Professional Documents
Culture Documents
Web Science
Centre for Doctoral Training
The Centre for Doctoral Training in Web Science is
funded by the EPSRC, and underlines Southampton's
pre-eminence in this new research discipline. Web
Science has an ambitious agenda. It is inherently
interdisciplinary as much about social and
organisational behaviour as about technology. Its
research programme targets the web as a primary focus
of attention, adding to our understanding of its
architectural principles, its development and growth, its
capacity for furthering global knowledge and
communication, and its inherent values of
trustworthiness, privacy and respect for social
boundaries. The first year of the training programme is
a taught MSc and includes short courses and project
work tailored to each students research interests. This
is followed by three years of challenging and original
research at PhD level.
This booklet details the current MSc students' academic
and professional backgrounds along with their research
plans for the future.
It also includes a research poster from each of our
enrolled PhD researchers.
"
#$
%&#
'
()$
"(
%+/
(()
&
*)
!
"#
(
"
4
# 5+6
#)%
#%"*(
#:&8< $787-
-&8
!
7(6
7&8-77#$
'
$"%
7#-#/ %#
7,% 7# #/ 7
.
*+
0
*
1
5
2
9#&
3
-
4
;
#7;% ;
*&(
)
###/-
7<7#-## #-7
!
&
'
.
0
7#&
7&%
!
$
#7
-7#7-77<#):#@
77#:
1
8#7
2
,#
&8#7:
3
!4
!
++
: (
!!
8
!'
(#
!.
&
!0
*/#&%
!1
: #:#-$
!2
!
!
%
8
# 7#-#$
!3
'4
#;
'
'
#)(
'!
%
''
(%
'.
:G$H
'0
%&
'1
8%
):
<&7 /&8 #7/77
#:#$?
'2
*#
'3
%
!
$
#7
-7#7-77<#):#@
77#:
1
8#7
2
,#
&8#7:
3
!4
!
++
: (
!!
8
!'
(#
!.
&
!0
*/#&%
!1
: #:#-$
!2
!
!
%
8
# 7#-#$
!3
'4
#;
'
'
#)(
'!
%
''
(%
'.
:G$H
'0
%&
'1
8%
):
<&7 /&8 #7/77
#:#$?
'2
*#
'3
%
Nsa1g14@soton.ac.uk
@AmosNeil
Edmund BAIRD
eb16g11@soton.ac.uk
Nicholas BENNETT
nb1g11@soton.ac.uk
Flavia DINCA
fmd2g11@soton.ac.uk
N.Fair@soton.ac.uk
www.linkedin.com
/in/nicfair
www.nicfair.co.uk
Paul GILBERT
pig1g14@ecs.soton.ac.uk
After graduating with a First Class degree in Web
Technology four years ago, I moved to central London to
pursue a career in online design and development. Over the
next 4 years I worked for a number of top creative agencies
as a Front End Developer, then finally Lead Developer for
Chelsea Football Club. I have been fortunate to design and
develop online solutions for global brands such as Estee
Lauder, EA, Panasonic, Virgin and Chelsea FC.
Briony GRAY
big1g11@ecs.soton.ac.uk
I graduated with a BA in Geography from the University of
Southampton and I became more interested in virtual
geography throughout my degree. This covered areas such
as disaster management, the emergence of the web
affecting countless aspects of geography, and the
development of new data collection methods and
technology to aid with geographical issues.
My research will explore how and why web accessibility
affects populations in both physical and human ways.
Human geography has become more integrated with Web
Science since the development of technologies such as
satellite imaging and disaster management prediction
systems.
Accessibility to the web is important to global communities:
divisions of economic standing, social demographics and
governmental policies play a large role in the availability of
vital information surrounding natural hazards. Furthermore,
I am interested in the applications of real geographic data
to gaming platforms, and how this can be utilised not only
for games and digital marketing, but also harnessed in new
and experimental pursuits of disaster management and
modelling.
Sarah HEWITT
sh9g14@ecs.soton.ac.uk
Through the Open University, I gained a BA (Hons) in
English Literature with Art History, and then completed a
GTC in Secondary Education (English with Drama) at Exeter
University. Since then, I've worked as an English teacher
and Head of Media.
My interest in Web Science centres around the concepts of
democracy and power. I spend a lot of time on twitter
engaging with conversations about education, ranging from
pedagogical theory to Ofsted. Education has always been
an area of great debate and often contention, but the arrival
of social networking, blogs, and comments following
articles published on-line has, I believe, given the people on
the front line i.e. teachers a voice that can and has been
heard by those involved in deciding government policy.
tk1c09@ecs.soton.ac.uk
I completed my Bachelors degree in Computer Science in
Sungkyul University in Korea and Masters degree in
Software Engineering at the University of Southampton. I
have done my undergraduate final project for Shopping mall
with Ajax and JSP in 2003 and Master degree dissertation
was Case study; compare and contrast proof-based versus
model-based model checking.
I am interested in peoples different behaviour online and
offline. People sometimes show completely opposite way of
behaviour online which they dont act in real life. I would
like to research why people act differently online and what
they would get if they are showing different behaviour
between online and offline.
Oluwadolapo MAJEKODUNMI
oam1g14@soton.ac.uk
Rafael MELGAREJO
rm2e14@soton.ac.uk
Colin PATTINSON
cogp1g14@soton.ac.uk
@taylorkeisha
www.webnetthings.com
Gefion THUERMER
gt2g14@ecs.soton.ac.uk
Tobias M. Eckrich
@GefionT
Niko TSAKALAKIS
nt4g14@ecs.soton.ac.uk
Jack WEBSTER
jw30g11@ecs.soton.ac.uk
Prior to joining the Web Science CDT, I studied Music at the
University of Southampton where I primarily focused upon
musicology, the academic study of music, as well as
developing as a jazz guitarist and musical performer. My
undergraduate dissertation channelled me towards the
study of the Internet and World Wide Web. I explored the
online production and consumption of British hip-hop and
rap music on YouTube; in particular, I focused on the offline
spatial experience of producing and consuming music
online. I graduated with first-class honours and won the
Edward Wood Memorial Prize for best Music student.
My interest in Web Science grew out of my undergraduate
dissertation. I am interested in challenging notions of
placelessness on, and as a result of, the Web and assert the
importance of offline spatial experience to online activity.
!.+.,
& % & % $&- &+! &
#$*- #"% " & &"# %, %"
!&+"$! %&% 6 7 ! & )%%
&-)%0
!/+/,
& % & % $&- &+! &
#$*- #"% " & &"# %, %"
!&+"$! %&% 6 7 ! $%%!
= 9 $ "
! ' " ! % " &
!"$ '"! "
%%"!$%
6
7 4$*- !"'% " "
#$'50
!0+0,
$&$!-$"
!'"!%"&
!"$ '"! "
%%"!$5%
6
7 4$*- !"'% " "
#$'51+#$*-#"%"
!"&$%%0
!1+1,
$ &$ !- & % " !"$ '"!
$%% ! & #$*- #"%
! " & ! ) ! & % = 9
$"
!'"!%$" &
"0
.!
!-%% %"+ && % $&-
+% "+ &+! ! & )%%
&-)%+4*/37,3
% +% $- ) &" $!% !
! 1 !
% !
&+! 3
/!
$&-+%$$&+!
! &$ % " & % &- $%%
+2/*4.7,)
%%"+&&&")& )%
$!& )%%1 &- &" "!*-
&% !"$ '"!3
0!
$ +$ @
$"
!'"!%
+ !"! " & $%%3
"+*$1 & +% )!$ +&$ &%
+%)%&-+$!"&##
"$ )% & % #-
&"!)& !&#$*-#"-3
1!
!-%% %" %"+ &$ +$ =
& % + ? $%%
+ +$ !"& #$%!& ! &
"2 #$"%% " )#'! &
#"-1 %#)!'"!&-1+&
4!"$ '"!5 "!%%& " ! "+
$*!"$ '"!3
!
% #$"& "!) && +%& &
% $&- &+! #$*- #"% "
&&"#?%"!&+"$!%&%6 7
!&)%%&-)%%"+1% $&-
! &$ % " & & % &- "*$ %
1 !'! && %&!$%'"! %
#"%%1 )& - & $&$ &! -
)%3
/(
!!
* $"
!'"!% +$ "$
!- $")# ""! &" %&!$%
#$*-#"%+"))%&"
! %&!$%! #"% ! &
)&)$3
%$"
!'"!%"))%
- "& $%$$% ""! &"
#$*- #"% ! $ "$
- $")#% ""! &" %&!$%
#"%!&$!&)$!)"$ 3
%
" !'"!"
%!
*
!!
!%+$)%&"2
:3 $. & $%$$ +& & &1 ! &% #$"& & +% & $%& -$ " &
#$*-#"%"&? "%&#"#)$%"!&+"$!%&%6 7"-3
;3 *&"%!&")%%!"$$&" %)$% $&-&+!)%%)%!
$5%"!&"$ )6
%$)%'"!:73
<3 $ "$ & % "! & )%% )%! =9 $"
!'"!% $" &
!"$ '"! "
%%"!$5%
5% 6
7 4$*- !"'% " " #$'53 %
$"
!'"!%+$)%&"*&)%%!&"& %3
=3 ! & %"# " $"
!'"!1 + "+ & $%$$ &" %&&
&"$- +&$ #$*- #"- # !& & $"
!'"! "$ !"&3
$&-+%&! %)$)%!$5%"!&"$ )6
%$)%'"!;73
>3!'-!-"&=9
& %+$!"&#$%!&!!-"&#"%)%
.$")%%+$"!&"& 6
%$)%'"!<73
?3!'-+&$!-"& "!&!& %"!"$ '"!1++$!"&!
&")%&$+$)%%!"&"!&"& %6
%$)%'"!=73
Emma Cradock
erc1e10@soton.ac.uk
10
&'.!%#
!&$"*'"!
-$$#%& +$% #% $%#$%%&.$!$! )& !# 5))%)# #%
0%# )
)#%#%$#$! $&$# $$ )%-2$ )$ %%)-$)$$ 0#%#%
-$$ ")&%&* #")%&*$0)&$ !#$* - %#$!#-%#%)##*%$$%)-2
+$+,
% &.$! % !# 5) )%)# %
*
#*%- %0 # *#$ %#!#%& $1 -
+ $ # $$ & #- 0 *
- !%#& $!2 !,$$)%$ +#%0
%&.$!% #$% $%#)%$%$%#
!#% !%) %$0 $) $ $$##
6;99?7
6;9:970 + % +#$ ,%$
!-$- # %0 & 5$%% &.$!2 $ $) (
# & &$ $! ! $%5& &.#- ,$%
+%$ 5%%$%%)%
%$2
+$0 % !% !# 5)
$ %%&*-
,!#$$$)%% %$)%)#2%0%$$$ %
- !#$$ !$% *$ &
<291
)%)##& $+%)%-2# #0 $%#)%
% #&#)%0)-%! $ !!#
#)& #0 #& $)$$ %% *
#% %+ % *) ! %$ %
&.$!%+ %!# 5)
2
%*%%"!
%*%%"!
%$)$%+$#5*$ %)%)# !# 5)
-# )%%&.$!0#%#%$&$2
$ % & !$% ! $& $1
%- %#$&0 % %# $ - $!2
$%#)% )##% %$ % &.$!0 ")$&
%# # )$%$$2 ) %$ % ) )$- %
$ #$! &.$! %$0 $) $ 22 #$ 6:@>970
#&%-,%
&.$!0#%#%%)
% &.$!0 !& +% !# 5) *$
&$ 5% 5 $&%)& *+$2
)%$% %&.$!% %#%$
#$! $&$0# #-! $& %%%&.$!$
! $%5& !%0 #%# % )$% % 2
$% -
%+ #%- *)$0 $) $ ##$5 6;9:=70 #)
$%# - # $) # & 0 %$ #$ #- $%#%
##&.$!$ #$!2#)%%%&.$!
# $%#)% +% & # % $5
%#& % &.$ + # %- $%)%0 )%
- %2 !$%$0 $%#%% #
#+ # # % #%$ #$! $&$ $%
$%0)%$&%# 0 %! ##-)#%$2
Web 3.0
Digital Citizens, not
Semantics?
PASSPORT
"!*%"!
- )$ $)$%%%%*$ &
!# 5)
0#%#$-%&.$!0 #
$ !$% % ! $& $1 % !5 +0
%- %#$&0 ( 5)!0 $ 5%
#* )& $0 $$%& )#%# ,! #& 2 )#%# #0
!# 5)
! $%5& %&.$!$$%%
)*#$$")%- #%$ #$! $&$ %
$%2
$ ) - # $%#)& $! % %# ) ! $%5
& $ 5%!#!$1! #%% #$ -
!# 5)*$ #%
2-! %&#+ #$+#
$ #0%% ! )%%%)# %
&.$!$+$%#%$#$! $&$2
$!$
$!$%5
026><=@723
$!$%5
"!&&>A1&
#%&0#$%!&!*&*$42!1
$><=@2
$%0226=CA<72
2 $1!+$%&-$%%2
"%%$$0 20"$&02026><<B72
$0%%*%)%1
$%%2
026><==722%!&"!1
2-8 ==?:%"&"!22*9
!+$%&-""*& #&"!
!
Web Science Doctoral Training Centre, 2 Mathematical Sciences, 3 Centre for Risk Research,
University of Southampton
Abstract
We aim to develop a ranking algorithm which can be easily adapted
to a wide range of alternatives such as digital products, online consumer choices or user behaviour.
We have used UK horse racing data between 2008 and 2010 as a
basis to explore this problem.
The algorithm used in this project is adapted from HodgeRank,
a topologically driven method for determining a global ranking of
alternatives from scores given by voters. It provides insights into
inconsistencies in the dataset and provides some measure of the
veracity of the ranking.
entries are missing. However, by considering the aggregated pairwise scores, less than 0.3% of entries are missing.
Global Inconsistencies: If there is a cycle of more than 3 alternatives which implies that i j k ... i, then the
pairwise scoring function is globally inconsistent.
1. Ranking Problems
Figure 3: Globally Inconsistent Pairwise Scoring Function
C=
HodgeRank attempts to reduce the impact of two specic challenges: subjectivity and incompleteness.
Subjectivity: Information used to solve ranking problems may
be subjective which can produce inconsistencies in the ranking
solution.
Incompleteness: Large databases are prone to containing a
signicant number of missing entries. Solutions based upon
databases containing missing entries may be suboptimal if these
entries were complete
Both of these problems occur in horse racing. Races can be considered as subjective in two regards. Firstly, each race is dierent.
Some may be considered more dicult than others and some horses
may favour certain types of tracks.
Secondly, the competition in each race varies. Consider horses A
and B competing in two races. Due to the subjectivity of the races,
A nishes in a lower position in the second race. However, it nishes faster than B in both races. Intuitively we want to rank A
higher than B.
A complete dataset would have been formed if every horse raced
in every race. However, the dataset indicated that each race was
competed in by approximately 11 of the 26886 horses which ran
over the 3 years. Thus the dataset contained more than 99.96%
missing entries.
The error between the optimal ranking solution and the aggregated
pairwise scores is the residual
R = Y 0s
Score Function
FP
NFP
LP
||R||
C
183.91 0.4461
21.41 0.4574
37.82 0.2866
||R||
C
1403.7 0.7898
115.59 0.7941
219.86 0.5171
The residuals showed that the betting market was relatively as accurate in predicting the outcome of races as the normalised nishing
positions. However, by examining the cyclicity ratios, we showed
that the market assumes that the outcomes of races are more consistent than previous results indicate.
Applying Hodge Theory, we can decompose the residual into constituent parts which reect dierent types of inconsistencies.
8. Discussion
HodgeRank forms a global ranking of alternatives from a collection of local rankings and oers insights into inconsistencies in the
dataset.
Applying HodgeRank to horse racing data, we were able to compare
the accuracy of dierent variables as predictors. We were also able
to compare the level of inconsistencies in the outcomes of races and
the behaviour of the betting market.
Despite these strengths, the implementation of HodgeRank also
highlighted areas for further development.
The aggregated pairwise scores reduce the eect of the incompleteness problem. An entry is only missing if none of the voters have
scored both alternatives. In the horse racing data, over 99.96% of
The size of the residual measures how well the optimal score function matches the aggregated pairwise scores formed from all the
voters.
7. Results
We applied HodgeRank to horse racing data over one and six
months concerning the outcomes of races and the expectations of
the betting market assigned to horses. Finishing positions (FP) and
normalised nishing positions (NFP) were used as outcome data
and log prices (LP) to quantify the expectations of the market.
s = 00Y
5. Optimisation Problem
2. Pairwise Scores
HodgeRank relies on pairwise scores formed from the voters scores.
A score function s is assigned to each voter where s(i) is the
voters score of the i-th alternative.
||R||
||0s||
Several assumptions have been made in the HodgeRank methodology. For instance, every voter is assumed to be equal. We will
examine how these can be adjusted to individual ranking problems
and the eects of doing so.
We aim to build a more sophisticated version of HodgeRank which
will provide a useful tool for examining Web-based ranking problems.
12
Standards
.
Faranak Hardcastle , Supervised by Prof. Luc Moreau and Prof. Susan Halford
1.
4.
In order to enable the Web to grow to its full potential, the underlying technology
needed to be implemented in a similar way around the globe. Standards facilitate
this by providing unified technical specifications.
2.
Standards can:
Case study
The World Wide Web Consortium (W3C) is the leading standard setting body
producing guidelines, technical specifications and best practices for the Web. A case
study was conducted in which three W3C Working Groups were empirically analysed.
The Provenance, Tracking Protection Group and HTML Working Groups were chosen
as they can potentially have socio-political implication on the micro, meso and macro
scale.
Result in
unanticipated
socio-political
implications that
emerge later.
Piracy
BitTorrent
DeNardis (2013,p.64)
Lawsuits
They are also open to interpretation and different sets of legal, political, social and
economic interests and directions can shape the way they are specified.
EME
Free
speech
policy
Standards
zz
Law and policy are sometimes intertwined (e.g. by policy makers) in the design of
standards as an alternative way of enforcement.
Encrypted
Media
Extensions
The charter fails to provide a clear and detailed outline by employing general
language that results in a wide scope, or vague process, leaving it open for
interpretation.
The W3Cs own mission is interpreted in various ways. Whilst some actors
within the W3C, strongly believe that W3C should only be concerned with
technology and remain separate from policy, others believe that the work of W3C
should consider the social impact of the Web into the standardization process.
Free
speech
?
Managing Conflicts
Stakeholder
Interest?
Privac
y
?
Wiretapping
?
Standards
Conclusion
5.
3.
Various stakeholders
Diverse interests
Getting the right balance is
challenging
Technical
Quality
Security
Customisation
al
Easy to
Digit l
ats implement
DRigigith
ts
h
Privacy
Rig
Ethics
6.
Standards
References
DeNardis, L. (Ed.). (2011) Opening standards: the global politics of interoperability. MIT Press.
DeNardis, L. & Raymond, M. (2013) Thinking Clearly About Multistakeholder Internet Governance. Paper presented at
eighth annual giganet symposium, Bali, Indonesia October 21st 2013. [Online] Available from:
http://www.phibetaiota.net/wp-content/uploads/2013/11/Multistakeholder-Internet-Governance.pdf
Cartoons created by Matt Greoning
products
appropriately
Acceptable to everyone
Lack of a community
official
fun
Business/selling expertise
No legal concerns
Some safety information
Psychonaut expertise
No navigation expertise
Navigation expertise
The study concluded that just as there are different physical drug-taking spaces with distinct and dissimilar underlying values, so are there different
virtual spaces. It found that factors such as prohibitive regulation may hold influence over these spaces, particularly affecting the type of expertise to be
displayed and what kinds of narratives can be displayed. Several commentators have argued the need for further information surrounding the use of
novel psychoactive substances, warning against the dangers of rash and overly-harsh policy. This result adds evidence to support this, implying that
repressive policy prohibiting novel psychoactive substance use is not stopping the selling and buying of novel psychoactive substances, but
counterproductively increasing the potential for harm for those who buy them; both by limiting the inclusion of safety information and by criminalizing
users who have little desire to break the law. The study therefore identified a clear need for a deeper understanding into both how legal high
marketplaces are used by individuals and more broadly how the deep web is used as a space for deviancy and as a community.
King, L. (2013) Legal Classification of Novel Psychoactive Substances, in Dargan, P. and Wood, D. (eds.) Novel Psychoactive Substances:
Classification, Pharmacology and Toxicology. London: Elsevier, pp. 3-27
Meashem, F., Moore, K., Newcombe, R. and Welch, Z. (2010) Tweaking, bombing, dabbing and stockpiling: the emergence of
mephedrone and the perversity of prohibition, Drugs and Alcohol Today, 10 (1), pp. 14-21 Emerald [Online]
Ritchie, J. and Spencer, L. (1994) Qualitative data analysis for applied policy research, in Bryman, A. and Burgess, A. (eds.) Analysing
Qualitative Data. London: Routledge Press, pp. 173-194
14
&'.().('"'
'1,-+5
5&"'6=,$FF ELC,(-('::1$
1)+2",(+9"$""',8(<1)+2",(+9
", ++",
,-!&'.
!,,1+8"-,
1)-$51,"',,,!,'
2+5,1-%83"-!&'5().' -!
-!'(%( ",!"'-!,',:FGL
1,"',,,3+"'.,()-+,(
-!,-!'(%( ",:!,3+- (+"6
,9+.' )+(1-,;-((%,,+(1'
-!&81,"' -!&8(+""' "'+,+!8(+
2%()&'-;,-'+"6.(':
'1,-+5
,-(+>5
(?'(&)'5,"6
3+%,(4&"')+1,"',,8
-( "' +-+"'," !-,"'-(-!
,"&"%+".,-3'
()-+,:
&'.
!'(%( 5
()-5
1,"',,
!++-!+&"'
-!'(%( ",-!-&$1)-!
$('(-!&'.9
9>,(1+,+").('+&3(+$?
3!"!)+(2",&(+4-',"235(
,+""' -:
'-(%( ",93!"!+,,'.%%52(1%+5
(+'"' (')-,'-!"++%.(',!"),
>''3+"0'"'
(+?:
93!"!",-!*1+5%' 1
(+:
SELECT ?business
WHERE { ?sem_web_tech
swc:adoptedBy ?business }
!(&)'",3!(!2
()--!,-!'(%( ",!2
'"'."''1&+(35,:
'+%+!(+&'.1,"',,,:
"-+-1+-"%"' 1,"',,,1,"' &'.
-!'(%( ",:
'2,. .' %"'-,')+-'+,(
1,"',,,(+"' &'.,+2",:
&'.('+'
",-,:
H&+,!")
",-,:
H>GEEK?8&'.,-1",'
,,,:@'%"'9,,GJ<1 <GEFIA:
9!0)9;;333:3H:(+ ;GEEF;,3;,3(;)1%";,,,;
H>GEFG?8H
8H(&&'.('8
(+%"(',(+.1&:@'%"'9,,HF<1%5<GEFIA:
9!0)9;;333:3H:(+ ;;(3%G<(2+2"3;
H>GEFH?8
F:F2+2"38H(&&'.('8(+%
"(',(+.1&:@'%"'9,,GJ<1 <GEFIA:
9!0)9;;333:3H:(+ ;;,)+*%FF<(2+2"3;
H>GEFI?8H8H+(&&'.('8(+%"
(',(+.1&:@'%"'9,,HF<1%5<GEFIA:
9!0)9;;333:3H:(+ ;;
www.reddit.com/r/medicine
Research
Question
How do healthcare professionals
use humour to create and maintain
discourses of the healthcare
profession?
Results
Identification
Metaphor/
Similies
Berger (1995)
Most common literary
devices used in humour:
- Metaphor and Similes
- Metonymy and
Synecdoche
- Parody and Intertextuality
+ Anecdotes (Powell and
Anderson, 2006)
Clarification
Enforcement
Methodology
Meyer (2000)
4 Rhetorical Functions of
Humour:
- Identification
- Clarification
- Enforcement
- Differentiation
Differentiation
Offensive metaphors
used to establish
differences with other
tribes, who were
characterised as
unlikeable. Focus on
surgeons and residents.
Metonymy/
Synecdoche
Synecdoche used to
identify features of
another tribe. Eg,
surgeons portrayed as
demanding.
Parody
Light-hearted
parodies of
relationships/
conversations
between patients
and professionals.
Identification
between
professionals who
have to deal with
similar events.
Inter
textuality
Images posted
within conversations
referencing pop
culture.
Identification
between those
understanding the
joke/reference.
Anecdote
Professionals swap
similar anecdotes
referring to
traumatising or
shocking events.
Creates
identification that all
experience similar
events.
Harsher parodies
of patients
bitching, often
involving
swearing or
infantile mimicry.
Enforces
expected roles.
Humourous
anecdotes clarify
socially
acceptable
norms and
behaviours for all
actors.
Anecdotes also
provide direct
discipline or a
person or whole
tribe, enforcing
expected roles
r/medicine identified as
opportunity for observation of
backstage discourse/activity
Non-participant ethnography of r/
me
edicine to test the rhetorical functions
medicine
of humour proposed by Meyer (2000),
to examine how users identifying as
healthcare professionals, patients and
medical students create and
maintain discourses of the
Humour as a
healthcare profession
Management Tool
Discussion
I havent used a
stethoscope since
1993.
16
@jessogden
Research Questions
Introduction
Institutional Repositories
! 8 "'+.,1.('% *)(+",(*"+ A +B ' ,! +(3* ,!, +1))(*, ,!&
!2%,(,!*.('(='3$"'(+!(%*%5.2",5>4!"",,!*(1 !
,! "
"" (* ,! ', ( %%
+!(%*+CHD: '+.,1.('%*)(+",(*"+!2&* ++,*, "+2(,5
,! ()' ++ &(2&', CID8 ' !2 "'*+"' %5 (& ,! (1+ (
"'"..2+(*++++"' ,!&"*+*!%'+)"'(,!,!',!
: '+.,1.('% *)(+",(*"+ * '(3 +, ,( (& 2*?&(* ',*% ,( ,!
&' &','++++&',(1'"2*+",5(1,)1,+:
Methodology
Data Collection
Analysis Strategies
@ /"'?),!8
-""
"',*2"3+
Interviews
Narrative Analysis
! "',*2"3 3+ *(* ' ,!'
,*'+*""'1%%1+"'
"2(:!,*'+*").('
1'*3', ' ",*.2 )*(++ ( )0*'
*( '".(' ' *+, "'%1 ,!
&#'1'*%5"' #
+,!5
)*,"',(,!!"+,(*5( +:
Documentary
*2"(1+*+*!('"'+.,1.('%*)(+",(*"+!+('(1+(',!"**(%"'
"%",.' ()' ++8 ,!*(1 ! +,1"+ ',* (' 1,!(* !2"(1*+ '
"&), '%5++ ( ;+%?*!"2"' < ' "'+.,1.('% &',+: !"+ *+*!
4)%(*+ ,! "&), ( "'+.,1.('% *)(+",(*"+ (' +!(%*%5
(&&1'".(' 5 " $
%
"
#
&
$
(
Results
@ (3*(&)*"+('"
'
"
@ &9,!(%%0)(*,8
" ",%)(+",(*"+2"3
@ ! "##
&"%
4!'
Intersecting Narratives
1994
The arXiv
1994 - 2001
1991 - Present
Paul Ginsparg
Follett Report
eLibs
Programme
eLib Open
Journals Project
1999
CogPrints
Budapest Open
Access Initiative
Stevan Harnad
1991
WWW
Turnkey
Repository
Software
! '**.2 2',+ !" !%" !, ,3( (&&1'".+ 1+"' ,!
',*',',(*++,!+)*,A1,*%,B"++1+
+1**(1'"' ,!
' "
( +!(%*+!"):
(,!(&&1'".++3,!2%()&',(*"
&$
+&'+(*1*,!*"' ,!+"&+:
Santa Fe,
OAI-PMH
@ H+,&.' ()'
@ "*+,*)(+",(*"+
@ '+'+
@ %,*('")*?)*"',
*!"2+ '"..2"'',
)*( *&&(2*+'
*!"2(*+"'.
8
34"(
5,!
#
)1%".('A3?
@ ,,(2%()+,'*+
@ *(&(,+"" @ ;%%,(.('<(*
++"%"'HPPJB
')*(,((%+(*,!
,,(3*+,!
&"+,()@ &)!+"+,!$
&(?)*"',
1+(?*+(1*+"'
#*)1%".('+
&%
;*!"2+<COD
%"**5)*.CND
('%"'
&
@ "+1++,!'(*
@ 1'+2*%
@ (*+!(3,!
@ " !%" !,
"
%
-
'(*
(&&1'",5(
')"&&
"
-
&
&"+&
$
*
'%,*('"#(1*'%+
#
"
@ 2%())
A: :)'
(1*'%+8
(',!
# *
( *"',+B
',*',':
+,'*,(%"'$*)(+",(*5
&,,
Conclusions
@ !+,15!" !%" !,,!
&
"'!*',"'
+(3*2%()&',8+3%%+,! #%&
# ,!,
&* 1*"' ,!)*(++(+" ':
@ !,!'"%(*2%+*"+(4)%"",2%1+&"',!3(*$(3+',1*+
(()'*"',+,!,
"
#
&:
@ 1*,!*&(*8,!1+( ++&!'"+&(*"++.%%
"
,!,1+'('.'1(1+%5),,!&,(+1",,!"*'+:
*,"' #
"
"
$
(2* (,!*+ 1*"' ,!
+(3* +" ' )*(++ !2 &* ,!*(1 ! ,! "&)(*,' )% ('
*,"' 1'.('%".+ 5 ,! "',*2"3+: ! )*+' ( ,!+ %
#
" !" !%" !,+ ,! !"+,(*"% "'1' ( ,! '**.2 2',+ ' 5
4,'+"('*3+0'.(',(""' +A: :
,! +"* ,( (%%, *,"' &,, (* )*(2""' ()' ++ ,(
*(*B:
adaptability
usability
E
E
E
configurability
open licence
helpdesk, support
graphical interface
interactivity
curation
metadata harvesting
download capabilities
metadata creation
embargo features
References
"
*!&. .
+!- !!
&&!""
%"!3
What values
should (we)
build into
repositories?
((),0.(%$,)$%'$.))$-'()0%%,)#&)%$2&&'%-)(&&"*%$6688:9<4
""%$(.'(,&&"0)
%,$'% )3'0"2$-"%&0"/$'$(2
0$'.(!02,(*%$0,&'*(2$-"%&0"/$'$(2'(0'(%$(2
).%'!0'$$$
%-!$
$#0$""#(%)%4,"$(&'#3+&355)4"0581-;2)-$ '$#0'("%#3+&355)4"058,"
18
Motivation
Identifying and visualising attention to learning supports feedback on learner progress1, the development of collective
intelligence2, automation of metadata annotation3 and facilitates personalised learning4. This research project re-positions
the Digital Artefacts for Learning Engagement (DiAL-e) toolkit5 as a coding schema, and applies language analysis to
identify attention to learning in user comments associated with MOOC learning objects.
Results
References
1. Najjar, Duval & Wolpers, 2006; 2. Shum, 2003;
3. Downes, 2004; 4. Beck & Woolf, 2000;
5. Burden & Atkinson, 2008
Image credits
University of Southampton 2014; Noun Project 2014
Games
Social
Multimedia
Portal
Retail
News
Listings
Search
Retail
Profiling Scenarios
Human value lists can be used to describe emotional responses to stimuli. Kahle and Kennedys (1984) List of
Values methodology was used in this study as it is simple to understand and has a strong foundation in previous
research.
Using these values it is possible to build a value profile for different scenarios which allows for comparison
between vastly different situations. These profiles were found to be significantly different between the scenarios of
Web use in the above diagram.
The graphs on the right show mean values of users scores for each value when browsing a retail website, such as
Amazon, and a social media website, such as Facebook.
The differences between these example profiles allow for comparing and contrasting different scenarios in terms
of the needs people want fulfilled when using them. There is a clear contrast between these two examples,
showing the users have very different value requirements for each.
This method has obvious business implications in motivating users to try new products and services. It can also be
used as a predictor for the values people will want to be represented by new types of products and services. For
example a social news website will likely elicit a value response which is a combination of the profiles for social
media and news, and therefore an advertiser would want to appeal to a value profile generated from these.
The method also has research implications, as vast differences in the values people assign to different activities are
areas for investigation as to why this occurs, especially when they are unexpected.
References
Kumar, R. and Tomkins, A. (2010), A characterization of online browsing behavior, Proceedings of the 19th International Conference on the World Wide Web
Kahle, L. R. and Kennedy, P. (1984), Using the list of values (LOV) to understand consumers, The Journal of Consumer Marketing 6(3), 512.
Social
20
Background
Methodology
A sample of 1000 unique threads was generated from each project. A coding
scheme was subsequently created, drawn from relevant literature suggesting
potential methodologies and other sources of influence on discussion content.
Content analysis was carried out by identifying the percentage of posts which
corresponded to each section of the coding scheme. Subsequently, discursive
saturation was carried out on each sample. This is a qualitative coding method,
where discourse is analysed for specialist, context-independent terminology
(Dowling, 1994). The discursive saturation of samples was then compared to
the discursive saturation of tutorials and descriptions surrounding the relevant
projects.
Findings
Snapshot Serengeti
Planet Four
Discursive saturation
Discursive saturation varies within projects. Generally, project complexity had some effect on discursive saturation the more complex Notes from Nature had
higher peak-saturation than less complex projects. However, specific activities were associated with particular levels of discursive saturation. Threads discussing
classifications, plus threads discussing underlying scientific principles, had relatively high levels of discursive saturation. Threads collecting types of image and
engaging in more social activities showed a relatively low level of discursive saturation. This aligns with Bernsteins (1999) theory on vertical and horizontal
hierarchies of activity. Further analysis has suggested that individual users show a preference for particular types of activity and make use of an associated level
of discursive saturation. This suggests influence resulting from users as individuals, in terms of motivation and individual use of language (Bakhtin, 2010).
gjvh1g13@soton.ac.uk
Online anonymity
Individuals who try to escape surveillance seek online
anonymity trough anonymity technologies, such as Tor.
Next to political dissidents and concerned citizens,
individuals with more dubious intentions, such as
terrorists, paedophiles and drug traders, use Tor to escape
prosecution. A prominent site on which individuals use
such anonymity is Silk Road. Group polarisation and
deindividuation are seen as consequences of anonymity.
Silk Road
Online hidden marketplace on which
mainly illegal drugs are sold
Opened
February 2011
Websites on the Dark Web, such as Silk Road, can often only be
accessed with onion routing network Tor, which anonymises trac.
Remains open
October 2014
Re-opened
November 2013
Drugs
Drugs
Drugs
Marketplace
Marketplace
Money
Money
Political/Philosphical debate
Political/Philosphical debate
Troll/Joke/Conspiracy
Troll/Joke/Conspiracy
Scam
Other
Other
Other
20
40
60
80
100
Political/Philosphical debate
Troll/Joke/Conspiracy
20
40
60
80
100
20
40
60
80
100
22
) ((&%+$2EDFB,)-)(990%
0*+1!,)+,8+!,++!,A+),,)+,&!++
(-+*+(0+,
,+,2 )!'-)(+-)()'!1&0+)'*(-
)&!,-)+-+'7()-$0,-**,7-)+!11&0
*!').1.)(&,0+)0*)0,+,?()-,!'*&4 %+,@
)*0&+&4!(.,+!,%>-%+,0-:
:-0!,, )2- 4'*&)4+!,%>+0.)(,-+-!,?D@
<-- -!,'),-1&0&-)*+!1-
)+(!,.)(,()(,0'+,!,- -
- -!,'),-*+)--9=
< +!,(;-0&-0+)-+(,*+(4(
%()2&9=
- ))&)4
,0&-,
(-+1!2)0(+,7
!(1,-)+,(,0**)+-+,)
+&4,-)'*(!,
0,!(*(-
)'*!&++!+,(
&&(,+)'&),(
,,-0!,
(2!- 0,+,7()-
*0&!, +,)+'!,
)*&7()-&()+
&!(%-7+%4-)-
*+),,
(4,-% )&+,+
!(1)&17()-$0,-
*0&!, +>0,+
*(-0&-0+
!,()-1&0+.)(>&
(,! -,
<)0(
- +! -
)((.)(,
!(-
)1+('(-9=
+,*.1,)(*(-0.&!-4(,-(+,+,!-0.)(&
(-+*+(0+!&0,+-%,')+*+'.1!2)*(
-- (- ), &4'!(!1!&,+1(-,
+&.)(, !*-2(-*0&!, +,(0,+,(,-)
(!(-+.17)(.(0)0,!&)0
*(-!,*+),,7()-*+)*+-4
<(-+*+(0+,
,%
)+!1(,,7
()-
*+'!,,!)(9=
?D@)+&(!7(
0&&!(,7
9?ECCC@+!1!,%,( )!,!((-+*+(0+,2
(-0+!,!)(,7
DH8GFCH>FEE
24
Category
Health
Assessment
Question
00:00
Answer
How is your
health in general?
Answer
--Please Choose --
Success Rate
Question:
What % of .. ?
Answer:
Questions
Answered
Fastest Correct
Answer
Explanation:
Correct Answer
Streak
10% of active
people eat
Answer
HealthQuest: Can an
Educational Quiz Lead to
Behaviour Change?
By Anna Weston
aw3g10@soton.ac.uk
@anna_west0n
Introduction
Theories
Experiment
1,044,407 emergency
admissions were
potentially avoidable in
2012/13.
Transtheoretical Model
Hypothesis
1: Learning
Hypothesis
2: Behaviour
Hypothesis
3: Nudges
Self-management
reduces admissions by
increasing the patients
understanding and
coping mechanisms
Social Cognitive
Theory (SCT)
Control Group
1. Health self-assessment
2. Test: 20 random
questions (no feedback)
3. 2-week break
4. Test: 20 random
questions (no feedback)
5. Health self-assessment
Experimental Group:
1. Health self-assessment
2. Test: 20 random
questions (no feedback)
3. 2-weeks playing the
quiz (with feedback)
4. Test: 20 random
questions (no feedback)
5. Health self-assessment
Integrated Change
(I-Change) Model
Behaviour Economics
Intention-Behaviour Gap
Emotional Arousal
Optimism Bias
Gain/Loss-Framed Messages
Social Nudges
!
!
!
!
!
!
!
!
!
,
!
Future Work
!
Longitudinal Studies
- More participants for a longer
period of time would provide
further insights into this area
including data for participant
engagement and retention
Can an educational
quiz app help increase
self-management and
bring about behaviour
change?
#
$
Your stats
10%
Answer
Next
Sorry, that
was
incorrect
Intervention Email
Sent
App Development
- Such as Gamification
26
In the absence of institutional policy, what is the creator/facilitator perspective on the aims and
consequences of MOOC development at the University of Southampton? The literature indicates
commercial, democratic and research concerns motivate MOOC development in HE.
Learning designers
Facilitators/trainers
Management
Content providers
Reputation
building
Influence educational
culture
Develop e-learning
practice culture
Exploit MOOCs as
research tool
Embed MOOCs in F2F
courses
Conclusion
MOOC development is mainly perceived as a way to advance the interests of the university, rather
than for wider open educational goals in education. However, MOOCs are also seen as a dynamic
for internal educational change and development, and as a way to realign teaching and learning
methods with wider processes and concerns in a Web-connected world.
Image sources:
knowledgehut.com 2014
tap.iop.org/momentum/220/
page_46435.html 2014
28
30
!
"
#
"
!
"
#
$
%
&
!
!
!
&
!%
'
!
!
(
'
)
!
* +!,
-
(
!
Interdisciplinary Approach
This project combines insight from
Psychology, Finance and Computer
Science to help build an
understanding of the role of the web
in the investor decision making
process.
Key Questions
- How do investors interact with
online information?
- Can online footprints give
estimates of investor mood?
- How important is the role of
investor mood in the stock
market?
Proposed Methods
- Differentiating public
mood and investor
mood from online
social media
- Applying psychological
models of mood to
social media analysis
- Testing models against
individual stock
prices/market indices
Supervisors
Prof. Johnnie Johnson (Management)
Dr. Tiejun Ma (Management)
Prof. Ming-Chien Sung (Management)
Dr. Thanassis Tiropanis (Electronics and Computer
Science)
32
MISSION
tlogging the growth and evolution
of MOOCs;
rResearch on learner engagement and motivations: 2 surveys conducted, one with potential MOOC learners, the
other with actual MOOC learners.
rResearch on educator attitudes
rResearch on marketing: how MOOCs are impacting recruitment on F2F courses
rLearning analytics/Educational Data Mining: Research on
customised automated recommender systems in MOOCs
rResearch on perspectives from other stakeholders within
HEIs
rResearch on the role of social media in MOOCs
rResearch on MOOCs impact on the openness agenda
rMendeley group (Around 250 tagged academic sources)
r2 Scoopit blogs
rMOOC Observatory Blog
rMOOC history timeline
WHO WE ARE
Education
Library
Health Sciences
University of Southampton
Web Science
Internet Intermediaries
Internet technology requires the insertion
n of intermediaries,
ce providers, web
such as Internet access and service
Technology
Security Techniques might:
- be difficult to implement
- be ineffective (i.e. high-speed Internet backbone
networks)
- violate fundamental principles of Internet
governance (i.e. net neutrality)
- infringe upon users rights (i.e. right to be forgotten)
- be subject to misuse (i.e. surveillance by
governments or private entities)
Economics
Lack of economic incentives as a hurdle to the
implementation of effective security measures
Law
Internet
intermediaries best
suited to safeguard
the Internet
But necessary
security measures
not in place
Network insecurity
still an open
problem
Politics
Different priorities/perceptions of users rights
34
1.
2.
Avatars
An avatar is the graphical representation of a player within a virtual
environment. In videogames they are the medium through which a player
interacts with the game, responding to a greater or lesser extent according
to the players wishes.
Virtual Environments
These terminologies refer to large-scale, immersive graphical environments
hosted on servers which allow for large populations of users to be present
and interact through the Internet. MMOs which rely on virtual environments
as part of gameplay will also occasionally be referred to in these terms.
This section is concerned with both personal and social avatar interaction and addresses both initial
research aims. As the notion of the avatar as sex object is instigated by a curious but not uncommon
phenomenon in virtual worlds, that of gender-switching, this section also returns to a consideration of
the mediating role played by technology in the relationship between a player and their in-game avatar.
Determining players' reasons for doing so has had varying levels of success, as it would appear that
there is not one overarching motivator. Rather, the reasons can vary widely according to the player and
their gender, and different methodologies have uncovered a wide range. More recent studies by Martey
et al. and Yee claimed that a significant motivator in gender-switching is that of aesthetics - male players
simply preferred to see a female avatar on the screen, rather than a male. While these studies did not
refute previous research which points to embodiment or behavioural changes such as
the Proteus Effect , they highlighted the unconscious nature of these practices. This reinforces the
mediating aspect of virtual worlds and highlights the distance between player and avatar, bridged not
only by technology but also by the look.
In many ways the female avatar body is in fact primed to be seen as a sex object. Female characters in
video games are forced into a narrow set of highly codified, pre-existing categories to be temporally
inhabited as an easily assumed, ready-to-be-invaded vessel" (Lahti). For the most part they are passive
sexual objects acting as visual adornment for the target audience (which is presumed to be male)
(Ivory). Socially, virtual worlds are often masculine and sometimes misogynistic spaces (Fox and Tang),
creating a gender-imbalanced framework. This is part of a self-perpetuating cycle in which games are
developed by men who have predominantly played games developed for a male audience. The male
point of view is therefore entrenched and largely unquestioned. The fetishistic aspects of these male
fantasies have become largely invisible to male gamers" (Yee), but are noticed and criticized by female
game-players, for whom sexualised female avatars act as a constant reminder of their not-belonging.
Elzabi Rimington
University of Southampton
58/3129
Salisbury Road
Highfield Campus
Hampshire
SO17 1BJ
07525429416
emr2g08@soton.ac.uk
Crime Deviancy
This Research
My research involves a detailed account of
the history of copyright law, psychological
descriptions of pirates and their behaviour,
and sociological investigation of the nature
of piracy, law and deviancy. The current
literature on piracy does not go far in
illuminating these issues. Much of the
current research is incomplete, inaccurate,
and contradictory. Summaries of some of the
issues in this field are presented below along
with a description of the future of this
research.
What is Piracy?
There are legal battles on-going regarding
how copyright is defined in the context of the
Web and digital distribution. Yet research
participants are often presented with
questions like Do you pirate?. Its often
assumed that participants definitions of
piracy are accurate without behavioural
checks. Services like Youtube2MP3, unofficial
uploaders and streaming services, along with
a variety of other phenomena, have
complicated the status of Web user behaviour
often leaving legality unclear. At the very
least, legality is often misunderstood by users
(and legal professionals). Like the question of
who are pirates?, the assumptions of legal
understanding in this research area remain
untested.
Conclusions
The idea of intellectual property inspires diverse opinions.
Regardless, I would argue that the current conclusions regarding
copyright infringement, as it is perpetrated on the Web
(internet piracy), are not based on clearly established facts. This
research aims to investigate the interactions between the
moral/ethical beliefs of pirates and their understanding of the
law, to establish clearer accounts of pirate methodologies, and
to examine how businesses have attempted to operate on a
Web with pervasive digital piracy.
Background
How can the United Nations evaluate Living Labs which are
not amenable to traditional economic or fiscal analysis?
Research Question
A Holistic Model
Web Science
Acknowledgements
References
Future Work
Eamonn Walls ~ ew1g12@soton.ac.uk | PhD Candidate, Web Science Centre for Doctoral Training | School of Electronics and Computer Science, University of Southampton
36
jrw1g08@soton.ac.uk
@jenwelch15
Jen_welch15
Related work
Jennifer Welch
Prof Susan Halford
Dr Mark Weal
Prof Gerry Stoker
The research
[i]f the Internet can provide a canvas upon which nations can paint their social, linguistic,
cultural, and political beliefs, then perhaps the physical struggle for safe cultural havens and
borders may no longer be as necessary for their preservation or evolution
1. Conceptual framework
McCormick (2002)
The role of the Web and ICTs in peacebuilding is at present widely under-researched, yet
there is a prevalent assumption of the many potentials of their uses to improve the relevance
and impact of post-conflict peacebuilding practice. The literature on the subject is small, but
in 2004 already Sanjana Hattotuwa (2004: 39) highlighted an increasing confluence between
ICT, conflict transformation and peacebuilding. In 2013, Stability Journal launched a special
collection on New Technologies for Peace and Development, while earlier academic work on
the uses of the web for peacebuilding or conflict transformation processes focused on the
role of so-called digital diasporas (Brinkerhoff, 2011, 2007; Turner, 2008; Kent, 2006). These
academic developments have been paralleled by increased policy and practical attention to
the topic.
2. Practice review
Opening of the first international conference on ICTs for peacebuilding Build Peace
Peace through Technology, at MIT (Cambridge, MA) in April 2014
howtobuildup.org
38
Revenge Pornography
Abigail Whitmarsh
Web Science CDT
University of Southampton
Background
Revenge Pornography describes the act of publishing on the Web pornographic images of a person without their consent. It is a phenomenon
that has been enabled through the development of the Web and almost universal public access to digital photography and file sharing
technology. Many sites include revenge in their title, including the site I have identified for research which reads My Ex Get Revenge.
Anyone can appear on a revenge pornography Website however, most victims are female and more men than women view the sites.
Uploader
Viewer
Commenter
Research
Methods
Research Aim
Why do men engage with revenge pornography
websites?
Research Questions
How large is the community who use revenge
pornography sites and how quickly does
pornographic material get consumed?
Can we identify and differentiate between
users in this context?
What added value does revenge pornography
websites offer over other forms of online
pornography?
Website
Victim
Literature
Pornography is a controversial topic. Radical feminists viewed pornography as
placing an overwhelming emphasis on male sexual pleasure and female
domination, arguing that pornography was reflective and self-perpetuating in its
ideology; not only reinforcing gender stereotypes but also adding to them. This
view point has been criticised by liberals for being censorious and by other
feminists for being too deterministic. Early studies of pornography focused on the
effect pornography has on women and ignored men. Men are the biggest
consumers of pornography and by disregarding the impact pornography has on
them ignores a significant and important area of research . Technology has
changed the way pornography is produced and consumed. Cheaper and portable
devices allow for easy creation and distribution of pornographic images. Web 2.0
has added an extra dimension of community and social value to pornographic
Websites. Revenge pornography websites utilises the technology and provides a
platform for users of the site to easily post details and images of their ex partner,
simultaneously engaging with a community who enjoying viewing pornography
which has been displayed without the consent of the person in the material.
Web Science
Acknowledgements
The Digital Economy Programme is a Research
Councils UK cross council initiative led by
EPSRC and contributed to by AHRC, ESRC and
MRC.
My PhD supervisors; Gethin Rees and Elena
Simperl Elena Simperl
40
1. To what extent does data visualisation affect the choices and behaviour of
analysts using visual analytic tools on the Web?
2. To what extent can interaction data be used to identify the influence of
framing for VA tools on the Web?
3. Can interaction data be used to identify framing effects in visualisations on
the web and to improve measurable analytic performance ?
Theories are emerging from Visual Analytics and Visualisation literature which
suggest that interaction events can provide insights into the utility of design and can
inform new developments in data visualisation. This research examines visualisations
for the presence of framing effects - a established concept in Economics - by utilising
an existing taxonomy of action types commonly used in visual analytic applications.
Symbols aquired from thenounproject.com are public license except for those under the CC Attribution license: Bomb by Scott Lewis. Corporation by Stephen Copinger. Dollar (sign) and Twitter by Lubo Volkov. Dollar (bill) by Christopher Beach.
Globe by Nicholas Menghini. Chevron by Christopher T. Howlett. Military Vehicle and Airplane by Luke Anthony Firth. Dangerous Area, UN Office, Police, Water, NGO Office and Storm Surge by OCHA Visual Information Unit.
Introduction
Crime preoccupies the media and our TV schedules; it fills our
fiction shelves and is a large part of public spending, whether via
warfare and defence, or policing.
A report suggests that the amount spent on combating just violent crime
^jnZm^lmh0'0h_ma^NDl@=I%hk{-%0))_hk^o^krahnl^ahe]'T.VBl
this effective spending?
Ahpfn\ablmablli^g]bg`]kbo^g[r\kbf^lmZmblmb\l8Iheb\^'ndblZlbm^ikhob]^][rma^N'D'lAhf^H__b\^pab\aik^l^gmlhi^g\kbf^]ZmZ%lniihkmbg`ma^@ho^kgf^gmlmkZgliZk^g\rZg]Z\\hngmZ[bebmrZ`^g]Z'
Ahpfn\aZk^ma^]ZmZ(lmZmblmb\llaZi^][rm^\agheh`rhklh\bZe\Znl^l
iheb\r%\nemnk^%Z]fbgblmkZmbhg%[nk^Zn\kZ\r8<Zgma^mkZgliZk^g\r
Z`^g]Za^eibgng]^klmZg]bg`mabl8T+V
P^[L\b^g\^\Zga^einlmh\eZllb_rma^l^\kbf^ZiilZg]p^[lbm^l%lhf^times referred to as Crime Social Machines. Understanding the data and
bg_hkfZmbhg^\hlrlm^fpab\aZeehpllh\b^mrmhZ]]k^ll\kbf^%a^eilnlng]^klmZg]ma^lbm^llbg`neZker'
Three dimensions:
Results
Acknowledgments
Ma^phkdbgmabliZi^kpZl_ng]^][rma^K^l^Zk\a<hng\belND
=b`bmZe>\hghfrIkh`kZff^%P^[L\b^g\^=h\mhkZeMkZbgbg`<^gmk^%
Ngbo^klbmrh_LhnmaZfimhg%>I(@),/2+/(*Zg][rLH<B:F3Ma^
Ma^hkrZg]IkZ\mb\^h_Lh\bZeFZ\abg^l%_ng]^][rma^ND>g`bg^^kbg`
Zg]Iarlb\ZeL\b^g\^lK^l^Zk\a<hng\be!>ILK<"ng]^k`kZgmgnf[^k
>I(C)*00+1(*\hfikblbg`ma^Ngbo^klbmb^lh_LhnmaZfimhg%Hq_hk]Zg]
>]bg[nk`a'
Method
@khng]^]Ma^hkrblng]^kibgg^][riabehlhiarh_l\b^g\^%
Pbmm`^glm^bgl_Zfberk^l^f[eZg\^l%:f^kb\ZgikZ`fZmblf%
lrf[heb\bgm^kZ\mbhgblf%DZgmbZgblf%Fbeel
lrlm^fh_
]b__^k^g\^l%;Z\hgbZgbg]n\mboblfZg]:kblmhm^ebZgZqbheh`r'
Grounded Theory appropriate for Web research:
:eehplma^ma^hkblmmhk^obl^ma^bk_bg]bg`lZlma^rfho^makhn`a
ma^]bl\ho^krikh\^ll'
Ma^ikh\^llh_ng]^kmZdbg`k^l^Zk\ahgma^k^lihglbo^p^[
can affect the thing being researched, for example in
^qZfbgbg`p^[lbm^l%mZedlmhlbm^]^lb`g^klZ__^\mma^lbm^lZl
]^lb`g^klZk^bg_en^g\^][rjn^lmbhglZ[hnm]^lb`g%bgm^gm%
\hfi^mbmbhg%]ZmZikho^gZg\^Zg]iheb\r'
A methodological approach is required which accepts some
bgm^kieZr[^mp^^gma^h[l^ko^kZg]ma^mabg`h[l^ko^]%
pbmahnmmablfZdbg`ma^k^lnemlh_h[l^koZmbhgbgoZeb]'
Hence the reactive impact that investigators have upon their
]ZmZ[^Zklfhk^hgma^l\hi^maZghgma^\k^]b[bebmrh_Zg
^f^k`bg`ma^hkr'Ma^m^\agbjn^maZm_hk\^lbgo^lmb`ZmhklmhlmZr
\ehl^mhma^bk]ZmZ%Zg]pab\a\hglmbmnm^lma^lrlm^fblZmbhgh_
ma^ZiikhZ\a%blma^\hglmZgm\hfiZkZmbo^f^mah]'T-V
FZbglmk^Zfl\b^g\^ehhdl_hkk^ikh]n\b[bebmrbgk^lnemlZl[^bg`
_ng]Zf^gmZemhma^l\b^gmb_b\f^mah]4pa^k^p^\Zkkrhnmp^[
l^Zk\a^lpbmak^lnemlk^mnkg^]obZ@hh`e^%]ZmZk^mnkg^]fZr
not be the same from moment to moment, depending on data
centre locations, indexing, and the constant addition of new
ebgdlmhma^p^[maZmma^gfZrZem^kl^Zk\ak^lneml'T*V
@khng]^]ma^hkrZeehplmabl4ma^_h\nlblhg\k^Zmbg`Z
f^mah]heh`rmaZme^mlk^l^Zk\a^klZiierbmhkZem^kbm
themselves, as it fits their needs. The aim of this research
f^mah]bl[nbe]bg`ma^hkr%ghmm^lmbg`ma^hkr'T,VLn\aZg
approach is pragmatic and suits fluid data results coming from
the web.
42
Introduction
We spend a vast amount of time on the Web and much of that time is spent
reading
However, with the large amount of information available we cannot read it
all in great detail, therefore we engage in skim reading (Lui , 2005; Morkes &
Nielsen, 1997)
Skim reading has been shown to negatively affect comprehension (Carver,
1984; Just & Carpenter, 1987 ; Dyson & Haselgrove, 2000)
Others have shown that there is a different between important and
unimportant information. The important information does not receive the
same loss of comprehension that the unimportant information does
(Masson, 1982; Reader & Payne, 2007; Duggan & Payne, 2009)
Experiment
Experimental Conditions
2 x 2 x 2 within-participant
design
Task Type: Normal/Skimming
Word Type: Linked/Unlinked
Word Frequency: High/Low
Question 1:
Does skim reading affect
the way we read
hypertext?
32 participants
160 experimental sentences
inserted into 40 edited Wikipedia
pages (4 in each)
20 pages read were normally, 20
pages were skim read
Question 2:
Does skim reading
affect comprehension?
160 comprehension questions
(4 after each stimulus)
50% asked about important
sentences
50% asked about unimportant
sentences
Figure 2. Example stimulus with fixations of
normal reading
Results
Figure 3. Task Type x Word Type interaction in skipping probability and Task Type x Word Type x Word
Frequency interaction in single fixation durations
Comprehension results
Comprehension was reduced when skim reading
Comprehension was marginally better for the questions related to
the important sentences compared to the unimportant sentences
when skim reading
Conclusion
Does skim reading affect the way we read hypertext?
Yes, the linked words were skipped less when skim reading
compared to the unlinked words
When the linked words were fixated they were processed fully,
unlike the unlinked words that showed no frequency effect in the
skim readingg condition
What does this mean for reading on the Web?
If participants are using linked words to suggest important
information and using them as anchor points to guide their
movement through the text, then the choice of which words to add
links to needs to be considered very carefully
This is because skim readers focus primarily on linked words and use
them as a marker for the most important information
Trust
Collaboration
Accountability
Deliberation
Transparency
Consultation/Protest
Open Data
Data published by default
Support
Reusable Data
Exchange hacks
Web wallet hacks
Pool aacks
Market manipulaon
Double spends
Buer overow
Mining aacks (selsh mining)
Deviancy
Who are the relevant authories for handling cryptocurrency related crime?
e??
At what p
point will naonal companies
p
and authories begin
g to implement cryptocurrency specic policies?
s??
p
p
p
What p
policies are in place
to handle praccal
policing dierences of decentralised currencies?
s??
The scripng
p g language
g g is a forth like non
onTuringg complete
p
stack based language
g g with
approximately 190 dierent commands.
s.
Cryptocurrencies
yp
requires
q
users to hold the
private keys to spend their currency.
y.
Criminal Opportunies
es
Laundering
Malware (mining malware, wallet stealing malware, clipboard malware)
Privacy/deanonymisaon aacks
Educaon?
Defence
Scripng Language
ge
Other aacks
Aack Category
Research Quesons
ns
Despite
p there beingg ~$5billion worth of cryptocurrencies
yp
in circulaon and lots of media coverage
g (parcularly
(p
y relangg to
crime),
) veryy lile research, p
parcularly social or criminological
research, has been conducted.
d
d.
Cryptocurrencies,
yp
such as Bitcoin, are decentralised online currencies. Unlike at currencies, their creaon, distribuon and
value are not governed
g
byy law and theyy are typically
yp
y not associated with anyy single
g oine jurisdicon.
j
The technology
gy behind
these currencies provides
p
users with a high
g degree
g
of privacy,
p
y
and their implementaon
p
means that theyy have no central
point of operaon,
p
p
failure or control. These currencies allow the
direct transfer of value between individuals online, without the
inconvenience, cost or trust required
q
with a third party such as
a bank or payment processor (e.g. PayPal).
l)
l).
Originally
g
y invented and released under the pseudonym
p
y Satoshi
Nakamoto, Bitcoin is seen as the rst cryptocurrency.
yp
y The reference client was released as open
p source soware and has now
spawned over 500 dierent cryptocurrencies.
s.
Background
nd
Dr C
D
Craig
i Webbe
W
WebberCriminology
bber
b
Cr
Criminolog
i i l gy
Dominicc Hobsondom.hobson@soton.ac.uk
Hobso
ondo
on
om hobson@
om.hobson@soton.ac.u
@soton a uk
@soto
Cryptocurrencies
yp
do not fall within exisngg legal
g denions of
electronic cash due to the lack of central issuer or authority.
y
Aempts
p to regulate,
g
such as New York BitLicences, include ngerprinng users for 10 years and have been met with resistance.
e.
Monegraph
o eg ap
ph
p
h uses the Namecoin blockchain to show authencity
of digital artwork.
k
k.
se
er serves as a P2P microblogging
ggg plaorm, using the torrent
Twister
protocol, DHTs, and a blockchain.
n.
Maidsafe
a dsafe
e uses Safecoins to automacallyy reward developers and
contributors to its decentralised storage network.
k
k.
Ethereum
e eum oers smart contracts, extendingg the idea of a transacon scripng language with a Turing complete language.
e.
Namecoin
a ecoin
n p
presents a censorship
p resistant DNS system,
y
where
transacon instead represent registraons of a .bit domain.
n.
44
Giant strides have been taken recently in developing theories and techniques of identity attribution
from data indirectly linked to individuals either alone, or in combination with other data.
These challenge traditional distinctions found in data protection and privacy laws between two
categories of information: PERSONAL DATA and NON-PERSONAL DATA.
Consider the inferences that might be made from communications metadata alone:
You spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.
Research Questions:
To what extent are we anonymous online? What exactly do we mean by anonymous?
Can we rely on anonymisation techniques to hide our identities?
What weight should be placed on indirect digital identifiers and their links to a person? (e.g. Should I bear any liability for
what happens via an IP address linked to my home? Should the same IP address be deemed my personal data worthy of
legal data protection against those who might use it to try to identify my offline identity?)
What is the harm from digital identity attribution? Does it extend beyond a privacy harm? What is its value?
http://blogs.law.harvard.edu/billofhealth/files/2013/05/Screen-shot-2013-05-13-at-3.02.09-PM.png
Alison Knight
University of Southampton
A.M.Knight@soton.ac.uk
Web Science
46
The Problem
Handwriting
Recognition
[TEX]
x=\frac{-b\pm\sqrt
{b^2-4ac}}{2a}
[/TEX]
Background
Rationale
Milestones
Simplify digitisation of
mathematics expressions
Use current handwriting
recognition techniques to
translate handwritten work
into computer codes
Develop socially-informed
interface to reduce
technology-induced
cognitive overload while
working electronically
Could also be used to
interface with any online
communication tool.
References: [1] Ahmed (2008). Support Mathematical Instruction in Web-Based Learning System Using Object-Oriented Approach. ICACTE'08. IEEE.
[2] Mikusa et al. (2005). Features and advantages of WME: a Web-based mathematics education system. SoutheastCon05. IEEE.
[3] Lo et al. (2013). MathPen: identifying and solving the problems of online collaborative learning for mathematics. ICTMT11.
Funded by Research Councils UK Digital Economy,
Web Science Doctoral Training Centre, EP/G036926/1.
Expanding Graphs
University of Southampton
dm1x07@soton.ac.uk
History
The theory of random graphs began with Erdos in the 1940s
and 1950s. Erdos used probabilistic methods to demonstrate
the existence of graphs with particular properties without
needing to explicitly construct these graphs
Symmetry
One less studied property of real world networks is the degree
to which these networks are symmetric. Symmetry in a network effectively means that certain vertices play precisely the
same role in the graph. This redundancy naturally reinforces
the graph against an attack by providing structural backups
[2].
Trees
It has been suggested that real-world networks that grow by
the addition of vertices and edges often under preferential attachment are naturally tree-like [2]. This begs the question:
How tree-like are the Watts and Strogatz and the BarabasiAlbert Models? What is the expected girth of the Watts and
Strogatz and the Barabasi-Albert Models? Note that if one
sets m0 = 1 and m = 1 at each step in the Barabasi-Albert
Model then the resulting graph is necessarily a tree. If realworld networks are indeed tree-like then one could understand
properties of real-world networks by understanding properties
of random trees.
Results
Thus far we have used a formalised notion of symmetry called
the automorphism group of a graph in order to investigate the
typical degree of symmetry to be found in a variety of models
of growing random trees. We have utilised such models of
growing graphs to, for example, model phenomena as diverse
as Alzheimers disease and the World Wide Web.
References
[1] Reka Albert and Albert-Laszlo Barabasi. Statistical mechanics of complex networks. Reviews of modern physics,
74(1):47, 2002.
[2] Ben D. Macarthur, Ruben J. Sanchez-garca, and James W.
Anderson. Symmetry in complex networks. Discrete Applied Mathematics, pages 35253531, 2008.
[3] Duncan J Watts and Steven H Strogatz. Collective dynamics of small-worldnetworks. nature, 393(6684):440442,
1998.
48
#
"%
(')&$$
'"$(%!$%/
$!%%!$&$
!",
$!%%!$'% !$
! !$ &! %&"$"&! !'&+% %% &+&&!$$! &!!+& ! &"!$$+
%!&+0%%'- !&! +&!&"!"'$&+!%%$!'&%&!&$ !%-%'%&-*$%
!%&%-'&%!"$%%'$%&!&$%"! %&+!$3!+"$!&%46 -:88;70)%&$ %!$&
"$!'&! $'&! !- ! 1%- %&$&)+% ('%@ !$&! -
! %'$"$!'&%- !' &!'&%"@!+%%'%0%&%%*"!$%&$!!&) "'$%'&
!%&&%'$$+.#'%&! !)&)%"& 3!+"$!&%4!$$!+.& @' !&)
! !%-'% &%%&'+!%&&%'$$+- !))'%$%)!$%" !%5!&
"+% ($&'5$ &'$ %" &)0
!
& $! !% & ) "+ 3!+ "$!&%4 1
%"@+ !) $ $& !$&! &'$%
! & ) '% "$!&%0 !) $ $ !%
! "$!'&%!&)2
!)!%&) @' !%-'%
&%%&'+!%&&%'$$+2
!)$'%$%!&)%" !%-
&'$ %" &)&%2
"
"
!+ "$!&% $ @*- '%'+ ! !
! %&$'&! % ! & !+ 6 - :88;70 %
"$&% $ !& )0 &$&! % &! & !+ (
&'$!'&'$%&!$+-$! %$ &
!+ &$!' &&&!! !$ %$@&! %!
'&'$%-&$!'! &$!($%"$&%%'%!!&
!&$% 6'!%+- 9?=9. - :88;70
"& $! ! ! &&+ %%
('% ! %&$'& $! %&$'& &$
"+% ""$ % 6 %- 9??9. -
:88;70 %' *" ! !+ "$!& % &
! %&$'&! & !
)& !'% ! &+ !!
6 - :88;70 + !!&% "'$%'& !$
&% !%&&% %'.)&%&&
%'$$+ ! $!'& %!'& !'& &! & &%
%0 $! ! & ) & "'$%'& ! !+
"$!&%%%%%&!%&%) !$-(!&-
%- !) %'%%! ! !+ "$!&%0 "%
!$& ! %'$ !$&! - "$!'&%-
( ! "!"'$0 ) % $!)
($%@. "$% & !"* ($! & )&
!"& %!'$%! !$&! "$!'&%0
"
%$-0.$&% -00.
$-06:88:73!+! %'/@*(&+ !%&'$$+4-
-9?6987/=?;1>9
%-069??97
-$/
!&+
-06:88;7
-
! ! /-: &!
"
%
!) &/&! !+
$!$%%$!' % $!%%!' &&(+
! &$'&&!+-
Sh
ar
in
g
dg
e
le
Kn
ow
Re
se
ar
ch
Ed
uc
at
io
on
Ex
g
in
hi
bi
ti
t
ke
ar
ns
tiv
ra
io
at
l
Re
ist
in
m
Ad
ic
bl
Pu
&XOWXUDO+HULWDJH
2UJDQLVDWLRQVRQWKH:HE
Knowledge
2QOLQH&XOWXUDO
+HULWDJH
(2&+)
Data
Information
Javier Pereda
Knowledge
MSHUHGD#VRWRQDFXN
Wisdom
Web Science
DTC
Informatum Production
Informatum Sharing
Engagement withInformatum
,QWKHSURFHVVRIGHQLQJGLHUHQWOHYHOVRILQWHUDFWLRQDQGRUW\SHRIXVHUOHYHOVLQ2&+7D\ORU
SURYLGHVDVHWRIGLHUHQWSHUVSHFWLYHVRIKRZDXVHUYLVLWRUPLJKWDWWHPSWWRJDLQNQRZOHGJH
Visceral
Conscious
Formalised
Compromised
User Experience
Constructivism
Demateriallisation
Physical
Environment
Objects/Artifacts
Intangible
Dynamic
Transient
Tangible
Static
Persistent
Informatum
Digital
World
Tangible Interaction
&DPSHQKRXWHWDO
'U/HLI,VDNVHQ
'U<XDQ\XDQ<LQ
'U*UDHPH(DUO
to
er to
it
This P
(versi
asked
If you
temp
e day
e
our
50
Method
Participants
40 undergraduate students (Female = 27, Male = 13) completed this study in
exchange for course credit. Participants were randomly allocated to either a Control
or Experimental condition.
Design
Study used a 2(Condition) x2(Gender) x2(Room Type) x2 (Movement) mixed design.
Apparatus
This study used a virtual environment which participants were required to navigate
and explore. This was modelled on the University of Southampton Shackleton
Building (44), using 3DSMax 2012. Participants controlled their movement using the
arrow keys, but could not interact with items within the environment.
Group Control explored a replica of the building with no additional navigation aids. In
contrast Group Experimental also saw large coloured bands on the top of each of the
walls, based on their compass facing (North Blue, East Yellow, South Green and West
Red)
Procedure
Participants explored the outside and inside of the virtual building before completing
four orientation trials. At the start of each orientation trial Participants found
themselves within rooms in the virtual building and were asked to turn to face a nonvisible external landmark. Once participants were happy with their position they
proceeded to the next trial.
Two rooms in the orientation trials were external, allowing the use of external visual
cues to orientate. The other two rooms were internal, over looking the inner
courtyard, and required an understanding of the spatial relationship between the
internal and external cues to complete the task. One of the external rooms and one
of the internal rooms had been visited previously in the acquisition trials.
Results
Orientatation Error (in degrees)
22cm
140
140
120
120
100
Female
Male
80
100
Female
Male
80
60
60
40
40
20
20
0
External
Unvisited
Internal
Unvisited
External
Visited
Internal
Visited
External Internal
Unvisited Unvisited
External
Visited
Internal
Visited
Results suggest that without the coloured cues Females in Group Control found it
difficult to orient within the inner rooms, especially if they had not previously
visited.
A 4-way mixed design ANOVA revealed a main effect of room type, F(1,36)= 4.45,
P<0.05 suggesting it was more difficult to perform the task from an internal room. A
main effect of movement, F(1, 36) = 9.96, p<0.01 suggests that the orientation task
was more difficult from within a room which participants had not previously visited.
No other main effects were significant. There was a significant 4-way interaction,
F(1, 36) = 6.91, p<0.05. Further analysis via simple main effects revealed that there
was only an effect of gender in Group Control in the Internal room to which the
participants had not previously moved, F(1, 144) = 8.96, p<0.01. This suggests that
females found it harder than males to orientate in this room, but this impairment in
spatial updating was removed by the addition of the coloured cues.
Conclusion
Participants within the control condition struggled to automatically update their
position within internal rooms, suggesting they were unable to update multiple
environments simultaneously. This is consistent with previous findings, using real
world tasks (Wang & Brockmole, 2003)
The effect of movement offers partial support for Klatzky et al. (1998). Participants
made greater orientation errors within rooms which they had not previously visited.
However many were able to remain oriented within the virtual environment without
the need for physical movement.
There was no overall effect of gender, but a gender difference was apparent when
participants were required to use internal cues. Females within Group Control were
unable to effectively update their orientation automatically within the internal
room. The addition of colour cues however allowed females in Group Experimental to
orient as well as the males. This is consistent with females greater reliance on direct
landmark cues (Lawton, 1994).
Results suggest that losing track of where you are within a virtual environment can
be reduced by the addition of salient visual cues which are associated with external
orienting features.
References
Klatsky, R.L., Loomis, J.M., Beall, A.C., Chance, S.S., & Golledge, R.G. (1998). Spatial updating of self-position and orientation during real,
imagined, and virtual locomotion. Psychological Science, 9, 293298
Lawton, C. A. (1994). Gender differences in way-finding strategies: Relationship to spatial ability and spatial anxiety. Sex Roles, 30, 765-779.
Lawton, C. A., & Morrin, K. A. (1999). Gender differences in pointing accuracy in computer-simulated 3D mazes. Sex Roles, 40, 73-92.
Riecke, B.E., Cunningham, D.W., & Buelthoff, H.H. (2007) Spatial updating in virtual reality: the sufficiency of visual information.
Psychological Research, 71, 298313.
Rieser, J. J. (1989). Access to knowledge of spatial structure at novel points of observation. Journal of Experimental Psychology: Learning,
Memory, and Cognition, 15, 1157-1165.
Tlauka, M., Brolese, A., Pomeroy, D.E., & Hobbs, W. (2005), Gender differences in spatial knowledge acquired through simulated exploration
of a virtual shopping centre, Journal of Environmental Psychology, 25, 111-118.
Wang, R.F. & Brockmole, J.R. (2003) Simultaneous spatial updating in nested environments. Psychonomic Bulletin & Review. 10, 981986
Acknowledgments
This research was funded by the Research Councils UK Digital Economy Program, Web Science Doctoral Training Centre,
University of Southampton. EP/G036926/1
RESEARCH POSTER PRESENTATION DESIGN 2012
www.PosterPresentations.com
Verify
Go to
prefe
of the
100%
when
qualit
for pr
Using
To ad
and ty
click
frame
Then,
you c
be fo
Modif
This t
colum
mouse
click
layou
the p
advan
and t
Impor
TEXT
place
side o
PHOT
in it a
TABL
docum
the te
paste
then
value
Modif
To ch
Desi
from
your o
20
21
Ber
pos
Memory Institutions
and the Web
Museums, libraries and archives are conventionally recognised
memory institutions. The web is changing this. For museums,
traditionally understood mechanisms for collecting, preserving
and interpreting the heritage of humanity and our
environments are no longer enough.
The photographs in this poster form part of the Europeana collection Vintage Animals and are curated by Retronaut.
They are multi-institutionally sourced, and owe their presence here to good metadata (which made them findable) and
comedic subject matter (which made them adorable).
On the web, the audience of heritage is very different. Young people and
people of different socio-economic backgrounds engage with content with a
history or archaeology focus much more readily online than they do offline. In
addition to this, the audiences of this kind of content are finding information
and knowledge about these topics away from the large authoritative
organisations. An online user will come across the information in a different
way, and this is key to the success of sharing heritage knowledge online.
Content online still needs to be collected and categorised, to be interpreted
and then presented: to be curated. Open data is an essential component to
this re-discovery of information. Social networking systems, the tools and
platforms where people are creating and sharing content are essential to the
future of museums. Museums are the appropriate institution to exhibit data
from the web that relates to cultural memory, and that the adoption of open
data and real engagement with the social aspects of the web will be integral to
this occurring.
Online metadata indexes make collections and objects within collections
findable. The serendipity of the case study, Retronaut, and the fun and relaxed
way that the site and its associated social networking platforms engage with
audiences is illustrative of this potential.
Notes: http://theculturalheritageweb.wordpress.com
Thoughts: @nicoleebeale
References:
Andermann, J., and S. Arnold-de Simine, 2012. Introduction: Memory,
Community and the New Museum, Theory Culture Society, 29(3); 3-13
Pett, D., 2012. Use of Social Media within the British Museum and the Museum
Sector. In: Bonacchi, C, (ed.) Archaeology and Digital Communication: Towards
Strategies of Public Engagement. Archetype Publications: London, UK: 83-102
Robinson, H., 2012. Remembering things differently: museums, libraries and
archives as memory institutions and the implications for convergence,
Museums Management and Curatorship, 27(4): 413-429
Woodhorn, 2013. Time traveller to open up archives, Woodhorn: Museums
and Archives Northumberland, 5th December 2013. Available at:
http://www.experiencewoodhorn.com/time-traveller-to-open-up-archives/
Accessed 16th February 2014
52
Since its inception 25 years ago the World Wide Web has facilitated an explosion of
information unprecedented in its scale. Many websites are said to embody the Webs
censor-free, information anarchy. This has led to widespread anxiety about the fidelity
of some of this information and its potential to do harm. As the myth of the Digital
Native is debunked, young people, it is now claimed, are exceptionally vulnerable to this
new danger; they are declared nave and lacking in the crucial new literacies needed to
discern fact from fiction.
This work investigates the reality of these fears and claims. Drawing on case studies
from two very different institutions a state sector FE college with a largely white
working class intake and a prestigious independent fee paying school with an ethnically
diverse intake the research explores how groups of 16-18 year olds access, interpret
and use information. It focusses on controversial information involving issues such as
immigration, climate-change, and government cover-ups and makes use of multiple
methods including interviews and workshops as well as proxy servers to digitally record
everything young people do on the Web. The data suggests highly differentiated, classbased practices grounded in the social, material and cultural contexts of everyday life
that can be better understood by combining Bourdieusian and Foucauldian theoretical
frameworks.
Acknowledgement: The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and
contributed to by AHRC, ESRC and MRC
$
Malware doesnt propagate like viruses any more, so
epidemic models need to be changed
Imagining the criminal as the pathogen changes the
focus to the environment in general
A more hostile environment makes cybercrime less
worthwhile to participate in
Bad security practices are a problem for the whole
Web, not just an individual network
Web
Science
54
"
'
$
'
"
$
*
(
*
)
$
)
.
*
*
11
$12
341
1
*
*
$
0
$
$
$
$
$
+ $
!
!
'
'
'
$
$
(
)
*
,
0
$
.
$
/*)"
Introduction
On the 23 of April 2013, a fake tweet was sent from the White House's twitter
account. A few minutes later the price of the Standard and Poor's 500 index,
representing 500 of the highest valued companies in the US dived by nearly 1%.
1 tweet accounted for the loss of nearly 1% of the value of the US Economy.
In a sense this is not surprising, financial news services like Bloomberg and
Reuters regularly update and publish indices of media sentiment towards
stocks. Over the last 4-5 years researchers have begun to look for models of
media sentiment which can be used to predict prices. The results of this
research are, however, generally quite disappointing.
The reason for this is that the way language relates to offline events is a
difficult thing to model. Language is temporally uncertain, in that a
statement can be about an event in the future, past or present. Also as yet
there is no literature which describes how to model word frequency
movements over time.
The aim of this PhD is to define a methodology that tackles these issues.
56
Project Aim
The purpose of this thesis is to identify research gaps within the Systems of
Innovation literature over the past 33 years. This was to identify gaps and
formulate research questions. It was then synthesised into a
comprehensible framework of the ICT Innovation System. Agent-based
modelling was chosen as it is an underutilised methodological approach.
Three case studies were subsequently mooted from the relationships of the
framework in order to help policy makers make decisions using this systemic
perspective.
Christopher Hughes
Dr Lorraine Warren
Dr Jason Noble
T ERHII N URMIKKO
D R J ACOBB D AHL
D R K IRKK M ARTINEZ
58
D R G RAEMEE E ARL
of competence.
all are
e provenanced
d to archaeological sites
within modern day Iran.
Earlier attempts to decipher the proto
too-Elamite
script have taught us many things about the
nature of use and layout of documents, but the
language
e eludes us.
C.J.Phethean@soton.ac.uk
VALUE
This framework has been produced as a result of a mixed methods investigation into what influences the creation of value on social media for
charities. It goes beyond existing free analytic services that rarely take into account the context of the organisation in question, and instead focuses
on what their aims are, how they relate to their supporters' reasons for using social media to connect with a charity, and how these aspects are
reflected in actual behaviour on the sites.
1 SOC
1.
SOCIAL THEO
THEORI
HEORIES
ORIES
ES
On the web, behaviour are a crystallisation of existing behaviour studied in social science.
- Important phenomenon on the web and in the society in general is the tendency of
change instead of static state [13] [5]. This particularity is exacerbated on
Information Stream where life of an URL cited on Twitter is around 2.3 hours [2].
Aim:
Linking theoretical reections about social behaviour to their methodological implications with
the new form of data available. Theses links are created in order to develop practical solution
to understand group formation on Social Network Sites, specically on Twitter.
Social
Processes
60
Dynamic
Network
Micro-Blogging
Behaviour
Time
Quantitative
Production
Data
Qualitative
Access
Databases
s
2. TYPE OF DATA
Two
T
o main
i typ
t pe off dat
type
data
d ta to
t stu
study
tud
dy iinteractions
nter
t acti
actions
tions on tth
the
he web
he
w
web:
eb:
b
- The combined impact of scale, breadth and complexity increase the diculty to
nd useful information.
- Diculty to verify the coherence of dataset and be sure the information measured
are eectively the one supposed [10].
4 FRA
4.
FRAGME
ENTATION
EN
NTA
TA
ATION
N
3. BIG DATA
- Lack of unication of data and they are not focused on individuals making
the comparison overtime dicult.
Computer Analysis
C
Network analysis
Algorithm Analysis
REFERENCES
me and
d social
social
ocial
ial theory
theory
theory.
[2] Bitly blog - you just shared a link. how long will people pay attention?
http://blog.bitly.com/post/9887686919/you-just-shared-a-linkhow-long-will-people-pay, September 2011.
[3] E. Bakshy, J. M Hofman, W. A Mason, and D. J Watts. Everyones an inuencer: Quantifying inuence on twitter.
In Proceedings of the fourth ACM international conference on Web search and data mining,pages 6574. ACM, 2011.
[4] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user inuence in twitter:
The million follower fallacy. In 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 2010.
[5] J. Cho and H. Garcia-Molina. Estimating frequency of change. ACM Transactions
on Internet Technology (TOIT), 3(3):256290, 2003.
5 DISCO
5.
DISCONNECTION
CONNE
CONN
NECTION
- Computer science has useful tools to analyse dataset and developing a epistemological approach
of the 4th paradigm
- "New scientic methodology based on the power of data-intensive science, understood as the
capturing, curation, and analyse of large data" [12]
- But, there is a risk of understanding the human behaviour as the best algorithm results,
developing a human-engineering without understanding the meaning of the interaction
- The solution is inter-disciplinary : connecting the social science theories to the computer science.
- Theoretically: Social sciences bringing already conceived concepts and reections about
notion of network and time within human, giving integrate understanding of interaction and
- Methodologically: Finding solution about the implications of big data with computer side
conception (scalabilty) but also by having a comprehension of the meaning of data.
- Both disciplines will benet of the interaction
[6] B. Latour. Reassembling the social. Oxford University Press Oxford, 2005.
[7] R., Rogers. The end of the virtual: Digital methods. Amsterdam University Press, 2009.
[8] M. Savage, and R. Burrows. The coming crisis of empirical sociology. Sociology 41(5):885-903, 2007.
[9] M. Savage, and R. Burrows. Some further reections on the coming crisis of empirical sociology.
Sociology 43(4):762, 2009.
[10] M. Thel
Thelwall
wall. Interp
Interpreting
reting socia
sociall scie
science
nce li
link
nk ana
analysis
lysis resear
research:
ch: A theore
theoretical
tical framew
framework
ork.
Journal
Jour
nal of the A
America
merican
n Society
Society fo
forr Info
Informatio
rmation
n Scie
Science
nce and
and Tech
Technology
nology 57(1)
57(1):60-68
:60-68, 2006.
2006
[11] J. Urry. Mobile sociology. The British journal of sociology, 51(1): 185-203, 2000.
[12] J. Weng, E. P Lim, J. Jiang, and Q. He. Twitterrank: nding topic-sensitive inuential twitterers. pages 261-270
in Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010.
[13] J. Wilbanks. I have seen the paradigm shift, and it is us. In T. Hey et al. (Eds.), The fourth paradigm (pp. 209-214).
Redmond,
Redm
ond, W
WA:
A: Mic
Microsoft
rosoft Resea
Research,
rch, 2
2009.
009.
[[14]] JJ.,, Yang, and JJ. Leskovec. . Patterns of tempora
p
l variation in online media. Pp.
p 177-186 in Proceedings
g of the fourth ACM
M
i t rnatio
inte
ti nall conference
f
on Web
W b search
h and
d dat
d ta mini
i ing. AC
ACM
M 201
M,
2011
1.
- Social science :
- Using existing and adequate tools instead of creating new one [8][9]
- Having the opportunity to use dataset with new kind of information to test the existing
theories.
- Computer science:
- Using concepts allowing the understanding of human behaviour upon the algorithm
perspective.
- Knowing which variables is important to store, analyse and understand.
Olivier
er PHILI
PHILIPPE
op1e10@ecs.soton.ac.uk
Methods
The study was comprised of three stages:
Background
Medicines and drugs are subject to national and state/federal
regulation. The misuse, illegal consumption and purchase of
drugs and medicines is not a new phenomenon, but it is one
which the Web may enable or magnify, opening up as it does
access to online information and purchasing.
The provision, purchase and supply of prescription only
medicines are typically regulated by national or state law. This
can vary between countries; each with their own licensing body
(e.g. UK The Medicines and Healthcare products Regulatory
Agency (MHRA) and the US The Food and Drug
Administration (FDA). Current UK medicines legislation is
comprised of the Medicines Act 1968 and approximately 200
statutory instruments. Much of this legislation has not kept up
with developments online and the Web is notoriously difficult to
police
Findings
The forum and survey data show the wide variety of medicines
available to buy online, and that the Web is a source of discussion
and debate about such purchasing. These data also indicate that
there are websites that do not follow regulatory standards in
requiring prescriptions and consultations for prescription only
medicine.
The interviews show that people talk about the purchasing medicine
online in relation to other consumptive behaviour on and offline.
People that have purchased medicine from the Web presented
justifications for their behaviour. Such justifications involved
availability, convenience and need to support the online purchasing.
Impact / deployment
This work has been undertaken in collaboration across different
University Faculties and groups such as Electronics and Computer
Science, Health Sciences, Social Sciences and Social Policy, and
Law. This research will describe and understand the purchase of
prescription only medicine from the Web and help to develop
methods for analysing this phenomena.
This research is pioneering because there is currently no qualitative
understanding of why individuals choose to purchase prescription only
medicine from the Web. This will be the first study to apply
sociological and criminological theories to Web phenomena of this
type. Working closely with the UK regulatory agency, the MHRA, this
project seeks to inform patient safety, policy decisions, regulation,
and in particular to contribute to future public advise and advertising
campaigns from this agency.
to pro
procure
r cure them.
them
h . What
What is legitimately available
avai
is constantly shifting and the Web
allowing
sales toAcknowledgement:
be conducted outside
doe
do
doe
does
oes not
no
ott always
alw
a
al
llw
wa
ays
ay
ys
ys reflect
rre
refle
efle
flle
lec
ctt this,
th
th
thi
hiis, a
all
lllow
ow
owi
wiing sale
Theauthorised
Digital Economy Programme is a Research Councils UK
forms
supply.
for
orrms
m off supply
l .
cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC
62
CLEANWEB UK REPORT
How British Companies are using the Web for Economic Growth & Environmental Impact
SONNY MASERO, JACK TOWNSEND
https://eprints.soton.ac.uk/369513/
@JackTownsend_
jack@jacktownsend.net
Conceptualising Glo
Global
obal Justice Networks (GJNs
(GJNs)
Traditionally known as a social
social movement, it seems that global justice
justi
activism is rather a more complex structure, one made up of networks of
local and transnational actors with a variety of agendas and unique
collective identities. Routledge and Cumbers (2009) describe GJNs to be
a series of overlapping, interacting, competing, and differently-placed
and resourced networks made up of a variety of political actors, from
environmental campaign groups to radical anarchists, trade unions to gay
rights proponents who come together periodically as coalitions of
contention against the neoliberal agenda and visualise a connected global
citizenry attempting to influence national policy in both their home
countries and overseas through advocating the causes of others. How
these activists use the Web is of great importance to the creation and
maintenance of such networks.
References:
Routledge, P., & Cumbers, A. (2009). Global Justice Networks: Geographies of
Transnational Solidarity. Manchester University Press.