Professional Documents
Culture Documents
October 2015
Web Science
Centre for Doctoral Training
The Centre for Doctoral Training in Web Science is funded by the
EPSRC, and underlines Southamptons pre-eminence in this new
research discipline. Web Science has an ambitious agenda. It is
inherently interdisciplinary as much about social and organisational
behaviour as about technology. Its research programme targets the
Web as a primary focus of attention, adding to our understanding of
its architectural principles, its development and growth, its capacity
for furthering global knowledge and communication, and its inherent
values of trustworthiness, privacy and respect for social boundaries.
The first year of the training programme is a taught MSc and includes
short courses and project work tailored to each students research
interests. This is followed by three years of challenging and original
research at PhD level.
This booklet details the current MSc students academic and
professional backgrounds along with their research plans for the future.
It also includes a research poster from each of our PhD researchers.
The Digital Economy Theme is a Research Councils UK cross council
initiative led by EPSRC and contributed to by AHRC, ESRC, and MRC.
This work was supported by the EPSRC through grants EP/G036926/1
and EP/L016117/1.
Content
Biography | MSc Students 2015
Lia ANGGRAINI
Clarissa BROUGH
Jo DIXON
Ryan JAVANSHIR
Louise KEEN
Anna KENT-MULLER
Daniella MALLER
Bartosz PASCZA
Maria PRIESTLEY
Vera SHCHERBINA
Chira TOCHIA
Clare WALSH
Enterprise Mobility And Big Data Analytics: A Leverage For Corporate Knowledge
Management
Nada AL BUNNI
Neil AMOS
Social Media And The Far Right: Web 2.0, Opportunity For The English Defence
League?
10
Nicholas BENNETT
11
Nicholas FAIR
12
Paul GILBERT
13
Briony GRAY
14
Sarah HEWITT
15
Dola MAJEKODUNMI
16
Rafael MELGAREJO-HEREDIA
Public Web
17
Keisha TAYLOR
Moving Beyond Local To Assess How Intangible Assets Are Developed By Micro, Small
And Medium Enterprises (MSMEs) On The Global Web
18
Gefion THUERMER
19
Niko TSAKALAKIS
20
Jack WEBSTER
21
22
Elisabeth COSKUN
23
Emma CRADOCK
Understanding How To Talk Formally About Personal Data To Make Data Processing
More Transparent
24
Michael DAY
25
Conrad DSOUZA
Predicting Selections From Past Performance Data: A Case Study Predicting Winners
Of Horse Racing
26
Faranak HARDCASTLE
Back On The Track Of Do Not Track: Raising Transparency In The Online Behavioural
Tracking Ecosystem
27
Laura HYRJAK
Youth, Drugs And The Web: Exploring Youths Use Of The Web To Access And
Research NPS
28
Sami KANZA
29
Amy LYNCH
Examining The Activated Patient: A Qualitative Study Of How And Why Diabetic
Patients Use The Web To Aid Self-Management Of Their Disease
30
Neil MACEWAN
31
Joanna MUNSON
32
Jessica OGDEN
33
Tim ORIORDAN
34
Alexander OWEN
35
Sophie PARSONS
36
Alan PONCE
37
Neal REEVES
38
39
Johanna WALKER
40
Anna WESTON
41
Peter WEST
42
Steven WHITE
43
44
Gareth BEESTON
45
Robert BLAIR
46
Ian BROWN
47
Jennifer GASKELL
48
Lawrence GREEN
49
Caroline HALCROW
50
William LAWRENCE
51
52
Evangelia PAPADAKI
53
Elzabi RIMMINGTON
54
Keiran RONES
The Web And Digital Pirates: Who Are Pirates And Do They Understand The Law?
55
Eamonn WALLS
56
Abigail WHITMARSH
Revenge Pornography
57
58
Paul BOOTH
59
Timothy DAVIES
60
Maire BYRNE-EVANS
61
Gemma FITZSIMMONS
62
Mark FRANK
63
Dominic HOBSON
64
Alison KNIGHT
Identity Linkability And Attribution: Digital Challenges For Law And Policy
65
66
David MATTHEWS
67
Rebecca NASH
Making Bodies: What Is The Role Of The Web On Womens Engagement With
Aesthetic Surgery??
68
Javier PEREDA
69
Orienting Within Complex Digital Environments: Bridging The Gap Between The
Inside And Out To Reduce Disorientation
70
Nicole BEALE
71
Jaymie CAPLEN
72
Huw DAVIES
73
Huw FRYER
74
William FYSON
75
Paul GASKELL
76
Richard GOMER
77
Christopher HUGHES
78
Terhi NURMIKKO
79
Christopher PHETHEAN
80
Olivier PHILIPPE
81
Lisa SUGIURA
82
Jack TOWNSEND
83
Philip WADDELL
84
85
Sarosh KHAN
The Emergent Threat Of Defamation Online: The Need For A New Model Governing
Online Defamation With The Emergence Of Social Web Technologies
86
Russell NEWMAN
87
Ramine TINATI
88
Michael YIP
89
Aristea-Maria ZAFEIROPOULOU
90
Lia ANGGRAINI
lpa1u14@soton.ac.uk
BA Computer Science, Kwik Kian Gie School of Business
Upper Second Class Honours (2:1)
I am interested in the implementation of integrated e-government systems. These
allow seamless interconnectivity and automated interaction between citizen and
government, and other stakeholders. A Web-based solution will empower the
government to optimise their activities (especially in solving public issues) and to
reduce potential misconduct in bureaucracy.
Clarissa BROUGH
cb1g15@soton.ac.uk
MRes Humanities (Music), Keele University
Merit
BA Dual Honours, English and Music, Keele University
1st Class Honours
My research interests reside in investigating how sociological behaviours and the
technical processes of the Web can construct our identity, in particular our musical
identity. This area of research is becoming ever more relevant with the growth of
online music networks, such as Spotify and Apple Music. These services provide
open forums for listening, sharing and rating music. Users can create dedicated
artist and genre communities by sharing and recommending music, or posting
messages. I am interested in researching how these online music networks serve as
arenas for an internet based reality where individual and collective identities can be
formed, a type of self-definition. I am particularly looking forward to how the iPhD
will broaden my knowledge of the alliance between technology and identity as well
as the technical processes behind online music networks.
Jo DIXON
jmd3g10@soton.ac.uk
PGCE, University of Southampton
Pass
M.Ed English Language Teaching, University of Sheffield
Pass
BA Modern Languages, University of Sheffield
1st Class Honours
While I have found it easy to make the Web work for me, personally and
professionally, I am acutely aware that not everybody does. I work with people
who face various barriers to accessing or making effective use of the Internet, and
Im interested in the best ways of supporting them to develop Web literacy (and,
indeed, what that means, or should mean, or might come to mean), especially adults
with language or literacy difficulties. I have a particular interest in the mobile Web
and its implications for teaching and learning with and about the Web.
Ryan JAVANSHIR
rj1g15@soton.ac.uk
MSc Computing, Oxford Brookes University
Pass
LLB Law, University of Portsmouth
Upper Second Class Honours (2:1)
I am interested in e-learning, specifically learning through simulations using Virtual
Reality technologies. I am also interested in computer games, how the Web has
affected them and the future of playing games online.
@OhMyReza
www.kuchalu.co.uk
Louise KEEN
lk1g15@soton.ac.uk
BSc Information and Library Studies, Aberystwyth University
1st Class Honours
My undergraduate dissertation focused around how public libraries use social
media for the marketing of their services. I plan to expand upon this and investigate
how libraries could use social media. I also find website design, information
architecture, infographics and online gaming interesting.
uk.linkedin.com/in/louisejkeen
@louisylou
Anna KENT-MULLER
alkm1g12@soton.ac.uk
BA in Music, University of Southampton
1st Class Honours
I am interested in the link between music and the Web. This research area includes
investigating the role of the Web in the evolution of the music business, specifically
focusing on music distribution applications, and the changes affecting the
recording industry. I am also interested in online music representation, looking into
music encoding, and how we can develop these initiatives to enable greater music
distribution and music access online.
uk.linkedin.com/in/annalouisekentmuller
@Anna_93
annakentmuller.wordpress.com
Daniella MALLER
dm4g15@soton.ac.uk
MSc Information Science, University College London
Distinction
BA Fine Art, London Metropolitan University
Upper Second Class Honours (2:1)
The Internet and the Web are considered to be the main facilitators of the
Information Revolution. World history attests that revolutions do not always
deliver the result they intended. Among pioneers who developed the Web were
Libertarians that believed it will promote personal and social freedoms. Yet
nowadays it is also used for surveillance and for curtailing freedom. It is almost
inevitable that the Web will further influence the way we participate in politics
and economics, what is not clear is how and to what extent. I am interested in
considering the possible ways the Web could change the structures of democratic
societies and how individuals will relate to it. The sharing economy, online petitions
and e-governments are only a few examples of areas I would like to research.
Bartosz PASCZA
bp11g12@soton.ac.uk
BSc Physics, University of Southampton
1st Class Honours
One of my fields of interest is scientific communication on the Web and
the development of metrics of Science. In my opinion, the Web provides an
opportunity for more accurately and successfully measuring the quality of scientific
work. In addition, I am interested in how data analysis can benefit cities. The term
Smart Cities seems to be not only a buzzword, but also a real opportunity to foster
community governance, transparency of local government, and improve municipal
services.
uk.linkedin.com/in/paszcza
@bpaszcza
about.me/bartosz_paszcza
Maria PRIESTLEY
mp5g15@soton.ac.uk
BSc Biological Anthropology, Durham University
1st Class Honours
Currently I am interested in applying evolutionary approaches to study the dynamic
nature of the Web. This includes trying to understand the processes through which
cultural norms and social networks develop, as well as identifying factors that
influence the spread and popularity of online content.
Vera SHCHERBINA
vss2g15@soton.ac.uk
MA Religious Studies, Lomonosov Moscow State University
Merit
Im particularly interested in remote working through the Web and the social
transformation caused by this phenomenon. In addition, I would like to explore how
user generated content (usage logs) can be used in Social research. However, I am
also intrigued by the role of the Web in Russia and Eastern Europe.
Chira TOCHIA
cnt1g15@soton.ac.uk
BA Advertising and Marketing Communication,
Bournemouth University
Upper Second Class Honours (2:1)
Although I want to further my research on social networks and the challenges
it puts on what are considered to be social behaviour norms. Im really looking
forward to the module on Computational Thinking so I can build a solid foundation
of knowledge in the more hands on and technical aspects of Web Science.
linkedin.com/pub/chira-tochia/33/604/906
@chiratochia
Clare WALSH
cew2g15@soton.ac.uk
Post Graduate Study in Education, University of Javeriana
Pass
BA English and American Studies, Keele University
Lower Second Class Honours (2:2)
I am interested in teaching methodologies in e-learning, and Learner Analytics with
a view to supporting and enhancing learning. There is a lack of inter-disciplinary
skills in this field, and an urgent need for more qualified people to interpret the way
that technology can be used to enhance learning in a traditional ESL (English as a
Second Language) classroom environment. I am hoping through Web Science to be
able to understand the potential for Learner Analytics, and other technologies, to
be used in an integrated manner with other existing teaching methodologies.
linkedin.com/pub/clare-walsh/8/9b0/8a0
Corporate
Knowledge Flow
Corporate
Knowledge Flow
Introduction
Research Questions
The consumerisation of mobile devices has helped in popularising the trends and
1. What factors influence the awareness and adoption of these innovative Web
technological trends within a corporate organisation?
concepts of Enterprise Mobility and Social Networking as they have pervaded within
the spectrums of Employee-owned and/or company-owned devices. Consequently, an
enormous amount of rapid and varied data is being produced and also available for
2. To what extent has Enterprise Mobility enhanced social networking within the
organisation and how have both trends impacted employee engagement and
knowledge sharing?
organisations insight like never before, resulting in the exigency of Big Data
Analytics. This research is therefore, focused on how to exploit the convergence of
3. How can Big Data Analytics be exploited to elicit knowledge from a convergence of
Enterprise Mobility, Social Networking and external data sources?
Enterprise Mobility and Big Data Analytic for knowledge capture and sharing, with
the aim of making KM deliver value to corporate organisations.!
Hypothesis
Preliminary Experiment
1. Given the effective use of current and emerging Web innovations and
technologies, Knowledge Management will remain a viable and sustainable
management tool and field of practice for the foreseeable future.
To prove the concept, about 150,000 domain-specific tweets were polled from Twitters
Streaming API in a week. Using text analytics techniques, actionable knowledge and
strategic insights were discovered from the data polled. As the value of the discovery is
in its potential to drive it towards strategic competitive advantage, the company
officially decided to uphold and implement the knowledge gained from the experiment.
Supervisors:
Prof. Leslie Carr
(lac@soton.ac.uk)
Proposed Approach
A macro-level exploration of the Arab public sphere is
Abstract
The political and social movements in the Arab world have received wide media
coverage in the western countries and have emphasized the role of social media in
such movements. The literature on the Arab Spring has generated many questions
yet to be addressed in order to fully understand how the social media affected and
continue to affect the public in the Arab states. This work aims to study the
emergence of online public sphere for the Arab users. The concept of public sphere
identifies historical formation of democratic societies and it also posits a model of
what an ideal society should be. This makes it a good candidate to use as
theoretical framework in order to understand the role of social media in the Arab
states. The statistical indicators suggest Facebook is providing a sphere for public
to discuss their public concerns. This research will use the techniques of social
network analysis to analyse the structure and the participants of this sphere and
how it is evolving during the political and social movements.
Research Motivations
Although there is a rich literature that has been dedicated to
study the recent social and political movements in the Arab
states as a manifestation of the potentials of the online social
networks, this literature has generated more questions to
research on.
o Why Arab states have experienced different scenarios and
various outcomes of their uprisings during the Arab Spring.
o The impact of social media on politics is continuous and it
requires ongoing observation and analysis.
o Identifying the actors and explore how web empowers them.
o Recognize the
spheres.
in the online
Research Questions
the study of the social graph of Facebook over time to observe the changes
in Arab public sphere as they manifest in the pattern of fragmentation in the
Facebook network.
Dr Jeff Vass
Dr David Milland
jmv@soton.ac.uk
dem@soton.ac.uk
Social Sciences
Web Science DTC
University of
University of
Southampton
Southampton
Nada AL BUNNI
na11g10@soton.ac.uk
Web Science DTC
University of
Southampton
10
11
12
13
Briony Gray
University of
Southampton
Bjg1g11@soton.ac.uk
Background
In the past decade social media and the Web have played an increasing role in emergencies and disasters,
primarily as they offer a means of two-way reliable and accessible communication. Examples of social media
include Facebook, Twitter, blogs such as Wordpress, video channels such as Youtube, professional sites such
as LinkedIn and general forums. They are used in a number of ways which range from individuals passing on
warning information, to governments distributing real-time updates or advice during an event. Social media
and Web use during disasters may be conceptualised into two broad categories: the first is used to
disseminate information and to receive communications, the second is used as a management tool.
The impact of social media in disaster situations however is reliant on a number of underlying factors. These
have been synthesised into key overriding themes that existing literature highlight at emergent areas which
require further study. Firstly, accessibility to the Web and subsequently social media is a vital consideration
to the effectiveness of online disaster management strategies. Secondly, the reliability of online information
shared on social media and other forms of communication has a direct link to the level of risk an individual
is subject to. Thirdly, usability of online sources, tools, applications and channels has clear connotations to
how effective these resources may be used. While the utility of social media during disasters remains
intriguing, many applications, tools and platforms remain either speculative, in their infancy, or have been
subject to unexplained underlying factors that subvert their potential.
Methodology
In order for social media uses to be fully understood and integrated into disaster management the Web must also be
studied as it represents the intermediary between the individual, and online information. Related works synthesise
information regarding social media use/users and benefits/limitations in analysis frameworks for application to specific
disaster events, however these are lacking in key areas required for better understanding and improvements, and fail to
synthesise broad ranging information designed to be applied across multiple different disasters. This study sought to
address these gaps in knowledge by assessing the role of the Web in online disaster communications and questioning
whether this can be synthesised into disaster frameworks. Secondly, it questioned whether the incorporation of recent
literature is able to produce a more insightful analysis framework, and thus more detailed application. Finally, it sought
to evaluate whether the incorporation of an interdisciplinary perspective may broaden the explanations of said
framework, leading to more effective social media disaster management tools.
The qualitative nature of the study data, and the application to a number of varying case studies meant that a framework
was the most suitable way of synthesising information. To generate such a framework the study followed a number of
steps:
1.
2.
3.
4.
5.
Relevant literature was searched for and a database made of suitable articles. These were identified through
key term searches using Google and Academic databases. The shortlist contained 59 individual papers.
Grounded theory and inductive coding were applied to the shortlist of papers, which produced a series of
categories explaining how and why social media was used during disasters (according to the literature).
Each category had appropriate sections of papers slotted in according to theme and content. This produced
a framework of 44 categories which illustrated the range of uses for social media during a disaster.
The framework was then applied to a case study to demonstrate relevancy and insight to a disaster situation
where social media and Web 2.0 had been used, which exceeded the usefulness of other existing frameworks.
Suitable conclusions were drawn from the framework application, and future suggestions provided.
Results
The study produced a framework featuring 44 categories which took a number of considerations into account. These were broken down into the four key themes
highlighted by the literature review (accessibility, usability, reliability and effectiveness). They indicated several trends within the literature that previous
frameworks had not fully discussed or explained: firstly, there had been a rapid development in technology and software that was able to be utilised by disaster
management strategies. Secondly, there was a growing evaluation of the Web as the intermediary to social media. Finally, it was evident that offline and online
situations still differed dramatically, and that confusion between the two was a considerable limitation to the effective use of social media during disasters.
Accessibility A number of categories in the analysis framework indicated that Web accessibility remained a vital issue. This is because geographical differences
in location, household income, poverty levels, geographical internet spread and online authentication issues impacted who was able to gain access to the Web,
and therefore social media. Less economically developed countries were shown to have the lowest access to the Web during disasters, with ethnicity and location
also having a direct affect to Web access.
Reliability The reliability of information spread on social media was shown to be impacted in a number of ways throughout many framework categories. These
included unintentional spread of false information, malicious spread of information or terrorism, sharing information without verified sources or information
filtering systems not functioning as they were intended to. The categories however highlighted the fact that information reliability was an area in which individuals
and organisations were becoming increasingly critical of, leading to improved online information standards.
Usability The usability of the Web was broken down into two categories. The first was technical usability which involved the technical design, proficiency and
success of software and hardware during disasters. The framework found that this was the area in which huge improvements and investments were being made
both in research groups and on a governmental scale. These took the form of innovative tools, applications and protocols. Social usability involved the ability of
individuals to use the Web effectively and to understand the information on it. The framework showed that differences in computer literacy, the age at which
someone was first exposed to the Web, and how many technical devices and individual owned made an impact in management effectiveness.
The framework was applied to a dataset of Tweets from Nepal during the earthquake in April 2015, demonstrating its applicability. This case was chosen as there was little academic literature that
analysed communications in detail from the disaster. In addition to this, the disaster saw high usage of social media during all phases of the event making analysis clearer and broader. The dataset
was collected by the Southampton Web Observatory and has a sample size of 10,000 tweets. The dataset was searched for key terms highlighted by previous Twitter studies as being relevant to
identify communication patterns. Key terms included words or phrases from the framework categories to show tweets with immediate relevancy such as #earthquake, help, #nepal,
#nepalearthquake2015, aid, donate, and support.
Accessibility issues were demonstrated by tweets which stated that local Nepalese people did not own, or owned fewer, devices that could connect to the Web throughout the disaster. Reliability
issues were highlighted by the general confusion of the Facebook safety check application, which was made use of by individuals on a global scale rather than in Nepal alone. This confused rescue
efforts, and created discrepancies between online and offline situations. Reliability was also demonstrated by the lower than expected count of the standardised disaster hashtag #NepalEarthquake
in comparison to other hashtags, meaning that the spread of online information was not as easily traceable. Usability issues were shown in the manifestation of public unrest regarding the Nepalese
government. Tweets which called individuals around the world to invest in charities rather than to donate to the government for fear of corruption evidently represents underlying social factors and
political friction. The assessment of the Web as an intermediary to social media produced valuable insight to the analysis framework application, which was evidenced by the range of accessibility
issues shown in the Nepal tweet dataset. The range and depth of issues attributed to accessibility barriers meant that emerging theories regarding the Web, such as online identities and Web
perception, were able to be discussed unlike in related frameworks. Similarly, the incorporation of an interdisciplinary perspective allowed for the identification of underlying factors often overlooked
in related general frameworks, such as the presence of political frictions between the public and government.
Future development of the framework should focus on the creation of a translation system where a minimum of three individuals would translate and interpret the context of a tweet. This would ensure
a reduction in human error and/or bias, and develop a clearer idea of tweet context than individual translation alone. The application of the framework to the Nepal dataset demonstrated that the
research questions had been addressed, and that interdisciplinary, recent and Web-focus literature have produced a valuable insight to the case study. Consequently, in the future the framework may
be utilised by various tools, applications and online resources for improvements to online disaster management strategies that are both interdisciplinary and relevant.
14
Gaming Facts
46% of gamers aged 16-64 are
female.
Most games:
- feature male-gendered activities;
- are advertised to males;
- feature males in the advertising.
Other Facts
Only 29% of the House of
Commons is made up of women.
Only 16.7% of Directors of
FTSE-100 companies are women.
Only 17.6% of senior police
officers are women.
Only 15.1% of ICT professionals
are women.
It is suggested that as little as 4%
of all programmers and engineers
in the video game industry are
women.
Flaming,
cyberbullying,
or e-bile?
The research......
ur whe
avio
n
eh
ded in
bed
re
m
g online
min
e
ga
The Psychology
of Play
slut
Mixed method:
bitch
cunt
Used positively:
Slut jokes are so whoreable
Used negatively:
RT: And it ranges from casual
(using 'bitch' when you meant
to say 'woman') to the horrid
shit I just RTd. I am tired.
Neutral use:
Karmas a bitch
Disregarded: partial or
complete foreign language;
unintelligible; tweets promoting
porn sites.
he magic circ
et
l
sid The magic circle is e
play happe
ni
oes
n
rd
Methodologies
Selected keywords:
?
ply
ap
Research Questions
different ru
ere
les
wh
life?
al
Is
b
The evidence....
200
180
160
140
120
Disregarded
Positive
100
Neutral
Negative
80
60
40
20
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
In particular, with regard to the use of the word bitch, it would be helpful
to know if the word was used as a form of misogynist abuse by just one
demographic, or whether it had become representative of the lingua
franca generally. While the Twitter search API is both useful and easily
accessible, it has limitations.
It is only later, particularly from scholars such as Jane, the point begins
to be made that the abuse is very deliberately misogynist and very deliberately designed to reclaim sections of the online space (which is directly linked with the corresponding offline space) for men only.
r
e
t
t
i
w
re T
!
s
a
Bi
a
w
e
B
15
Research Objectives
Social media banking refers to
the use of social media as a
form of delivery channel for To explore the adoption and
usage of social media by banks.
banking services.
To identify what set of
attributes influence customers
perception and attitude
towards social media banking.
Theoretical Framework
Rogers Diffusion of Innovation
Relative Advantage
Compatibility
Complexity
Trialability
Observability
Methodology
A quantitative method approach was chosen for the study. The data used
for the study were in two categories, the primary data and secondary
data. The secondary data included a theoretical background from
journals, financial reports and market reviews of banks. The primary data
for this study was obtained directly from participants using a structured
questionnaire sent by email to University students. The questionnaire
had two sections- section one comprised of questions to obtain
information on the demographics of the respondents and section two
contained questions that collected data related to the influence of the
five attributes of innovation on the perception and attitude of
respondents to social media banking. A 5 point Likert scale (a
psychometric scale) was used and they were coded accordingly. The
questionnaire consisted of 34 questions measuring five variables. A
reliability test using Cronbachs Alpha method was done to ensure
internal reliability of the multiple scale items used in the questionnaire.
Main findings
The study identified Facebook, Twitter and YouTube as the most
frequently used social channels by UK banks .
Convenience and ease of use were the major incentives for the use of
social media banking for the respondents .
Overall the respondents perceived data security and privacy as barriers to
adoption of social media banking .
The results showed that relative advantage, compatibility and trialability
were statistically significantly associated with attitudes of respondents
towards social media banking.
Reference
Rogers, E. M. (2003). Diffusion of
innovations, 5th edition New York: Simon &
Schuster Adult Publishing Group.
16
PUBLIC WEB
GOVERNMENTS
CORPORATIONS
DARK WEB
BOTTOM-UP
Interdependent community
Give voice
Value on data
A secure social machine
Mechanism
Surveillance
Disruption, threat > Order
Value on action
A harmful free space
Organism
Community entanglement
Spontaneous, endogenous, emergent > Adaptation, innovation, self-organization
Functional
Ruled by a few, roles preassigned
Enactive
Erratic mass participation
Dynamic Balancing
Damping
Allopoietic
Conformational
Autopoietic
17
Moving'Beyond'Local'to'Assess'how'Intangible'
Assets'are'Developed'by'Micro,'Small'and'Medium'
Enterprises'(MSMEs)'on'the'Global'Web!!
!
Business!
(Strategic Management)!
Why'this'research?'
18
Geography !
(Economic Geography)!
Democratic decisions require equal participation of all affected individuals. In political parties, all
members are involved in decisions about the parties policies and leadership. The web can be used to
make these decision-making processes more accessible. I researched how much the web is actually
used for member participation in decisions in two German parties.
Motion
decision
Motion
proposition /
access
Green Party
Pirate Party
Candidate
election
Candidate
announcement
Candidate
introduction
0 No web use
1 Minimal web use, third party
platforms
2 Minimal web use, own platforms
Decision
preparation
Motion
discussion
Candidate
support
Pirate Party
Not required
Consensus development
Candidate support
Remaining inequalities
Reinforced, where office staff gives MPs an even
bigger advantage
Transposed, where non-access to the web now
means exclusion from decisions
Generated, where access to information
overwhelms
gt2g14@soton.ac.uk
@GefionT
19
Identity Assurance
Supervised by:
Gov.UK Verify is the first national electronic identity management (eIDM) scheme that uses identification functions provided by the private-sector. While still in evaluation (currently in
public beta), this study examines its acclaimed privacy-preserving implementation against requirements imposed by national and international obligations.
Gov.UK Verify
Actors bound by G2G (CH with SP), G2B (CH to IdP) and
G2C (CH to users) eGovernance models
Summary of purpose
Identity assurance activities can only take place if the user
User Control
consents or approves them; users can exercise control over
them
Identity assurance only takes place in ways the user knows
Transparency
about and understands
Users can choose and use as many different identity
Multiplicity
providers as they want to
User interactions only use the minimum data necessary to
Data Minimisation
meet system needs
Data Quality
Records are updated only upon users choice
Copies of all data are provided to users upon request; all
Service User Access and Portability
data can be moved / removed if users wish so
All participants of the Identity Assurance Service have to be
Certification
certified against common governance requirements
Dispute Resolution
An independent Third Party handles disputes
Any exception has to be approved by Parliament and is
Exceptional Circumstances
subject to independent scrutiny
Implications of implementation
References:
[1] Fiat, A. and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, in Advances in Cryptology CRYPTO 86, A.M. Odlyzko,
Editor 1987, Springer Berlin Heidelberg 186-194.
[2] Arora, S., National e-ID card schemes: A European overview. Information Security Technical Report, 2008. 13(2) 46-53.
[3] Brando, L., N. Christin, and G. Danezis, Toward Mending Two Nation-Scale Brokered Identification Systems. Proceedings on Privacy Enhancing Technologies,
2015(2) 135
[4] Clarke, R., Identity Management: The Technologies, Their Business Value, Their Problems, Their Prospects, in Xamax Consultancy Pty Ltd, at
http://www.xamax.com.au/EC/IdMngt.html, March 2004
[5] Cabinet Office, Privacy and Consumer Advisory Group: Draft Identity Assurance Principles, 2013
20
Cultural
Consumers
Cultural
Producers
Recommender
Systems
Cultural'intermediaries'are$occupations$defined$by$Pierre$Bourdieu$as$taste$makers$who$
mediate$between$the$production/consumption$of$culture.$They$are$underpinned$ by$their$cultural$
legitimacy$and$expertise$(cultural$capital),$and$they$operate$within$a$structured$field$of$relations
Bourdieu
Capital$(economic,$cultural,$social)$is$the$
accumulation$of$labour in$all$its$forms
Cultural$capital is$the$basis$of$legitimacy$and$
expertise$of$intermediaries
Habitus$is$the$internalised norms$of$the$field$of$
relations$and$it$manifests$in$regulated$practice
Actor'Network'Theory
The$social/material$world$understood$in$terms$of$
heterogeneous$(human/non)$actorDnetworks$
There$is$a$delegation$of$labour amongst$actors$in$
order$to$make$technologies$exist$and$function
Delegation$results$in$the$prescription$of$behavior$
between$human/non$actors$in$an$actorDnetwork
Socio9Technical'System'Framework
A'framework'for'examining'how'cultural'capital'might'be'co9constituted'and'how'
habitus'regulates'the'actions'of'socio9technical'(e.g.'recommender)'systems
Cultural'capital'(intermediary$expertise)$can$be$explained$by$the$accumulation$of$
delegated'labour amongst$human/nonDhuman$actors$in$a$socioDtechnical$system
Habitus and$regulatory$norms$of$the$field$manifests$in$the$prescription'of'behavior'
from$human$to$nonDhuman$and$vice$versa
Jack Webster
jw30g11@soton.ac.uk
Prof. Susan Halford, Dr. Brian Hracs &
Dr. Nick Gibbins
Image$Credit:$http://appadvice.com/appnn/2015/06/rockDoutDwithDtheseDstreamingDmusicDservices
21
HYPERTEXT KNOWLEDGE://
FARMERS,FETTLERS OR FLANEURS?
Knowledge, stored as hypertext, doesnt naturally retain its relevance. The knowledge
may evolve or become obsolescent, as may its context within the web of other
hypermedia. Curation of the media persists the data but not necessarily its meaning or
relevance. How is this relevance retained:
Are appropriate tools available? How may Spatial Hypertext help?
How is knowledge re-factored without excessive link breakage?
Who undertakes this task in collaborative hypertexts and what is their skill-set?
How is this work privileged over other contributors yet given proper oversight?
Skill-set
Curation
Trust
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.
Meaning
Lorem ipsum dolor sit
amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.
Hypertexts
Formalisms
Psychology
Context
Web
Link Breakage
Visualisation
Narrative
Spatial Hypertext
Tyranny of Search
Emergent Structure
Trails
Tools
Mark Anderson
mwra1g13@soton.ac.uk
Web Science
CDT
Mark Anderson: mwra1g13@soton.ac.uk
22
Emerging a
Curriculum
Overview
Want to
contribute?
https://www.isurvey.soton.ac.uk/16343
Further Research
Questions
23
Understanding(How(to(Talk(Formally(
about(Personal(Data(to(Make(Data(
Processing(More(Transparent(
RQ1:$ How$ do$ the$ privacy$ policies$ of$ online$
services$ currently$ talk$ formally$ about$ the$
personal$data$that$they$collect?((
(
(
(
(
(
If(I(asked(to(borrow(an(item(from(your(house(
and(I(told(you:((
(
L Who(I(am((
L The(purpose(for(borrowing(it((
L What(I(would(use(it(for(
L Who(else(I(might(give(it(to((
L Whether(you(have(a(choice(to(give(it(
L How(long(I(would(keep(it(for((
(
Is#there#anything#else#you#would#like#to#know?#
RQ5:$How$can$the$DIKW$Hierarchy$be$adapted$and$applied$to$the$EU$data$protec+on$
framework$to$make$personal$data$processing$more$transparent?$$
Wisdom:$ Accumulated( knowledge.( Allows(
understanding( of( how( to( apply( concepts( from(
one( domain( to( new( situa>ons( or( problems.(
Ability( to( see( beyond( the( horizon( and( to( act(
cri>cally(or(prac>cally(in(any(given(situa>on.(
Knowledge:$ Created( by( establishing( links( with(
e x i s > n g( k n o w l e d g e ,( i n f o r m a > o n ,(
understanding,( capability,( experience,( skills(
and(values.(((
Knowledge$$
Informa+on:$Data(processed(for(a(
purpose,(provides(answers(to(who,(what,(
where(and(when(ques>ons.((
Informa+on$
24
$$$$Wisdom$$
Data$
The$hierarchy$is$used$to$contextualize$data,$
informa6on,$ knowledge,$ and$ some6mes$
wisdom,$with$respect$to$one$another$and$to$
iden6fy$and$describe$the$processes$involved$
in$ transforming$ a$ lower$ level$ en6ty$ in$ the$
hierarchy$(e.g.$data)$to$an$en6ty$at$a$higher$
level$in$the$hierarchy$(e.g.$informa6on).$$
Digital(CiEzenship(
IntroducEon#
My# work# is# intended# for# those# interested# in# digital# ci1zenship# and# shaping# a# founda1on# for# a# pro9human# future# for# the# Web,# through#
encouraging#digital#rights#and#responsibili1es#across#what#is#now#rapidly#becoming#a#global,#post9na1onal#digital#community#of#ci1zens.#This#
focuses,#presently,#on#an#intellectually#challenging#discussion,#rather#than#analysis#of#quan1ta1ve#or#qualita1ve#ndings,#though#it#will#build#
upon#both#of#these#in#the#future,#as#well#as#u1lising#a#comprehensive#body#of#interdisciplinary#literature#and#a#range#of#relevant#case#studies.#
Overview#
Digital# ci1zenship# and# the# pro9human# future# of# the# Web# have#
been# fervently# debated,# forming# diverse# interpreta1ons;# only#
now# is# an# emerging# associa1on# being# made,# moving# beyond# an#
implicit# rela1onship.# A# complex# issue# in# its# own# right,# digital#
ci1zenship#requires#deconstruc1on,#as#it#is#a#term#predicated#on#
conceptual#debates,#such#as#Mossberger#et#al.#(2008)#and#Ribble#
(2010),#which#align#a#deni1on#towards#an#extension#of#physical#
na1on9state# ci1zenship.# As# such,# liPle# recogni1on# iden1es# the#
need#to#shape,#as#well#as#the#existence#of,#a#digital#post9na1onal#
ci1zenry,#born#from#the#co9cons1tu1onal#nature#of#the#Web.##
#
Likewise,# a# Pro9human# Web# is# tenta1vely# expressed# as#
fundamental# to# its# future.# Yet,# this# is# dominated# by# a# pressing#
epistemological# vision# to# realise# the# Seman1c# Web# 3.0;# # future#
direc1on# is# ambiguous.# Therefore,# I# propose# a# theore1cal#
argument,#one#strongly#inuenced#by#the#philosophical#paradigm#
of# a# hermeneu1c# circle,# which# u1lises# a# discussion# that# moves#
back# and# forth# between# the# individual# components# of# digital#
ci1zenship# and# the# whole# of# the# Pro9human# Web,# to# illustrate#
their#connec1vity#and#highlight#future#direc1on#for#both.##
Discussion#
#
An#important#aspect#of#re9envisioning#the#future#of#a#Pro9human#
Web# is# grounding# it# in# digital# ci1zenship,# rather# than# seman1cs.#
This#creates,#however,#conict;#it#is#unclear#whether#both#can#be#
realised# simultaneously.# We# must# deconstruct# current# debates#
about# digital# ci1zenship,# ques1oning# their# robustness.# Indeed,#
many# of# these# are# ambiguously# aligned# to# scholarship# of#
ci1zenship#itself,#such#as#T.H.#Marshall#(1950),#describing#what#is#
barely# extended# physical# ci1zenship,# rather# than# actual# digital#
ci1zenship,# so# nega1ng# of# socio9technical# and# co9cons1tu1onal#
views#which#must#be#considered#in#discussion#and#deni1on.##
#
Such# debates,# in# fact,# fail# to# link# digital# ci1zenship# to# digital#
rights#and#responsibili1es.#We#must,#then,#reinforce#the#posi1on#
that# digital# ci1zenship# is# a# post9na1onal# and# postmodernist#
concept,#rather#than#a#ci1zenship#bolt#on.#Whilst#many,#such#as#
Berners9Lee# (2014),# argue# for# such# recogni1on,# this# remains#
largely#abstract#regarding#ci1zenship#scholarship.#Hence,#views#of#
digital#ci1zenship#must#be#reconstructed#with#a#deni1on#rooted#
in# self9determina1on# of# ci1zens# who# are# digitally# situated,# but#
globally# located# and# networked.# To# accomplish# this,# we# must#
realise# a# framework# of# digital# rights# and# responsibili1es# that# are#
oset#against,#but#dis1nct#from,#contemporary#human#rights.#
!(
#
Web 3.0
Digital Citizens, not
Semantics?
PASSPORT
Conclusion#
The# vision# of# a# Seman1c# Web# and# a# Pro9human# Web,#
characterised# by# digital# ci1zenship,# aord# clashing#
epistemological#and#ontological#posi1ons;#top9down,#technically#
determinis1c,# and# boPom9up,# socio9technical# revolu1ons,#
necessita1ng# further# explora1on.# Hence,# both# the# Pro9human#
Web#and#post9na1onal#digital#ci1zenship#necessitate#equality#of#
digital# rights# and# responsibili1es# across# the# global# stage,# with#
scholarship#developing#mechanisms#to#realise#this#universally.##
#
In#future#reconstruc1ons#and#discussions,#we#must#shape#digital#
ci1zenship# within# the# Pro9human# Web# by# ensuring# recogni1on#
of# the# changing# aYtudes# towards# na1onality,# as# individuals#
become#globally#connected#in#a#post9na1onal#globalised#society.#
The# Web# is# dened# by# social# and# the# technical# solu1ons;# we#
need#both#to#ensure#a#future#vision#grounded#in#digital#rights.##
Michael(J.(Day([mjd1g13@soton.ac.uk](
University(of(Southampton(
Web(Science(InsEtute(
BernersGLee,( T.( (2014).( Tim( BernersGLee( on( the( Web( at( 25:( the(
past,(present(and(future.(In:(Wired!Magazine,!March(2014.((
Marshall,( T.H.( (1950).( Ci.zenship! And! Social! Class:! and! other!
essays.(Cambridge:(University(Press.((
Mossberger,( K.,( Tolbert,( J.( McNeal,( R.( (2008).( Digital! Ci.zenship,!
The!Internet,!Society!and!Par.cipa.on.!Cambridge,(Massachuse\s:(
MIT(Press.(
Ribble,(M.((2011).(Digital!Ci.zenship!in!Schools.(Washington:(ISTE.!
25
Web Science Doctoral Training Centre, 2 Mathematical Sciences, 3 Centre for Risk Research,
University of Southampton
Abstract
We aim to apply Topological Data Analysis (TDA) techniques to predict which alternative will be selected based
on past selections. These selections can refer to the products bought in online marketplaces by consumers or the
behaviour exhibited by users online, amongst other interpretations.
The algorithm used in this project is adapted from
HodgeRank, a method for ranking alternatives and identifying inconsistencies in datasets. Applying a more sophisticated version of the algorithm, we generate rankings
and use them as the basis of the predictions.
Horse racing is used as a case study with the aim of better predicting the winners of horse races from a dataset
of past results from 2008 to 2012.
26
There can be missing direct comparisons, as seen in Figure 1 by the lack of an edge between nodes 3 and 4.
However these missing entries are compensated for by
the paths between the nodes which are indirect comparisons of pairs of alternatives.
Using simplicial cohomology to analyse the simplicial
complex, HodgeRank attempts to find a global scoring function, s, which best matches the local pairwise
scores by solving an optimisation problem.
A global ranking can be created by the rule that alternative i is ranked higher than alternative j if s(i) > s(j).
4. Inconsistencies
The error between the global scoring function and the
local pairwise scores is the residual. The size of the
residual measures how well the global scoring function
matches the aggregated pairwise scores formed from all
the voters.
Applying Hodge Theory, we can decompose the residual
into consistent and inconsistent parts to identify which
alternatives are responsible for the errors.
5. Application to Horse Racing
HodgeRank relies on pairwise scores formed from the voters scores. A local score function f is assigned to
each voter where f (i) is the voters score of the i-th
alternative.
6. Results
We have applied the improved HodgeRank algorithm to
three years of past data and the rankings produced have
been used as a predictive variable for two years of future observations. Two conditional logit models were
created, one with just the betting market information
and the other which included the ranking predictive variable. Comparing these models, the following results were
obtained:
e2
e2 increase
Model
R
LLR
R
Betting Market 0.163754
incl. Ranking 0.164023 0.000269 11.55073
2. Pairwise Scores
1. Ranking Problems
A ranking is an ordering of a collection of n alternatives
V = {1, ..., n} according to some measure of preference.
An optimal ranking is one which is the best solution to
the ranking problem, although this is not well defined.
this ranking information. We can also measure the accuracy of predictions made from both the betting market
information and the ranking.
Figure 3.[9]
Figure 2.[9]
However, having transparency does not make OBT practices accountable. This
raises a second question: `How to increase accountability in OBT practices? As
part of our future work, we plan to find answers to this by exploring mechanisms
that enable and encourage OBT entities to adopt and engage with DNT and
TATE. Additionally we aim to investigate the potential future implementation of
them from the lens of Science and Technology Studies.
1. Mayer, J. R. & Mitchell, J. C. (2012),Third-party web tracking: Policy and technology. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 413-427. Available at http://dl.acm.org/citation.cfm?id=2310703.
2. Narayanan, A. & Shmatikov, V. ( 2008), Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP '08). IEEE Computer Society, Washington, DC, USA, 111-125. Available at http://dl.acm.org/citation.cfm?id=1398064.
3. Lohr, S. (2013), Sizing up big data, broadening beyond the Internet. The New York Times. Available at http://www.cs.columbia.edu/igert/courses/E6898/Sizing_Up_Big_Data.pdf, Last accessed oct 2015.
4. Ramirez, E. (2013), The Privacy Challenges of Big Data: A View from the Lifeguards Chair. Available at https://www.ftc.gov/sites/default/files/documents/public_statements/privacy-challenges-big-data-view-lifeguards-chair/130819bigdataaspen.pdf, Last accessed June 2015.
5. Singer, N. F.T.C. (2013), F.T.C Member Starts Reclaim Your Name Campaign for Personal Data. The Business of Technology (BITS). Available at http://bits.blogs.nytimes.com/2013/06/26/reclaim-your-name/?_r=0, Last accessed Oct 2015.
6. Barocas, S. (2014), Panic Inducing: Data Mining, Fairness, and Privacy. Phd dissertation, New York University.
7. Madden, M. (2014), Public Perceptions of Privacy and Security. Pew Research Center. at http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf
8. Using an open source platform for measuring dynamic web content developed by Stanford Security Lab and The Center for Internet and Society Available at fourthparty.info .
9. Some of the information used in these diagrams are based on; Acar, G. et al. (2014), The Web never forgets: Persistent tracking mechanisms in the wild. in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 674689. Available at https://dl.acm.org/citation.cfm?id=2660347; and
Cookie Matching, Google Developers, Available at https://developers.google.com/ad-exchange/rtb/cookie-guide?hl=en, Last accessed June 2015.
27
Background
Novel psychoactive substances (NPS) can be defined as psychoactive drugs which are not prohibited by the Misuse of Drugs Act
1971, and which people in the UK are seeking for intoxicant use. By declaring NPS as not for human consumption, these substances
can be sold legally online to anyone with a credit or debit card. Within the UK, popular rhetoric has created a connection between NPS,
the web and todays youth, resulting in fear and panic over the ease of access to these substances and the threat this provides to young
people. Within this discourse, the web is posited through a technologically determinist stance, viewed simply as a deviant and dangerous
place which both increases access to, and heavily promotes the use of NPS. Youth are placed as vulnerable, unable to resist the webs
temptations as well as being unable to evaluate the information presented to them. In this way, societal fears are often oversimplified,
ignoring the complexity of the relationship between the web and the NPS user. This research aims to establish how young people
themselves view their relationship with the web, and whether they construct the web as a viable resource for obtaining NPS. By learning
about youths own opinions we are in a better position to tackle the problem of NPS, particularly to assess whether the web can
conversely be used as a site for risk minimisation as opposed to risk amplification.
- Since 1866
Research Questions
Methods
A mixed methods approach integrating some quantitative and
predominately qualitative research will be employed with multiple
stages. The proposed form of the research aims to both allow for
online and offline comparisons inter and intra group, and to build
upon information generated through each stage of the research
to inform and structure subsequent parts of the study; for
example data gained from initial surveys will be used to generate
questions for the interviews. Methods used will include:
Online and offline surveys
Online observation
Online and offline interviews
Online and offline focus groups
Laura Hyrjak, PhD student
Email: lnh1g09@soton.ac.uk
Supervisors: Charlie Walker, Catherine Pope and Gethin Rees
28
Researcher:!Sami!Kanza!(sk11g08@soton.ac.uk),!Supervisors:!Nick!Gibbins!(Computer!Science)!&!Jeremy!Frey!(Chemistry)!
Abstract'
Research''
Ques:ons''
Whilst!Electronic!Lab!Notebooks!(ELNs)!
!have!acQvely!been!studied!over!the!years,!there!!
sQll!exist!many!relevant!concepts!that!have!not!been!!
explored,!such!as!uQlizing!cloud!technologies.!Most!ELNs!
are!commercially!licensed!products,!whose!enQre!notebook!
systems!created!from!scratch;!few!are!plaTorm!independent,!
and!a!majority!do!not!make!use!of!modern!Web!technologies.!
They!therefore!lack!both!the!exibility!and!agility!expected!by!
this!generaQons!students.!While!academia!has!explored!some!
of!these!areas!(e.g!incorporaQng!SemanQc!Web!technologies)!
there!hasnt!been!signicant!uptake!of!the!ELNs!born!out!of!
these!invesQgaQons.!My!research!explores!the!concept!of!
an!ELN!environment!built!upon!an!exisQng!cloud!based!
notebook,!that!uQlizes!SemanQc!Web!technologies!!
and!applies!domain!knowledge!where!necessary.!
This!approach!will!allow!the!power!of!the!
!Web!to!transport!scienQc!research!!
into!the!digitally!driven!!
21st!Century.!!
!
1.!What!are!the!approaches!that!!
!
should!be!taken!into!account!when!
!
creaQng!an!ELN?!
!
2.!What!is!an!appropriate!
environment!to!create!an!
ELN!with?!
!
!
Current''
Research'Objec:ves'
!
!
1.!Notebook!plaTorm!experiments
.!!
!
3.!SemanQc!Web!Tech!IntegraQon!
4.!Research!proper!ELN!pracQce!
5.!Construct!new!ELN.!!
!
!
!
!
Paper! !
Portable!
!
Securely!stored!
No!power!supply! !
Easy!data!entry! !
Robustness!
Rapid!access! !
Mark!pages!!
Market'Research'
AcQve!ELNs!
R&D!
QA/QC!
Chemistry!
Biology!
Life!Sciences!
PharmaceuQcal!
MulQdiscipline!
All!Purpose!
SemanQc!Web!
Chemistry!ELNs!
'
'
''
Requires!Other!
Unspecied!
Mac!
Windows!
Web!Based!
Independent!
Free!Version!
Open!Source!
Commercial!
0!
10!
!
!
1.!Comprehensive!survey!of!!
!
exisQng!ELNss!and!ELN!research.!!
!
!
2.!InvesQgate!cloud!based!!
plaTorms!for!creaQng!an!ELN!
environment!with.!
!
!
!
Paper'vs'Electronic''
Lab'Notebooks''
!
2.!Integrate!domain!specic!services!!
!
!
!
!
Completed''
Research'Objec:ves''
20!
30!
0!
5!
10!
15!
Electronic!!
Searchable!
Shareable!
Replicable!
CollaboraQve!
Electronic!Backup!
Audit!Trail!
Version!Control!
!
Survey'of'Chemistry'So0ware'Usage'
Other!
SemanQc!Web!
Chemistry!Bibliographic!Database!
Chemical!Datacase!&!InformaQcs!
Chemical!KineQcs!&!Process!Simulator!
Nano!Structure!Modelling!
Organic!Synthesis!
Quantum!Chemistry!
Molecular!Editor!
Molecular!Modelling!!
0!
20!
40!
60!
80!
100!
120!
140!
What'other'type'of'so0ware'would'you'like'to'be'created?'
'
''
UCD!!
Approaches'
Ethnography!!
CollaboraQon!!
Cloud!
Solu:on'
'
So#ware( to( draw( all( chemistry( diagrams," Markush! structures," Open"
Source," Convert' all' chemical' formats' to' other' formats," Calculate( mw(
mol( and( yields( from( mass( data( input," Create! rectangular! Nano!
parQcles," Crystal" structure" predic4on," Input' tools' for' LAMMPS,(
Graphing( So#ware," Calculate! funcQonal! groups! connecQng! atom!
classes," Retrosynthesis" probabili4es," Database' of' computa:onal'
results," 3D( data( rendering( so#ware," Bejer! integraQon," Web" based"
chemical"synthesizer,"Video'maker,"Spectroscopy(simula;ons,!Integrate!
exisQng!tools!with!each!other!""
"
"
"
"
"
""
"
Future'Work'
CollaboraQve!
PlaTorm!Independent!
1.!IdenQfy!tools!that!can!be!integrated!into!ELN!
2.!Analyze!strengths!and!weaknesses!of!past!systems!
Domain!Specic!!
SemanQc!
3.!Determine!current!ELN!pracQce!
4.!Develop!a!prototype!
29
In the UK
Genetics
Obesity
Age
Amy Lynch
all1g1@soton.ac.uk
Supervisors:
Catherine Pope &
Jeff Vass
Ethnicity
Diabetes prevalence Is increasing and the Web is seen as a useful tool to support disease
management.
Research Questions:
How is chronic illness self-management changing with the continued growth of social networking
sites and personal health tracking devices?
How are technology and policy intersecting to influence healthcare and health service delivery?
Are people with diabetes activated patients? How are activated patients discursively constructed?
How are different groups impacted by these changes?
Sociology
All#images:#ickr.com#
All#stats:#Diabetes#UK#
30
Computer
Science
Research Objectives:
Health
Science
Interviews with
healthcare professionals
and patients
Can we implement
sociotechnical systems
in healthcare?
To examine patient activity within public support groups pertaining to different Types of diabetes (Type 1, Type 2 and Gestational Diabetes) on
social networking sites using non-participant ethnography
To interview patients to understand their perspectives on incorporating the Web, particularly social networking sites and internet-connected
wearable technology, into diabetes self-management
To interview healthcare professionals, investigating the integration of online communication and wearable technology into their healthcare
delivery
To examine the discursive construction of the activated patient through policy analysis, as well as content analysis of social networking pages
operated by charities
In researching cybercrime,
what can critical victimology
tell us that positivist
victimology cannot?
Within cybercrime
discourse, how is
the victim
constructed? And
with what
implications?
Researcher:
Neil MacEwan
31
32
@jessogden
Research Questions
Introduction
Institutional Repositories
The% Web,% insHtuHonal% repositories% (IRs)% and% the% so1ware% that% support% them%
have%led%to%the%creaHon%of%a%new%kind%of%scholarly%acHvity%exhibited%through%
the% ins.tu.onal) management) of) academic) outputs% for% the% benet% of% all%
scholars%[1].%InsHtuHonal%repositories%have%emerged%as%strategies%advocated%by%
the% open% access% movement% [2],% and% have% increasingly% become% the% focus% of%
iniHaHves%for%assessing%the%academic%research%landscape%in%both%the%UK%and%the%
US.% InsHtuHonal% repositories% are% now% set% to% become% everUmore% central% to% the%
management%and%assessment%of%university%outputs.
A%wealth%of%sociology%of%science%and%technology%(SST)%literature%acknowledges%
the% implicit% complexity% of% the% interacHon% between% the% technical% capabiliHes%
and%the%moHvaHons%and%interests%of%social%groups,%individuals%and%organisaHons%
[3].% The% technical) design) and) social) values% of% the% creators% (and% users)% of%
technologies% are% interrelated% [4],[5]% and% are% key% to% understanding% both% their%
evoluHon%and%impact%[6].
Methodology
Data Collection
Narrative Analysis
Each% interview% was% recorded% and% then%
transcribed%in%full%using%NVivo.%Each%transcripHon%
underwent% an% iteraHve% process% of% paaern%
recogniHon% and% rst% included% the% iden.ca.on)
of)key)events%and%underlying%mo.va.ons%as%they%
pertained%to%the%history%of%IRs.
Documentary
Previous%research%on%insHtuHonal%repositories%has%o1en%focused%on%their%role%in%
facilitaHng% open% access,% through% studies% centred% on% author% behaviours% and%
impact% analyses% of% selfUarchiving% and% insHtuHonal% mandates.% This% research%
explores% the% impact% of% insHtuHonal% repositories% on% Web% scholarly%
communicaHon% by% shi:ing) the) focus) towards) an) examina.on) of) the) socio<
technical) processes) that) inuenced) the) development) of) digital) repository)
so:ware.
Analysis Strategies
6)inUdepth,%
semi<structured%
interviews
Interviews
Results
So1ware%comparison%guides%
and%manuals
Key)reports:%the%Follea%Report,%
JISC%Digital%Repositories%Review
The%Subversive)Proposal)email%
exchange
The% second% stage% involved% the% iden.ca.on) and) evalua.on) of) so:ware) design) decisions)
present% in% the% chosen% so1ware,% rst% as% described% by% the% informants.% These% features% were%
then% used) to) extract) explicit) representa.ve) values.% This% process% was% aided% by% relevant%
documentary%evidence%(publicity%statements,%so1ware%manuals,%etc.)%where%appropriate%and%
was%supplemented%by%feature%descripHons%made%by%key%informants%during%the%interviews.
Intersecting Narratives
1994
The arXiv
1994 - 2001
1991 - Present
Paul Ginsparg
Follett Report
eLibs
Programme
eLib Open
Journals Project
1999
CogPrints
Budapest Open
Access Initiative
Stevan Harnad
1991
WWW
Turnkey
Repository
Software
Santa Fe,
OAI-PMH
1st%meeHng%of%Open%
First%UK%repositories%
O1en%seen%as%a%
Electronic%preUprint%
Archives%IniHaHve%in%Santa%
programme%overseen%
beginning)of)the)Open)
archive%for%scienHc%
Fe,%New%Mexico
by%the%JISC
Access)movement
publicaHon%(webU
Met%to%develop%standards%
Promoted%a%culture)of) A%call%to%acHon%for%
accessible%in%1993)
and%protocols%for%the)
change%towards%the%
academics%to%self<
Emphasised%the%power)
interoperability%of%eUprint%
use%of%eUresources%in%
archive%publicaHons%
of)hypertext)in)
archives%[8]
UK%library%pracHce%[7]
online
scholarly)research
Discussed%the%need%for%
Funded%several%
Foreshadowed%the%
Highlighted%a%
ins.tu.onal)repositories)
experimental)e<print)
need%for%linking)
community%of%
and)turnkey)repository)
repository)projects%
distributed)e<print)
academics%openly)
so:ware
and%electronic%journals%
archives
distribu.ng)their)
Developed%OAI)Protocol)
(e.g.%Open%Journals,%
research%on%the%
for)Metadata)Harves.ng%
CogPrints)
Internet%and%Web.%
standard%to%link%repository%
Note:&This&,meline&is¬&intended&to&be&a&complete&history&of&either&digital&libraries,&repositories&or&the&open&access&
metadata
movement.&It&is&representa,ve&and&only&includes&key&events&as&discussed&by&interviewees.
Conclusions
The%study%highlighted%the%temporary)stabilisa.on)and)technical)limita.ons%inherent%in%
so1ware%development,%as%well%as%the%interpre.ve)exibility)of)developer)priori.es)that%
emerge%during%the%process%of%design.
The%technical%code%revealed%a%series%of%explicit%values%embedded%in%the%workows%and%features%
of%of%DSpace%and%EPrints%that%priori.sed)the)cura.on)of)digital)objects)over)open)accessibility.
Furthermore,%the%use%of%IRs%as%a%mechanism%for%OA%is%sHll%con.ngent)on)the)priori.es)of)the)
communi.es)of)prac.ce%that%use%and%conHnuously%adapt%them%to%suit%their%needs.
Certain% values) and) features) that) were) priori.sed% over% others% during% the%
so1ware% design% process% have% emerged% through% the% importance% placed% on%
certain% funcHonaliHes% by% the% interviewees.% The% presence% of% these% explicit)
values% highlights% the% historical% inuence% of% the% narraHve% events% and% by%
extension%draws%aaenHon%to%possible)sources)of)emergent)tensions%in%IRs%(e.g.%
the% desire% to% collect% certain% metadata% before% providing% open% access% to% a%
record).
adaptability
usability
{
{
{
configurability
open licence
helpdesk, support
graphical interface
interactivity
curation
metadata harvesting
download capabilities
metadata creation
embargo features
References
The%community%may%
have%been%examining%
the%technical%code%of%
IRs%all%along:
What values
should (we)
build into
repositories?
[1]$Carr,%L.,%Pope,%C.,%and%Halford,%S.%Could%the%web%be%a%temporary%glitch?%In%Web$Science$Conference$2010,%Raleigh,%North%
Carolina,%USA,%2010.
[2]$BOAI.%Budapest%Open%Access%IniHaHve,%hJp://www.budapestopenaccessiniHaHve.org.%February%2002.
[3]$Flanagin,%A.%J.,%Farinola,%W.%J.%M.,%and%Metzger,%M.%J.%The%technical%code%of%the%internet/world%wide%web.%Cri0cal$Studies$in$
Media$Communica0on,%17(4):%409%X%428,%December%2000.
[4]$Abbate,%J.%InvenHng%the%Internet.%MIT%Press,%Cambridge,%MA,%1999.
[5]$Friedman,%B.%Human$Values$and$the$Design$of$Computer$Technology.%CSLI%lecture%notes.%Cambridge%University%Press,%
Cambridge,%1997.
[6]%Flanagin,%A.%J.,%Flanagin,%C.%F.,%and%Flanagin,%J.%Technical%code%and%the%social%construcHon%of%the%internet.%New$Media$and$
Society,%12(2):179%X%196,%2010.
[7]%Green,%A.%Towards%the%digital%library:%How%relevant%is%eLib%to%pracHHoners?%New$Review$of$Academic$Librarianship,%3(1):39%X%
48,%1997.
[8]%Ginsparg,%P.,%Luce,%R.,%and%Van%de%Sompel,%H.%Call%for%parHcipaHon%in%the%UPS%iniHaHve%aimed%at%the%further%promoHon%of%
author%selfXarchived%soluHons,%Open%Archives%IniHaHve,%July%1999.
This$study$was$conducted$in$accordance$with$the$University$of$Southampton,$approved$ethics$applica0on$ERGOLFPSEL11629.$Addi$onal)Credits:$All$icons$were$supplied$by$the$NounProject:$Bird$by$OliM,$Envelope$by$Alexandria$Eddings,$Idea$by$Andrew$Laskey,$Ques0on$by$SuperA0c$Labs,$Envelope$by$Alexandria$Eddings,$Gears$by$Cris$Dobbins,$Network$by$Brennan$Novak$and$
Enigma$by$Daniel$Llamas$Soto.$Paul$Ginsparg$image:$hYp://bit.ly/1zvQ8SU,$Stevan$Harnad$image$by$Chris$Balcombe:$hYp://bit.ly/1FOuAld
33
34
.ceiling.light
.desk.light
.tv
#livingRoom
.washer
#utilityRoom
.dryer
#home
.blind
#bedroom
#kitchen
.hob
.microwave
The number of smart devices in our environments is increasing and controlling them all using individual smartphone apps is
becoming less plausible.
To make these devices more manageable and interoperable we can assign an ID and class to each device and each context (which
could be a room. Then we can select devices individually and in complex groups using CSS (Cascading Style Sheet) selectors.
For example #home #utilityRoom .dryer selects any dryers in the utility room context. Or #home .light selects all lights of all
types in the house.
Beyond this we could make style sheets similar to CSS to control multiple devices at the same time, for example setting up the
same living space for a party, a movie or a study space.
There is also a lot of potential for using this approach in commercial and industrial settings.
Images from the Noun Project (thenounproject.com), by Aaron K. Kim, Crea>ve Stall, Andrew Liebchen, San>ago Arias, Christopher Pond and Edward Boatman
35
Sophie'Parsons'
sp13g10@soton.ac.uk'
'
Supervisors:'
Mark'Weal'
Nathaniel'OGrady'
Peter'Atkinson'
#!( 1
" !":
#UKSn
ow201
0'
$#(
":
# "
#" !!
- $!%(
- #!%&"
- &##! (""
#Shore
$": 2013
: !% # "
!( !" "
!%!( #".
hamAi
rshow'
ow
#Glasg
'
#"
!:
sh'
erCra
t
p
o
c
i
l
He
$#(" #( #
# #" $#"
"#!$#$!" $! !""
!.
- ! (2006)
o
#UKFlo
ds'
iots'
nR
#Londo
3: " " !( !" !" %#"
# !( !" " # !( "#$#?
36
37
Online citizen science projects must attract contributions from large numbers of volunteers to enable
research. Increasingly, such systems make use of online community aspects. This poster describes a
survey of online community features in CS projects aimed at encouraging user contributions.
Goals
Task visibility
Design guidelines:
Design guidelines:
Sample mechanisms:
Sample mechanisms:
Feedback
Rewards
Design guidelines:
Design guidelines:
Sample mechanisms:
Sample mechanisms:
Task/performance contingent
Gold standard derivation
Majority opinion derivation
Numerical point scores
38
University of Southampton
The aim of my research is to identify the steps users of online criminal marketplaces have to go through
to be successful in committing an illicit transaction on the web. Online criminal marketplaces foster
environments that promote sophisticated measures to protect their members from law enforcement. This
is particularly the case on the Tor network, on which my research will focus. As both buyers and sellers
go through similar steps in the transactional process, their steps can be mapped with crime script
analysis, a method that looks at the procedural aspects of a crime.
Carding
Drug trade
Future work
Analyse(
tutorials(
Create(scripts((
Talk(to(LE(
professionals(
Describe(
common(
criminal(
improvisa:ons(
Propose(
feasible(
intercep:ve(
methods(
Propose(
preventa:ve(
measures(
39
The$Risks$and$Barriers$of$Open$Data:$$
An$Entrepreneurial$Perspec;ve!
Johanna!Walker!jcw2g13@soton.ac.uk!!
Supervisors:!Dr!Lisa!Harris!&!Professor!Leslie!Carr!
Entrepreneurs!
Users!who!aim!to!generate!economic!value!from!Open!Data!!
Goal!is!to!create!rm,!not!just!apps,!to!derive!value!
Specic!moLvaLonal!subgroup!of!users!(not!simply!hackers)!
Popularly!idenLed!as!riskQtakers!but!
Studies!show!they!employ!riskQreducLon!strategies!(1)!
!
!
Data!that!is!most!valuable!to!private!
organisaLons!and!consumers!is!the!data!
that!is!most!protected.!
There!isnt!a!culture!of!transparency!and!
knowledge.!
!
!
I!thought!it!would!be!easyI!was!so!nave.!
You!need!deep!pockets!to!sustain!yourself!
long!enough!to!get!the!data.!
Open!Government!Data!
More!valuable!than!Public!Sector!InformaLon!as!more!accessible!
Removing!fricLon!from!informaLon!market!opens!opportunity!for!
increased!employment!and!tax!revenues!
Government!is!not!best!placed!to!exploit!its!own!byproducts!for!
prot!(eg!Trading!Funds,!TfL!apps)!
Proper!role!is!championing!innovaLon!in!Open!Data!
.But!this!has!to!be!more!than!hackathons!and!compeLLons!
!
!
Methodology!
Results!
!
Interviewed!founders,!
investors!and!supporters!of!!
early!stage!companies!
using!Open!Data!
!
Compiled!barriers!and!
challenges!from!blogs!and!
case!studies!
!
Engaged!with!users,!not!
publishers!or!academics!
People,!not!clean!or!
linked!data,!are!key!to!the!
process!
!
Many!stakeholders!are!
involved,!not!just!
publisherQuser!
!
The!UK!Open!Data!culture!
is!not!value!creaLonQled!
!
Insights!
You!need!!
the!right!
connecLons!!
in!the!
government.!
PerspecLves!on!Open!Data!uLlity!and!standards!are!situaLonal!
The!entrepreneurial!user!takes!a!more!pragmaLc!view!of!Open!
Data!than!those!held!by!academia!and!civil!servants!
The!relaLonship!between!data!publishers!and!users!needs!to!be!
an!interacLve,!conLnuous!dialogue!!
Open!data!is!a!process,!not!a!property!
Entrepreneurs!
seek!
forgiveness,!
not!
permission.!
(1)!Forlani,!D!and!Mullins,!J.!(2000)!Perceived!Risks!and!Choices!in!Entrepreneurs!New!
Venture!Decisions,!Journal(of(Business(Venturing(15:4!305Q322!
40
By Anna Weston
aw3g10@soton.ac.uk
@anna_west0n
ionna
Self-reporting
ires
Cardiovascular Eye
-track
ing
measures
Physiological
Sweat
gland
Web analytics
activit
Digital Behaviour
Change
Intervention
Engaging
Autonomy
Motivation
Relatedness
Competence
Self-Determination Theory
Q2
Disengaging
Q3
Point of
Engagement
Disengagement
Q1
Q4
Q5
Q4. What is
disengagement?
Q1. How is engagement
conceptualised?
Re-engagement
Website/App
Disengagement
Intervention
Disengagement
Supervisors
Leanne Morrison
Mark Weal
Lucy Yardley
41
42
Web Science
Do#conven(onal#understandings#of#online#learning#community#and#trust#apply#in#MOOCs?#
Social$construcIvist$approaches$to$online$educaIon$emphasise$interacIon$and$communicaIon$and$rely$on$the$
development$of$community$to$support$deep$and$criIcal$thinking$online.$This$implies$the$need$for$trust$between$
parIcipants$as$an$important$dimension$of$community.$$However,$the$potenIally$massive$numbers$of$learners$involved$in$
MOOCs,$and$the$disIncIve$paKerns$of$behaviour$and$moIvaIons$of$these$parIcipants$raise$quesIons$about$the$nature$
(or$perhaps$even$existence)$of$community$and$trust$in$MOOCs.$
reputaIon$
vulnerability$
expectaIons$
interacIon$$$$$$$$$$$$$$$
collaboraIon$
community$
Online#trust#
Learning#theory,#community#and#trust#
FutureLearn$social$construcIvist$underpinnings:$
ConversaIonal$learning8$
Development$of$learning$communiIes9$
InteracIon$and$criIcal$thinking10$
$
Trust$as$fundamental$aspect$of$community$in$social$
construcIvist$learning$theory:$
Foster$cooperaIon11$
Enables$successful$group$learning12 $$
Required$in$MOOC$learning13$
#
Trust#systems#
ReputaIonNbased$approaches$$focus$on$behaviour4$
Predict$future$behaviour$from$past$acIons$
Inform$judgements$of$benevolence/credibility$of$counterparts5$
$
Need#for#support#structures#in#design#
Trust#as#under>researched#in#e>learning#
dearth$of$literature$on$$trust$in$online$learning$7$
$
$
new$interacIon$paradigms$demand$trust6$
Trust$theories$
MOOC$
Design$
Quan(ta(ve
#
#
#
#
#
N$Surveys$of$parIcipant$percepIons$of$community$and$trust $
N$AnalyIcs$of$learner$data
$
$
$
$
Learning$theory$
Learning$design$
Trust$systems$
Mixed#methods#research#design#
ParIcipant$interacIon$has$limits$in$MOOCs14$
Building$trust$challenging$in$MOOCs15$
Need$mentor$curaIon,$aggregaIon,$and$presence15$
Recognise$boundaries$of$openness$15$
#
$
$
#Qualita(ve#
$N$Literature$review$on$educaIonal$communiIes$/$crowds$
$N$Virtual$ethnography$of$discussion$fora#
Research#direc(ons#
Can$MOOC$parIcipants$be$seen$as$a$community$as$understood$in$educaIonal$theory?$
What$is$the$nature$and$extent$of$trust$relaIonships$that$exist$between$MOOC$parIcipants,$and$between$parIcipants$and$mentors?$
How$can$MOOC$designers$best$align$learning$theory,$MOOC$design,$and$technical$systems$facilitaIng$development$of$trust?$$
$
References$(Mendeley):$hKp://bit.ly/1MLeXgD$
43
James Baker
(jb29g08@ecs.soton.ac.uk)
Introduction
As computer games have become more popular, there has been
considerable interest in developing serious games, which are games with
a purpose beyond entertainment; in particular, to educate
However, it is not easy to design such games. To be successful, they must
keep the players attention, teach their material in a more lasting way than
traditional teaching methods, and of course be fun.
Supervisors:
Education
Relevance - Players feel more immersed in
an educational game if its educational
content is made relevant to the player, i.e.
the player feels that they can use the
content in their own life
The first category summarises immersion in
the games educational content. This
involves how to maximise the possibility of
learning the material within the game, by
emphasising why it should matter to the
player in the real world, and by presenting it
naturally within the progression of a game.
Gameplay
Balanced Challenge - A player can become
more easily immersed in an educational
game if the challenges it presents are
balanced to the players abilities (it does
not feel too hard or too easy)
The second category outlines the factors in
gameplay that influence a players
immersion. This includes the way the
games challenges are designed, and the
underlying feedback mechanisms they
employ.
Agency
44
45
Why InvesAgate?
Objec&ve
Web Science
Use of social media to support non-formal learning
by subjects and gender
Inuencing Factors
Preferred InteracAon
Supervisors
Dr. John Woollard
EducaAon School
University of Southampton
J. Woollard@soton.ac.uk
The Digital Economy Theme is a Research Councils UK cross council iniAaAve led by EPSRC and contributed to by AHRC, ESRC, and MRC
46
The$D.N.A.$of$
Web$Observatories$
Web Science
Ian$C.$Brown$
Web$Science$Ins+tute,$University$of$Southampton$
WHAT?$
HOW?$
WHY?$
eni6on$
ature$
rchetypes$
ACADEMIC!KNOWLEDGE$
COMMUNITY!CONTROL$
BUSINESS!RESOURCE$
47
jrw1g08@soton.ac.uk
@jenwelch15
Jen_welch15
Related work
Jennifer Gaskell
Prof Susan Halford
Dr Mark Weal
Prof Gerry Stoker
The research
[i]f the Internet can provide a canvas upon which nations can paint their social, linguistic,
cultural, and political beliefs, then perhaps the physical struggle for safe cultural havens and
1. Conceptual framework
McCormick (2002)
The role of the Web and ICTs in peacebuilding is at present widely under-researched, yet
there is a prevalent assumption of the many potentials of their uses to improve the relevance
and impact of post-conflict peacebuilding practice. The literature on the subject is small, but
in 2004 already Sanjana Hattotuwa (2004: 39) highlighted an increasing confluence between
ICT, conflict transformation and peacebuilding. In 2013, Stability Journal launched a special
collection on New Technologies for Peace and Development, while earlier academic work on
the uses of the web for peacebuilding or conflict transformation processes focused on the
role of so-called digital diasporas (Brinkerhoff, 2011, 2007; Turner, 2008; Kent, 2006). These
academic developments have been paralleled by increased policy and practical attention to
the topic.
2. Practice review
Opening of the first international conference on ICTs for peacebuilding Build Peace
Peace through Technology, at MIT (Cambridge, MA) in April 2014
howtobuildup.org
48
5IF%JHJUBM&DPOPNZ5IFNFJTB3FTFBSDI$PVODJMT6,
DSPTTDPVODJMJOJUJBUJWFMFECZ&143$BOEDPOUSJCVUFEUPCZ
")3$
&43$
BOE.3$5IJTXPSLXBTTVQQPSUFECZUIF
&143$
HSBOUOVNCFS&1(
$PMPVSDPEFENBQ
TIPXJOHEFOTJUZPGIPSTF
SBDFUSBJOFSTBOEUIF
MPDBUJPOTPGUIFSBDF
DPVSTFTNBSLFUPOUIF
NBQ
Lawrence Green
Supervised By:
Tiejun Ma
Thanassis Tiropanis
Johnnie Johnson
Ming-Chien Sung
49
Web Science
SPENCE!is!a!model!of!online/oine!community!!!!!
(O/OC).!It!provides!a!means!of!building!and!
measuring!O/OC!with!conceptCbased!metrics,!
created!from!core!elements!of!online!and!oine!
community!theory!(e.g.!Durkheim,!Hanifan,!Hillery,!
FesInger,!Newcomb,!Putnam,!Bourdieu,!Rheingold,!
McMillan,!McPherson,!Wellman,!GranoveOer,!
Giddens)!that!has!been!iterated!by!empirical!
evaluaIon.!!
In!the!diagram,!the!facet!discs!dynamic!drives!
upwards:!the!Entrepreneurial!driver!leads!to!the!
creaIon!of!Se6lement!using!Channels,!which!enables!
Proximity!that!drives!Exchange!that!creates!Network.!!
Caroline)Halcrow.)Supervisors:)Professor)Les)Carr,)Professor)
Susan)Halford,)Professor)Dame)Wendy)Hall
)!
Modeling'online/oine'community'
NETWORK'
EXCHANGE'
PROXIMITY!
CHANNELS'
S
P
E
N
C
E
GENERATIVE'MODEL:'With'O/OC'insMtuMonalisaMon'
local'community'services'form'and'exisMng'services'
are'linked'to'
Network'is!the!interpersonal!
structure!of!social!capital!of!trust!
and!inuence!capability.!!
Channels!are!the!communicaIons!
mechanisms!across!which!the!trac!
of!exchange!ows.!
Entrepreneurship!(social)!is!the!
development!of!online/oine!
community!by!an!agent!or!
organisaIon.!
SPENCE'FACETS'
SETTLEMENT'
ENTREPRENEURSHIP'
Se6lement!is!a!place!in!which!
personal!or!collecIve!community!
is!performed.!It!can!be!sustained!
or!temporary,!online!or!oine,!
external!or!internal!(cogniIve).!!!
Proximity!is!physical!or!psychological!
nearness!between!people.!!
Exchange!is!deliberate!
communicaIon,!including!
informaIon!content,!aiming!for!
reciprocal!understanding,!
interacIon!and!linkCmaking.!
50
Interdisciplinary Approach
This project combines insight from
Psychology, Finance and Computer
Science to help build an
understanding of the role of the web
in the investor decision making
process.
Key Ques7ons
- How do investors interact with
online informa7on?
- Can online footprints give
es7mates of investor mood?
- How important is the role of
investor mood in the stock
market?
Proposed Methods
- Dieren7a7ng public
mood and investor
mood from online
social media
- Applying psychological
models of mood to
social media analysis
- Tes7ng models
against individual
stock prices/market
indices
Supervisors
Prof. Johnnie Johnson (Management)
Dr. Tiejun Ma (Management)
Prof. Ming-Chien Sung (Management)
Dr. Thanassis Tiropanis (Electronics and Computer
Science)
51
Abstract
Higher Education Institutions (HEIS) are facing the disruption of MOOCs as a technological innovation with chances of
altering the Higher Education landscape. MOOCs are now a
reality in an increasing number of universities, which is
provoking a wide range of reactions both in faculty members
and academic leaders. This project aims to capture these
perceptions by enquiring university staff with different levels
of responsibility within the institution. The results of this
study are intended to inform about how the inclusion of
MOOCs in the educational catalogues of universities is
perceived within the faculty so that the best course of action
is chosen accordingly.
METHODS
Desk Survey
Questionnaires
Interviews
52
Technology
Law
Economics
Cyber
insecurity is
still an open
problem
Lack of
economic
incentives for
ISPs to
implement
costly security
measures
Lack of
specific legal
obligations
imposed on
ISPs
Security techniques
might be
difficult to implement,
ineffective (i.e. highspeed Internet backbone
networks)
or subject to misuse (i.e.
surveillance by
governments or private
entities)
Adoption of
approved codes
of conduct
Mechanisms
for changing
ISPs security
culture
Adoption of a
risk
management
frame
Law enforcement
mechanisms: better
incentives for
compliance, serious
sanctions for noncompliance
Web Science
Supervisors:
Dr Tim Chown (ECS)
Dr Sophie Stalla-Bourdillon (Faculty of Business&Law)
53
forms of capital and they continue to emerge and re-emerge in different social
time represents the immanent structure of the social world. There are many
Like the field, capital is a process by which society expresses itself as much as a
and hierarchies are largely negotiated by their own development, and allow the
with a shared habitus, which is of strong enough influence that they become
Swartz, 1997). They are operated and inhabited by groups of human agents
Fields, as Bourdieu would have it, are structured conceptual spaces within
core.
"the socialized body (which one calls the individual or person) does not stand in
structured and structuring social system (Bourdieu, 1990). Bourdieu wrote that
self is the social, that humans are made and exist and make ourselves within a
battling id and superego. By contrast, there stands a strong argument that the
between self and society has fascinated thinkers for millennia, from Platos
This may differ according to the type of synthetic environment being discussed,
and that they also invest in valued cultural objects or artefacts (Malaby, 2006).
and is flexible enough that it can potentially be applied to the resources that
cultural capital in this context. He claims that the notion may act as a means of
cultural capital.
achievement, badges of honour, ranks and titles all fall into this category of
yet remains relatively autonomous from its bearer by its own value. Medals of
a form of cultural capital that imbues an agent with a degree of authority and
objects. For example a highly sought-after objet dart is valued both in terms of
Cultural capital, according to Bourdieu, exists in three forms. The first, the
Designing a project which has the capability to effectively answer this question,
while bearing in mind the implications of the literature, is a challenging part of
this process. Ethical considerations, practicality, and rigour must all be taken
into account. As virtual-worlds research is quite new, there is no
predetermined method to follow. Instead, I took into consideration methods of
practice and analysis which have proven successful for a number of other
researchers.
An ethnographic approach to this research could have been undertaken in both
the real and virtual world, or simply online. I chose a virtual ethnography
followed by semi-structured interviews. The understanding was that this would
offer less of an insight into a particular players lived experiences of gaming as
part of their life, but that it would also be less invasive while still allowing for a
reflexive and participant-focused approach to answering the research question.
I spent approximately one hour a day, four days a week and at varying times of
day immersed in the League of Legends environment. This time was spent both
in and out of game instances making field notes and forming social ties.
Preliminary results are encouraging.
scorn clumsy newbies or noobs. In this they make displays of cultural capital,
sublimating facile impulses and primary needs cannot assert itself (2010:176).
art, there is no area of practice in which the intention of purifying, refining and
virtual environments, far less work has been done on the possibility of
effort. The reward for such an investment goes beyond a ranking number and a
medallions and ranks. Climbing ranks takes time, skill, and concentrated
ratios of not only wins to losses but ratios of kills to deaths) indicated by
as exploring the game world in its entirety or finding particularly rare treasure
may come into play. For example, in World of Warcraft rare achievements such
player is low- or high-level (Malaby, 2006), but there are other factors which
Contact:
Elzabi Rimington
University of Southampton
58/3129
Salisbury Road
Highfield Campus
Hampshire
SO17 1BJ
07525429416
emr2g08@soton.ac.uk
54
This
makes
copyright infringers, to
broadly describe pirates,
seem inappropriate. Even
in more explicit cases,
it is not clear that those
that are actively infringing
Crime Deviancy
Several researchers have highlighted that many pirates
appear not to construe their actions as immoral or even
suggested that pirates dont make moral considerations
(Gray, 2012; Yu, 2012). Yet many approaches to
explaining pirate behaviour take explicitly normative
perspectives that preclude a thorough examination of
the phenomenon. Criminological theories consistently
suggest a dissociation of crime (illegality) from deviant
behaviour and piracy
may be a case where this
dissociation is necessary
for academic investigation.
Illegal
Not Illegal
Deviant
Murder
Adultery
Not Deviant
Possession of a
short lobster
Breathing
As in The Lacey Act (18 U.S.C. 42; 16 U.S.C. 33713378) which would make possession of a short
lobster a Federal crime in the US (Duane, 2008).
To quote Duane, It doesnt matter if hes dead or
alive. It doesnt matter if you killed it, or if it died of
natural causes. It doesnt even matter if you acted
in self-defence.
Behavioural Checks
This research:
55
Web Science
eamonn walls
ew1g12@soton.ac.uk
web science cdt
university of southampton
Abstract
IN PARTNERSHIP WITH
u
This project aims to explore the ways in which digital, web and
mobile technologies (DWMTs) might or might not contribute to
making the world a slightly less bad place (SLBP). The point is that
people have different ideas about what a SLBP might look like.
The Concept of Social Good
OCTOBER BOOKS
56
Revenge Pornography
Abigail Whitmarsh
Web Science CDT
University of Southampton
Background
Revenge Pornography describes the act of publishing on the Web pornographic images of a person without their consent. It is a phenomenon
that has been enabled through the development of the Web and almost universal public access to digital photography and file sharing
technology. Legal responses aimed at ending revenge pornography have focused heavily on the either the owner of the Website, as in the cases
of Hunter Moore, Kevin Bollaert, Craig Brittain and Casey Meyering or by criminalising the act of uploading material without the consent of
the subject. England and Wales have taken the latter approach, and with the Criminal Justice and Courts Bill 2015 it is now an offence for a
person to disclose a private sexual photography or film if the disclosure is made a) without the consent of an individual who appears in the
photograph or film, and b) with the intention of causing that individual distress.
Research Objective
is revenge pornography an individualistic act or a
broader manifestation of misogyny?
Research Questions
Methods
Using a custom made Web scraper, data was collected from a revenge pornography
Website. The scraper will ran once an hour for 28 days and collected;
New posts
Number of views the post gets hourly
Comments that are made on the post
Time of comments
Commenters chosen pseudonym
The scraper ran successfully 97%.
Analysis
A total of 396 posts were made to the Revenge Pornography Website over the 28 days (672 hours).
270 posts remained on the Website for the full 672 hours, 126 were removed before the full month.
378 posts featured women, 18 featured men.
The true percentage of posts that feature women on this revenge pornography Website is between 93% and 98% at a
confidence level of 95%.
The 95% confidence interval for the number of views that a post featuring a woman receives is between 32892.4 and 36272.5
and 95% confidence interval for the number of views that a post featuring a man receives is between 6660 and 8263.
The 95% confidence interval for the number of comments that a post featuring a woman receives is between 14 and 15. The
95% confidence interval for the number of comments that a post featuring a man receives is between 6 and 9.
120000
30
N 25
u
m
b
e
20
r
N 100000
u
m
b
e
80000
r
o
Male
f
Female
o
f
V
i
e
w
s
140000
Male
Female
15
P
o
s
t
s 10
60000
40000
5
20000
0
1
1
6
11
16
21
26
31
36
41
46
51
56
61
66
71
76
81
86
91
96
101
106
111
116
121
126
131
136
141
146
151
156
161
166
171
176
181
186
191
196
201
206
211
216
221
226
231
236
241
246
251
256
261
266
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Day
Acknowledgements
The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC.
My PhD supervisors; Gethin Rees, Elena Simperl and Craig Webber
Web Science
57
58
Supervisors:
Lisa Harris, Management
David Millard, Computer Science
Michel O'Floinn, Law
Goods Provided
Family, Lifestyle
Employment
Health
Education
Race
Religion
Trade Union
Membership
VISUAL ANALYTICS
The Framing of Data & User Behaviour: Evaluating Visualisations Using Economics to Improve Decision Support
This research introduces the concept that reasoning and decision-making, when
facilitated by Visual Analytic tools and processes, can be improved through the use
of Web technologies to evaluate user interaction events and the application of
Economic theories. The field of visual analytics is an extension of data visualisation
that provides tools and processes for extracting information from raw data by
enabling user-interaction, highlighting an opportunity to observe and record chains
of user events that are generated. . The work addresses the following research
questions:
1. To what extent does data visualisation affect the choices and behaviour of
analysts using visual analytic tools on the Web?
2. To what extent can interaction data be used to identify the influence of
framing for VA tools on the Web?
3. Can interaction data be used to identify framing effects in visualisations on
the web and to improve measurable analytic performance ?
VISUAL ANALYTICS & THE WEB ARE USED ACROSS MANY INDUSTRIES
Crisis response
Theories are emerging from Visual Analytics and Visualisation literature which
suggest that interaction events can provide insights into the utility of design and can
inform new developments in data visualisation. This research examines visualisations
for the presence of framing effects - a established concept in Economics - by utilising
an existing taxonomy of action types commonly used in visual analytic applications.
Economics
Symbols aquired from thenounproject.com are public license except for those under the CC Attribution license: Bomb by Scott Lewis. Corporation by Stephen Copinger. Dollar (sign) and Twitter by Lubo Volkov. Dollar (bill) by Christopher Beach.
Globe by Nicholas Menghini. Chevron by Christopher T. Howlett. Military Vehicle and Airplane by Luke Anthony Firth. Dangerous Area, UN Office, Police, Water, NGO Office and Storm Surge by OCHA Visual Information Unit.
59
Web Scienceis not just about methods for modelling, analysing and understanding the Web at the
various micro- and macroscopic levels. It is also about engineering protocols and providing
infrastructure, and ensuring that there is t between the infrastructure and the society that hosts it. Web
Science must coordinate engineering with a social agenda, policy with technical constraints and
possibilities, analysis with synthesis...[1]. Berners-Lee et. al. (2006) A Framework for Web Science.
Over the last six years open data has moved into the policy mainstream. Transparency and openness, mediated
through machine-readable re-usable data, is increasingly a key public policy tool of choice for decision makers. From
the scal accountability and anti-corruption agenda, to the new global Sustainable Development Goals (SDGs) open
data, is central to the delivery strategy. At the same time, open data is discussed as a crucial resource for economic
growth and innovation: with government collected data targeted as a particularly valuable raw material for private
sector exploitation.
Neither social, nor the economic, impacts of open data are a foregone conclusion. Policy choices, technical designs,
and how they unfold together in different contexts around the world shape the impacts of open data.
Pragmatic research starts from a particular problem. The starting point for this enquiry: How can the civic potential of
open government data best be promoted?. The enquiry has four steps:
(1) Establishing scope: Open data is a global phenomena: but how does it vary across the world?
What balance must be struck between local and global interventions.
The Open Data Barometer combines expert survey and secondary data to build up a multi-dimensional
picture of open data across 86 countries.
- Widespread presence of Open Government Data Initiatives: but varying depth of government support
- Limited implementation of Open Denition [Machine Readable + Open License + Freely available]
- Cluster analysis identities four groups of countries - including one sided initiatives, focussing on
economic goals to the exclusion of civic potential of open data;
Future work: comparing 2013, 2014 and forthcoming 2015 Barometer data.
(2) Exploring initiatives: How is the implementation of open data policy shaped at the country level?
Civic life is frequently constructed at a national level, so the way open data ideas are transposed in different
country contexts can inform analysis on opportunities for intervention. An in-depth reading of policy
documents offers an empirical basis for this.
- Method: Six countries selected based on political, economic and social diversity. Policy timelines
constructed, and documents read and coded;
- Findings: Open data policy used to focus on reconstructing data infrastructures of the state;
- A shift over time from civic to economic focus of open data discourse in most countries;
Future work: Tracking the impact of global policy initiatives, including Open Government Partnership, and
International Open Data Charter on focus countries.
(3) Investigating infrastructures: Whilst national open data agendas may tend to diverge,
policy and technology standards bring back common global elements. Data standards play a central role
in determining how data can be used, who by, and what for. Interviews with data standards creators and
users & participant observation in data standards communities offers a route into infrastructural
inversion: revealing the way in which standards are shaped, and then shape the civic potential of open
data.
- Data standards constitute a complex infrastructure of schema, identiers and compliance tools;
- Data standards are shaped by the data publishers or users closest to them in their early stages;
- Data standard infrastructures, once developed, are resistant to substantial change;
Future work: evaluating the impact of interventions into data standard development.
(4) Synthesis & action: The test of pragmatic enquiry is practical. Given a social agenda that seeks greater equality between citizens, and
greater inclusion of all citizens in governance and decision making, has the enquiry identied successful strategies for action? Finding this out is
ultimately the nal step of this enquiry > www.opendataimpacts.net
60
Introduction
Crime preoccupies the media and our TV schedules; it fills our
fiction shelves and is a large part of public spending, whether via
warfare and defence, or policing.
A report suggests that the amount spent on combating just violent crime
equates to 7.7% of the UKs GDP, or 4,700 for every household. [5] Is
this effective spending?
How much is this spending driven by crime statistics? Police.uk is a site provided by the U.K.s Home Office which presents open crime data, supporting the Governments transparency and accountability agenda.
How much are the data / statistics shaped by technology or social causes
policy, culture, administration, bureaucracy? Can the transparency
agenda help in understanding this? [2]
Web Science can help us to classify these crime apps and websites, sometimes referred to as Crime Social Machines. Understanding the data and
information ecosystem which allows society to address crime, helps us understand the sites singularly.
Three dimensions:
Results
Method
Acknowledgments
The work in this paper was funded by the Research Councils UK
Digital Economy Programme, Web Science Doctoral Training Centre,
University of Southampton, EP/G036926/1 and by SOCIAM: The
Theory and Practice of Social Machines, funded by the UK Engineering
and Physical Sciences Research Council (EPSRC) under grant number
EP/J017728/1 comprising the Universities of Southampton, Oxford and
Edinburgh.
61
Introduction
We spend a vast amount of time on the Web and much of that time is spent
reading
However, with the large amount of information available we cannot read it
all in great detail, therefore we engage in skim reading (Lui , 2005; Morkes &
Nielsen, 1997)
Skim reading has been shown to negatively affect comprehension (Carver,
1984; Just & Carpenter, 1987 ; Dyson & Haselgrove, 2000)
Others have shown that there is a different between important and
unimportant information. The important information does not receive the
same loss of comprehension that the unimportant information does
(Masson, 1982; Reader & Payne, 2007; Duggan & Payne, 2009)
Experiment
Experimental Conditions
2 x 2 x 2 within-participant
design
Question 1:
Does skim reading affect
the way we read
hypertext?
32 participants
160 experimental sentences
inserted into 40 edited Wikipedia
pages (4 in each)
20 pages read were normally, 20
pages were skim read
Question 2:
Does skim reading
affect comprehension?
160 comprehension questions
(4 after each stimulus)
50% asked about important
sentences
50% asked about unimportant
sentences
Figure 2. Example stimulus with fixations of
normal reading
Results
Figure 3. Task Type x Word Type interaction in skipping probability and Task Type x Word Type x Word
Frequency interaction in single fixation durations
Comprehension results
Comprehension was reduced when skim reading
Comprehension was marginally better for the questions related to
the important sentences compared to the unimportant sentences
when skim reading
Conclusion
Does skim reading affect the way we read hypertext?
Yes, the linked words were skipped less when skim reading
compared to the unlinked words
When the linked words were fixated they were processed fully,
unlike the unlinked words that showed no frequency effect in the
skim reading condition
What does this mean for reading on the Web?
If participants are using linked words to suggest important
information and using them as anchor points to guide their
movement through the text, then the choice of which words to add
links to needs to be considered very carefully
This is because skim readers focus primarily on linked words and use
them as a marker for the most important information
62
Trust
Collaboration
Accountability
Deliberation
Transparency
Consultation/Protest
Open Data
Data published by default
Support
Reusable Data
63
Dominic Hobsondom.hobson@soton.ac.uk
Dr Craig WebberCriminology
Attack Category
Double spends
Buffer overflow
Mining attacks (selfish mining)
Deviancy
Defence
Exchange hacks
Web wallet hacks
Pool attacks
Market manipulation
Ethereum offers smart contracts, extending the idea of a transaction scripting language with a Turing complete language.
Education?
Chargeback scams
Attacks against the individual
Targeted attacks that exploit the Ponzi schemes
Social engineering attacks
consumer
What impact has the technology behind cryptocurrencies had on cybercrime, security
and policing?
Background
Originally invented and released under the pseudonym Satoshi
Nakamoto, Bitcoin is seen as the first cryptocurrency. The reference client was released as open source software and has now
spawned over 500 different cryptocurrencies.
Cryptocurrencies, such as Bitcoin, are decentralised online currencies. Unlike fiat currencies, their creation, distribution and
value are not governed by law and they are typically not associated with any single offline jurisdiction. The technology behind
these currencies provides users with a high degree of privacy,
and their implementation means that they have no central
point of operation, failure or control. These currencies allow the
direct transfer of value between individuals online, without the
inconvenience, cost or trust required with a third party such as
a bank or payment processor (e.g. PayPal).
Other attacks
Criminal Opportunities
Laundering
Malware (mining malware, wallet stealing malware, clipboard malware)
Privacy/deanonymisation attacks
Scripting Language
Despite there being ~$5billion worth of cryptocurrencies in circulation and lots of media coverage (particularly relating to
crime), very little research, particularly social or criminological
research, has been conducted.
Research Questions
However, this language is poorly documented and incomplete in its implementation, including reserved commands by Satoshi, and
other commands disabled due to security
concerns.
The scripting language is a forth like nonTuring complete stack based language with
approximately 190 different commands.
64
from data indirectly linked to individuals either alone, or in combination with other data.
These challenge traditional distinctions found in data protection and privacy laws between two
categories of information: PERSONAL DATA and NON-PERSONAL DATA.
Consider the inferences that might be made from communications metadata alone:
You spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.
Research Questions:
To what extent are we anonymous online? What exactly do we mean by anonymous?
Can we rely on anonymisation techniques to hide our identities?
What weight should be placed on indirect digital identifiers and their links to a person? (e.g. Should I bear any liability for
what happens via an IP address linked to my home? Should the same IP address be deemed my personal data worthy of
legal data protection against those who might use it to try to identify my offline identity?)
What is the harm from digital identity attribution? Does it extend beyond a privacy harm? What is its value?
http://blogs.law.harvard.edu/billofhealth/files/2013/05/Screen-shot-2013-05-13-at-3.02.09-PM.png
Alison Knight
University of Southampton
A.M.Knight@soton.ac.uk
Web Science
65
The Problem
Handwriting
Recognition
2 4
=
2
[TEX]
x=\frac{-b\pm\sqrt
{b^2-4ac}}{2a}
[/TEX]
Background
Rationale
Simplify digitisation of
mathematics expressions
Use current handwriting
recognition techniques to
translate handwritten work
into computer codes
Develop educationallyinformed interface to
reduce technology-induced
cognitive overload while
working electronically
Could also be used to
interface with interactive
textbook and mobile apps.
Milestones
References: [1] Ahmed (2008). Support Mathematical Instruction in Web-Based Learning System Using Object-Oriented Approach. ICACTE'08. IEEE.
[2] Mikusa et al. (2005). Features and advantages of WME: a Web-based mathematics education system. SoutheastCon05. IEEE.
[3] Lo et al. (2013). MathPen: identifying and solving the problems of online collaborative learning for mathematics. ICTMT11.
Funded by Research Councils UK Digital Economy,
Web Science Doctoral Training Centre, EP/G036926/1.
66
Expanding Graphs
University of Southampton
dm1x07@soton.ac.uk
History
The theory of random graphs began with Erdos in the 1940s
and 1950s. Erdos used probabilistic methods to demonstrate
the existence of graphs with particular properties without
needing to explicitly construct these graphs
Symmetry
One less studied property of real world networks is the degree
to which these networks are symmetric. Symmetry in a network effectively means that certain vertices play precisely the
same role in the graph. This redundancy naturally reinforces
the graph against an attack by providing structural backups
[2].
Trees
It has been suggested that real-world networks that grow by
the addition of vertices and edges often under preferential attachment are naturally tree-like [2]. This begs the question:
How tree-like are the Watts and Strogatz and the BarabasiAlbert Models? What is the expected girth of the Watts and
Strogatz and the Barabasi-Albert Models? Note that if one
sets m0 = 1 and m = 1 at each step in the Barabasi-Albert
Model then the resulting graph is necessarily a tree. If realworld networks are indeed tree-like then one could understand
properties of real-world networks by understanding properties
of random trees.
Results
Thus far we have used a formalised notion of symmetry called
the automorphism group of a graph in order to investigate the
typical degree of symmetry to be found in a variety of models
of growing random trees. We have utilised such models of
growing graphs to, for example, model phenomena as diverse
as Alzheimers disease and the World Wide Web.
References
[1] Reka Albert and Albert-Laszlo Barabasi. Statistical mechanics of complex networks. Reviews of modern physics,
74(1):47, 2002.
[2] Ben D. Macarthur, Ruben J. Sanchez-garca, and James W.
Anderson. Symmetry in complex networks. Discrete Applied Mathematics, pages 35253531, 2008.
[3] Duncan J Watts and Steven H Strogatz. Collective dynamics of small-worldnetworks. nature, 393(6684):440442,
1998.
67
Making'Bodies:'What'is'the'Role'of'the'Web'on'
Womens'Engagement'with'Aesthetic'Surgery??!
Rebecca'Nash''
rn5g08@soton.ac.uk'
Supervisors:!Professor!Catherine!Pope!&!Professor!Susan!Halford!
Conforming!to!an!idealistic!perception!of!beauty!is!incessantly!at!the!forefront!of!bodily!debate!in!contemporary!
society.!This!is!due,!not!only!to!the!popularity!of!accessible!routes!to!altering!bodies,!such!as!diet,!exercise!and!
cosmetics,!but!also!pressures!to!take!responsibility!for!body!projects!(Shilling,!2003),!driven!by!a!cosmetic!
gaze!(Wegenstein!and!Ruck!2011.!The!Web!has!transformed!production!and!circulation!of!images,!and!altered!ways!
that!individuals!Nind!information,!consumer!products,!and!communicate!about!aesthetics.!This!thesis!explores!the!
role!of!the!Web!on!womens!engagement!with!aesthetic!surgery.!!
Research'Objectives'
How!is!aesthetic!surgery!represented!across!the!
Web?!
How!are!women!engaging!with!aesthetic!surgery!
on!the!Web?!
Is!the!Web!altering!perceptions!of!aesthetic!
surgery,!and!ideations!of!ideal!bodies?!
'
Case'Study:'Aesthetic'Surgery'
Aesthetic!surgery!is!a!practice!which!alters!the!body!
in! pursuit! of! an! aesthetic! ideal.! Becoming!
increasingly! popular! throughout! the! 20th! Century;!
media! images! idealised! certain! body! types! !
overwhelmingly! young! people! with! perfect!
Western! characteristics! W! drove! commoditisation! of!
the!body;!deNiance!of!ageing!(Askegaard!et!al.,!2002:!
795),! and! the! notion! of! the! ! body! as! a! reNlexive!
project!(Giddens,!1991;!Shilling,!2003).!The!web!has!
opened! up! spaces! for! these! practices,! enabling! not!
only! discussion! of! aesthetic! surgery,! and! websites!
afNiliated! with! established! organisations,! but! also!
unlicensed! practitioners,! potentially! risky! sites! for!
aesthetic! tourism,! howWto! guides,! and! purchasing!
spaces! for! aesthetic! materials.! This! thesis! is!
exploring! these! spaces! to! comprehend! varying!
discourses,! and! how! they! may! impact! upon!
individuals!interested!in!undergoing!a!procedure.!
Research'Methods''
References''
Askegaard,!S.;!Gertsen,!M.C.;!Langer,!R.!(2002)!The!Body!Consumed:!ReNlexivity!and!Cosmetic!
Surgery,!Psychology)and)Marketing,!19!(10):!793W81!
Giddens,! A.! (1991)! Modernity) and) Self5Identity:) Self) and) Society) in) the) Late) Modern) Age,!
Cambridge:!Polity!
Shilling,!C.!(2003)!The)Body)and)Social)Theory,!London:!Sage,!2nd!Edition!
!
Research'Outcomes'
Continuities'and'discontinuities'of'the'Web'
In! some! cases,! materials! disseminated! online! do! not! differ!
from!materials!accessible!ofNline.!However,!the!Web!departs!
from!traditional!media!in!three!main!ways:!the!3Vs,!ease!of!
access! and! navigation,! and! user! enrolment.! In! relation! to!
aesthetic! surgery! online,! continuities,! discontinuities! and!
contradictions!are!evident!across!spaces.!!
Womens'bodies'as'perpetually'aesthetically'deKicient''
The!Web!is!far!from!the!disembodied!space!put!forward!by!
postWhuman! theorists,! and! indeed! not! a! space! with! neat!
online/ofNline! boundaries.! It! is! a! number! of! spaces!
presenting! real! female! bodies,! possessing! real! assumed!
deNiciencies,! with! real! life! consequences! for! viewers! of!
materials!!
Hypertextual'Feminism'
The! Web! provides! images,! discussion,! and! ways! to! alter!
bodies! and! empowerment! comes! through! browsing! and!
assessing! Web! materials! on! aesthetic! surgery.! Yet,!
simultaneously,! women! are! faced! with! critiques! of!
undesirable! bodies! ! altered! and! unaltered;! reinforcing!
structural!ideas!of!what!it!means!to!be!attractive.!!
Acknowledgement:!The!Digital!Economy!Programme!is!a!Research!Councils!UK!cross!council!initiative!led!by!EPSRC!and!
contributed!to!by!AHRC,!ESRC!and!MRC!
68
Sh
ar
in
g
ge
le
d
Kn
ow
Re
se
ar
ch
tio
on
iti
Ed
uc
a
ns
g
in
io
iv
hi
b
t
la
t
ra
Ex
Re
ist
in
t
ke
ar
M
m
Ad
ic
bl
Pu
Cultural Heritage
Organisations on the Web
Knowledge
Online Cultural
Heritage
(OCH)
Data
Information
Javier Pereda
Knowledge
j.pereda@soton.ac.uk
Wisdom
Web Science
DTC
Informatum Production
Informatum Sharing
Engagement withInformatum
In the process of dening dierent levels of interaction and/or type of user levels in OCH, Taylor (1967)
provides a set of dierent perspectives of how a user/visitor might attempt to gain knowledge.
Visceral
Conscious
Formalised
Compromised
User Experience
Constructivism
Demateriallisation
Physical
Environment
Objects/Artifacts
Tangible
Static
Persistent
Intangible
Dynamic
Transient
Informatum
Digital
World
Tangible Interaction
(Campenhout, et.al., 2013)
TUIs present an interactive paradigm where a wider range of opportunities can be exploited. An example of this
is the capability of dierent levels of digital inclusion to be applied into interactive interfaces.
Supervisors
69
122cm
This Po
(versio
asked q
If you a
templa
me day
de
your
When we move, we can effectively keep track of where we are with limited effort
(Riecke, Cunningham & Bulthoff, 2007). To do this we must effectively track our
position in terms of stationary objects, via a process of Spatial Updating. As we move
within complex internal spaces, our relationship with the larger, unseen world also
constantly changes.
But have you ever lost track of where you are in relation
to the exit in a shopping centre?
Wang and Brockmole, (2003) suggest that within nested
environments, such as rooms within a building, people
can automatically update cues within their local
environment (the room), but struggle to update their
position relative to the larger outside world.
Klatzky et al. (1998) suggests that without physical
movement, for example when moving within a virtual
environment, automatic spatial updating can be impeded.
he
to
hin
ter to
e it
r.
Method
Participants
40 undergraduate students (Female = 27, Male = 13) completed this study in
exchange for course credit. Participants were randomly allocated to either a Control
or Experimental condition.
Design
Study used a 2(Condition) x2(Gender) x2(Room Type) x2 (Movement) mixed design.
Apparatus
This study used a virtual environment which participants were required to navigate
and explore. This was modelled on the University of Southampton Shackleton
Building (44), using 3DSMax 2012. Participants controlled their movement using the
arrow keys, but could not interact with items within the environment.
Group Control explored a replica of the building with no additional navigation aids. In
contrast Group Experimental also saw large coloured bands on the top of each of the
walls, based on their compass facing (North Blue, East Yellow, South Green and West
Red)
Procedure
Participants explored the outside and inside of the virtual building before completing
four orientation trials. At the start of each orientation trial Participants found
themselves within rooms in the virtual building and were asked to turn to face a nonvisible external landmark. Once participants were happy with their position they
proceeded to the next trial.
Two rooms in the orientation trials were external, allowing the use of external visual
cues to orientate. The other two rooms were internal, over looking the inner
courtyard, and required an understanding of the spatial relationship between the
internal and external cues to complete the task. One of the external rooms and one
of the internal rooms had been visited previously in the acquisition trials.
Results
Orientatation Error (in degrees)
140
140
120
120
100
Female
Male
80
100
Female
Male
80
60
60
40
40
20
20
0
External
Unvisited
Internal
Unvisited
External
Visited
Internal
Visited
External Internal
Unvisited Unvisited
External
Visited
Internal
Visited
Results suggest that without the coloured cues Females in Group Control found it
difficult to orient within the inner rooms, especially if they had not previously
visited.
A 4-way mixed design ANOVA revealed a main effect of room type, F(1,36)= 4.45,
P<0.05 suggesting it was more difficult to perform the task from an internal room. A
main effect of movement, F(1, 36) = 9.96, p<0.01 suggests that the orientation task
was more difficult from within a room which participants had not previously visited.
No other main effects were significant. There was a significant 4-way interaction,
F(1, 36) = 6.91, p<0.05. Further analysis via simple main effects revealed that there
was only an effect of gender in Group Control in the Internal room to which the
participants had not previously moved, F(1, 144) = 8.96, p<0.01. This suggests that
females found it harder than males to orientate in this room, but this impairment in
spatial updating was removed by the addition of the coloured cues.
Conclusion
Participants within the control condition struggled to automatically update their
position within internal rooms, suggesting they were unable to update multiple
environments simultaneously. This is consistent with previous findings, using real
world tasks (Wang & Brockmole, 2003)
The effect of movement offers partial support for Klatzky et al. (1998). Participants
made greater orientation errors within rooms which they had not previously visited.
However many were able to remain oriented within the virtual environment without
the need for physical movement.
There was no overall effect of gender, but a gender difference was apparent when
participants were required to use internal cues. Females within Group Control were
unable to effectively update their orientation automatically within the internal
room. The addition of colour cues however allowed females in Group Experimental to
orient as well as the males. This is consistent with females greater reliance on direct
landmark cues (Lawton, 1994).
Results suggest that losing track of where you are within a virtual environment can
be reduced by the addition of salient visual cues which are associated with external
orienting features.
References
Klatsky, R.L., Loomis, J.M., Beall, A.C., Chance, S.S., & Golledge, R.G. (1998). Spatial updating of self-position and orientation during real,
imagined, and virtual locomotion. Psychological Science, 9, 293298
Lawton, C. A. (1994). Gender differences in way-finding strategies: Relationship to spatial ability and spatial anxiety. Sex Roles, 30, 765-779.
Lawton, C. A., & Morrin, K. A. (1999). Gender differences in pointing accuracy in computer-simulated 3D mazes. Sex Roles, 40, 73-92.
Riecke, B.E., Cunningham, D.W., & Buelthoff, H.H. (2007) Spatial updating in virtual reality: the sufciency of visual information.
Psychological Research, 71, 298313.
Rieser, J. J. (1989). Access to knowledge of spatial structure at novel points of observation. Journal of Experimental Psychology: Learning,
Memory, and Cognition, 15, 1157-1165.
Tlauka, M., Brolese, A., Pomeroy, D.E., & Hobbs, W. (2005), Gender differences in spatial knowledge acquired through simulated exploration
of a virtual shopping centre, Journal of Environmental Psychology, 25, 111-118.
Wang, R.F. & Brockmole, J.R. (2003) Simultaneous spatial updating in nested environments. Psychonomic Bulletin & Review. 10, 981986
Acknowledgments
This research was funded by the Research Councils UK Digital Economy Program, Web Science Doctoral Training Centre,
University of Southampton. EP/G036926/1
RESEARCH POSTER PRESENTATION DESIGN 2012
www.PosterPresentations.com
70
Verifyi
Go to t
preferr
of the
100% th
when p
quality
for prin
Using t
To add
and typ
click o
frame
Then, c
you can
be foun
Modify
This te
column
mouse
click o
layout
the pro
advanc
and the
Import
TEXT:
placeh
side of
PHOTO
in it an
TABLES
docum
the tex
pasted
then cl
values
Modify
To chan
Design
from th
your ow
201
2117
Berk
post
Memory Institutions
and the Web
On the web, the audience of heritage is very different. Young people and
people of different socio-economic backgrounds engage with content with a
history or archaeology focus much more readily online than they do offline. In
addition to this, the audiences of this kind of content are finding information
and knowledge about these topics away from the large authoritative
organisations. An online user will come across the information in a different
way, and this is key to the success of sharing heritage knowledge online.
Content online still needs to be collected and categorised, to be interpreted
and then presented: to be curated. Open data is an essential component to
this re-discovery of information. Social networking systems, the tools and
platforms where people are creating and sharing content are essential to the
future of museums. Museums are the appropriate institution to exhibit data
from the web that relates to cultural memory, and that the adoption of open
data and real engagement with the social aspects of the web will be integral to
this occurring.
Online metadata indexes make collections and objects within collections
findable. The serendipity of the case study, Retronaut, and the fun and relaxed
way that the site and its associated social networking platforms engage with
audiences is illustrative of this potential.
Notes: http://theculturalheritageweb.wordpress.com
Thoughts: @nicoleebeale
References:
71
72
Since its inception 25 years ago the World Wide Web has facilitated an explosion of
information unprecedented in its scale. Many websites are said to embody the Webs
censor-free, information anarchy. This has led to widespread anxiety about the fidelity
of some of this information and its potential to do harm. As the myth of the Digital
Native is debunked, young people, it is now claimed, are exceptionally vulnerable to this
new danger; they are declared nave and lacking in the crucial new literacies needed to
discern fact from fiction.
This work investigates the reality of these fears and claims. Drawing on case studies
from two very different institutions a state sector FE college with a largely white
working class intake and a prestigious independent fee paying school with an ethnically
diverse intake the research explores how groups of 16-18 year olds access, interpret
and use information. It focusses on controversial information involving issues such as
immigration, climate-change, and government cover-ups and makes use of multiple
methods including interviews and workshops as well as proxy servers to digitally record
everything young people do on the Web. The data suggests highly differentiated, classbased practices grounded in the social, material and cultural contexts of everyday life
that can be better understood by combining Bourdieusian and Foucauldian theoretical
frameworks.
Acknowledgement: The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and
contributed to by AHRC, ESRC and MRC
73
Web
Science
74
Dissemination &
Disaggregation
William Fyson
Dr Simon Coles
Prof Les Carr
The models that govern scholarly discourse have developed over hundreds of years to produce a rigid and stable system for
exchanging research outputs. Whilst the mechanisms in place have served academia well, the Web presents an opportunity
for a number of innovations. Yet despite potential benefits, changes in academic publishing have been relatively
unforthcoming compared to many industries now dominated by the Web. Only by understanding the complex socio-technical
dynamics that underpin the system are we able to determine why the Web may not have enabled a scholarly utopia, that it has
to potenital to create.
Dissaggregation
Discussions
Posters
Workflows
Presentations
Datasets
Workshops
Collaborations
Thesis
Methodologies
Contacts
Ideas
The Redactor tool assists researchers with disseminating their work to the
widest audience possible. It allows a user to remove any elements that inhibit
wider dissemination and assists the user with finding alternative content that
may be more suitably distributed.
For example, images can be replaced with Creative Commons licenced
alternatives, or a user can distribute their own images by embedding licences in
the metadata.
Available at: http://users.ecs.soton.ac.uk/rwf1v07/redactor/
The Creative Commons suite of licences allow anyone
to publish their work openly whilst still requiring
anyone who uses the work to attribute the original
author. Thus the licences are useful to publish any
research outcomes, including papers and data sets.
Reward &
Recognition
The system that drives research relies on researchers building their reputation
as someone who contributes useful knowledge to their community. Thus to
encourage an open and disaggregated scholarly discourse, it must be easier
for researchers to prove the validity of their work to their peers, show the
impact of their work to institutions and demonstrate their skills and experience
to industry.
An online portfolio of a researchers work may be one way to achieve this,
aiming to elevate disaggregated research outputs to the level enjoyed by
journal articles. Provenance metadata provides vital context to research
outputs and Altmetrics could be used to help demonstrate a wide range of
impact.
Provenance
Peers
conte
xt
validation
skills
knowledge
Industry
Community
impa
ct
AltMetrics
visu
ions
lisat
University
The Disaggregator tool takes a user's document and assists the user in
extracting discrete chunks of knowledge that can be distributed in their own
right - in a Chemistry context as illustrated below, this may involve extracting
the data that represents a compound or a reaction from a thesis, so that it can
be more easily shared and used and built upon.
Once a work has been disaggregated, the resultant items of data and
information are available to be exploited by a researcher to further enhance
their reputation and be used by their peers. Further research will look into
associating items extracted by the disaggregator with an ORCID and
publishing results to blogging platforms to further explore ideas of reward and
recognition.
75
Introduction
On the 23 of April 2013, a fake tweet was sent from the White House's twitter
account. A few minutes later the price of the Standard and Poor's 500 index,
representing 500 of the highest valued companies in the US dived by nearly 1%.
1 tweet accounted for the loss of nearly 1% of the value of the US Economy.
In a sense this is not surprising, financial news services like Bloomberg and
Reuters regularly update and publish indices of media sentiment towards
stocks. Over the last 4-5 years researchers have begun to look for models of
media sentiment which can be used to predict prices. The results of this
research are, however, generally quite disappointing.
The reason for this is that the way language relates to offline events is a
difficult thing to model. Language is temporally uncertain, in that a
statement can be about an event in the future, past or present. Also as yet
there is no literature which describes how to model word frequency
movements over time.
The aim of this PhD is to define a methodology that tackles these issues.
76
77
78
of competence.
79
C.J.Phethean@soton.ac.uk
VALUE
This framework has been produced as a result of a mixed methods investigation into what influences the creation of value on social media for
charities. It goes beyond existing free analytic services that rarely take into account the context of the organisation in question, and instead focuses
on what their aims are, how they relate to their supporters' reasons for using social media to connect with a charity, and how these aspects are
reflected in actual behaviour on the sites.
80
81
Methods
The study was comprised of three stages:
Background
Medicines and drugs are subject to national and state/federal
regulation. The misuse, illegal consumption and purchase of
drugs and medicines is not a new phenomenon, but it is one
which the Web may enable or magnify, opening up as it does
access to online information and purchasing.
The provision, purchase and supply of prescription only
medicines are typically regulated by national or state law. This
can vary between countries; each with their own licensing body
(e.g. UK The Medicines and Healthcare products Regulatory
Agency (MHRA) and the US The Food and Drug
Administration (FDA). Current UK medicines legislation is
comprised of the Medicines Act 1968 and approximately 200
statutory instruments. Much of this legislation has not kept up
with developments online and the Web is notoriously difficult to
police
Findings
The forum and survey data show the wide variety of medicines
available to buy online, and that the Web is a source of discussion
and debate about such purchasing. These data also indicate that
there are websites that do not follow regulatory standards in
requiring prescriptions and consultations for prescription only
medicine.
The interviews show that people talk about the purchasing medicine
online in relation to other consumptive behaviour on and offline.
People that have purchased medicine from the Web presented
justifications for their behaviour. Such justifications involved
availability, convenience and need to support the online purchasing.
Impact / deployment
to procure them. What is legitimately available is constantly shifting and the Web
does not always reflect this, allowing sales toAcknowledgement:
be conducted outside
Theauthorised
Digital Economy Programme is a Research Councils UK
forms of supply.
cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC
82
ADOPTING
REALISING
DRIVING
Options are
materialised into
actions by bringing
together the
required
resources.
ASSESSING
INNOVATING
COMMUNICATING
Knowledge is
developed that
informs effective
action. Data and
knowledge are
gathered,
analysed, refined
and organised.
Novelty is
developed. Options
are developed for
new or altered
action that could be
more effective.
People disseminate
and discuss ideas,
knowledge,
opinions and
agreements.
Options are
decided between,
access is
controlled, action is
promoted up to
global scales.
Social networking
Blogs
Telephony,
conferencing
Email
Forums, commentary
Peer-to-peer content
sharing
Activism coordination
Collective agreement
and e-participation
<Sock puppets>
e-Marketplaces
Peer-to-peer
borrowing
Redistribution markets
Staffed customer
services
Directories
Group purchasing and
community adoption
Offers and discounts
Sales team
coordination
Ratings and
comparison
Ontologies, semantic
web, linked data
Data platforms and
standards
{Transmission}
{Data transfer
protocols}
{Volunteer computing}
Auto-software update
File download
{User control}
<Viruses,worms and
botnets>
DIGITAL TAXONOMY
1. DIGITAL
SYSTEM POWER:
DIGITAL CAPABILITY
HUMAN
Digital hardware
and software
coordinating
interactions
between humans,
connecting supply
and demand.
THINKING NETWORKS
AUGMENTED
Digital hardware
and software
interacting with,
informing,
influencing and
monitoring
humans.
GUIDED THINKING
Automated or
controlled digital
hardware and
software.
AUTO-THINKING
COLLECTIVE
MACHINE
Knowledge-bases and
wikis
Data analytics
applications
Geographical
information systems
Accounting systems
User profiles
{Crowd sensing}
{Human computation}
<Data theft>
Photography, satellite
and drone sensing
Mathematical analysis
2D/3D Scanners
Scientific instruments
Affective monitoring
Activity records
Mobile &wearable
sensors
{Sensors}
{Memory / storage}
{Computer inputs}
{Machine learning,
pattern and image
recognition}
ACTION NETWORKS
Crowdfunding
Crypto-currency
Collaborative
manufacturing and
disposal
Logistics and delivery
robots and drones
Employee coordination
P2P software sharing
Enterprise transaction
systems
[Digital
entrepreneurship]
Social behaviour
change and
gamification
Physical group
coordination
Decentralised
autonomous
organisations
Installation planning
Distributed
manufacturing and
disposal
Virtual customer
services
Real-time employee
guidance
Problem diagnosis
advice
Logistics and delivery
optimisation
Industrial predictive
analytics
Individual behaviour
feedback, quantified
self
Mobile and wearable
advice
Crowd tasks
Flash mob formation
Business intelligence
and operations
management
Real-time guidance
and navigation
Action knowledgebases Planning and
decision support
systems
Manufacturing robots
and drones
Automated process
optimisation
2D/3D printing
Automated problem
diagnosis
Installation assessment
drones and robots
{System components:
software, hardware
and digital services}
[Digital industry
manufacturing base]
Robots
Drones
Automated
optimization
Motors, actuators
Networked machines
(Internet of things)
Dematerialised content
{Computer outputs}
GUIDED ACTION
Optimisation of options
Customisation of
options
Design environments
Open innovation and
opportunity
identification
Design assessment
Ideation catalysts
[Accelerators and
incubators]
[Digital agencies,
software and design
services]
AUTO-ACTION
Computational
creativity
Simulation and
prediction
{Computation /
processing}
{Software}
{Cloud computing
services}
{Artificial intelligence
agents}
3. SUSTAINABILITY
SUSTAINABILITY
CAPABILITY
SUSTAINABILITY
PROGRESS
The major challenges that must ultimately be addressed for environmental sustainability.
ENVIRONMENTAL
INTERACTIONS
ENERGY
OTHER RESOURCES
Building efficiency
Renewable energy
Cities
Font: Klima CC BY-NC-ND 4.0. Icons: Freepik, Robin Kylander, Flaticon.com. CCBY3.0; www.iconsmind.com.
Interdependent relationship of
humans with the Earth System
Biodiversity and habitat
conservation
Adaptation and resilience to
environmental risk
Environmental health and safety,
air quality
Geoengineering
General sustainability
0.6
83
Web Science
84
Thesis title
leg406@soton.ac.uk
Supervisory team:
Abstract
Recent high profile retractions such as the case of Woo Suk Hwang and others demonstrate that there are still significant
issues regarding the reliability of published academic research data. While technological advances offer the potential for
greater data re-usability on the Web, models of best practice are yet to be fully re-purposed for a digital age.
Employing interdisciplinary web science practices, this thesis asks what makes for excellent academic research across the
sciences, social sciences and humanities. This thesis uses a case study approach to explore five existing digital data platforms
within chemistry, marine environmental sciences and modern languages research. It evaluates their provenance metadata,
legal, technological and ethical frameworks. This thesis further draws on data collected from semi-structured interviews
conducted with eighteen individuals connected to these five data platforms. The participants have a wide range of expertise in
the following areas: data management, data policy, academia, law and technology.
Through the interdisciplinary literature review and cross-comparison of the three case studies, this thesis identifies the five
main principles which inform how best practice should be modelled both now and in the future. These principles are:
sustainability, discoverability, working towards a common understanding, a good user experience and accreditation. It also
reveals the key grey areas that require further investigation.
Post-doctoral project
Summary
Researchers from the Ordnance Survey and the University of Southampton have joined together to work on an
interdisciplinary research project that focuses on data enrichment in a digital age.
Dr Jenny Harding (Ordnance Survey) and Professor Mary Orr (Modern Languages) lead the research team with Ashley Wright
(Ordnance Survey), Victoria Lavender-Seagrave (Ordnance Survey), Dr Sophie Stalla-Bourdillon (Law) and Laura German (Web
Science) as co-investigators.
This research focuses on how data at Ordnance Survey can be further enriched for business, research and leisure users
through data mining of existing data and linking to other external datasets. It explores the potential for data enrichment at
Ordnance Survey and how this could be achieved (where necessary) by modification to its existing provenance metadata,
legal, technological and ethical frameworks.
This one-year project is funded by Ordnance Survey and sponsored by the University of Southampton.
Web Science Poster. Version 1.0. Last modified by Laura German on 24 October 2014.
85
The Emergent Threat of Defamation Online: The need for a new model governing online
defamation with the emergence of social web technologies
Introduction
Online Defamation
Twitter is the most popular with 400 million worldwide users with
individuals able to publish 140 character pieces. The Interpersonal
network is developed through retweeting and searching content
on mass.
The Problem The continued adoption of the paternal approach is no longer appropriate to govern online defamation in the U.K. in
light of the essence of the Web 2.0 environment. The ability to republish and search for content means that more individuals are engaging
with potentially defamatory content than ever before.
RT Convention Proliferation
Variation
Via
Username
@tagami
Date
16/03/2007
HT
@TravisSeitler
22/10/2007
Retweet
@kevinks
01/11/2007
Retweeting
@musicdt
05/01/2008
RT
@TDavid
25/01/2008
R/T
@samflemming
20/06/2008
Recycle Icon
@claynewton
16/09/2008
Text
@jasonCalacanis (via@kosso) new Nokia NSeries phones will do Flash, Video and YouTube.
The Age Project: how old do I look?
http://tweetl.com/21b (HT @technosailor)
Retweet: @AHealthyLaugh is in the Boston Globe
today, for a stand-up show shes doing tonight.
Add the funny lady on Twitter!
Retweeting @Bwana: Is anyone streaming live
from CES? #ces
RT @BreakingNewsOn: LV Fire Department: No
major injuries and the fire on the Monte Carlo
west wing contained east win nearly contained
r/t: @danwei Live Online chat with Chinese
President Hu Jintao,. Variation
He claims he uses net to # of adopters
know netizen concerns.
[recycle icon] @ev of @biz re:twitterkeys [star]
http://twurl.nl/fc6trd
RT
1,836,852
% of # of adopters of # of retweets
total
89.2%
53,221,529
Via
751,547
36.5%
5,367,304
Retweeting
50,400
2.44%
296,608
Retweet
36,601
1.78%
110,616
HT
8,346
0.41%
22,657
R/T
5,300
0.26%
28,658
Recycle icon
3,305
0.16%
18,225
Total
2,059,350
59,065,627
Through a combination of quantitative and qualitative analysis of a corpus of 80 million tweets from Jan 2007 to Oct 2009, we can
demonstrate the way in which the convention of RT has spread across the non homogeneous community of Twitter users to become the
accepted method of communication among the community. We see, RT and via exceed all others with no written rules as a standard of
behaviour through the existence of weak ties. Weak ties mean that even if individuals do not believe in a standard, they will adopt it if they
see others have adopted it.
39
86
87
88
89
90
@WebSciDTC
@sotonWSI