
long!enough!to!get!the!data.!
Open!Government!Data!

More!valuable!than!Public!Sector!InformaLon!as!more!accessible!
Removing!fricLon!from!informaLon!market!opens!opportunity!for!
increased!employment!and!tax!revenues!
Government!is!not!best!placed!to!exploit!its!own!byproducts!for!
prot!(eg!Trading!Funds,!TfL!apps)!
Proper!role!is!championing!innovaLon!in!Open!Data!
.But!this!has!to!be!more!than!hackathons!and!compeLLons!
!
!

Methodology!

Results!
!

Interviewed!founders,!
investors!and!supporters!of!!
early!stage!companies!
using!Open!Data!
!
Compiled!barriers!and!
challenges!from!blogs!and!
case!studies!
!
Engaged!with!users,!not!
publishers!or!academics!

People,!not!clean!or!
linked!data,!are!key!to!the!
process!
!
Many!stakeholders!are!
involved,!not!just!
publisherQuser!
!
The!UK!Open!Data!culture!
is!not!value!creaLonQled!
!

Insights!

You!need!!
the!right!
connecLons!!
in!the!
government.!

PerspecLves!on!Open!Data!uLlity!and!standards!are!situaLonal!
The!entrepreneurial!user!takes!a!more!pragmaLc!view!of!Open!
Data!than!those!held!by!academia!and!civil!servants!
The!relaLonship!between!data!publishers!and!users!needs!to!be!
an!interacLve,!conLnuous!dialogue!!
Open!data!is!a!process,!not!a!property!

Entrepreneurs!
seek!
forgiveness,!
not!
permission.!

(1)!Forlani,!D!and!Mullins,!J.!(2000)!Perceived!Risks!and!Choices!in!Entrepreneurs!New!
Venture!Decisions,!Journal(of(Business(Venturing(15:4!305Q322!

40

Research Posters | PhD Researchers 2013 2017


Developing a Framework For
Understanding (Dis)Engagement In Digital
Behaviour Change Interventions

By Anna Weston
aw3g10@soton.ac.uk
@anna_west0n

Q2. How is engagement measured?


Quest

ionna

Self-reporting

ires

Cardiovascular Eye
-track
ing
measures

Physiological

Sweat

gland

Web analytics

activit

Q3b. Can the point of disengagement be


predicted using this pattern?

Digital Behaviour
Change
Intervention

Q3a. Do disengaging users


follow a pattern of behaviour?

Engaging
Autonomy
Motivation
Relatedness
Competence
Self-Determination Theory

Q2

Disengaging

Q3

Point of
Engagement

Disengagement

Q1

Q4

Q5

Q4. What is
disengagement?
Q1. How is engagement
conceptualised?

Re-engagement

This can be during or at the end of


a session. It can be long-term or
short-term. It is a period of time
away from the site or app.

 

 

  

 
 

Website/App
Disengagement


  


Intervention
Disengagement

   


 
  
 

Disengagement from the


intervention material and guidance

     


  
  



 


Q5a. Are there common barriers to


dBCIs which cause disengagement?

 






  










Q5b. Can these barriers be overcome


to re-engage a disengaging user?

Supervisors

Leanne Morrison
Mark Weal
Lucy Yardley

41

Research Posters | PhD Researchers 2013 2017

42

Research Posters | PhD Researchers 2013 2017

Aligning learning theory, learning design


and Trust in MOOCs
Steve$White$(stw1g13@soton.ac.uk),$Su$White$
Web$and$Internet$Science,$University$of$Southampton$

Web Science

Do#conven(onal#understandings#of#online#learning#community#and#trust#apply#in#MOOCs?#

Social$construcIvist$approaches$to$online$educaIon$emphasise$interacIon$and$communicaIon$and$rely$on$the$
development$of$community$to$support$deep$and$criIcal$thinking$online.$This$implies$the$need$for$trust$between$
parIcipants$as$an$important$dimension$of$community.$$However,$the$potenIally$massive$numbers$of$learners$involved$in$
MOOCs,$and$the$disIncIve$paKerns$of$behaviour$and$moIvaIons$of$these$parIcipants$raise$quesIons$about$the$nature$
(or$perhaps$even$existence)$of$community$and$trust$in$MOOCs.$

reputaIon$
vulnerability$
expectaIons$

interacIon$$$$$$$$$$$$$$$
collaboraIon$
community$

Online#trust#

Learning#theory,#community#and#trust#

a" psychological" state" comprising" the" inten1on" to" accept"


vulnerability"based"upon"posi1ve"expecta1ons"of"the"inten1ons"
or"behaviour"of"another$1#
pervasive$and$disInct$from$F2F$contexts2$
risk$and$uncertainty$in$online$interacIons3$
$

FutureLearn$social$construcIvist$underpinnings:$
ConversaIonal$learning8$
Development$of$learning$communiIes9$
InteracIon$and$criIcal$thinking10$
$
Trust$as$fundamental$aspect$of$community$in$social$
construcIvist$learning$theory:$
Foster$cooperaIon11$
Enables$successful$group$learning12 $$
Required$in$MOOC$learning13$
#

Trust#systems#

ReputaIonNbased$approaches$$focus$on$behaviour4$
Predict$future$behaviour$from$past$acIons$
Inform$judgements$of$benevolence/credibility$of$counterparts5$
$

Need#for#support#structures#in#design#

Trust#as#under>researched#in#e>learning#

dearth$of$literature$on$$trust$in$online$learning$7$
$
$
new$interacIon$paradigms$demand$trust6$

Trust$theories$

MOOC$
Design$

Quan(ta(ve
#
#
#
#
#
N$Surveys$of$parIcipant$percepIons$of$community$and$trust $
N$AnalyIcs$of$learner$data
$
$
$
$

Learning$theory$
Learning$design$

Trust$systems$
Mixed#methods#research#design#

ParIcipant$interacIon$has$limits$in$MOOCs14$
Building$trust$challenging$in$MOOCs15$
Need$mentor$curaIon,$aggregaIon,$and$presence15$
Recognise$boundaries$of$openness$15$

#
$
$

#Qualita(ve#
$N$Literature$review$on$educaIonal$communiIes$/$crowds$
$N$Virtual$ethnography$of$discussion$fora#

Research#direc(ons#

Can$MOOC$parIcipants$be$seen$as$a$community$as$understood$in$educaIonal$theory?$
What$is$the$nature$and$extent$of$trust$relaIonships$that$exist$between$MOOC$parIcipants,$and$between$parIcipants$and$mentors?$
How$can$MOOC$designers$best$align$learning$theory,$MOOC$design,$and$technical$systems$facilitaIng$development$of$trust?$$
$
References$(Mendeley):$hKp://bit.ly/1MLeXgD$

43

Research Posters | PhD Researchers 2012 2016

James Baker
(jb29g08@ecs.soton.ac.uk)

Introduction
As computer games have become more popular, there has been
considerable interest in developing serious games, which are games with
a purpose beyond entertainment; in particular, to educate
However, it is not easy to design such games. To be successful, they must
keep the players attention, teach their material in a more lasting way than
traditional teaching methods, and of course be fun.

Supervisors:

Dr. Gary Wills (gbw@ecs.soton.ac.uk)


Prof. Ashok Ranchhod (Winchester School of Art)
(a.ranchhod@soton.ac.uk)

This project is investigating how to make educational games immersive.


To accomplish this, various learning theories and game design theories - as
well as serious game attempts previously made were analysed, and the
most important themes for keeping players engaged were extracted.
These themes were then made into a model, comprising of all the general
factors which can influence educational game immersion, split into three
categories.

Education
Relevance - Players feel more immersed in
an educational game if its educational
content is made relevant to the player, i.e.
the player feels that they can use the
content in their own life
The first category summarises immersion in
the games educational content. This
involves how to maximise the possibility of
learning the material within the game, by
emphasising why it should matter to the
player in the real world, and by presenting it
naturally within the progression of a game.

Gameplay Integration - An educational


game is more immersive when its
educational content is integrated into the
gameplay, so the two do not feel distinct
from each other while playing

Sequencing- It is important to ensure that


the content is presented in an appropriate
order, in terms of what skills and
knowledge they require to progress

Gameplay
Balanced Challenge - A player can become
more easily immersed in an educational
game if the challenges it presents are
balanced to the players abilities (it does
not feel too hard or too easy)
The second category outlines the factors in
gameplay that influence a players
immersion. This includes the way the
games challenges are designed, and the
underlying feedback mechanisms they
employ.

Agency

The third category focuses on factors which


let the player feel like an active, immersed
participant in the games virtual world. In this
way, the players learning feels more
immediately important and consequential.

44

Feedback - To prevent the player getting


too frustrated with an educational game,
it is important to provide frequent, helpful
feedback on how well they are progressing
through the game

Guidance - There needs to be appropriate


guidance provided to the player when
they get stuck, in order to reduce their
frustration and keep them focused on the
challenge

Narrative - The game must feature a


compelling narrative. This includes
establishing clear goals for the player,
ensuring consistency in the game world,
and keeping the story flexible enough so
that the player is able to influence it

Scenario - Educational games can be more


immersive if they have unfamiliar setting,
because they can more readily disengage
from the real world, and can approach the
educational content presented from a
new perspective

Curiosity - Players become more immersed


in a game when the game world and the
story stimulates curiosity (e.g. through
interesting details within the world, or
mysteries and surprises in the narrative)

Identity Projection - The player becomes


more engaged with an educational game if
they feel in control of their in-game
character, and feel invested in the role
they play in the game

Experimentation - Educational games are more engaging when they


allow players to experiment with the ideas they are trying to teach (i.e.
allow the players to use the educational content to solve challenges)

Research Posters | PhD Researchers 2012 2016

45

Research Posters | PhD Researchers 2012 2016

Is Social Media Being Used To Support


Non-Formal Learning by School Children?
PercepAons of Social Media

Findings of this work indicate that, perhaps


surprisingly, a signicant minority of pupils hold a
negaAve of view social media. Of the two studies
conducted so far ndings of study one, in which self
reported negaAve view did not appear to impact upon
use of social media, appear to be reinforced by ndings
of study two in which the negaAve inuence of social
media was reportedly greater. Though the negaAve
percepAon was higher in study two the level of use,
compared to the administraAve task use reported in
study one, was also higher in that social media was
reported more oKen as used in support of school
related work and homework understanding.

In line with the level of importance
aLached to low level use of social media such as
chaMng with friends or relaAves found in an iniAal
study, parAcipant comments in a second study
indicated a strong preference to use social media to
support dyadic interacAons. This would appear to
indicate that the aordances of social media to
communicate within local networks are being used in
the majority of occasions whereas the aordances
enabled by a global or school wide network are used
rarely. This preference for dyadic use of social media
may be due to issues of digital literacy, social capital,
pedagogical models in place which may not promote
the use of aordances enabled by social media or
social expectaAons which limit social media to a minor
role.

Learning as a Social Event

When one couples this apparent enthusiasm of


teenagers to uAlise social media with consideraAon of
construcAvism as the basis for the majority of current
learning theories the importance of using social media
in support of non-formal, collaboraAve learning
becomes apparent. From a pedagogical perspecAve
social media, being collaboraAve and communal in
nature, would appear to be a logical partner in support
of construcAvist learning whether cogniAve or social in
nature.


Most commonly occurring words recorded during


focus group interviews
Use and perceived level of importance of social media
by school pupils

Why InvesAgate?

With a focus upon the aordances enabled by social


media such as creaAvity, sharing of knowledge and the
building of communiAes of learners this research seeks
to idenAfy possible barriers to the use of social media
by pupils aLending secondary schools in England in
support of non-formal, self directed, collaboraAve
learning.
In aLempAng to address this quesAon the landscape in
which learning may be supported through social media
is being invesAgated by looking at percepAons and use
of social media by pupils and how these percepAons
compare to those held by other stakeholders at the
operaAonal level i.e. teachers and parents.

Objec&ve

SupporAng Non-Formal Learning

From the survey data collected in study one it was suggested


that social media was being used to support not-formal
learning but at a low level and with no clear indicaAon how it
was being used.













Researcher: Robert Blair
Web Science iPhD candidate
Centre for Doctoral Training
University of Southampton

Robert.Blair@soton.ac.uk

Web Science

By exploring percepAons held by stakeholders at the


operaAonal level it may be determined whether barriers
to non-formal learning supported by social media exist
due to limitaAons of pupils or technology and
determine whether, or indeed if, they can be overcome
through educaAon, policy, or some form of technical
soluAon.









Use of social media to support non-formal learning
by subjects and gender

Inuencing Factors

Factors idenAed which may have an eect upon


whether a parAcipant will opt to use social media to
support their learning.









Inuence of Pupil PercepAon

Pupil percepAon relates to the overall percepAon a


parAcipant might have with regard uAlising social media to
enable aordances which support learning. As seen in the
chart below, the overall percepAon reported was posiAve
with 54% of comments associated with a willingness or
desire to use social media to support learning. It is also of
note that, as menAoned previously, a signicant minority
of 36% of comments were negaAve in nature.







Percentage of comments for percepAon of social media


eecAng selecAon of social media to support not-formal
learning

Preferred InteracAon

Though not idenAed as a specic theme an interesAng


aspect of social media alluded to by parAcipants was
that of interacAon type. This chart shows the percentage
of comments made by parAcipants with regard the type
of interacAon they would describe as normally taking
part in and the inuence it would have on their decision
to use social media in support of non-formal learning.













Percentage of comments for preferred type of interacAon
eecAng selecAon of social media to support not-formal
learning

Dr. David Millard
ECS
University of Southamtpon
www.davidmillard.org.uk


Supervisors
Dr. John Woollard
EducaAon School
University of Southampton
J. Woollard@soton.ac.uk

The Digital Economy Theme is a Research Councils UK cross council iniAaAve led by EPSRC and contributed to by AHRC, ESRC, and MRC

46

Research Posters | PhD Researchers 2012 2016

The$D.N.A.$of$
Web$Observatories$

Web Science

Ian$C.$Brown$
Web$Science$Ins+tute,$University$of$Southampton$

WHAT?$
HOW?$
WHY?$

eni6on$
ature$

rchetypes$

ACADEMIC!KNOWLEDGE$

COMMUNITY!CONTROL$

BUSINESS!RESOURCE$

47

Research Posters | PhD Researchers 2012 2016


Web Science

The role of ICTs for


Post-Conflict Peacebuilding

jrw1g08@soton.ac.uk
@jenwelch15
Jen_welch15

Related work

Jennifer Gaskell
Prof Susan Halford
Dr Mark Weal
Prof Gerry Stoker

The research

[i]f the Internet can provide a canvas upon which nations can paint their social, linguistic,

cultural, and political beliefs, then perhaps the physical struggle for safe cultural havens and

1. Conceptual framework

borders may no longer be as necessary for their preservation or evolution

McCormick (2002)
The role of the Web and ICTs in peacebuilding is at present widely under-researched, yet
there is a prevalent assumption of the many potentials of their uses to improve the relevance
and impact of post-conflict peacebuilding practice. The literature on the subject is small, but
in 2004 already Sanjana Hattotuwa (2004: 39) highlighted an increasing confluence between
ICT, conflict transformation and peacebuilding. In 2013, Stability Journal launched a special
collection on New Technologies for Peace and Development, while earlier academic work on
the uses of the web for peacebuilding or conflict transformation processes focused on the
role of so-called digital diasporas (Brinkerhoff, 2011, 2007; Turner, 2008; Kent, 2006). These
academic developments have been paralleled by increased policy and practical attention to
the topic.

Focusing on the concept of affordances and building on


previous work, the thesis takes as its starting point the
co-constitution of technology and society. The
analytical emphasis shifts to the co-evolutive nature of
local and other uses of technology, in situations where
complex power dynamics are at play, and as such
allows us to better understand the technologies
emergent properties, providing a more comprehensive
account of their wider societal impacts.

2. Practice review

Opening of the first international conference on ICTs for peacebuilding Build Peace
Peace through Technology, at MIT (Cambridge, MA) in April 2014

How are ICTs being used


in peacebuilding
contexts, for what
purpose and with what
impacts?

Participatory Action Research


howtobuildpeace.org

howtobuildup.org

A key stakeholder committee formed


to review conceptual framework,
analysis from practice review and
advise on case studies.

Putting research into action through


case studies and the implementation
of early results of the thesis into real
life projects, analysis of which forms
the final empirical part of the study.

Interviews conducted by the


researcher with each member of the
key stakeholder committee.
CC BY 3.0 Meeting designed by Dan Hetteix from the Noun Project; Interview designed by Sarah Abraham from the Noun Project

48

There are significant opportunities for


economic profit

Information from new technology takes a


number of years to fully diffuse through a
market

Information from Virtual Globes is used in complex decision


making over 18 years.
1. How quickly does information from a new technology diffuse
through a financial market?
2. If new information is not immediately discounted, what is the
economic impact of the information diffusing through a market?

Virtual Globes more popular than any other


web technolgy and even Facebook!

Virtual Globes like Google Earth provide new


information on terrain

How quickly is new web based Technology


Adopted?

5IF%JHJUBM&DPOPNZ5IFNFJTB3FTFBSDI$PVODJMT6,
DSPTTDPVODJMJOJUJBUJWFMFECZ&143$BOEDPOUSJCVUFEUPCZ
")3$ &43$ BOE.3$5IJTXPSLXBTTVQQPSUFECZUIF
&143$ HSBOUOVNCFS&1(

Trip Time is more important than Distance


People will travel further if the likelihood of
winning is greater
Over a 3 year period statistical models can
be used to generate a profit in betting
markets

$PMPVSDPEFENBQ
TIPXJOHEFOTJUZPGIPSTF
SBDFUSBJOFSTBOEUIF
MPDBUJPOTPGUIFSBDF
DPVSTFTNBSLFUPOUIF
NBQ

Lawrence Green
Supervised By:
Tiejun Ma
Thanassis Tiropanis
Johnnie Johnson
Ming-Chien Sung

We analyse decisions in a repeated choice experiment


over 3 years.
1. Calculate how far each horse has travelled to a race
2. Use statistical models to analyse whether distance
and probability of winning are linked
3. Test the economic imact of this information

Is Distance OR Time more important


in decision making?

How Does Distance and Time effect peoples


decision making on travelling?

Research Posters | PhD Researchers 2012 2016

49

Research Posters | PhD Researchers 2012 2016

Web Science

SPENCE!is!a!model!of!online/oine!community!!!!!
(O/OC).!It!provides!a!means!of!building!and!
measuring!O/OC!with!conceptCbased!metrics,!
created!from!core!elements!of!online!and!oine!
community!theory!(e.g.!Durkheim,!Hanifan,!Hillery,!
FesInger,!Newcomb,!Putnam,!Bourdieu,!Rheingold,!
McMillan,!McPherson,!Wellman,!GranoveOer,!
Giddens)!that!has!been!iterated!by!empirical!
evaluaIon.!!
In!the!diagram,!the!facet!discs!dynamic!drives!
upwards:!the!Entrepreneurial!driver!leads!to!the!
creaIon!of!Se6lement!using!Channels,!which!enables!
Proximity!that!drives!Exchange!that!creates!Network.!!

Caroline)Halcrow.)Supervisors:)Professor)Les)Carr,)Professor)
Susan)Halford,)Professor)Dame)Wendy)Hall
)!

Modeling'online/oine'community'
NETWORK'
EXCHANGE'

PROXIMITY!
CHANNELS'

S
P
E
N
C
E

GENERATIVE'MODEL:'With'O/OC'insMtuMonalisaMon'
local'community'services'form'and'exisMng'services'
are'linked'to'
Network'is!the!interpersonal!
structure!of!social!capital!of!trust!
and!inuence!capability.!!
Channels!are!the!communicaIons!
mechanisms!across!which!the!trac!
of!exchange!ows.!
Entrepreneurship!(social)!is!the!
development!of!online/oine!
community!by!an!agent!or!
organisaIon.!

SPENCE'FACETS'

SETTLEMENT'
ENTREPRENEURSHIP'
Se6lement!is!a!place!in!which!
personal!or!collecIve!community!
is!performed.!It!can!be!sustained!
or!temporary,!online!or!oine,!
external!or!internal!(cogniIve).!!!
Proximity!is!physical!or!psychological!
nearness!between!people.!!
Exchange!is!deliberate!
communicaIon,!including!
informaIon!content,!aiming!for!
reciprocal!understanding,!
interacIon!and!linkCmaking.!

50

Research Posters | PhD Researchers 2012 2016

The investor decision making process A web science perspec7ve


William Lawrence
wl13g09@soton.ac.uk

Interdisciplinary Approach
This project combines insight from
Psychology, Finance and Computer
Science to help build an
understanding of the role of the web
in the investor decision making
process.

Key Ques7ons
- How do investors interact with
online informa7on?
- Can online footprints give
es7mates of investor mood?
- How important is the role of
investor mood in the stock
market?
Proposed Methods
- Dieren7a7ng public
mood and investor
mood from online
social media
- Applying psychological
models of mood to
social media analysis
- Tes7ng models
against individual
stock prices/market
indices

Above ndings from Bollen et al.s (2011) study


of Twi\er mood and DIJA index prices

Supervisors
Prof. Johnnie Johnson (Management)
Dr. Tiejun Ma (Management)
Prof. Ming-Chien Sung (Management)
Dr. Thanassis Tiropanis (Electronics and Computer
Science)

51

Research Posters | PhD Researchers 2012 2016

Manuel Leon Urrutia


ml4c08@soton.ac.uk

Understanding Attitudes Towards MOOCs


in Higher Education Institutions
Supervisors:
Dr. Su White (School of Electronics and Computer Science)
Dr. Lisa Harris (School of Management)

Abstract
Higher Education Institutions (HEIS) are facing the disruption of MOOCs as a technological innovation with chances of
altering the Higher Education landscape. MOOCs are now a
reality in an increasing number of universities, which is
provoking a wide range of reactions both in faculty members
and academic leaders. This project aims to capture these
perceptions by enquiring university staff with different levels
of responsibility within the institution. The results of this
study are intended to inform about how the inclusion of
MOOCs in the educational catalogues of universities is
perceived within the faculty so that the best course of action
is chosen accordingly.

METHODS
Desk Survey

Questionnaires

Interviews

Survey of specific facts reported


in specialist magazines such as
Times Higher Education and The
Chronicle of Higher Education.
All sources curated with Scoop.it

Addressed at educators in HEIs (mainly


lecturers), both involved and not involved
in production or delivery of MOOCs

Addressed at a selection of participants in the


questionnaires, AND academic leaders in
HEIs.

As an initial stage of this project, this poster reflects upon the


main concerns that MOOCs are generating in the Higher
Education arena by reviewing the already large body of
literature that the topic has generated to date. The literature
review will also include references on the theoretical framework within which the project is to be developed, which
includes different theoretical models on attitudes, innovation, and disruptive technologies in organisations.

What are the plans of academic leaders


regarding MOOCs?

How are the observed universities incorporating


MOOCs?

For them, what is the role of MOOCs at the university?

What resources are they dedicating (human, financial), and


where do the budgets come from?

What are their boundaries? What domains of


traditional education MOOCs should not trespass?

What reactions and attitudes are MOOCs causing in


faculty?
Are they perceived as a threat, or as an opportunity?
Are they perceived as they are going to affect their working
conditions?

52

What is the role of MOOCs within their organisational


strategy?

Research Posters | PhD Researchers 2012 2016

The Role of Internet Service Providers in Improving Cybersecurity:


An Interdisciplinary Approach

Technology
Law

Economics

ISPs are best suited to


safeguard the Internet but
the necessary security
measures are not in place

Cyber
insecurity is
still an open
problem
Lack of
economic
incentives for
ISPs to
implement
costly security
measures

Evangelia Papadaki {LLM, MSc)


E.Papadaki@soton.ac.uk
Web Science CDT

Lack of
specific legal
obligations
imposed on
ISPs
Security techniques
might be
difficult to implement,
ineffective (i.e. highspeed Internet backbone
networks)
or subject to misuse (i.e.
surveillance by
governments or private
entities)

Adoption of
approved codes
of conduct

How can ISPs secure the Internet


infrastructure and users personal
data while maintaining fundamental
human rights and principle of
Internet governance?
Technology
specific regulation
imposing detailed
security obligations
on ISPs

Mechanisms
for changing
ISPs security
culture

Adoption of a
risk
management
frame

Law enforcement
mechanisms: better
incentives for
compliance, serious
sanctions for noncompliance
Web Science

Supervisors:
Dr Tim Chown (ECS)
Dr Sophie Stalla-Bourdillon (Faculty of Business&Law)

53

Research Posters | PhD Researchers 2012 2016

By Elzabi Rimington. Supervisors: Pauline Leonard and Mark Weal

League of Legends, a massive online

ethnography undertaken in the game

This research takes the form of an

what players say and do in games.

expertise, and belonging, expressed in

building individual markers of class,

extend real-world social networks while

and communication. They reflect and

Online game worlds are sites of conflict

forms of capital and they continue to emerge and re-emerge in different social

time represents the immanent structure of the social world. There are many

distribution of the different types and subtypes of capital at a given moment in

theoretical construct. As Bourdieu (1986a) describes it, the structure of the

Like the field, capital is a process by which society expresses itself as much as a

arrangements (Swartz, 1997).

economic power and increase their capacity to legitimate existing social

autonomy it may extricate itself from hegemonic forms of political and

Bourdieu, this autonomy is a form of symbolic power, in that as a field grows in

field to become to some extent autonomous from external environs. For

and hierarchies are largely negotiated by their own development, and allow the

willing to and capable of investing in a particular field. Their internal structures

with a shared habitus, which is of strong enough influence that they become

Swartz, 1997). They are operated and inhabited by groups of human agents

culture and society, based on relational modes of reasoning (Bourdieu, in

Fields, as Bourdieu would have it, are structured conceptual spaces within

core.

Swartz, 1997). In this interpretation there is no dichotomy; we are social to our

opposition to society, it is one of its forms of existence" (Bourdieu, quoted in

"the socialized body (which one calls the individual or person) does not stand in

structured and structuring social system (Bourdieu, 1990). Bourdieu wrote that

self is the social, that humans are made and exist and make ourselves within a

battling id and superego. By contrast, there stands a strong argument that the

between self and society has fascinated thinkers for millennia, from Platos

depending on which goals and achievements are framed as particularly

This may differ according to the type of synthetic environment being discussed,

and that they also invest in valued cultural objects or artefacts (Malaby, 2006).

participants develop and acquire in the form of competencies and credentials

and is flexible enough that it can potentially be applied to the resources that

of expertise, rank, and reputation undertaken by participants in these worlds

microcosms of society. As a concept it goes some way to describe behaviours

bringing together current research, completing the picture of virtual worlds as

cultural capital in this context. He claims that the notion may act as a means of

social capital in virtual worlds, Malaby (2006) proposes the consideration of

While most scholarship on the subject is preoccupied by notions of value and

cultural capital.

achievement, badges of honour, ranks and titles all fall into this category of

yet remains relatively autonomous from its bearer by its own value. Medals of

a form of cultural capital that imbues an agent with a degree of authority and

through qualification by an independent, authoritative body onto an agent, it is

institutes cultural capital by collective magic(Bourdieu, 1986). Expressed

economic capital and symbolic power. Finally, the institutionalized state

objects. For example a highly sought-after objet dart is valued both in terms of

the objectified state, can conversely be traded for, as it is embodied in material

form of symbolic power manifested as authority. The second, cultural capital in

economic capital, though it can be unconsciously learned. As such it takes on a

individual and as such cannot be instantaneously exchanged freely or for

embodied state, takes time to cultivate and become internalised by the

Cultural capital, according to Bourdieu, exists in three forms. The first, the

How do we experience and live in a social world as individuals? The interplay

battle arena known for its enormous

environments, occasionally needing re-negotiation into more manageable

desirable. Certainly it seems no stretch to assume that expertise can be

recommendation to subdue individual will for a common good, to Freuds

and verbally combative player base.

conceptual constraints. The three most fundamental according to Bourdieu are

Designing a project which has the capability to effectively answer this question,
while bearing in mind the implications of the literature, is a challenging part of
this process. Ethical considerations, practicality, and rigour must all be taken
into account. As virtual-worlds research is quite new, there is no
predetermined method to follow. Instead, I took into consideration methods of
practice and analysis which have proven successful for a number of other
researchers.
An ethnographic approach to this research could have been undertaken in both
the real and virtual world, or simply online. I chose a virtual ethnography
followed by semi-structured interviews. The understanding was that this would
offer less of an insight into a particular players lived experiences of gaming as
part of their life, but that it would also be less invasive while still allowing for a
reflexive and participant-focused approach to answering the research question.
I spent approximately one hour a day, four days a week and at varying times of

day immersed in the League of Legends environment. This time was spent both
in and out of game instances making field notes and forming social ties.
Preliminary results are encouraging.

Image jon-jonz.deviantart.com and Riot Games

indicating that further distinguishing practices may be found.

scorn clumsy newbies or noobs. In this they make displays of cultural capital,

In-game experience is tallied by levels, and highly experienced, elite players

sublimating facile impulses and primary needs cannot assert itself (2010:176).

art, there is no area of practice in which the intention of purifying, refining and

to agree, claiming as he did in 1980 that while it might be most prominent in

must be that distinguishing behaviours can be observed. Bourdieu would seem

distinction existing in some form. Nonetheless, as microcosms of society, it

virtual environments, far less work has been done on the possibility of

While there is a burgeoning body of research on capital in video games and

acknowledgement of skill above that of other players.

virtual gew-gaw, rather it is in the conference of authority and the

effort. The reward for such an investment goes beyond a ranking number and a

medallions and ranks. Climbing ranks takes time, skill, and concentrated

ratios of not only wins to losses but ratios of kills to deaths) indicated by

to be ranked against each other, their standing (a complicated score based on

cultural capital. In the MMOBA League of Legends, players enter tournaments

will bestow a title on the player, surely indicating a practice of institutionalised

as exploring the game world in its entirety or finding particularly rare treasure

may come into play. For example, in World of Warcraft rare achievements such

player is low- or high-level (Malaby, 2006), but there are other factors which

demarcated in any game with a levelling mechanic, purely by whether the

economic, social, and cultural (Bourdieu, 1986).

Contact:
Elzabi Rimington
University of Southampton
58/3129
Salisbury Road
Highfield Campus
Hampshire
SO17 1BJ

07525429416
emr2g08@soton.ac.uk

54

Research Posters | PhD Researchers 2012 2016

The Web and Digital Pirates


Who are Pirates and do they understand the Law?
Definitions of the term Pirate

Understanding of the law

Pirate is not a legal term. Though it does appear in the


Berne convention, more recently, it has been banned from
use in court as pejorative (Ernesto, 2013; Williams, 2013).
An approach often taken in piracy research is to define
digital pirates as those who engage in digital copyright
infringement. Yet some estimates have suggested that the
average user might incur roughly 1.6 Million in civil liability
for infringement of copyright during the course of a normal

The first part of this research aims to establish more accurate


definitions of the term piracy, from historical, to political, to
copyright infringement. The second part aims to compare
pirates attitudes to infringing behaviour against their
understanding of the law. This comparison should help to
establish the possibilities of different pirate typologies based on
differing levels of legal understanding. It has been suggested
that copyright law is one of the most complex areas of law
(Vaver, 2006). So much so that some have questioned not
just whether the public understands their interactions with

day without awareness of the infringement (Tehranian,


2007).

This

makes

copyright infringers, to
broadly describe pirates,
seem inappropriate. Even
in more explicit cases,
it is not clear that those
that are actively infringing

copyright but even whether there is consistent agreement


amongst lawyers as to the interpretations and applications
of copyright laws and legislations.

understand the illegality.


So then, who are pirates?

Crime Deviancy
Several researchers have highlighted that many pirates
appear not to construe their actions as immoral or even
suggested that pirates dont make moral considerations
(Gray, 2012; Yu, 2012). Yet many approaches to
explaining pirate behaviour take explicitly normative
perspectives that preclude a thorough examination of
the phenomenon. Criminological theories consistently
suggest a dissociation of crime (illegality) from deviant
behaviour and piracy
may be a case where this
dissociation is necessary
for academic investigation.
Illegal

Not Illegal

Deviant

Murder

Adultery

Not Deviant

Possession of a
short lobster

Breathing

As in The Lacey Act (18 U.S.C. 42; 16 U.S.C. 33713378) which would make possession of a short
lobster a Federal crime in the US (Duane, 2008).
To quote Duane, It doesnt matter if hes dead or
alive. It doesnt matter if you killed it, or if it died of
natural causes. It doesnt even matter if you acted
in self-defence.

All images used under CC licensing and/or with permission.


Listed left to right, top to bottom:
Omning Old ladies pirating cook books at Barnes and Nobel
http://imgur.com/Zhbii
Mr. TinDC Law Books https://flic.kr/p/6HYZNq
Joe Shlabotnik - Everett And His New Lobster https://flic.kr/p/
vXCCN7
Joriel Joz Jimenez Arrrgh! | Pirates http://flic.kr/p/5VtC1r
References:
Duane, J. (2008). Dont Talk to Police. Regent Law School.
Ernesto. (2013). MPAA Banned From Using Piracy and Theft Terms
in Hotfile Trial.
Gray, K. (2012). Stealing From the Rich to Entertain the Poor?: A

Survey of Literature on the Ethics of Digital Piracy. The Serials


Librarian, 63(3-4), 288295.
Lacey, J. F., The Lacey Act (18 U.S.C. 42; 16 U.S.C. 3371-3378).
Tehranian, J. (2007). Infringement nation: Copyright reform and the
law/norm gap. Utah Law Review, 2007, 537.
Vaver, D. (2006). Does the Public Understand Intellectual Property
Law? Do Lawyers? (SSRN Scholarly Paper No. ID 902793). Rochester,
NY: Social Science Research
Williams, K. Case 11-cv-20427-KMW (UNITED STATES DISTRICT
COURTSOUTHERN DISTRICT OF FLORIDA 27 November 2013).
World Intellectual Property Organization. (1886). Berne convention
for the protection of literary and artistic works.
Yu, S. (2012). College Students Justification for Digital Piracy: A
Mixed Methods Study. Journal of Mixed Methods Research, 6(4),
364378.

Behavioural Checks

Given the potential complete lack of understanding, it


might seem inappropriate to ask participants questions
like do you pirate? or have you infringed copyright?
Yet, these are the questions that are deployed across
almost every single study done on digital piracy in the
last 10-15 years. Lack of behavioural checks may be one
explanation for the inconsistent findings regarding
demographics or the claims that digital piracy, a
behaviour that some
studies find occurring
at rates of 90+% in their
samples, results from
lowself-control. Quite
what high self-control
would look like in this
context is unclear.

This research:

The first portion of this research, described in the left


columns, is concerned with outlining potential typologies for
digital pirates and assessing the relevance of the normative
perspectives that have been applied to this area previously.
The second portion of this research, described in the
right columns, outlines the methodological direction for
establishing both whether pirates understand the legality
of their actions and how this can be assessed in a research
context. This is done by establishing a best practice for
future research in such a way as to begin establishing a
typology of digital piracy.
Contact Information and Supervision:
Kieran Rones BSc MSc MSc email: kcr1g08@soton.ac.uk
Twitter: @K_Rones
Supervisors
Dr Craig Webber (Criminology)
Dr Eleonora Rosati (Law)

55

Research Posters | PhD Researchers 2012 2016

HOW TO MAKE THE


WORLD A BETTER
PLACE IN 5 EASY
STEPS
SOCIO-TECHNICAL ANALYSES OF FIVE
COMMUNITY ORGANISATIONS IN
SOUTHAMPTON: A GROUNDED THEORY

Web Science

eamonn walls
ew1g12@soton.ac.uk
web science cdt
university of southampton

Abstract

IN PARTNERSHIP WITH
u

JAMIES COMPUTERS, SOCIETY OF ST JAMES

This project aims to explore the ways in which digital, web and
mobile technologies (DWMTs) might or might not contribute to
making the world a slightly less bad place (SLBP). The point is that
people have different ideas about what a SLBP might look like.
The Concept of Social Good

OCTOBER BOOKS

The concept of social good is that it is possible and desirable to


make the world a SLBP, and that it is worth finding out what ideas
people have proposed about how to go about achieving this. It turns
out that people have proposed LOTS of ideas. So I went out into the
world to find out about that.
Case Studies: 5 SGOs

SOUTHAMPTON CITY MISSION BASICS BANK

I have been working for about a year with five community


organisations in Southampton which I have described as social good
organisations (SGOs). Each of these SGOs has a set of values, a
mission, and a SLBP-related reason for existing. I want to find out
in what ways DWMTs might or might not contribute to each SGOs
vision of social good.
Methodology

CITY LIFE SOUP RUN

A standard qualitative Grounded Theory analysis following the


Corbin-Strauss tradition will make systematic comparisons of
perceptions and realisations of social good within and between the
SGOs. There is a focus on convergences and divergences in opinion
and actualisation of SLBP based strategies, per SGO and across all
SGOs, particularly with reference to DWMTs.
Wider Application

SOUTHAMPTON SUNDAY LUNCH PROJECT

Im a social activist. What I really care about is trying to make the


world a SLBP. If you care about this as well, send me an email and
we can solve all the worlds problems.
Acknowledgements
with many thanks to my super-super-supervisors !
They are so amazing!
Dr Gary Wills & Dr Jeff Vass

56

Research Posters | PhD Researchers 2012 2016

Revenge Pornography
Abigail Whitmarsh
Web Science CDT
University of Southampton

Background
Revenge Pornography describes the act of publishing on the Web pornographic images of a person without their consent. It is a phenomenon
that has been enabled through the development of the Web and almost universal public access to digital photography and file sharing
technology. Legal responses aimed at ending revenge pornography have focused heavily on the either the owner of the Website, as in the cases
of Hunter Moore, Kevin Bollaert, Craig Brittain and Casey Meyering or by criminalising the act of uploading material without the consent of
the subject. England and Wales have taken the latter approach, and with the Criminal Justice and Courts Bill 2015 it is now an offence for a

person to disclose a private sexual photography or film if the disclosure is made a) without the consent of an individual who appears in the
photograph or film, and b) with the intention of causing that individual distress.
Research Objective
is revenge pornography an individualistic act or a
broader manifestation of misogyny?
Research Questions

Who are the various types of users of MyEx.com


and do they constitute an online community?
Why do people post intimate images of other
people without their consent to myex.com?
Why do people engage with the content on
myex.com

Methods
Using a custom made Web scraper, data was collected from a revenge pornography
Website. The scraper will ran once an hour for 28 days and collected;
New posts
Number of views the post gets hourly
Comments that are made on the post
Time of comments
Commenters chosen pseudonym
The scraper ran successfully 97%.

Analysis
A total of 396 posts were made to the Revenge Pornography Website over the 28 days (672 hours).
270 posts remained on the Website for the full 672 hours, 126 were removed before the full month.
378 posts featured women, 18 featured men.
The true percentage of posts that feature women on this revenge pornography Website is between 93% and 98% at a
confidence level of 95%.
The 95% confidence interval for the number of views that a post featuring a woman receives is between 32892.4 and 36272.5
and 95% confidence interval for the number of views that a post featuring a man receives is between 6660 and 8263.
The 95% confidence interval for the number of comments that a post featuring a woman receives is between 14 and 15. The
95% confidence interval for the number of comments that a post featuring a man receives is between 6 and 9.

Maximum Number of Views for All Posts Over 28 Days


Posts that Remained Live
35

120000

30

N 25
u
m
b
e
20
r

N 100000
u
m
b
e
80000
r

o
Male
f
Female

o
f
V
i
e
w
s

Number of Posts to Revenge Porngraphy Website by Subject's


Gender Over 28 Days

140000

Male
Female

15
P
o
s
t
s 10

60000

40000

5
20000

0
1
1
6
11
16
21
26
31
36
41
46
51
56
61
66
71
76
81
86
91
96
101
106
111
116
121
126
131
136
141
146
151
156
161
166
171
176
181
186
191
196
201
206
211
216
221
226
231
236
241
246
251
256
261
266

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

Day

Acknowledgements
The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC.
My PhD supervisors; Gethin Rees, Elena Simperl and Craig Webber

Web Science

57

Research Posters | PhD Researchers 2011 2015


PERSONAL DATA AND TRANSPARENCY
Reuben Binns, rb5g11@soton.ac.uk, @RDBinns, www.reubenbinns.com/blog

Personal data: what, why, where?


By using digital technologies we reveal information
about ourselves such as likes and dislikes, purchase
histories, messages, emails, tweets, GPS coordinates,
browsing habits and search terms. Many people now
track their daily activity, health and diet via the web.
When combined, such data constitutes a rich digital
profile of our lives. Mining and analysing this data can
reveal a lot for marketers, researchers and individuals
themselves.
Over 350,000 organisations in the UK are required to
disclose how they use personal data.
We collected these disclosures over 18 months to draw a
picture of the personal data landscape in the UK.

Where in the world does it go?

58

Supervisors:
Lisa Harris, Management
David Millard, Computer Science
Michel O'Floinn, Law

What kinds of personal data are collected?


Personal Details
Financial Details

Goods Provided

Family, Lifestyle

Employment

Health

Education

Race

Religion

Trade Union
Membership

Research Posters | PhD Researchers 2011 2015

VISUAL ANALYTICS

The Framing of Data & User Behaviour: Evaluating Visualisations Using Economics to Improve Decision Support
This research introduces the concept that reasoning and decision-making, when
facilitated by Visual Analytic tools and processes, can be improved through the use
of Web technologies to evaluate user interaction events and the application of
Economic theories. The field of visual analytics is an extension of data visualisation
that provides tools and processes for extracting information from raw data by
enabling user-interaction, highlighting an opportunity to observe and record chains
of user events that are generated. . The work addresses the following research
questions:

1. To what extent does data visualisation affect the choices and behaviour of
analysts using visual analytic tools on the Web?
2. To what extent can interaction data be used to identify the influence of
framing for VA tools on the Web?
3. Can interaction data be used to identify framing effects in visualisations on
the web and to improve measurable analytic performance ?

VISUAL ANALYTICS & THE WEB ARE USED ACROSS MANY INDUSTRIES

Military / National Security

MARKET TRADING / ONLINE ADS

Crisis response

Strategic Decision Making in the field

Temporal, Value-driven Decisions

Natural Disasters & Anti-Terrorism

Theories are emerging from Visual Analytics and Visualisation literature which
suggest that interaction events can provide insights into the utility of design and can
inform new developments in data visualisation. This research examines visualisations
for the presence of framing effects - a established concept in Economics - by utilising
an existing taxonomy of action types commonly used in visual analytic applications.

Economics

In visual analytics we can


interact with directional filters.
Clicking a component on one
chart can filter another, where
we see new relationships in the
data..

is concerned with social


phenomena while Behavioural Economics
offers to increase the explanatory power of
economics by providing it with more
realistic psychological foundations. Beyond
Framing Effects it is possible that Prospect
Theory, Risk & Uncertainty, Bounded
Rationality, Heuristics and Bias could be
applied in the future.

The use of interaction data in VA tools is an important step towards improving


analysts performance and to be used to assist in building more effective analysis
environments The application of framing effects represents a significant
contribution to VA and Web Science by providing a new tool to better inform
design processes and improve the utility of VA on the Web.

Users can visually analyse


data in a Web browser. The
data is visually encoded, but
the scale used on each axis
could affect how the data is
framed...

By capturing chains of user interactions


in log files and observing users the
potential affect of visual framing can be mapped
out. A/B tests and lab experiments are applied to
confirm either: (1) A reduction in errors in data
interpretation. (2) The increasing efficiency /
timeliness of decisions, or (3) impovements in
comprehension in a given doman (military, stock
trading, and crisis response).

Filtering multiple charts &


graphs interactively enables
users to quckly get an
overview, filter and retrieve
details on demand which
lead to decision making.

Framing a problem in multiple ways can


affect decision-making. Visual framing has
been explored in the context of positive or negative
ratings (see below right). Howver, this approach
has not previously been applied in a commerical
setting or with a VA tools that
enable insights interactively
using Web technologies.

Symbols aquired from thenounproject.com are public license except for those under the CC Attribution license: Bomb by Scott Lewis. Corporation by Stephen Copinger. Dollar (sign) and Twitter by Lubo Volkov. Dollar (bill) by Christopher Beach.
Globe by Nicholas Menghini. Chevron by Christopher T. Howlett. Military Vehicle and Airplane by Luke Anthony Firth. Dangerous Area, UN Office, Police, Water, NGO Office and Storm Surge by OCHA Visual Information Unit.

59

Research Posters | PhD Researchers 2011 2015


October 2015

Shaping the civic impacts of open data on the web


Supported by:

A pragmatic enquiry into open data infrastructures | tim.davies@soton.ac.uk

Web Scienceis not just about methods for modelling, analysing and understanding the Web at the
various micro- and macroscopic levels. It is also about engineering protocols and providing
infrastructure, and ensuring that there is t between the infrastructure and the society that hosts it. Web
Science must coordinate engineering with a social agenda, policy with technical constraints and
possibilities, analysis with synthesis...[1]. Berners-Lee et. al. (2006) A Framework for Web Science.

Drawing on work from:

Over the last six years open data has moved into the policy mainstream. Transparency and openness, mediated
through machine-readable re-usable data, is increasingly a key public policy tool of choice for decision makers. From
the scal accountability and anti-corruption agenda, to the new global Sustainable Development Goals (SDGs) open
data, is central to the delivery strategy. At the same time, open data is discussed as a crucial resource for economic
growth and innovation: with government collected data targeted as a particularly valuable raw material for private
sector exploitation.
Neither social, nor the economic, impacts of open data are a foregone conclusion. Policy choices, technical designs,
and how they unfold together in different contexts around the world shape the impacts of open data.
Pragmatic research starts from a particular problem. The starting point for this enquiry: How can the civic potential of
open government data best be promoted?. The enquiry has four steps:

(1) Establishing scope: Open data is a global phenomena: but how does it vary across the world?
What balance must be struck between local and global interventions.

The Open Data Barometer combines expert survey and secondary data to build up a multi-dimensional
picture of open data across 86 countries.
- Widespread presence of Open Government Data Initiatives: but varying depth of government support
- Limited implementation of Open Denition [Machine Readable + Open License + Freely available]
- Cluster analysis identities four groups of countries - including one sided initiatives, focussing on
economic goals to the exclusion of civic potential of open data;
Future work: comparing 2013, 2014 and forthcoming 2015 Barometer data.

(2) Exploring initiatives: How is the implementation of open data policy shaped at the country level?
Civic life is frequently constructed at a national level, so the way open data ideas are transposed in different
country contexts can inform analysis on opportunities for intervention. An in-depth reading of policy
documents offers an empirical basis for this.
- Method: Six countries selected based on political, economic and social diversity. Policy timelines
constructed, and documents read and coded;
- Findings: Open data policy used to focus on reconstructing data infrastructures of the state;
- A shift over time from civic to economic focus of open data discourse in most countries;
Future work: Tracking the impact of global policy initiatives, including Open Government Partnership, and
International Open Data Charter on focus countries.

(3) Investigating infrastructures: Whilst national open data agendas may tend to diverge,

policy and technology standards bring back common global elements. Data standards play a central role
in determining how data can be used, who by, and what for. Interviews with data standards creators and
users & participant observation in data standards communities offers a route into infrastructural
inversion: revealing the way in which standards are shaped, and then shape the civic potential of open
data.
- Data standards constitute a complex infrastructure of schema, identiers and compliance tools;
- Data standards are shaped by the data publishers or users closest to them in their early stages;
- Data standard infrastructures, once developed, are resistant to substantial change;

Future work: evaluating the impact of interventions into data standard development.

(4) Synthesis & action: The test of pragmatic enquiry is practical. Given a social agenda that seeks greater equality between citizens, and
greater inclusion of all citizens in governance and decision making, has the enquiry identied successful strategies for action? Finding this out is
ultimately the nal step of this enquiry > www.opendataimpacts.net

60

Research Posters | PhD Researchers 2011 2015

Classifying Policing Social Machines


Maire Byrne-Evans, Thanassis Tiropanis, Craig Webber, Kieron OHara
University of Southampton, Web Science DTC

Introduction
Crime preoccupies the media and our TV schedules; it fills our
fiction shelves and is a large part of public spending, whether via
warfare and defence, or policing.
A report suggests that the amount spent on combating just violent crime
equates to 7.7% of the UKs GDP, or 4,700 for every household. [5] Is
this effective spending?
How much is this spending driven by crime statistics? Police.uk is a site provided by the U.K.s Home Office which presents open crime data, supporting the Governments transparency and accountability agenda.
How much are the data / statistics shaped by technology or social causes
policy, culture, administration, bureaucracy? Can the transparency
agenda help in understanding this? [2]
Web Science can help us to classify these crime apps and websites, sometimes referred to as Crime Social Machines. Understanding the data and
information ecosystem which allows society to address crime, helps us understand the sites singularly.

Three dimensions:

Results

How crime is addressed , mediating processes and


what the system does.
Implications: Home Office crime data (and the official crime
statistics that it comes from) is largely performance data,
knowledge-based and sits within the context of assurance and
mapping as a way of scientific understanding.
Similar looking crime map sites leverage fear of crime coming
from risk analyses to sell services including data itself.
Open crime data is about policing, rather than crime. It is
shaped by the social systems it moves through and the
processes it undergoes, and the way in which it is mandated.
To understand why a crime is reported and why it appears on
a map, we have to examine these confluences.
It is possible to differentiate similar-looking sites by
investigating which sites they link to and which sites are linking
to them and the economics of risk and fear.
We can see:
(a) How crime data is used; apparent worry about faked
data dissolves into a more sensible discussion of the social
origins of policing data; if the target culture were removed this
might then remove perverse incentives to shape data
according to often irrational targets.
(b) We have seen how data can be crowdsourced, and started
to examine some of the attendant problems of anonymity,
evaluation and incentives. These first two points presumably
help not only the public, but the police themselves.
(c) We have asked whether data and apps such as these can
help us to address crime, without increasing fear of crime, and
looked at the way in which the information economy might
drive some designers to sell crime data or a sense of safety
through leveraging fear of crime. Next stepsto produce
Policing Social Machine signatures.

Method

Grounded Theory and the Web

Grounded Theory is underpinned by philosophy of science,


Wittgensteins family resemblances, American pragmatism,
symbolic interactionism, Kantianism, Mills system of
differences, Baconian inductivism and Aristotelian axiology.
Grounded Theory appropriate for Web research:
Allows the theorist to revise their findings as they move through
the discovery process.
The process of undertaking research on the responsive web
can affect the thing being researched, for example in
examining websites, talks to site designers affect the sites as
designers are influenced by questions about design, intent,
competition, data provenance and policy.
A methodological approach is required which accepts some
interplay between the observer and the thing observed,
without this making the results of observation invalid.
Hence the reactive impact that investigators have upon their
data bears more on the scope than on the credibility of an
emerging theory. The technique that forces investigators to stay
close to their data, and which constitutes the systemisation of
the approach, is the constant comparative method.[4]
Mainstream science looks for reproducibility in results as being
fundamental to the scientific method; where we carry out web
searches with results returned via Google, data returned may
not be the same from moment to moment, depending on data
centre locations, indexing, and the constant addition of new
links to the web that then may alter search results. [1]
Grounded theory allows this; the focus is on creating a
methodology that lets researchers apply it or alter it
themselves, as it fits their needs. The aim of this research
method is building theory, not testing theory. [3] Such an
approach is pragmatic and suits fluid data results coming from
the web.

Acknowledgments
The work in this paper was funded by the Research Councils UK
Digital Economy Programme, Web Science Doctoral Training Centre,
University of Southampton, EP/G036926/1 and by SOCIAM: The
Theory and Practice of Social Machines, funded by the UK Engineering
and Physical Sciences Research Council (EPSRC) under grant number
EP/J017728/1 comprising the Universities of Southampton, Oxford and
Edinburgh.

61

Research Posters | PhD Researchers 2011 2015

Skim Reading: An Adaptive Strategy for Reading on the Web


Gemma Fitzsimmons, Mark J Weal, & Denis Drieghe
University of Southampton
Contact email: G.Fitzsimmons@soton.ac.uk

Introduction
We spend a vast amount of time on the Web and much of that time is spent
reading
However, with the large amount of information available we cannot read it
all in great detail, therefore we engage in skim reading (Lui , 2005; Morkes &
Nielsen, 1997)
Skim reading has been shown to negatively affect comprehension (Carver,
1984; Just & Carpenter, 1987 ; Dyson & Haselgrove, 2000)
Others have shown that there is a different between important and
unimportant information. The important information does not receive the
same loss of comprehension that the unimportant information does
(Masson, 1982; Reader & Payne, 2007; Duggan & Payne, 2009)

To explain these findings, it was suggested that an adaptive satisficing


strategy was being used to gain as much information from the text in
reduced time
A satisficing strategy is where an individual searches through alternatives
until an acceptable threshold is met. In this case the individuals search for
where information gain is high and when it drops below a certain threshold,
they move on to a new piece of text
In this experiment we explore whether a satisficing skim reading strategy is
used when reading on the Web and whether hyperlinks have an impact on
the strategy

Experiment
Experimental Conditions
2 x 2 x 2 within-participant
design

Task Type: Normal/Skimming


Word Type: Linked/Unlinked
Word Frequency: High/Low

Figure 1. SR-Research EyeLink 1000 eye tracker


set-up

Sentence Rating - Each sentence


of the stimuli was also rated by
20 independent participants on
its general importance

Question 1:
Does skim reading affect
the way we read
hypertext?
32 participants
160 experimental sentences
inserted into 40 edited Wikipedia
pages (4 in each)
20 pages read were normally, 20
pages were skim read

Question 2:
Does skim reading
affect comprehension?
160 comprehension questions
(4 after each stimulus)
50% asked about important
sentences
50% asked about unimportant
sentences
Figure 2. Example stimulus with fixations of
normal reading

Results

Figure 3. Task Type x Word Type interaction in skipping probability and Task Type x Word Type x Word
Frequency interaction in single fixation durations

Eye Movement Results


The linked words were less likely to be skipped when skimming
Faster reading speed in skimming condition
No frequency effect observed for the unlinked words while
skimming

Figure 4. Average accuracy for comprehension questions

Comprehension results
Comprehension was reduced when skim reading
Comprehension was marginally better for the questions related to
the important sentences compared to the unimportant sentences
when skim reading

Conclusion
Does skim reading affect the way we read hypertext?
Yes, the linked words were skipped less when skim reading
compared to the unlinked words
When the linked words were fixated they were processed fully,
unlike the unlinked words that showed no frequency effect in the
skim reading condition
What does this mean for reading on the Web?
If participants are using linked words to suggest important
information and using them as anchor points to guide their
movement through the text, then the choice of which words to add
links to needs to be considered very carefully
This is because skim readers focus primarily on linked words and use
them as a marker for the most important information

62

Does skim reading affect comprehension?


Yes, comprehension accuracy does decline when skim reading, but
participants did perform better when the comprehension questions
was related to the important sentences
Taken together with the eye movement results we can suggest that
skim readers could be engaging in a satisficing strategy
By focusing on important sentences and using hyperlinks as a guide
to where the important information may be, the participants could
reduce the speed-comprehension trade-off that comes with skim
reading
Web
Science

Research Posters | PhD Researchers 2011 2015

Open Data and Democratic Participation in


UK Local
Government
Mark Frank - University of Southampton
The Research Question
How should the UK governments open data policy evolve for
effective democratic engagement?

The Accountability Story

The Participation Story

unleash an army of armchair auditors and quite


rightly make those charged with doling out the
pennies stop and think twice about whether they
are getting value for money

the future of public institutions demands that


we create a collaborative ecosystem with
numerous opportunities for experts to engage

Trust

Collaboration

Accountability

Deliberation

Transparency

Consultation/Protest

Open Data
Data published by default

Support

Reusable Data

The users view

The politicians view

They ask us for lots of data but give us very little

We are a reference library

We havent got the skills or the time

It doesnt give a fair picture

I never knew the data was there

It is the taxpayers data

63

Research Posters | PhD Researchers 2011 2015

Dominic Hobsondom.hobson@soton.ac.uk
Dr Craig WebberCriminology

Attack Category

Double spends
Buffer overflow
Mining attacks (selfish mining)

Deviancy

Cryptocurrency specific security practices


and standards?

Source code review?

Defence

Professor Vladimiro SassoneComputer Science

Attack against currency


Exploits vulnerabilities in the
protocol or reference client

Exchange hacks
Web wallet hacks
Pool attacks
Market manipulation

Bitcoin was the first to use a blockchain - a public ledger which


allows a distributed network to come to a consensus via proofof-work (PoW). Participants agree to accept the history which
has had the most work done to create it. Work for Bitcoin involved hashing the last block of transaction in hope that the random result starts with a pre-set amount of 0s.

This consensus method has been altered and applied to network


to solve problems other than just transactions.

Namecoin presents a censorship resistant DNS system, where


transaction instead represent registrations of a .bit domain.

Ethereum offers smart contracts, extending the idea of a transaction scripting language with a Turing complete language.

Maidsafe uses Safecoins to automatically reward developers and


contributors to its decentralised storage network.

Twister serves as a P2P microblogging platform, using the torrent


protocol, DHTs, and a blockchain.

Cryptocurrency Policy & Policing

Education?

Attacks against infrastructure


Exploit weaknesses in the infrastructure (e.g. off protocol)

Chargeback scams
Attacks against the individual
Targeted attacks that exploit the Ponzi schemes
Social engineering attacks
consumer

Applications of blockchain tech

What impact has the technology behind cryptocurrencies had on cybercrime, security
and policing?

Background
Originally invented and released under the pseudonym Satoshi
Nakamoto, Bitcoin is seen as the first cryptocurrency. The reference client was released as open source software and has now
spawned over 500 different cryptocurrencies.
Cryptocurrencies, such as Bitcoin, are decentralised online currencies. Unlike fiat currencies, their creation, distribution and
value are not governed by law and they are typically not associated with any single offline jurisdiction. The technology behind
these currencies provides users with a high degree of privacy,
and their implementation means that they have no central
point of operation, failure or control. These currencies allow the
direct transfer of value between individuals online, without the
inconvenience, cost or trust required with a third party such as
a bank or payment processor (e.g. PayPal).

Other attacks

Criminal Opportunities

Monegraph uses the Namecoin blockchain to show authenticity


of digital artwork.

Cryptocurrencies requires users to hold the


private keys to spend their currency.
This leads to new opportunities for crime, as
this is the first time it has been possible for
people other than banking institutions to be
responsible for their own electronic money.
Services have sprung up, known as web wallets, who hold private keys for individuals.
But these services have become targets due
to the amount of money they hold.
We would like to find out what new criminal opportunities are being exploited with
cryptocurrencies with a qualitative analysis
of public forum data.

We would like to find out who are the relevant authorities,


what policies they have in place, and if there are none, at what
point would they consider bringing policies into place by interviewing key authority figures

Cryptocurrencies do not fall within existing legal definitions of


electronic cash due to the lack of central issuer or authority.
Attempts to regulate, such as New York BitLicences, include fingerprinting users for 10 years and have been met with resistance.

Unlike traditional payment services, there is no central point of


contact for cryptocurrencies. As a large portion of cybercrime is
motivated by money, authorities can typically approach money
service providers such as banks or PayPal and request information on individuals, freeze finances, or block users from such
services altogether. This is not possible with cryptocurrencies.

Laundering
Malware (mining malware, wallet stealing malware, clipboard malware)
Privacy/deanonymisation attacks

Scripting Language

Despite there being ~$5billion worth of cryptocurrencies in circulation and lots of media coverage (particularly relating to
crime), very little research, particularly social or criminological
research, has been conducted.

Research Questions

A Bitcoin transaction is a set of commands.


Transactions are verified by everyone by running the commands in the transaction.

We would like to see how this language is


used in the wild, by quantitatively analysing
all transactions in the blockchain.

However, this language is poorly documented and incomplete in its implementation, including reserved commands by Satoshi, and
other commands disabled due to security
concerns.

The scripting language is a forth like nonTuring complete stack based language with
approximately 190 different commands.

What new criminal opportunities have been created by cryptocurrency technology?


How is the Bitcoin transaction scripting language
being used in the wild?
What policies are in place to handle practical policing differences of decentralised currencies?
At what point will national companies and authorities begin to implement cryptocurrency specific policies?
Who are the relevant authorities for handling cryptocurrency related crime?

64

Research Posters | PhD Researchers 2011 2015

IDENTITY LINKABILITY AND ATTRIBUTION:


DIGITAL CHALLENGES FOR
LAW AND POLICY
Giant strides have been taken recently in developing theories and techniques of identity attribution

from data indirectly linked to individuals either alone, or in combination with other data.
These challenge traditional distinctions found in data protection and privacy laws between two
categories of information: PERSONAL DATA and NON-PERSONAL DATA.
Consider the inferences that might be made from communications metadata alone:
You spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.

You called the suicide prevention hotline while standing on a bridge.


You rang a phone sex service at 2:24 am and spoke for 18 minutes.
You called a gynecologist, spoke for a half hour, and then called the local Family Planning Clinics number later that day.
https://www.eff.org/deeplinks/2013/06/why-metadata-matters

Research Questions:
To what extent are we anonymous online? What exactly do we mean by anonymous?
Can we rely on anonymisation techniques to hide our identities?

What weight should be placed on indirect digital identifiers and their links to a person? (e.g. Should I bear any liability for
what happens via an IP address linked to my home? Should the same IP address be deemed my personal data worthy of
legal data protection against those who might use it to try to identify my offline identity?)
What is the harm from digital identity attribution? Does it extend beyond a privacy harm? What is its value?

http://blogs.law.harvard.edu/billofhealth/files/2013/05/Screen-shot-2013-05-13-at-3.02.09-PM.png

HOW SHOULD LAW AND POLICY EVOLVE IN LIGHT OF THESE CHALLENGES?

Alison Knight
University of Southampton
A.M.Knight@soton.ac.uk

Web Science

65

Research Posters | PhD Researchers 2011 2015

Handwriting Recognition For


Online Mathematics Communication
PhD Student: Mandy Lo (cmml100@soton.ac.uk)
Supervisors: Dr. Edwards, Dr. Bokhove, Prof. Davis

The Problem

Handwriting

Recognition

Fig.2: Writing mathematics


is natural and allows the
person to focus on the
mathematics free of
technological concerns

Fig.3: Good handwriting


recognition can provide
the codes needed, making
mathematics learning on
the web more accessible

2 4
=
2

[TEX]
x=\frac{-b\pm\sqrt
{b^2-4ac}}{2a}
[/TEX]

Fig.1: Non-intuitive codes


are required to express
mathematics online, which
interrupts the natural flow
of mathematical thinking

Background

the development of eLearning in the sciences in


general, and mathematics
in particular, has not met
the general expectation[1]
This may be, in part,
because practical and
intuitive mathematics input
for users is still under
investigation[2]
Current input methods for
online mathematics
communication are
cumbersome[3]

Rationale

Simplify digitisation of
mathematics expressions
Use current handwriting
recognition techniques to
translate handwritten work
into computer codes
Develop educationallyinformed interface to
reduce technology-induced
cognitive overload while
working electronically
Could also be used to
interface with interactive
textbook and mobile apps.

Milestones

Software R&D/ expert review


4 rounds of live trials with
school-aged children
working with maths task
Initial analysis confirms:
- significant enabling effect
for online mathematical
communications
- it is possible to progress
mathematical ideas via
online communications
Develop product for
general public

References: [1] Ahmed (2008). Support Mathematical Instruction in Web-Based Learning System Using Object-Oriented Approach. ICACTE'08. IEEE.
[2] Mikusa et al. (2005). Features and advantages of WME: a Web-based mathematics education system. SoutheastCon05. IEEE.
[3] Lo et al. (2013). MathPen: identifying and solving the problems of online collaborative learning for mathematics. ICTMT11.
Funded by Research Councils UK Digital Economy,
Web Science Doctoral Training Centre, EP/G036926/1.

66

Research Posters | PhD Researchers 2011 2015

Expanding Graphs

Symmetry in Complex Networks


David Matthews
Supervisors: Dr J.W. Anderson, Dr. R. Carare and
Dr B. MacArthur

University of Southampton
dm1x07@soton.ac.uk

History
The theory of random graphs began with Erdos in the 1940s
and 1950s. Erdos used probabilistic methods to demonstrate
the existence of graphs with particular properties without
needing to explicitly construct these graphs

Real World Networks


Given a collection of random graphs, a graph invariant is a
random variable that depends on that collection. For example
degree distribution, average path length (the average distance
between a pair of distinct vertices) and the clustering coefficient are all such invariants. Real world networks from a variety of sources have been shown to have a power law degree
distribution, low average path length (6 degrees of separation)
and a high clustering coefficient. These are not properties of
Erdos random graphs and around the beginning of this century
two new network models were developed:

Symmetry
One less studied property of real world networks is the degree
to which these networks are symmetric. Symmetry in a network effectively means that certain vertices play precisely the
same role in the graph. This redundancy naturally reinforces
the graph against an attack by providing structural backups
[2].

Trees
It has been suggested that real-world networks that grow by
the addition of vertices and edges often under preferential attachment are naturally tree-like [2]. This begs the question:
How tree-like are the Watts and Strogatz and the BarabasiAlbert Models? What is the expected girth of the Watts and
Strogatz and the Barabasi-Albert Models? Note that if one
sets m0 = 1 and m = 1 at each step in the Barabasi-Albert
Model then the resulting graph is necessarily a tree. If realworld networks are indeed tree-like then one could understand
properties of real-world networks by understanding properties
of random trees.

Results
Thus far we have used a formalised notion of symmetry called
the automorphism group of a graph in order to investigate the
typical degree of symmetry to be found in a variety of models
of growing random trees. We have utilised such models of
growing graphs to, for example, model phenomena as diverse
as Alzheimers disease and the World Wide Web.

New Network Models


(i) Watts and Strogatz model [3]. Similar to the Erdos-Renyi
models this probability space consists of graphs on n labelled vertices. Let K be the mean degree and 0 1
be a constant satisfying
n >> K >> ln(N ) >> 1
We construct a graph in which each vertex is attached via an
edge to K neighbours. For each node ni and edge (ni, nj )
with i < j with probability we remove that edge with
and replace it with a new edge (ni, nk ) where k is chosen
uniformly at random from all possibilities that avoid loops
and multiedges.
(ii) Barabasi-Albert Model [1] We begin with m0 labelled vertices and nodes are added one at a time. Each time a vertex is added it is attached via an edge to m m0 existing
nodes. A new vertex attaches to an existing vertex i with
probability
deg(i)
pi = P
j2V deg(j)

The Watts and Strogatz model has the property that if = 0


we simply get a K-regular lattice and if = 1 we get a classical Erdos-Renyi random graph. Surprisingly, for most values
of 0 <
< 1 the Watts and Strogatz model has low average path length and high clustering coefficient but it does not
exhibit a power law for degree distribution [3]. On the other
hand the Barabasi-Albert Model has a degree distribution that
follows a power law and low average path length, however it
exhibits a low clustering coefficient [1].

Figure 1: A fractal tree.

References
[1] Reka Albert and Albert-Laszlo Barabasi. Statistical mechanics of complex networks. Reviews of modern physics,
74(1):47, 2002.
[2] Ben D. Macarthur, Ruben J. Sanchez-garca, and James W.
Anderson. Symmetry in complex networks. Discrete Applied Mathematics, pages 35253531, 2008.
[3] Duncan J Watts and Steven H Strogatz. Collective dynamics of small-worldnetworks. nature, 393(6684):440442,
1998.

67

Research Posters | PhD Researchers 2011 2015

Making'Bodies:'What'is'the'Role'of'the'Web'on'
Womens'Engagement'with'Aesthetic'Surgery??!
Rebecca'Nash''

rn5g08@soton.ac.uk'

Supervisors:!Professor!Catherine!Pope!&!Professor!Susan!Halford!

Conforming!to!an!idealistic!perception!of!beauty!is!incessantly!at!the!forefront!of!bodily!debate!in!contemporary!
society.!This!is!due,!not!only!to!the!popularity!of!accessible!routes!to!altering!bodies,!such!as!diet,!exercise!and!
cosmetics,!but!also!pressures!to!take!responsibility!for!body!projects!(Shilling,!2003),!driven!by!a!cosmetic!
gaze!(Wegenstein!and!Ruck!2011.!The!Web!has!transformed!production!and!circulation!of!images,!and!altered!ways!
that!individuals!Nind!information,!consumer!products,!and!communicate!about!aesthetics.!This!thesis!explores!the!
role!of!the!Web!on!womens!engagement!with!aesthetic!surgery.!!

Research'Objectives'

How!is!aesthetic!surgery!represented!across!the!
Web?!
How!are!women!engaging!with!aesthetic!surgery!
on!the!Web?!
Is!the!Web!altering!perceptions!of!aesthetic!
surgery,!and!ideations!of!ideal!bodies?!
'

Case'Study:'Aesthetic'Surgery'

Aesthetic!surgery!is!a!practice!which!alters!the!body!
in! pursuit! of! an! aesthetic! ideal.! Becoming!
increasingly! popular! throughout! the! 20th! Century;!
media! images! idealised! certain! body! types! !
overwhelmingly! young! people! with! perfect!
Western! characteristics! W! drove! commoditisation! of!
the!body;!deNiance!of!ageing!(Askegaard!et!al.,!2002:!
795),! and! the! notion! of! the! ! body! as! a! reNlexive!
project!(Giddens,!1991;!Shilling,!2003).!The!web!has!
opened! up! spaces! for! these! practices,! enabling! not!
only! discussion! of! aesthetic! surgery,! and! websites!
afNiliated! with! established! organisations,! but! also!
unlicensed! practitioners,! potentially! risky! sites! for!
aesthetic! tourism,! howWto! guides,! and! purchasing!
spaces! for! aesthetic! materials.! This! thesis! is!
exploring! these! spaces! to! comprehend! varying!
discourses,! and! how! they! may! impact! upon!
individuals!interested!in!undergoing!a!procedure.!

Research'Methods''

This! research! used! a! combination! of! Multimodal!


Critical! Discourse! Analysis! and! semiWstructured!
interviews! with! 20! women! who! had! engaged! with!
aesthetic!surgery!online.!!
!

References''
Askegaard,!S.;!Gertsen,!M.C.;!Langer,!R.!(2002)!The!Body!Consumed:!ReNlexivity!and!Cosmetic!
Surgery,!Psychology)and)Marketing,!19!(10):!793W81!
Giddens,! A.! (1991)! Modernity) and) Self5Identity:) Self) and) Society) in) the) Late) Modern) Age,!
Cambridge:!Polity!
Shilling,!C.!(2003)!The)Body)and)Social)Theory,!London:!Sage,!2nd!Edition!
!

Research'Outcomes'

Continuities'and'discontinuities'of'the'Web'
In! some! cases,! materials! disseminated! online! do! not! differ!
from!materials!accessible!ofNline.!However,!the!Web!departs!
from!traditional!media!in!three!main!ways:!the!3Vs,!ease!of!
access! and! navigation,! and! user! enrolment.! In! relation! to!
aesthetic! surgery! online,! continuities,! discontinuities! and!
contradictions!are!evident!across!spaces.!!
Womens'bodies'as'perpetually'aesthetically'deKicient''
The!Web!is!far!from!the!disembodied!space!put!forward!by!
postWhuman! theorists,! and! indeed! not! a! space! with! neat!
online/ofNline! boundaries.! It! is! a! number! of! spaces!
presenting! real! female! bodies,! possessing! real! assumed!
deNiciencies,! with! real! life! consequences! for! viewers! of!
materials!!
Hypertextual'Feminism'
The! Web! provides! images,! discussion,! and! ways! to! alter!
bodies! and! empowerment! comes! through! browsing! and!
assessing! Web! materials! on! aesthetic! surgery.! Yet,!
simultaneously,! women! are! faced! with! critiques! of!
undesirable! bodies! ! altered! and! unaltered;! reinforcing!
structural!ideas!of!what!it!means!to!be!attractive.!!

Acknowledgement:!The!Digital!Economy!Programme!is!a!Research!Councils!UK!cross!council!initiative!led!by!EPSRC!and!
contributed!to!by!AHRC,!ESRC!and!MRC!

68

Research Posters | PhD Researchers 2011 2015

Sh
ar
in
g
ge
le
d
Kn
ow

Re

se

ar
ch

tio

on
iti

Ed
uc
a

ns

g
in

io

iv

hi
b

t
la

t
ra

Ex

Re

ist
in

t
ke
ar
M

m
Ad

ic
bl
Pu

Enhancing Engagement with


Online Cultural Heritage

Cultural Heritage organisations exist to disseminate knowledge, as well as to


preserve it. For example, museums have a responsibility towards the
communities of whom they hold the objects thus playing an important role in
their cultural development (ICOM, 2013, Trevelyan, 2008).
Traditionally the transfer of knowledge is carried out by interacting with an
artefact. Alternatively, in OCH the transfer of knowledge takes place by
interacting with the information presented to the users.

Cultural Heritage
Organisations on the Web

Knowledge

Online Cultural
Heritage
(OCH)

How is knowledge constructed?


Informatum
Due to the interdisciplinary
nature of this research, data
and information will be
addressed as a single entity
called informatum.

Data

Information

Javier Pereda

Knowledge

j.pereda@soton.ac.uk

Wisdom

Web Science
DTC

It is by adding meaning, that the transition between the elements is


possible in the DIKW Model (Acko, 1989).
One of the main objectives of this research is to enhance the
engagement with data and information held in OCH.

Informatum Production

Informatum Sharing

Engagement withInformatum

Museums, Researchers, Media, Publishers, etc

Museum Professionals, Researchers, Archaeologists, etc


The process of Informatum Production includes
not just the input of data but the strategy or
vision to make it useful and/or meaningful to the
dierent museum users so they can retrieve the
relevant information that they are looking for to
ll that gap in their knowledge.

Users of OCH, Developers, Designers, etc

Some of the important factors when sharing


informatum are not only access to the data, but
also the possibility to create relationships
between the dierent datasets (e.g. Linked Data).

OCH presents the channel for visitors to engage


with informatum related to cultural heritage that
would come from dierent sources. To access
any sort of digital data or information, a UI is
necessary. OCH is the bridge in between the
informatum and the user/visitor.

In the process of dening dierent levels of interaction and/or type of user levels in OCH, Taylor (1967)
provides a set of dierent perspectives of how a user/visitor might attempt to gain knowledge.
Visceral

Conscious

Formalised

Compromised

Interactions Systems for Online Cultural Heritage


Human Computer Interaction

Human Information Interaction

User Experience

Constructivism

Demateriallisation

Physical
Environment

Objects/Artifacts

Tangible
Static
Persistent

Intangible
Dynamic
Transient

Informatum

Digital
World

Tangible Interaction
(Campenhout, et.al., 2013)

Tangible User Interface (TUI)

TUIs present an interactive paradigm where a wider range of opportunities can be exploited. An example of this
is the capability of dierent levels of digital inclusion to be applied into interactive interfaces.
Supervisors

Dr. Leif Isaksen

Dr. Yuanyuan Yin

School of Humanities, Archaeological Computing

Dr. Graeme Earl

Winchester School of Art

School of Humanities, Archaeological Computing

69

Research Posters | PhD Researchers 2010 2014


Orienting within Complex Digital Environments
Bridging the Gap Between the Inside and Out to Reduce Disorientation

122cm

This Po
(versio
asked q
If you a
templa

Craig Allison1,2, Dr Edward Redhead2, Richard Treves3, Dr Matthew Jones2

me day

Web Science Doctoral Training Centre, 2Psychology, 3Geography, University of Southampton


Introduction

de
your

When we move, we can effectively keep track of where we are with limited effort
(Riecke, Cunningham & Bulthoff, 2007). To do this we must effectively track our
position in terms of stationary objects, via a process of Spatial Updating. As we move
within complex internal spaces, our relationship with the larger, unseen world also
constantly changes.
But have you ever lost track of where you are in relation
to the exit in a shopping centre?
Wang and Brockmole, (2003) suggest that within nested
environments, such as rooms within a building, people
can automatically update cues within their local
environment (the room), but struggle to update their
position relative to the larger outside world.
Klatzky et al. (1998) suggests that without physical
movement, for example when moving within a virtual
environment, automatic spatial updating can be impeded.

he

to

hin

ter to

e it
r.

Gender differences within spatial activities is the most


pronounced of all cognitive tasks (Lawton & Morrin,1999).
Gender differences in Spatial Updating have produced
mixed findings, though many report greater performance
by males (Tlauka et al., 2005)
Because of these factors, keeping track of our position in
digital environments is a great challenge. This research
aims to investigate whether the addition of simple visual
cues within a virtual nested environment could help individuals track their overall
location.

Method

Participants
40 undergraduate students (Female = 27, Male = 13) completed this study in
exchange for course credit. Participants were randomly allocated to either a Control
or Experimental condition.
Design
Study used a 2(Condition) x2(Gender) x2(Room Type) x2 (Movement) mixed design.
Apparatus
This study used a virtual environment which participants were required to navigate
and explore. This was modelled on the University of Southampton Shackleton
Building (44), using 3DSMax 2012. Participants controlled their movement using the
arrow keys, but could not interact with items within the environment.
Group Control explored a replica of the building with no additional navigation aids. In
contrast Group Experimental also saw large coloured bands on the top of each of the
walls, based on their compass facing (North Blue, East Yellow, South Green and West
Red)

Procedure
Participants explored the outside and inside of the virtual building before completing
four orientation trials. At the start of each orientation trial Participants found
themselves within rooms in the virtual building and were asked to turn to face a nonvisible external landmark. Once participants were happy with their position they
proceeded to the next trial.
Two rooms in the orientation trials were external, allowing the use of external visual
cues to orientate. The other two rooms were internal, over looking the inner
courtyard, and required an understanding of the spatial relationship between the
internal and external cues to complete the task. One of the external rooms and one
of the internal rooms had been visited previously in the acquisition trials.

Results
Orientatation Error (in degrees)

140

Group Control Mean Orientation Error, in Degrees,


for each trial.

140
120

120
100

Female
Male

80

100

Female
Male

80

60

60

40

40
20

20
0

Group Experimental Mean Orientation Error in Degrees,


for each trial.

External
Unvisited

Internal
Unvisited

External
Visited

Internal
Visited

External Internal
Unvisited Unvisited

External
Visited

Internal
Visited

Results suggest that without the coloured cues Females in Group Control found it
difficult to orient within the inner rooms, especially if they had not previously
visited.
A 4-way mixed design ANOVA revealed a main effect of room type, F(1,36)= 4.45,
P<0.05 suggesting it was more difficult to perform the task from an internal room. A
main effect of movement, F(1, 36) = 9.96, p<0.01 suggests that the orientation task
was more difficult from within a room which participants had not previously visited.
No other main effects were significant. There was a significant 4-way interaction,
F(1, 36) = 6.91, p<0.05. Further analysis via simple main effects revealed that there
was only an effect of gender in Group Control in the Internal room to which the
participants had not previously moved, F(1, 144) = 8.96, p<0.01. This suggests that
females found it harder than males to orientate in this room, but this impairment in
spatial updating was removed by the addition of the coloured cues.

Conclusion
Participants within the control condition struggled to automatically update their
position within internal rooms, suggesting they were unable to update multiple
environments simultaneously. This is consistent with previous findings, using real
world tasks (Wang & Brockmole, 2003)
The effect of movement offers partial support for Klatzky et al. (1998). Participants
made greater orientation errors within rooms which they had not previously visited.
However many were able to remain oriented within the virtual environment without
the need for physical movement.
There was no overall effect of gender, but a gender difference was apparent when
participants were required to use internal cues. Females within Group Control were
unable to effectively update their orientation automatically within the internal
room. The addition of colour cues however allowed females in Group Experimental to
orient as well as the males. This is consistent with females greater reliance on direct
landmark cues (Lawton, 1994).
Results suggest that losing track of where you are within a virtual environment can
be reduced by the addition of salient visual cues which are associated with external
orienting features.

References
Klatsky, R.L., Loomis, J.M., Beall, A.C., Chance, S.S., & Golledge, R.G. (1998). Spatial updating of self-position and orientation during real,
imagined, and virtual locomotion. Psychological Science, 9, 293298
Lawton, C. A. (1994). Gender differences in way-finding strategies: Relationship to spatial ability and spatial anxiety. Sex Roles, 30, 765-779.
Lawton, C. A., & Morrin, K. A. (1999). Gender differences in pointing accuracy in computer-simulated 3D mazes. Sex Roles, 40, 73-92.
Riecke, B.E., Cunningham, D.W., & Buelthoff, H.H. (2007) Spatial updating in virtual reality: the sufciency of visual information.
Psychological Research, 71, 298313.
Rieser, J. J. (1989). Access to knowledge of spatial structure at novel points of observation. Journal of Experimental Psychology: Learning,
Memory, and Cognition, 15, 1157-1165.
Tlauka, M., Brolese, A., Pomeroy, D.E., & Hobbs, W. (2005), Gender differences in spatial knowledge acquired through simulated exploration
of a virtual shopping centre, Journal of Environmental Psychology, 25, 111-118.
Wang, R.F. & Brockmole, J.R. (2003) Simultaneous spatial updating in nested environments. Psychonomic Bulletin & Review. 10, 981986

Acknowledgments
This research was funded by the Research Councils UK Digital Economy Program, Web Science Doctoral Training Centre,
University of Southampton. EP/G036926/1
RESEARCH POSTER PRESENTATION DESIGN 2012

www.PosterPresentations.com

70

Verifyi
Go to t
preferr
of the
100% th
when p
quality
for prin

Using t
To add
and typ
click o
frame
Then, c
you can
be foun

Modify
This te
column
mouse
click o
layout
the pro
advanc
and the

Import
TEXT:
placeh
side of
PHOTO
in it an
TABLES
docum
the tex
pasted
then cl
values

Modify
To chan
Design
from th
your ow

201

2117
Berk
post

Research Posters | PhD Researchers 2010 2014


Nicole Beale nicole.beale@soton.ac.uk

My PhD looks at the potential of


web-based phenomena for local
authority museums in the UK.
This poster presents a case study
which forms a part of a chapter of
my PhD thesis.

Memory Institutions
and the Web

Museums, libraries and archives are conventionally recognised


memory institutions. The web is changing this. For museums,
traditionally understood mechanisms for collecting, preserving
and interpreting the heritage of humanity and our
environments are no longer enough.
The photographs in this poster form part of the Europeana collection Vintage Animals and are curated by Retronaut.
They are multi-institutionally sourced, and owe their presence here to good metadata (which made them findable) and
comedic subject matter (which made them adorable).

Online metadata indexes as


an opportunity
The creation of online content should be a major consideration for
local authority museums. The web offers a new way for museums to
present social history data held in their collections.
Social networking platforms are tools for the collating and sharing of such
content, but they are resource-heavy. Large centralised metadata indexes
present the best option for smaller museums today. Europeana is an example of
such an index.
Museums have much to offer the web, in particular to the development and
continued uptake of social networking systems. Recent research into the web
as a repository for the memory of the world is evidence of the recognition of
the importance of the web for the future of the archive (Robinson, 2012;
Andermann & Arnold-de Simine, 2012).
Blogging and micro-blogging platforms provide ways to self-memorialise both
publically as commemoration and privately as remembrance without the
need of museums, libraries and archives. In the 1990s, predictions of the
democratisation of the past and the way that technologies threaten the timeboundedness of memory were thought to lead to the extinction of the archive,
as the past and the present became blurred and the world archived and
collected everything. Today these concerns manifest themselves in a similar
way, with academics and archival professionals alike expressing concerns about
the increasing propensity of people to share everything online.
But the web today is messy. Information is lost almost as soon as it is shared.
Twitter is an example of this, within days a tweet can be lost. The sharing of
information is not necessarily going to result in the creation of an archive.

The example of Retronaut


Chris Wild is the Curator of the website Retronaut. Wild curates
historical photographs via Retronaut which (as of 19th February
2014) has more than 200,000 views per day, just over 63,000
followers to its Twitter account and over 209,000 likes to its
Facebook page. The majority of the content for the website are
photographs with unusal subject matter. Most photographs come from
large online collections, such as Europeana.eu, a European Commission
funded cultural heritage metadata search portal. Retronaut makes use of the
metadata within Europeana in a way that people find engaging and
entertaining.
Wild has created an institution using only the information that is freely
available online via Europeana. Retronaut was established in 2009 and is
curated by a team of less than ten people. The site has had a Facebook page
since 2010. The British Museum, arguably one of the most well known
museums in the world only boasts just over 500,000 likes to its Facebook
page, and just under 269,000 Twitter followers (as of 19th February 2014). The
British Museum has used Facebook since April 2010 (Pett, 2012). The number
of likes for Retronaut when compared with the British Museum on Facebook is
staggering. Retronaut only has 41.8% of the British Museums likes, which is a
significant percentage when considering the size of the organisations
managing the social media and the resources available to each organisation in
the real world.
Retronaut makes use of the benefit of the web to bring disparate data
sources together, to highlight the multi-faceted nature of humanity and to
use historical collections to engage people in conversations about the
simultaneous distance and closeness of the past to the world today. The
Retronaut approach has been so successful that Wild is now installed at the
Museums and Archives Northumberland as a time-traveller to engage new
audiences (Woodhorn, 2013).

On the web, the audience of heritage is very different. Young people and
people of different socio-economic backgrounds engage with content with a
history or archaeology focus much more readily online than they do offline. In
addition to this, the audiences of this kind of content are finding information
and knowledge about these topics away from the large authoritative
organisations. An online user will come across the information in a different
way, and this is key to the success of sharing heritage knowledge online.
Content online still needs to be collected and categorised, to be interpreted
and then presented: to be curated. Open data is an essential component to
this re-discovery of information. Social networking systems, the tools and
platforms where people are creating and sharing content are essential to the
future of museums. Museums are the appropriate institution to exhibit data
from the web that relates to cultural memory, and that the adoption of open
data and real engagement with the social aspects of the web will be integral to
this occurring.
Online metadata indexes make collections and objects within collections
findable. The serendipity of the case study, Retronaut, and the fun and relaxed
way that the site and its associated social networking platforms engage with
audiences is illustrative of this potential.

Notes: http://theculturalheritageweb.wordpress.com
Thoughts: @nicoleebeale

References:

Andermann, J., and S. Arnold-de Simine, 2012. Introduction: Memory,


Community and the New Museum, Theory Culture Society, 29(3); 3-13
Pett, D., 2012. Use of Social Media within the British Museum and the Museum
Sector. In: Bonacchi, C, (ed.) Archaeology and Digital Communication: Towards
Strategies of Public Engagement. Archetype Publications: London, UK: 83-102
Robinson, H., 2012. Remembering things differently: museums, libraries and
archives as memory institutions and the implications for convergence,
Museums Management and Curatorship, 27(4): 413-429
Woodhorn, 2013. Time traveller to open up archives, Woodhorn: Museums
and Archives Northumberland, 5th December 2013. Available at:
http://www.experiencewoodhorn.com/time-traveller-to-open-up-archives/
Accessed 16th February 2014

Supervisors: Dr. Yvonne Marshall and Dr. Graeme Earl

71

Research Posters | PhD Researchers 2010 2014

Online Behaviour of States


Jaymie Caplen, Prof.Gerry Stoker, Dr. Tim Chown
Web Science DTC, University of Southampton

72

Research Posters | PhD Researchers 2010 2014

Huw Davies hcd1g10@soton.ac.uk @huwcdavies


Susan Halford Nick Gibbins

Since its inception 25 years ago the World Wide Web has facilitated an explosion of
information unprecedented in its scale. Many websites are said to embody the Webs
censor-free, information anarchy. This has led to widespread anxiety about the fidelity
of some of this information and its potential to do harm. As the myth of the Digital
Native is debunked, young people, it is now claimed, are exceptionally vulnerable to this
new danger; they are declared nave and lacking in the crucial new literacies needed to
discern fact from fiction.
This work investigates the reality of these fears and claims. Drawing on case studies
from two very different institutions a state sector FE college with a largely white
working class intake and a prestigious independent fee paying school with an ethnically
diverse intake the research explores how groups of 16-18 year olds access, interpret
and use information. It focusses on controversial information involving issues such as
immigration, climate-change, and government cover-ups and makes use of multiple
methods including interviews and workshops as well as proxy servers to digitally record
everything young people do on the Web. The data suggests highly differentiated, classbased practices grounded in the social, material and cultural contexts of everyday life
that can be better understood by combining Bourdieusian and Foucauldian theoretical
frameworks.
Acknowledgement: The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and
contributed to by AHRC, ESRC and MRC

73

Research Posters | PhD Researchers 2010 2014

Reimagining the Public Health Analogy


for Web Security
Huw Fryer (ECS) Supervisors: Tim Chown (ECS), Sophie Stalla-Bourdillon (ILAWS)
Web Science DTC
University of Southampton

A compromised Web server is like a contaminated water pump

Infected machines generate revenue for the criminal


This environment enables them to survive

Web
Science

74

People drinking the water provides an


environment for Cholera to survive

Malware doesnt propagate like viruses any more, so


epidemic models need to be changed
Imagining the criminal as the pathogen changes the
focus to the environment in general
A more hostile environment makes cybercrime less
worthwhile to participate in
Bad security practices are a problem for the whole
Web, not just an individual network

Research Posters | PhD Researchers 2010 2014

Dissemination &
Disaggregation

William Fyson
Dr Simon Coles
Prof Les Carr

The models that govern scholarly discourse have developed over hundreds of years to produce a rigid and stable system for
exchanging research outputs. Whilst the mechanisms in place have served academia well, the Web presents an opportunity
for a number of innovations. Yet despite potential benefits, changes in academic publishing have been relatively
unforthcoming compared to many industries now dominated by the Web. Only by understanding the complex socio-technical
dynamics that underpin the system are we able to determine why the Web may not have enabled a scholarly utopia, that it has
to potenital to create.

Dissaggregation

Discussions

Posters

Workflows

Presentations
Datasets
Workshops
Collaborations

Thesis

Methodologies
Contacts
Ideas

Academic publishing serves a number of different roles beyond dissemination


of research outputs, including: peer review, measuring impact both within
academia and beyond, recognising academic contributions and allocating
funding. At present this is mostly achieved through the single scholarly unit of a
journal article, the success of which is typically measured via citations.
Dissemination of research outputs online can be much more flexible however
allowing us to disaggregate the bundle of research outputs that form an article
or thesis. This in turn presents new opportunities for demonstrating our
contributions to a field and measuring impact. Such issues have already arisen
in other online markets and business models have adapted as a result; will the
same innovative and disruptive forces take hold in academic publishing?

Tools & Services

The Redactor tool assists researchers with disseminating their work to the
widest audience possible. It allows a user to remove any elements that inhibit
wider dissemination and assists the user with finding alternative content that
may be more suitably distributed.
For example, images can be replaced with Creative Commons licenced
alternatives, or a user can distribute their own images by embedding licences in
the metadata.
Available at: http://users.ecs.soton.ac.uk/rwf1v07/redactor/
The Creative Commons suite of licences allow anyone
to publish their work openly whilst still requiring
anyone who uses the work to attribute the original
author. Thus the licences are useful to publish any
research outcomes, including papers and data sets.

Reward &
Recognition

The system that drives research relies on researchers building their reputation
as someone who contributes useful knowledge to their community. Thus to
encourage an open and disaggregated scholarly discourse, it must be easier
for researchers to prove the validity of their work to their peers, show the
impact of their work to institutions and demonstrate their skills and experience
to industry.
An online portfolio of a researchers work may be one way to achieve this,
aiming to elevate disaggregated research outputs to the level enjoyed by
journal articles. Provenance metadata provides vital context to research
outputs and Altmetrics could be used to help demonstrate a wide range of
impact.

Provenance
Peers

conte

xt

validation

skills
knowledge

Industry
Community

impa

ct

AltMetrics

visu

ions
lisat

University

The Disaggregator tool takes a user's document and assists the user in
extracting discrete chunks of knowledge that can be distributed in their own
right - in a Chemistry context as illustrated below, this may involve extracting
the data that represents a compound or a reaction from a thesis, so that it can
be more easily shared and used and built upon.

A unique idenitfier for researchers,


allowing a researcher to attach
themselves to their diverse research
outputs, distributed across a range of
platforms, institutions and disciplines.

Once a work has been disaggregated, the resultant items of data and
information are available to be exploited by a researcher to further enhance
their reputation and be used by their peers. Further research will look into
associating items extracted by the disaggregator with an ORCID and
publishing results to blogging platforms to further explore ideas of reward and
recognition.

75

Research Posters | PhD Researchers 2010 2014


Web Science

Predicting Stock Prices with Online Information


Paul Gaskell
Professor Frank McGroarty
Dr. Thanassis Tiropanis

Introduction
On the 23 of April 2013, a fake tweet was sent from the White House's twitter
account. A few minutes later the price of the Standard and Poor's 500 index,
representing 500 of the highest valued companies in the US dived by nearly 1%.
1 tweet accounted for the loss of nearly 1% of the value of the US Economy.
In a sense this is not surprising, financial news services like Bloomberg and
Reuters regularly update and publish indices of media sentiment towards
stocks. Over the last 4-5 years researchers have begun to look for models of
media sentiment which can be used to predict prices. The results of this
research are, however, generally quite disappointing.
The reason for this is that the way language relates to offline events is a
difficult thing to model. Language is temporally uncertain, in that a
statement can be about an event in the future, past or present. Also as yet
there is no literature which describes how to model word frequency
movements over time.
The aim of this PhD is to define a methodology that tackles these issues.

Signal Diffusion Mapping


A New Time-Series Analysis Methodology for
Modelling and Forecasting Based on Complex LeadLag Relationships
Currently, almost all time series
analysis research uses some form of
linear regression. The trouble with this
is that the temporal relationship
between variables is fixed if there is
uncertainty as to when a variable
influences another this cannot be
picked up in the analysis.
In order to be able to model series where the temporal
relationship between the variables is uncertain, we invented a
new time-series analysis methodology (paper currently under
review). This combines concepts from speech processing and
polymer physics to model the relationship as a bumpy surface,
over which information attempts to diffuse from one series into
the other.
We go on to show how mapping the diffusion rate properly
allows us to predict the daily return of the major US and UK
stock indices. We show a trading model that could return around
908% over a 14 year period, just using two indices to predict
each other.

76

Spurious Regressions with Online Text Data


A large number of studies now exist which report correlations
between some text based metric and an offline variable. These
studies always use metrics built under the assumption that the
probability of a word occurring in a set of messages is either not
a function, or at most a linear function of the number of
messages.
But a wide range of studies exist showing that word frequencies
are approximately power law distributed in text. We show that
firstly, this property has significant implications for modelling
text based time-series metrics and secondly, this property
means that current regression results in this literature are
largely invalid.
We go on to present a model of word frequency movements
that better fits that data.

Research Posters | PhD Researchers 2010 2014

77

Research Posters | PhD Researchers 2010 2014

78

Research Posters | PhD Researchers 2010 2014

T ERHI N URMIKKO D R J ACOB D AHL D R K IRK M ARTINEZ D R G RAEME E ARL


University of Southampton University of Oxford University of Southampton University of Southampton

Our project combines Reectance


TransformaGon Imaging (RTI) and ciGzen
science to create a new tool for the
decipherment of this ancient script.
Proto-Elamite is one of the
last of the myriad of
languages from the
ancient Near East to
remain undeciphered.

ParGcipants idenGfy signs


based on visual
characterisGcs and assign
labels to these images.
Tasks are assigned depending
Exempla are all dated to a relaGvely short period

on areas of interest and level

of Gme during the Bronze Age (c. 3000 BC), and

of competence.

all are provenanced to archaeological sites


within modern day Iran.
Earlier aVempts to decipher the proto-Elamite
script have taught us many things about the
nature of use and layout of documents, but the
language eludes us.

We will gain a beVer


understanding of
online community
dynamics and paVerns
of behaviour.

79

Research Posters | PhD Researchers 2010 2014


Revealing the Value of Social Media for
Charitable Organisations
Chris Phethean

C.J.Phethean@soton.ac.uk

Supervisors: Dr Thanassis Tiropanis and Dr Lisa Harris


Social media provide a unique opportunity for charities to reach a large audience with whom they can
engage in productive two-way conversations, for little cost. While it is often assumed that using social media
will be productive, and that charities should use these services, there is a lack of understanding regarding
what value is actually produced and where by using them. This poster presents a framework for
understanding the value that could potentially be created by a charity depending on their intentions and
motivations, communication style, audience intentions and audience engagement.

VALUE
This framework has been produced as a result of a mixed methods investigation into what influences the creation of value on social media for
charities. It goes beyond existing free analytic services that rarely take into account the context of the organisation in question, and instead focuses
on what their aims are, how they relate to their supporters' reasons for using social media to connect with a charity, and how these aspects are
reflected in actual behaviour on the sites.

80

Research Posters | PhD Researchers 2010 2014

81

Research Posters | PhD Researchers 2010 2014


Institute of Criminal
Justice Research

Buying Medicine from the Web


Lisa Sugiura, Catherine Pope, Craig Webber ls3e10@soton.ac.uk
Web Science DTC, Faculty of Health Sciences, Division of Sociology, Social Policy and Criminology
University of Southampton

Methods
The study was comprised of three stages:

Aims of the Research


This research explored the following questions:
What types of medicines are available online, and what types of
websites sell these medicines?
What are the different routes for purchasing medicines, especially
prescription medicine, on the Web?
How and why do people buy medicines from the Web?

Background
Medicines and drugs are subject to national and state/federal
regulation. The misuse, illegal consumption and purchase of
drugs and medicines is not a new phenomenon, but it is one
which the Web may enable or magnify, opening up as it does
access to online information and purchasing.
The provision, purchase and supply of prescription only
medicines are typically regulated by national or state law. This
can vary between countries; each with their own licensing body
(e.g. UK The Medicines and Healthcare products Regulatory
Agency (MHRA) and the US The Food and Drug
Administration (FDA). Current UK medicines legislation is
comprised of the Medicines Act 1968 and approximately 200
statutory instruments. Much of this legislation has not kept up
with developments online and the Web is notoriously difficult to
police

The Role of the Web


The Web can make medicines accessible. People can view
websites outside of the UK and may access to unregulated sites.
The Web enables advertising including spam emails, and direct
marketing when people are browsing other sites which may
encourage purchasing of medicines online. The nature of online
purchasing is impersonal and may be anonymous which can may
encourage disregard for the law/regulation. Those who purchase
medicines online may ignore possible health risks, and may not be
as aware that they are breaking the rules as they would be in the
real-world.
This research sets out to explore the online purchase of prescription
only / unlicensed medicines. While such purchases may not be
criminal and are distinct from offline illegal drug purchasing and use
they can contravene regulations and social norms. The Web
appears to remove or bypass some of the sanctions and stigma
associated with illegal drug purchasing and appears to offer a safe
way to engage in deviant behaviour. Online purchasing of
unlicensed medicines may therefore be an example of respectable
deviancy.

1. Virtual Ethnography: observation of web forums


2. Online Survey designed and implemented with the assistance of
the MHRA
3. Semi-Structured Interviews
Since so little is known about the issue of purchasing prescription
only/ unlicensed medicines online, and even less about the reasons
behind the decision to make that purchase, the research sought to
identify important aspects of these potentially deviant areas of the
Web, by drawing on theories of deviancy established within
criminology and sociology.

Findings
The forum and survey data show the wide variety of medicines
available to buy online, and that the Web is a source of discussion
and debate about such purchasing. These data also indicate that
there are websites that do not follow regulatory standards in
requiring prescriptions and consultations for prescription only
medicine.

Figure 1. Types of medicine available online

The interviews show that people talk about the purchasing medicine
online in relation to other consumptive behaviour on and offline.
People that have purchased medicine from the Web presented
justifications for their behaviour. Such justifications involved
availability, convenience and need to support the online purchasing.

Impact / deployment

This work has been undertaken in collaboration across different


University Faculties and groups such as Electronics and Computer
Science, Health Sciences, Social Sciences and Social Policy, and
Law. This research will describe and understand the purchase of
prescription only medicine from the Web and help to develop
methods for analysing this phenomena.
This research is pioneering because there is currently no qualitative
understanding of why individuals choose to purchase prescription only
medicine from the Web. This will be the first study to apply
sociological and criminological theories to Web phenomena of this
type. Working closely with the UK regulatory agency, the MHRA, this
project seeks to inform patient safety, policy decisions, regulation,
and in particular to contribute to future public advise and advertising
campaigns from this agency.

to procure them. What is legitimately available is constantly shifting and the Web
does not always reflect this, allowing sales toAcknowledgement:
be conducted outside
Theauthorised
Digital Economy Programme is a Research Councils UK
forms of supply.
cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC

82

Research Posters | PhD Researchers 2010 2014


DIGITAL TAXONOMY FOR SUSTAINABILITY
Townsend, J. H. (2015). Doctoral thesis,
pending.
Townsend, J. H. (2015). Digital Taxonomy
for Sustainability. Proceedings of ICT for
Sustainability 2015.

2. ACTION LIFE CYCLE: THE CAPABILITY PROCESSES


THINKING Developing knowledge & options for action ACTION

Materialising chosen options to cause effects

ADOPTING

REALISING

DRIVING

Options are
materialised into
actions by bringing
together the
required
resources.

Action takes place,


enacting rules to
cause effects in
the wider world in
order to progress
the objectives.

ASSESSING

INNOVATING

COMMUNICATING

Knowledge is
developed that
informs effective
action. Data and
knowledge are
gathered,
analysed, refined
and organised.

Novelty is
developed. Options
are developed for
new or altered
action that could be
more effective.

People disseminate
and discuss ideas,
knowledge,
opinions and
agreements.

Options are
decided between,
access is
controlled, action is
promoted up to
global scales.

Social networking
Blogs
Telephony,
conferencing
Email
Forums, commentary
Peer-to-peer content
sharing
Activism coordination
Collective agreement
and e-participation
<Sock puppets>

e-Marketplaces
Peer-to-peer
borrowing
Redistribution markets
Staffed customer
services
Directories
Group purchasing and
community adoption
Offers and discounts
Sales team
coordination
Ratings and
comparison

News, analysis, blogs


eEducation and games
Mass e-Campaigning
and public relations
Data journalism
Leaks
Open data
{Artificial intelligence
advice}
{Information
visualisation}
{Content display}
<Social network bots>

e-Marketing and digital


advertising
CRM and services
E-locks and access
control
Ticketing
Sales gamification
Recommender
systems
Decision support
systems
Voting
<Phishing, trojans and
social engineering>

Ontologies, semantic
web, linked data
Data platforms and
standards
{Transmission}
{Data transfer
protocols}
{Volunteer computing}

Auto-software update
File download
{User control}
<Viruses,worms and
botnets>

DIGITAL TAXONOMY

1. DIGITAL
SYSTEM POWER:
DIGITAL CAPABILITY

HUMAN



Digital hardware
and software
coordinating
interactions
between humans,
connecting supply
and demand.

THINKING NETWORKS


AUGMENTED


Digital hardware
and software
interacting with,
informing,
influencing and
monitoring
humans.

GUIDED THINKING


Automated or
controlled digital
hardware and
software.

AUTO-THINKING


COLLECTIVE

MACHINE

Wiki discussion pages


Social activity records
Organisation analysis
Sensor journalism
Decentralised oracles
Citizen science forums

Knowledge-bases and
wikis
Data analytics
applications
Geographical
information systems
Accounting systems
User profiles
{Crowd sensing}
{Human computation}
<Data theft>

Photography, satellite
and drone sensing
Mathematical analysis
2D/3D Scanners
Scientific instruments
Affective monitoring
Activity records
Mobile &wearable
sensors
{Sensors}
{Memory / storage}
{Computer inputs}
{Machine learning,
pattern and image
recognition}

Revision control and


collaborative software
Collaborative design
analysis
Design sharing, open
source and open
hardware
[Hackathons, meetups
and coding events]
[Investors]
[Digital
entrepreneurship]
[Maker culture]

ACTION NETWORKS
Crowdfunding
Crypto-currency
Collaborative
manufacturing and
disposal
Logistics and delivery
robots and drones
Employee coordination
P2P software sharing
Enterprise transaction
systems
[Digital
entrepreneurship]

Social behaviour
change and
gamification
Physical group
coordination
Decentralised
autonomous
organisations

Installation planning
Distributed
manufacturing and
disposal
Virtual customer
services
Real-time employee
guidance
Problem diagnosis
advice
Logistics and delivery
optimisation
Industrial predictive
analytics

Individual behaviour
feedback, quantified
self
Mobile and wearable
advice
Crowd tasks
Flash mob formation
Business intelligence
and operations
management
Real-time guidance
and navigation
Action knowledgebases Planning and
decision support
systems

Manufacturing robots
and drones
Automated process
optimisation
2D/3D printing
Automated problem
diagnosis
Installation assessment
drones and robots
{System components:
software, hardware
and digital services}
[Digital industry
manufacturing base]

Robots
Drones
Automated
optimization
Motors, actuators
Networked machines
(Internet of things)
Dematerialised content
{Computer outputs}

GUIDED ACTION

Optimisation of options
Customisation of
options
Design environments
Open innovation and
opportunity
identification
Design assessment
Ideation catalysts
[Accelerators and
incubators]
[Digital agencies,
software and design
services]

AUTO-ACTION

Computational
creativity
Simulation and
prediction
{Computation /
processing}
{Software}
{Cloud computing
services}
{Artificial intelligence
agents}

3. SUSTAINABILITY

EFFECTS OR OBJECTIVES: THE SUSTAINABILITY TAXONOMY

SUSTAINABILITY
CAPABILITY

Intermediate steps across


the capability processes to
build up resources for
sustainability progress


SUSTAINABILITY
PROGRESS

The major challenges that must ultimately be addressed for environmental sustainability.

SUSTAINABLE RESOURCE USE

ENVIRONMENTAL
INTERACTIONS

Decoupling. Efficiency and productivity.

ENERGY

OTHER RESOURCES

Sustainability education, arts and media

Building efficiency

Water and waste water

Sustainability science and knowledge


development

Renewable energy

Food, agriculture, and fishing

Carbon and fossil fuels

Waste, materials and mineral


extraction

Finance, insurance, resource pricing


ICTs (cleanweb, second order applications)

Electricity distribution and storage

Government, regulation and e-participation

ICTs (green computing, first order


impacts)

Local economy and community

Transport and electric vehicles

Fundamental technology or resource

Cities

Font: Klima CC BY-NC-ND 4.0. Icons: Freepik, Robin Kylander, Flaticon.com. CCBY3.0; www.iconsmind.com.

Manufacturing and supply chains


Real estate, storage and
construction
Consumer goods

Interdependent relationship of
humans with the Earth System
Biodiversity and habitat
conservation
Adaptation and resilience to
environmental risk
Environmental health and safety,
air quality
Geoengineering
General sustainability

JACK TOWNSEND DIGITALTAXONOMY.COM

0.6

83

Research Posters | PhD Researchers 2010 2014

Web Science

  


   

 
      

      




 
  



     




   


         
    
   
    

    
  

    
   
           
           


    
    
    
   
   
            
      
  
 
    
     
  
    
   
             

           


 

  
        
 

          
  
          
      
  

 
        
     
 
 


 
     

   
 


     


 
   
  
 


    



          

  
  
 
             
   
          
 
      
     
   
  

    
 

     
   
     
 
   
     
             
           
     
  


 


 
   

  

       


  


 
 
       
   
           
                     
          
    
           
   
       
 
            
   
      

 
      





 
 
    

84

     



 



Research Posters | PhD Researchers 2009 2013

Thesis title

Academic Research Data


Re-usage in a Digital Age:
Modelling Best Practice
Laura German

leg406@soton.ac.uk

LLB (Hons) Law, University of Southampton 2009


MSc (Dist.,) Web Science, University of Southampton 2010
Web Science PhD Candidate October 2010 to (expected completion) early 2015
Senior Research Assistant (The Ordnance Survey Data Enrichment Project) January 2014 to January 2015

Supervisory team:

Professor Mary Orr Lead Supervisor, Modern Languages, Faculty of Humanities


Professor Stephen Saxby Co-Supervisor, Law, Faculty of Business and Law
Professor Leslie Carr Co-Supervisor, Web and Internet Science, Faculty of Physical and Applied Sciences

Abstract
Recent high profile retractions such as the case of Woo Suk Hwang and others demonstrate that there are still significant
issues regarding the reliability of published academic research data. While technological advances offer the potential for
greater data re-usability on the Web, models of best practice are yet to be fully re-purposed for a digital age.
Employing interdisciplinary web science practices, this thesis asks what makes for excellent academic research across the
sciences, social sciences and humanities. This thesis uses a case study approach to explore five existing digital data platforms
within chemistry, marine environmental sciences and modern languages research. It evaluates their provenance metadata,
legal, technological and ethical frameworks. This thesis further draws on data collected from semi-structured interviews
conducted with eighteen individuals connected to these five data platforms. The participants have a wide range of expertise in
the following areas: data management, data policy, academia, law and technology.
Through the interdisciplinary literature review and cross-comparison of the three case studies, this thesis identifies the five
main principles which inform how best practice should be modelled both now and in the future. These principles are:
sustainability, discoverability, working towards a common understanding, a good user experience and accreditation. It also
reveals the key grey areas that require further investigation.

Post-doctoral project

The Ordnance Survey Data


Enrichment Project
Enriching Ordnance Survey Content: Provenance, IP and
Licensing Impacts of Data Usage from Multiple Sources

Summary

January 2014 to January 2015

Researchers from the Ordnance Survey and the University of Southampton have joined together to work on an
interdisciplinary research project that focuses on data enrichment in a digital age.
Dr Jenny Harding (Ordnance Survey) and Professor Mary Orr (Modern Languages) lead the research team with Ashley Wright
(Ordnance Survey), Victoria Lavender-Seagrave (Ordnance Survey), Dr Sophie Stalla-Bourdillon (Law) and Laura German (Web
Science) as co-investigators.
This research focuses on how data at Ordnance Survey can be further enriched for business, research and leisure users
through data mining of existing data and linking to other external datasets. It explores the potential for data enrichment at
Ordnance Survey and how this could be achieved (where necessary) by modification to its existing provenance metadata,
legal, technological and ethical frameworks.
This one-year project is funded by Ordnance Survey and sponsored by the University of Southampton.
Web Science Poster. Version 1.0. Last modified by Laura German on 24 October 2014.

85

Research Posters | PhD Researchers 2009 2013

The Emergent Threat of Defamation Online: The need for a new model governing online
defamation with the emergence of social web technologies

Sarosh Khan , Phd Candidate, shrk106@soton.ac.uk


Dr Roksana Moore (Faculty of Business & Law)
Dr Mark Weal (Faculty of Applied & Physical Sciences)
Web Science Doctoral Training Centre, University of Southampton

Introduction

Online Defamation

Twitter is the most popular with 400 million worldwide users with
individuals able to publish 140 character pieces. The Interpersonal
network is developed through retweeting and searching content
on mass.

The multiple publication rule dictates that a publisher is liable every


time a defamatory publication is read, along with any subsequent
republisher and intermediary involved. The protection of reputation
is one of the most important aspects of the legal landscape of the
U.K.

The development of the Web has led to the development of the


Web as a medium of dissemination Including potentially
defamatory. The Essence in the emergence of the social Web
whereby no longer is the Web merely an informational resource
but an interpersonal network. The Web ha shifted from merely a
resource with which the vast majority of individuals have simply
taken from what has been presented on the browser to being a
resource that has allowed individuals through their ability to
publish content to become an interpersonal network.

Defamation on the Web is governed through the same principles as


govern offline defamation; cyberpaternalism. A publisher will be
liable every time a defamatory comment has been accessed, any
individual that republishes will be liable every time the republication
is seen and intermediary liable for its active role in publications.
Cyberlibertarianism says that you should leave the community of
Web users to govern themselves through norms and standards that
will develop but it was disregarded for paternalism because of a lack
of homogeneity amongst people online. Decisions in Berezovsky,
Dow Jones, Loutchansky, Godfrey, Bunt and eBay have affirmed the
application of the paternal approach in the U.K. These rules have
developed to continue to protect reputations, one of the most
fundamental aspects of the legal landscape of the U.K.

The Problem The continued adoption of the paternal approach is no longer appropriate to govern online defamation in the U.K. in

light of the essence of the Web 2.0 environment. The ability to republish and search for content means that more individuals are engaging
with potentially defamatory content than ever before.

RT Convention Proliferation
Variation
Via

Username
@tagami

Date
16/03/2007

HT

@TravisSeitler

22/10/2007

Retweet

@kevinks

01/11/2007

Retweeting

@musicdt

05/01/2008

RT

@TDavid

25/01/2008

R/T

@samflemming

20/06/2008

Recycle Icon

@claynewton

16/09/2008

Text
@jasonCalacanis (via@kosso) new Nokia NSeries phones will do Flash, Video and YouTube.
The Age Project: how old do I look?
http://tweetl.com/21b (HT @technosailor)
Retweet: @AHealthyLaugh is in the Boston Globe
today, for a stand-up show shes doing tonight.
Add the funny lady on Twitter!
Retweeting @Bwana: Is anyone streaming live
from CES? #ces
RT @BreakingNewsOn: LV Fire Department: No
major injuries and the fire on the Monte Carlo
west wing contained east win nearly contained
r/t: @danwei Live Online chat with Chinese
President Hu Jintao,. Variation
He claims he uses net to # of adopters
know netizen concerns.
[recycle icon] @ev of @biz re:twitterkeys [star]
http://twurl.nl/fc6trd
RT
1,836,852

% of # of adopters of # of retweets
total
89.2%

53,221,529

Via

751,547

36.5%

5,367,304

Retweeting

50,400

2.44%

296,608

Retweet

36,601

1.78%

110,616

HT

8,346

0.41%

22,657

R/T

5,300

0.26%

28,658

Recycle icon

3,305

0.16%

18,225

Total

2,059,350

59,065,627

Through a combination of quantitative and qualitative analysis of a corpus of 80 million tweets from Jan 2007 to Oct 2009, we can
demonstrate the way in which the convention of RT has spread across the non homogeneous community of Twitter users to become the
accepted method of communication among the community. We see, RT and via exceed all others with no written rules as a standard of
behaviour through the existence of weak ties. Weak ties mean that even if individuals do not believe in a standard, they will adopt it if they
see others have adopted it.

39

86

Research Posters | PhD Researchers 2009 2013

87

Research Posters | PhD Researchers 2009 2013

88

Research Posters | PhD Researchers 2009 2013

89

Research Posters | PhD Researchers 2009 2013

90

Web Science Centre for Doctoral Training


http://webscience.ecs.soton.ac.uk/dtc
+44 (0) 23 80 59 27 38
Web Science Institute
www.southampton.ac.uk/wsi
+44 (0) 23 80 59 35 23

To download this booklet

@WebSciDTC
@sotonWSI

You might also like