Professional Documents
Culture Documents
Web Science
Centre for Doctoral Training
The Centre for Doctoral Training in Web Science is
funded by the EPSRC, and underlines Southampton's
pre-eminence in this new research discipline. Web
Science has an ambitious agenda. It is inherently
interdisciplinary as much about social and
organisational behaviour as about technology. Its
research programme targets the web as a primary focus
of attention, adding to our understanding of its
architectural principles, its development and growth, its
capacity for furthering global knowledge and
communication, and its inherent values of
trustworthiness, privacy and respect for social
boundaries. The first year of the training programme is
a taught MSc and includes short courses and project
work tailored to each students research interests. This
is followed by three years of challenging and original
research at PhD level.
This booklet details the current MSc students' academic
and professional backgrounds along with their research
plans for the future.
It also includes a research poster from each of our
enrolled PhD researchers.
1418
"#$
%&#
'
($
)* + ,
).
"/
%*.
&)(
P P!013 17
//
7:77 #7$. #$ 7+
7+#(:7
"
/#5*6
8 (:./,77 7#7</7$.,, $:
%:#(%#:
#(%/
*,(: ,7.7#<,# $.
#&!/&#(:#,
#%")
#:&8< $787,
,&8
76
7&8,77#$
'
$"/%
7#,#. %#7+% 7# #. 7
)*
: .#7,# $7:
97
777 ,7#&8<7#7:##7
/
9#&
#. :#*:%;
*: 7+#(7#:7< $.
+77#7#:*7# 4!C'
D7 # 7?E/77#7#7 @
$.6#/7> #F7
#7;%;
#,7.$7$#(&8< $. @
##7. #:#(7, (
)&
(###.,7<7#,## #,7
&
5% 7=75</7 =>#/:?
'
:#. 777/ (:
&$(/?7( # #,7/ ,7
7#&
7&%
P P!20122016
#7
,7#7,77<#(:# @
77#:
8#7
,7. .7+## .# #:
+#
&8#7:
/# %/&
!4
& &/
**@
/%:#7< #,7#%7#
.7#77##,#:7+#(#7$
!!
$7#<;#7 7# .K :79
8F7
!'
&8J7#7 #$
!-
&
+# # 7.:8# #, @
7.*77</.@8
!0
).#&/%
./# 7@/. 7 8 :
!1
8: &%%
: #:#,$
!2
P P!20112015
8 # 7#,#$
%
#;
!3
; $7<#:.7J*##
'4
/ .$: :
'
6 (:<,77#7:$#:&8
'
#(
,7#7 #7,7* #7
'!
&7,7% :$/#$,7##%/$ @
8##K#7$ :?
''
'-
/:G$H
'0
%&
9,:#,<$7#$/, 97+#(
'1
8%
'2
)#
:::7&7 / 7# %#7:
'3
D
/#:
-4
#$777&8
%+;
%+"
:: 8 % 7 :$#&8#7$
-!
& "
7J::#:7
-'
--
#$/J.#/7
-0
/#7,#%*%
7@ #+#(./7$7<:7
,,## $(:
-1
#*
7 : ,#77.7#7#7#
-2
/#7,#
%%
:; . #/#78 #:7
-3
%+/& , : ,,#:+7@
: ,,#. 7,&8
04
**
$:.#7&8
)(&
&7/&8$7#78 7$?
9, #:*.&8 8 )77+#(
0!
# %
,&
Neil AMOS
Nsa1g14@soton.ac.uk
@AmosNeil
Edmund BAIRD
eb16g11@soton.ac.uk
Nicholas BENNETT
nb1g11@soton.ac.uk
Flavia Dinka
fmd2g11@soton.ac.uk
Nicholas Fair
N.Fair@soton.ac.uk
www.linkedin.com
/in/nicfair
www.nicfair.co.uk
Paul GILBERT
pig1g14@ecs.soton.ac.uk
After graduating with a First Class degree in Web
Technology four years ago, I moved to central London to
pursue a career in online design and development. Over the
next 4 years I worked for a number of top creative agencies
as a Front End Developer, then finally Lead Developer for
Chelsea Football Club. I have been fortunate to design and
develop online solutions for global brands such as Estee
Lauder, EA, Panasonic, Virgin and Chelsea FC.
Briony GRAY
big1g11@ecs.soton.ac.uk
I graduated with a BA in Geography from the University of
Southampton and I became more interested in virtual
geography throughout my degree. This covered areas such
as disaster management, the emergence of the web
affecting countless aspects of geography, and the
development of new data collection methods and
technology to aid with geographical issues.
My research will explore how and why web accessibility
affects populations in both physical and human ways.
Human geography has become more integrated with Web
Science since the development of technologies such as
satellite imaging and disaster management prediction
systems.
Accessibility to the web is important to global communities:
divisions of economic standing, social demographics and
governmental policies play a large role in the availability of
vital information surrounding natural hazards. Furthermore,
I am interested in the applications of real geographic data
to gaming platforms, and how this can be utilised not only
for games and digital marketing, but also harnessed in new
and experimental pursuits of disaster management and
modelling.
Sarah HEWITT
sh9g14@ecs.soton.ac.uk
Through the Open University, I gained a BA (Hons) in
English Literature with Art History, and then completed a
GTC in Secondary Education (English with Drama) at Exeter
University. Since then, I've worked as an English teacher
and Head of Media.
My interest in Web Science centres around the concepts of
democracy and power. I spend a lot of time on twitter
engaging with conversations about education, ranging from
pedagogical theory to Ofsted. Education has always been
an area of great debate and often contention, but the arrival
of social networking, blogs, and comments following
articles published on-line has, I believe, given the people on
the front line i.e. teachers a voice that can and has been
heard by those involved in deciding government policy.
Taekyun KIM
tk1c09@ecs.soton.ac.uk
I completed my Bachelors degree in Computer Science in
Sungkyul University in Korea and Masters degree in
Software Engineering at the University of Southampton. I
have done my undergraduate final project for Shopping mall
with Ajax and JSP in 2003 and Master degree dissertation
was Case study; compare and contrast proof-based versus
model-based model checking.
I am interested in peoples different behaviour online and
offline. People sometimes show completely opposite way of
behaviour online which they dont act in real life. I would
like to research why people act differently online and what
they would get if they are showing different behaviour
between online and offline.
Oluwadolapo MAJEKODUNMI
oam1g14@soton.ac.uk
Rafael MELGAREJO
rm2e14@soton.ac.uk
Colin PATTINSON
cogp1g14@soton.ac.uk
@taylorkeisha
www.webnetthings.com
Gefion THUERMER
gt2g14@ecs.soton.ac.uk
Tobias M. Eckrich
@GefionT
Niko TSAKALAKIS
nt4g14@ecs.soton.ac.uk
Jack WEBSTER
jw30g11@ecs.soton.ac.uk
Prior to joining the Web Science CDT, I studied Music at the
University of Southampton where I primarily focused upon
musicology, the academic study of music, as well as
developing as a jazz guitarist and musical performer. My
undergraduate dissertation channelled me towards the
study of the Internet and World Wide Web. I explored the
online production and consumption of British hip-hop and
rap music on YouTube; in particular, I focused on the offline
spatial experience of producing and consuming music
online. I graduated with first-class honours and won the
Edward Wood Memorial Prize for best Music student.
My interest in Web Science grew out of my undergraduate
dissertation. I am interested in challenging notions of
placelessness on, and as a result of, the Web and assert the
importance of offline spatial experience to online activity.
!"#"$%&'()*"#+,-(.(/!).0(
!
"#$%! &'! %#(! '&)&*$+&%,! -(%.((/! %#(!
0+&1$2,! 03*&2&('! 34! %#(! %30! '&5! '32&$*!
/(%.3+6&/7! '&%('! 89:9;! &/! %#(! 2*$<'('!
%#(,!<'(=!
!
!
!"#"$%&'()*"#+,-(I(/!)I0(
"#$%! &'! %#(! '&)&*$+&%,! -(%.((/! %#(!
0+&1$2,! 03*&2&('! 34! %#(! %30! '&5! '32&$*!
/(%.3+6&/7! '&%('! 89:9;! &/! $@@+(''&/7!
T U! + ( 2 3 ) ) ( / @ $ ? 3 / '! 3 4! % # (!
V/43+)$?3/! O3))&''&3/(+'! WP2(!
8VOW;! XL+&1$2,! /3?2('! 23@(! 34!
0+$2?2(N=!!
!"#"$%&'()*"#+,-(J(/!)J0(
!
>+(!%#(+(!$/,!+(23))(/@$?3/'!34!%#(!
V/43+)$?3/! O3))&''&3/(+N'! WP2(!
8VOW;! XL+&1$2,! /3?2('! 23@(! 34!
0+$2?2(N!F!.#&2#!$**!0+&1$2,!03*&2&('!@3!
/3%!$@@+(''=!!
!
!"#"$%&'()*"#+,-(K(/!)K0(
(
>+(! %#(+(! $/,! %#()('! 34! &/43+)$?3/!
$@@+(''(@! &/! $**! %#(! 0+&1$2,! 03*&2&('!
/ 3 % ! & / 2 * < @ ( @ ! & / ! % # ( ' ( ! T U!
+(23))(/@$?3/'!4+3)!%#(!VOW!O3@(=!
!
!
!).(!"#*42(!
Y#(! $/$*,'&'! '#3.(@! %#$%! '&)&*$+&%,!
.$'! *3.! -(%.((/! 9:9! &/! %#(! 2*$<'('!
%#(,!<'(!/L9IMN0C!!
Y#&'! .$'! *$+7(*,! @<(! %3! @&[(+(/2('! &/!
4 $ - 5 * $ 5 " F! = * - & + , - $ 4 8 2 6! $ / @!
"4$?,%$+,-!-(%.((/!9:9C!!
!
!)I(!"#*42(!
9&)&*$+&%,!.$'!4$+!#&7#(+!-(%.((/!9:9!
&/! %(+)'! 34! %#()('! %#(,! $@@+(''(@!
/OI9L.N0@((
Y#&'!'#3.(@!%#$%!$*%#3<7#!%#(!9:9!<'(!
@&[(+(/%! 2*$<'('F! %#(,! $&)! %3! 23/1(,!
%#(!'$)(!&/43+)$?3/C!!
!
!)J(!"#*42(!
Y#(+(! .(+(! \! VOW! +(23))(/@$?3/'!
.#&2#! /3/(! 34! %#(! 9:9! $@@+(''(@C!
]3.(1(+F! &%! .$'! </2*($+! .#(%#(+! %#&'!
.$'!-(2$<'(!%#(,!.(+(!/3%!$00*&2$-*(!
3+! -(2$<'(! %#(! 9:9! #$@! '&)0*,! 4$&*(@!
%3!&/2*<@(!%#()!&/!%#(!0+&1$2,!03*&2,C!!
!
!)K(!"#*42(!
>/$*,'&'! $*'3! '#3.(@! %#(+(! .(+(! T!
%#()('! .#&2#! $**! I! 9:9! $@@+(''(@!
.#&2#! .(+(! /3%! 0+('(/%! &/! %#(! VOW!
O3@(A! Y#(! 0+32(''! 34! <0@$?/7! %#(!
03*&2,F!9:9!'0(2&H2!4</2?3/$*&%,F!.#$%!
X&/43+)$?3/N! 23/'&'%(@! 34! ! $/@! #3.!
9:9!+(2(&1(!&/43+)$?3/C!
!).R(:4$*#"(:,D"%$5"(((
:,-&4*#8,-((
Y#&'! 0+3G(2%! 23/2*<@(@! %#$%! .#&*'%! %#(!
'&)&*$+&%,! -(%.((/! 0+&1$2,! 03*&2&('! 34!
%#(!%30!I!'32&$*!/(%.3+6&/7!'&%('!89:9;!
&/!%#(!2*$<'('!%#(,!<'(!&'!*3.F!'&)&*$+&%,!
&/! %(+)'! 34! %#(! %#()('! %#(,! 231(+! &'!
#&7#F! &/@&2$?/7! %#$%! '%$/@$+@&'$?3/! &'!
03''&-*(F! -<%! -,! %#()(! +$%#(+! %#$/! -,!
2*$<'(C!!
!
!
!)IR!
P*2*%"(Q,%<#(((
1"2',3,4,56(
>!23)-&/$?3/!34!2'"7$+&($-$46#8#($/@!&%,##93,&*7"-2(#2%*&2*%"(2'",%6(.(+(!<'(@(%3A!!
!
BC! ! D$)&*&$+&E(! %#(! +('($+2#(+! .&%#! %#(! @$%$F! &/! %#&'! 0+3G(2%! &%! .$'! %#(! H+'%! *$,(+! 34! %#(!
0+&1$2,!03*&2&('!34!%#(!I!)3'%!030<*$+!'32&$*!/(%.3+6&/7!'&%('!89:9;!7*3-$**,C!
!
JC! !K&1&@(!%#(!L3*&2&('!&/%3!2*$<'('!&/!3+@(+!%3!)($'<+(!'&)&*$+&%,!-(%.((/!2*$<'('!<'&/7!!!!!
M$22$+@N'!O3(P2&(/%!43+)<*$!8Q('($+2#!R<('?3/!B;C!!
!!
SC! 9($+2#! 43+! %#()('! $)3/7! %#(! 2*$<'('! <'&/7! TU! +(23))(/@$?3/'! 4+3)! %#(!
V/43+)$?3/! O3))&''&3/(+N'! WP2(N'! 8VOW;! XL+&1$2,! /3?2('! 23@(! 34! 0+$2?2(NC! Y#('(!
+(23))(/@$?3/'!.(+(!<'(@!%3!@&1&@(!%#(!2*$<'('!&/%3!%#()('C!!
!
TC! K(H/(! %#(! '230(! 34! ($2#! +(23))(/@$?3/F! .#&2#! $**3.(@! %#(! +('($+2#(+! %3! '%$%(!
2$%(73+&2$**,! .#(%#(+! $! 0+&1$2,! 03*&2,! #$@! &)0*()(/%(@! %#(! +(23))(/@$?3/! 3+! /3%C!
9&)&*$+&%,!.$'!%#(/!)($'<+(@!<'&/7!M$22$+@N'!O3(P2&(/%!43+)<*$!8Q('($+2#!R<('?3/!J;C!
!
ZC!V@(/?4,!&4!$/,!34!%#(!TU!VOW!%#()('!.(+(!/3%!0+('(/%!&/!$/,!34!%#(!03*&2&('!-(2$<'(!
E(+3!2*$<'('!.(+(!23@(@!&/%3!%#()!8Q('($+2#!R<('?3/!S;C!!!
!
IC!V@(/?4,!.#(%#(+!$/,!34!%#(!9:9!23/%$&/(@!%#()('!34!&/43+)$?3/F!.#&2#!.(+(!/3%!&/!
%#(!23@(!-(2$<'(!%#(+(!.(+(!2*$<'('!/3%!23@(@!&/%3!%#()('!8Q('($+2#!R<('?3/!T;C!!
Emma Cradock
erc1e10@soton.ac.uk
10
!"#$"%&'($)*$+,$"-'.#'&*/")%'0*1/"#/2#($3$%-,#
*$14&")5$+#%/#60$,(#-#)%'/"3&'#2/0"(-1/"#2/'#-#
20%0'+'/8509-"#:&6;<#
+"2"7%'(E"]^&85$"A(
S87>609#]68#
=.#($))&'%-1/"#>-)#$"%&"(&(#2/'#%5/)&#$"%&'&)%&(#$"#($3$%-,#*$14&")5$+#-"(#)5-+$"3#-#2/0"(-1/"#/2#-#+'/8509-"#20%0'/'#%5&#:&6?#%5'/035#
&"*/0'-3$"3#($3$%-,#'$35%)#-"(#'&)+/")$6$,$1&)#-*'/))#-#3,/6-,#*/990"$%.<#@5$)#2/*0)&(#/"#-"#$"%&,,&*%0-,,.#*5-,,&"3$"3#($)*0))$/"?#'-%5&'#%5-"#
-"-,.)$)#/2#A0-"1%-1B&#/'#A0-,$%-1B&#C"($"3)?#01,$)$"3#-#*/9+'&5&")$B/(.#/2#$"%&'($)*$+,$"-'.#,$%&'-%0'&#-"(#-#'&,&B-"%#*-)&#)%0(.<#
_=&>="&`#
D$3$%-,# *$14&")5$+# -"(# %5&# +'/8509-"# 20%0'&# /2# %5&# :&6# 5-B&#
6&&"# 2&'B&"%,.# (&6-%&(?# 2/'9$"3# ($B&')&# $"%&'+'&%-1/")E# /",.#
"/># $)# -"# &9&'3$"3# -))/*$-1/"# 6&$"3# *,&-',.# 9-(&?# 9/B$"3#
6&./"(#-"#$9+,$*$%#'&,-1/")5$+<#!#*/9+,&F#$))0&#$"#$%)#/>"#'$35%?#
($3$%-,#*$14&")5$+#"&&(&(#%/#6&#C')%#(&*/")%'0*%&(#-)#$%#$)#-#%&'9#
+'&($*-%&(# /"# */"*&+%0-,# (&6-%&)?# )0*5# -)# =/))6&'3&'# !"# $%&#
GHIIJK# -"(# L$66,&# GHIMIK?# >5$*5# -,$3"# %/>-'()# &F%&")$/"# /2#
+5.)$*-,,.# '//%&(?# "-1/"8)%-%&# *$14&")5$+<# !)# )0*5# ,$N,&#
'&*/3"$1/"# $(&"1C&)# )5-+$"3# -# +/)%8"-1/"-,# *$14&"'.# &F$)%&"*&#
>$%5#)/*$/8%&*5"$*-,#%5&9&)#%5-%#$"O0&"*&#%5&#:&6#$%)&,2<##
#
P$Q&>$)&?# %5&# */"*&+%# /2# -# +'/8509-"# :&6# $)# %&"%-1B&,.#
&F+'&))&(#-)#20"(-9&"%-,#%/#$%)#20%0'&<#R&%?#%5$)#$)#-,)/#(/9$"-%&(#
6.# -# +'&))$"3# &+$)%&9/,/3$*-,# B$)$/"# /2# -# S&9-"1*# :&6# T<IE##
20%0'&#($'&*1/"#$)#,-*&(#>$%5#-96$30$%.<#@5&'&2/'&?#U#*/")%'0*%&(#
-#%5&/'&1*-,#-'309&"%?#$"O0&"*&(#6.#%5&#+5$,/)/+5$*-,#+-'-($39#
/2# -# 5&'9&"&01*# *$'*,&?# *'&-1"3# -# ($)*0))$/"# %5-%# 9/B&(# 6-*Q#
-"(# 2/'%5# 6&%>&&"# %5&# $"($B$(0-,# */9+/"&"%)# /2# ($3$%-,#
*$14&")5$+#-"(#%5&#>5/,&#/2#%5&#+'/8509-"#:&6<#
+"5#955"68#
+"5#955"68
#
!#%5&9&#)033&)%&(#>-)#'&8&"B$)$/"$"3#%5%0'&#/2#-#+'/8509-"#
:&6#6.#3'/0"($"3#$%#$"#($3$%-,#*$14&")5$+?#'-%5&'#%5-"#)&9-"1*)<#
@5$)# 5$35,$35%&(# */"O$*1"3# &+$)%&9/,/3$*-,# +/)$1/")E# /"&#
%&*5"$*-,,.# (&%&'9$"$)1*?# %5&# /%5&'# )/*$-,,.# )5-+&(<# U#
(&*/")%'0*%&(# *0''&"%# (&6-%&)# /2# ($3$%-,# *$14&")5$+?# A0&)1/"$"3#
%5&$'# '/60)%"&))<# U# 2/0"(# %5&)&# %/# 6&# -96$30/0),.# -,$3"&(# %/#
)*5/,-')5$+# /2# *$14&")5$+# $%)&,2?# )0*5# -)# @<X<# =-')5-,,# GMYZIK?#
*'&-1"3#($3$%-,,.#&F%&"(&(#)*+,-.$%#*$14&")5$+?#'-%5&'#%5-"#-*%0-,#
($3$%-,# *$14&")5$+?# $"*/9+-16,&# >$%5# +'/8509-"# B$)$/"# -"(#
"&3-1"3#)/*$/8%&*5"$*-,#-"(#*/8*/")1%01/"-,#B$&>)<##
#
S0*5#(&6-%&)#2-$,&(#%/#,$"Q#($3$%-,#*$14&")5$+#%/#($3$%-,#'$35%)#-"(#
'&)+/")$6$,$1&)?#'&$"2/'*$"3#9.#+/)$1/"#%5-%#($3$%-,#*$14&")5$+#$)#-#
+/)%8"-1/"-,# */"*&+%?# '-%5&'# %5-"# [0)%# -# 6/,%# /"<# :5$,)%# 9-".#
"/%&>/'%5.# $"($B$(0-,)?# )0*5# -)# \&'"&')8P&&# GHIM]K?# -'30&#
)%'/"3,.# 2/'# )0*5# '&*/3"$1/"?# %5$)# '&9-$")# ,-'3&,.# -6)%'-*%#
'&3-'($"3#*$14&")5$+#)*5/,-')5$+<#U#-'30&(#%5-%#($3$%-,#*$14&")5$+#
*-"# 6&# '&*/")%'0*%&(# >$%5# -# (&C"$1/"# '//%&(# $"# )&,28
(&%&'9$"-1/"# /2# ($3$%-,# *$14&")# >5/# -'&# ($3$%-,,.# )$%0-%&(?# 60%#
3,/6-,,.#,/*-%&(<#@/#-**/9+,$)5#%5$)?#U#(&9/")%'-%&(#%5&#"&&(#2/'##
-# 2'-9&>/'Q# /2# *,-'$C&(# ($3$%-,# '$35%)# -"(# '&)+/")$6$,$1&)# /V)&%#
-3-$")%?#60%#($)1"*%#2'/9?#*/"%&9+/'-'.#509-"#'$35%)<#
#
Web 3.0
Digital Citizens, not
Semantics?
PASSPORT
E68#'95"68#
=.#*/"*,0)$/"#)033&)%&(#%5-%#%5&#B$)$/"#/2#-#S&9-"1*#:&6#-"(#
-#+'/8509-"#:&6?#*5-'-*%&'$)&(#6.#($3$%-,#*$14&")5$+?#-V/'(&(#
*,-)5$"3# &+$)%&9/,/3$*-,# -"(# /"%/,/3$*-,# +/)$1/")E# %/+8(/>"?#
%&*5"$*-,,.# (&%&'9$"$)1*?# -"(# 6/N/980+?# )/*$/8%&*5"$*-,#
'&B/,01/")?# "&*&))$%-1"3# 20'%5&'# &F+,/'-1/"<# W0'%5&'9/'&?# -#
+'/8509-"#:&6#-"(#+/)%8"-1/"-,#($3$%-,#*$14&")5$+#"&*&))$%-%&#
0"$B&')-,$)$"3#&A0-,$%.#/2#'$35%)#$'(#'&)+/")$6$,$1&)#/"#%5,/6-,#
)%-3&<##
#
@5$)# $"O0&"*&(# 9.# '&*/")%'0*1/"# -"(# )5-+&(# $%# %5'/035# +/)%8
"-1/"-,#-"(#)/*$/8%&*5"$*-,#+'$"*$+,&)E#$9+/'%-"%#2/'#)/,$($2.$"3#
-#+'/8509-"#B$)$/"#2/'#%5&#:&6<#X.+/%5&1*-,#2'-9&>/'Q)#>&'&#
-,)/#2/'9&(?#$"%&"(&(#%/#9-+#/0%#%5&#*5-"3$"3#"-%0'&#/2#($3$%-,#
*$14&")5$+#-)#>&,,#-)#($3$%-,#'$35%)#-"(#'&)+/")$6$,$1&)<#
!(
F&>8&>5GH&&I(D*(JKL1MN*(OD".(F&>8&>5GH&&(68(7$&(B&C(%7(KPQ(7$&(
A%57I(A>&5&87(%80(?979>&R*(S8Q("#$%&!'()(*#+%,!!%>#$(KL1M*((
!%>5$%''I(D*T*(J1UPLN*(-#.*%+/0#1!2+&!345#(6!-6(//7!(+&!480%$!
%//(9/*(E%.C>"02&Q(<8"=&>5"7,(V>&55*((
!655C&>2&>I(W*I(D6'C&>7I()*(!#X&%'I(Y*(JKLLZN*(:#)#8(6!-#.*%+/0#1,!
;0%!<+8%$+%8,!345#%89!(+&!=($.5#1(.4+>!E%.C>"02&I(!%55%#$95&[5Q(
!SD(V>&55*(
Y"CC'&I(!*(JKL11N*(:#)#8(6!-#.*%+/0#1!#+!350446/*(B%5$"82768Q(S@D\>!
!"#$%&'()*(+%,(-./01213456768*%#*9:;(
<8"=&>5"7,(6?(@697$%.A768(
B&C(@#"&8#&(+DE(
11
Web Science Doctoral Training Centre, 2 Mathematical Sciences, 3 Centre for Risk Research,
University of Southampton
Abstract
We aim to develop a ranking algorithm which can be easily adapted
to a wide range of alternatives such as digital products, online consumer choices or user behaviour.
We have used UK horse racing data between 2008 and 2010 as a
basis to explore this problem.
The algorithm used in this project is adapted from HodgeRank,
a topologically driven method for determining a global ranking of
alternatives from scores given by voters. It provides insights into
inconsistencies in the dataset and provides some measure of the
veracity of the ranking.
entries are missing. However, by considering the aggregated pairwise scores, less than 0.3% of entries are missing.
Global Inconsistencies: If there is a cycle of more than 3 alternatives which implies that i j k ... i, then the
pairwise scoring function is globally inconsistent.
1. Ranking Problems
Figure 3: Globally Inconsistent Pairwise Scoring Function
C=
HodgeRank attempts to reduce the impact of two specific challenges: subjectivity and incompleteness.
Subjectivity: Information used to solve ranking problems may
be subjective which can produce inconsistencies in the ranking
solution.
Incompleteness: Large databases are prone to containing a
significant number of missing entries. Solutions based upon
databases containing missing entries may be suboptimal if these
entries were complete
Both of these problems occur in horse racing. Races can be considered as subjective in two regards. Firstly, each race is different.
Some may be considered more difficult than others and some horses
may favour certain types of tracks.
Secondly, the competition in each race varies. Consider horses A
and B competing in two races. Due to the subjectivity of the races,
A finishes in a lower position in the second race. However, it finishes faster than B in both races. Intuitively we want to rank A
higher than B.
A complete dataset would have been formed if every horse raced
in every race. However, the dataset indicated that each race was
competed in by approximately 11 of the 26886 horses which ran
over the 3 years. Thus the dataset contained more than 99.96%
missing entries.
2. Pairwise Scores
The error between the optimal ranking solution and the aggregated
pairwise scores is the residual
R = Y 0s
The size of the residual measures how well the optimal score function matches the aggregated pairwise scores formed from all the
voters.
Applying Hodge Theory, we can decompose the residual into constituent parts which reflect different types of inconsistencies.
Local Inconsistencies: If the sum of the pairwise scores, in
a clockwise direction, along any triangle in the simplicial complex does not sum to 0, the pairwise scoring function is locally
inconsistent.
||R||
C
183.91 0.4461
21.41 0.4574
37.82 0.2866
||R||
C
1403.7 0.7898
115.59 0.7941
219.86 0.5171
The residuals showed that the betting market was relatively as accurate in predicting the outcome of races as the normalised finishing
positions. However, by examining the cyclicity ratios, we showed
that the market assumes that the outcomes of races are more consistent than previous results indicate.
8. Discussion
HodgeRank forms a global ranking of alternatives from a collection of local rankings and offers insights into inconsistencies in the
dataset.
Applying HodgeRank to horse racing data, we were able to compare
the accuracy of different variables as predictors. We were also able
to compare the level of inconsistencies in the outcomes of races and
the behaviour of the betting market.
Despite these strengths, the implementation of HodgeRank also
highlighted areas for further development.
The aggregated pairwise scores reduce the effect of the incompleteness problem. An entry is only missing if none of the voters have
scored both alternatives. In the horse racing data, over 99.96% of
7. Results
We applied HodgeRank to horse racing data over one and six
months concerning the outcomes of races and the expectations of
the betting market assigned to horses. Finishing positions (FP) and
normalised finishing positions (NFP) were used as outcome data
and log prices (LP) to quantify the expectations of the market.
s = 00Y
5. Optimisation Problem
6. Inconsistencies
HodgeRank relies on pairwise scores formed from the voters scores.
A score function s is assigned to each voter where s(i) is the
voters score of the i-th alternative.
||R||
||0s||
Several assumptions have been made in the HodgeRank methodology. For instance, every voter is assumed to be equal. We will
examine how these can be adjusted to individual ranking problems
and the effects of doing so.
We aim to build a more sophisticated version of HodgeRank which
will provide a useful tool for examining Web-based ranking problems.
12
Standards
.
Faranak Hardcastle , Supervised by Prof. Luc Moreau and Prof. Susan Halford
1.
4.
In order to enable the Web to grow to its full potential, the underlying technology
needed to be implemented in a similar way around the globe. Standards facilitate
this by providing unified technical specifications.
2.
Standards can:
Case study
The World Wide Web Consortium (W3C) is the leading standard setting body
producing guidelines, technical specifications and best practices for the Web. A case
study was conducted in which three W3C Working Groups were empirically analysed.
The Provenance, Tracking Protection Group and HTML Working Groups were chosen
as they can potentially have socio-political implication on the micro, meso and macro
scale.
Result in
unanticipated
socio-political
implications that
emerge later.
Piracy
BitTorrent
DeNardis (2013,p.64)
Lawsuits
They are also open to interpretation and different sets of legal, political, social and
economic interests and directions can shape the way they are specified.
EME
Free
speech
policy
Standards
zz
Law and policy are sometimes intertwined (e.g. by policy makers) in the design of
standards as an alternative way of enforcement.
Encrypted
Media
Extensions
!The charter fails to provide a clear and detailed outline by employing general
language that results in a wide scope, or vague process, leaving it open for
interpretation.
!The W3Cs own mission is interpreted in various ways. Whilst some actors
within the W3C, strongly believe that W3C should only be concerned with
technology and remain separate from policy, others believe that the work of W3C
should consider the social impact of the Web into the standardization process.
Free
speech
?
Managing Conflicts
Stakeholder
Interest?
Privac
y
?
Wiretapping
?
Standards
Conclusion
5.
3.
! Various stakeholders !
Diverse interests
! Getting the right balance is
challenging
Technical
Quality
Security
Customisation
al
Easy to
Digit l
ats implement
DRigigith
ts
h
Privacy
Rig
Ethics
6.
Standards
References
DeNardis, L. (Ed.). (2011) Opening standards: the global politics of interoperability. MIT Press.
DeNardis, L. & Raymond, M. (2013) Thinking Clearly About Multistakeholder Internet Governance. Paper presented at
eighth annual giganet symposium, Bali, Indonesia October 21st 2013. [Online] Available from:
http://www.phibetaiota.net/wp-content/uploads/2013/11/Multistakeholder-Internet-Governance.pdf
Cartoons created by Matt Greoning
13
products
appropriately
Acceptable to everyone
Lack of a community
official
Clear legal concerns
fun
No legal concerns
Some safety information
Psychonaut expertise
No navigation expertise
Navigation expertise
The study concluded that just as there are different physical drug-taking spaces with distinct and dissimilar underlying values, so are there different
virtual spaces. It found that factors such as prohibitive regulation may hold influence over these spaces, particularly affecting the type of expertise to be
displayed and what kinds of narratives can be displayed. Several commentators have argued the need for further information surrounding the use of
novel psychoactive substances, warning against the dangers of rash and overly-harsh policy. This result adds evidence to support this, implying that
repressive policy prohibiting novel psychoactive substance use is not stopping the selling and buying of novel psychoactive substances, but
counterproductively increasing the potential for harm for those who buy them; both by limiting the inclusion of safety information and by criminalizing
users who have little desire to break the law. The study therefore identified a clear need for a deeper understanding into both how legal high
marketplaces are used by individuals and more broadly how the deep web is used as a space for deviancy and as a community.
King, L. (2013) Legal Classification of Novel Psychoactive Substances, in Dargan, P. and Wood, D. (eds.) Novel Psychoactive Substances:
Classification, Pharmacology and Toxicology. London: Elsevier, pp. 3-27
Meashem, F., Moore, K., Newcombe, R. and Welch, Z. (2010) Tweaking, bombing, dabbing and stockpiling: the emergence of
mephedrone and the perversity of prohibition, Drugs and Alcohol Today, 10 (1), pp. 14-21 Emerald [Online]
Ritchie, J. and Spencer, L. (1994) Qualitative data analysis for applied policy research, in Bryman, A. and Burgess, A. (eds.) Analysing
Qualitative Data. London: Routledge Press, pp. 173-194
14
!
!
!
"#$%&'(!)#*!+,-.'-&!/&!0&,12345!
65!"%$/!7%&8%!9!2:;;<=>?2-3-&@%(@1:!!
A#%,!"1.#4B/2-4C!D/(:!E/**/&2F!G-H"1.#4B/2-4C!A/2%!I%44/2!
!+2!3J#!"#$%&'(!!
!)#*!J%2!214K%(#,F!/32!!
!1.3%:#!*5!*12/#2!J%2!*##&!!
!B#45!21*3L#F!M/3J!$%&5!%,-.'&<!3J#!
3#(J&-L-</#2!*#J/&,!3J#!2(#@!;N>!
*12/#2!M#4#!/,#&'O#,!%2!%,-.3#42!-K!
3J#2#!3#(J&-L-</#2@!PJ#2#!M#4#!(%3#<-4/8#,!
%2C!(4#%'&<!.4-,1(32Q3--L2!*%2#,!%4-1&,!
3J#$F!12/&<!3J#$F!-4!%/,/&<!/&!4#2#%4(JF!-4!
,#B#L-.$#&3Q23%&,%4,/8%'-&@!0&,12345!
2#(3-4!R*5!"0G!G-,#S!%&,!(-$.%&5!2/8#!!
M#4#!%L2-!#T%$/&#,!.#4!*12/F!
!3-!<%/&!<4#%3#4!/&2/<J32!/&3-!3J#!!
2/$/L%4/'#2!*#3M##&!!
%,-.3#42@!
"#$%&'(!)#*!
P#(J&-L-<5!
%,-.3#,65!
!
612/!
!PJ#4#!%4#!3J4##!$%/&!!
3#(J&-L-</#2!3J%3!$%:#!1.!3J#!!
*%(:*-&#!-K!3J#!"#$%&'(!)#*C!!
!
! UVWC!RU#2-14(#!V#2(4/.'-&!W4%$#M-4:S!!
MJ/(J!.4-B/,#2!%!$-4#!#T3#&2/B#!M%5!-K!
,#2(4/*/&<!,%3%@!!
!
! X&3-L-</#2C!MJ/(J!%4#!#22#&'%LL5!%!B-(%*1L%45!
K-4!,#O&/&<!(-&(#.32!%&,!3J#/4!4#L%'-&2J/.2!
R%&,!(%&!*#!M4/Y#&!/&!X)A!-4!UVW"S@!
!
! "Z+U[AC!MJ/(J!/2!3J#!\1#45!L%&<1%<#!!
K-4!UVW@!!
SELECT ?business!
WHERE { ?sem_web_tech
swc:adoptedBy ?business }!
!
PJ#!(-$.%&/#2!MJ-!J%B#!!
%,-.3#,!3J#2#!3#(J&-L-</#2!J%B#!!
*##&!/,#&'O#,!/&!%!&1$*#4!-K!M%52@!
!
! E#%L!"#%4(J!K-4!"#$%&'(!)#*!*12/#2@!
! A/3#4%314#!,#3%/L/&<!*12/#2!12/&<!"#$%&'(!
)#*!3#(J&-L-</#2@!!
!
! 0&B#2'<%'&<!(L/#&32!%&,!.%43*!-K!
*12/#2!-`#4/&<!"#$%&'(!)#*!2#4B/(#2@!
! "#$%&'(!)#*!G-&K#4#&(#!A/232@!
! )aG!b#$*#42J/.!A/232@!
! +!2/<&/O(%&3!.#4(#&3%<#!-K!3J#!!
(-$.%&/#2!/,#&'O#,!J%B#!.%4'(/.%3#,!%3!!
-&#!.-/&3!-4!%&-3J#4!/&!3J#!,#B#L-.$#&3F!!
23%&,%4,/8%'-&!-4!4#2#%4(J!-K!3J#2#!3#(J&-L-</#2@!
!
! PJ#!$%/&!35.#2!-K!(-$.%&/#2!3-!%,-.3!3J#2#!!
3#(J&-L-</#2!%4#!/&!3J#!0&K-4$%'-&!]!G-$$1&/(%'-&!
"#(3-4@!
!
! +!$%^-4/35!-K!3J#!(-$.%&/#2!/&B-LB#,!/&!#%4L5!%,-.'-&!
%4#!#/3J#4!2$%LL!23%431.2!-4!L%4<#!(-4.-4%'-&2!M/3J!!
-B#4!;=F===!#$.L-5##2@!!
! G-$.%&/#2!+U_!12/&<!3J#!"#$%&'(!)#*F!!
3J#5!%4#!^123!$-4#!L/:#L5!3-!*#!12/&<!/3!!
21*3L5!*#J/&,!3J#!2(#@!
!
!
)aG!RN==cSF!"#$%&'(!)#*!G%2#!"31,/#2!%&,!!
d2#!G%2#2@!eX&L/&#C!+((#22#,!NfH+1<HN=;gh@!!
dUAC!JY.CQQMMM@Ma@-4<QN==;Q2MQ2M#-Q.1*L/(Qd2#G%2#2Q!!
!
)aG!RN=;NSF!)aG!X)AF!)aG!U#(-$$#&,%'-&F!!
)-4L,!)/,#!)#*!G-&2-4'1$@!eX&L/&#C!+((#22#,!a;Hi1L5HN=;gh@!
dUAC!JY.CQQMMM@Ma@-4<QPUQ-MLNH-B#4B/#MQ!!
!
!)aG!RN=;aSF!"Z+U[A!;@;!XB#4B/#MF!)aG!U#(-$$#&,%'-&F!)-4L,!
)/,#!)#*!G-&2-4'1$@!eX&L/&#C!+((#22#,!NfH+1<HN=;gh@!
dUAC!JY.CQQMMM@Ma@-4<QPUQ2.%4\L;;H-B#4B/#MQ!
!
)aG!RN=;g%SF!)aG!UVWF!)a(!4#(-$$#&,%'-&F!)-4L,!)/,#!!
)#*!G-&2-4'1$@!eX&L/&#C!+((#22#,!a;Hi1L5HN=;gh@!
dUAC!JY.CQQMMM@Ma@-4<QUVWQ!!
!
!
!
!
15
www.reddit.com/r/medicine
Research
Question
How do healthcare professionals
use humour to create and maintain
discourses of the healthcare
profession?
Results
Identification
Metaphor/
Similies
Berger (1995)
Most common literary
devices used in humour:
-! Metaphor and Similes
-! Metonymy and
Synecdoche
-! Parody and Intertextuality
+ Anecdotes (Powell and
Anderson, 2006)
!
Clarification
Enforcement
Methodology
Meyer (2000)
4 Rhetorical Functions of
Humour:
-! Identification
-! Clarification
-! Enforcement
-! Differentiation
Differentiation
Offensive metaphors
used to establish
differences with other
tribes, who were
characterised as
unlikeable. Focus on
surgeons and residents.
Metonymy/
Synecdoche
Synecdoche used to
identify features of
another tribe. Eg,
surgeons portrayed as
demanding.
Parody
Light-hearted
parodies of
relationships/
conversations
between patients
and professionals.
Identification
between
professionals who
have to deal with
similar events.
Inter
textuality
Images posted
within conversations
referencing pop
culture.
Identification
between those
understanding the
joke/reference.
Anecdote
Professionals swap
similar anecdotes
referring to
traumatising or
shocking events.
Creates
identification that all
experience similar
events.
Harsher parodies
of patients
bitching, often
involving
swearing or
infantile mimicry.
Enforces
expected roles.
Humourous
anecdotes clarify
socially
acceptable
norms and
behaviours for all
actors.
Anecdotes also
provide direct
discipline or a
person or whole
tribe, enforcing
expected roles
r/medicine identified as
opportunity for observation of
backstage discourse/activity
Non-participant ethnography of r/
medicine to test the rhetorical functions
of humour proposed by Meyer (2000),
to examine how users identifying as
healthcare professionals, patients and
medical students create and
maintain discourses of the
Humour as a
healthcare profession
Management Tool
Discussion
I havent used a
stethoscope since
1993.
16
17
@jessogden
Research Questions
Introduction
Institutional Repositories
"#$% I$<7% +.&H'(H0.3-% /$50&+'0/+$&% JDE&K% 3.)% '#$% &0123/$% '#3'% &(550/'% '#$6%
#34$%-$)%'0%'#$%8/$3H0.%09%3%L.$2%=+.)%09%&8#0-3/-*%38H4+'*M%$;#+<+'$)%'#/0(,#%
'#$% ,/*.!7.%/'-) #'/'8"#"/!) %6) '1'0"#,1) %7!$7!*% 90/% '#$% <$.$N'% 09% 3--%
&8#0-3/&%OPQ:%D.&H'(H0.3-%/$50&+'0/+$&%#34$%$6$/,$)%3&%&'/3'$,+$&%3)4083'$)%<*%
'#$% 05$.% 388$&&% 604$6$.'% ORQ7% 3.)% #34$% +.8/$3&+.,-*% <$806$% '#$% 908(&% 09%
+.+H3H4$&%90/%3&&$&&+.,%'#$%383)$6+8%/$&$3/8#%-3.)&835$%+.%<0'#%'#$%ST%3.)%'#$%
S@:% D.&H'(H0.3-% /$50&+'0/+$&% 3/$% .02% &$'% '0% <$806$% $4$/U60/$% 8$.'/3-% '0% '#$%
63.3,$6$.'%3.)%3&&$&&6$.'%09%(.+4$/&+'*%0('5('&:
G%2$3-'#%09%&08+0-0,*%09%&8+$.8$%3.)%'$8#.0-0,*%J@@"K%-+'$/3'(/$%38=.02-$),$&%
'#$% +65-+8+'% 8065-$;+'*% 09% '#$% +.'$/38H0.% <$'2$$.% '#$% V'$8#.+83-% 8353<+-+H$&W%
3.)%'#$%60H43H0.&%3.)%+.'$/$&'&%09%&08+3-%,/0(5&7%+.)+4+)(3-&%3.)%0/,3.+&3H0.&%
OXQ:% "#$% !"12/,1'-) 0"*,8/) '/0) *%1,'-) 3'-7"*% 09% '#$% 8/$3'0/&% J3.)% (&$/&K% 09%
'$8#.0-0,+$&% 3/$% +.'$//$-3'$)% OYQ7OZQ% 3.)% 3/$% =$*% '0% (.)$/&'3.)+.,% <0'#% '#$+/%
$40-(H0.%3.)%+6538'%O[Q:
Methodology
Data Collection
Analysis Strategies
! C)+.U)$5'#7%
*"#,<*!&71!7&"0%
+.'$/4+$2&
Interviews
Narrative Analysis
A38#% +.'$/4+$2% 23&% /$80/)$)% 3.)% '#$.%
'/3.&8/+<$)%+.%9(--%(&+.,%_`+40:%A38#%'/3.&8/+5H0.%
(.)$/2$.'% 3.% +'$/3H4$% 5/08$&&% 09% 53a$/.%
/$80,.+H0.% 3.)% N/&'% +.8-()$)% '#$% ,0"/.>1'.%/)
%6)?"()"3"/!*%3.)%(.)$/-*+.,%#%.3'.%/*%3&%'#$*%
5$/'3+.$)%'0%'#$%#+&'0/*%09%DE&:
Documentary
B/$4+0(&%/$&$3/8#%0.%+.&H'(H0.3-%/$50&+'0/+$&%#3&%01$.%908(&$)%0.%'#$+/%/0-$%+.%
938+-+'3H.,% 05$.% 388$&&7% '#/0(,#% &'()+$&% 8$.'/$)% 0.% 3('#0/% <$#34+0(/&% 3.)%
+6538'% 3.3-*&$&% 09% V&$-9U3/8#+4+.,W% 3.)% +.&H'(H0.3-% 63.)3'$&:% "#+&% /$&$3/8#%
$;5-0/$&% '#$% +6538'% 09% +.&H'(H0.3-% /$50&+'0/+$&% 0.% I$<% &8#0-3/-*%
8066(.+83H0.% <*% *2,:,/8) !2") 6%17*) !%;'&0*) '/) "5'#,/'.%/) %6) !2") *%1,%<
!"12/,1'-) $&%1"**"*) !2'!) ,/47"/1"0) !2") 0"3"-%$#"/!) %6) 0,8,!'-) &"$%*,!%&()
*%:;'&"=
Results
! @0123/$%80653/+&0.%87,0"*%
3.)%#'/7'-*
! @"()&"$%&!*b%'#$%C0--$a%E$50/'7%
cD@d%?+,+'3-%E$50&+'0/+$&%E$4+$2
! "#$%A7+3"&*,3")B&%$%*'-)$63+-%
$;8#3.,$
"#$% &$80.)% &'3,$% +.40-4$)% '#$% ,0"/.>1'.%/) '/0) "3'-7'.%/) %6) *%:;'&") 0"*,8/) 0"1,*,%/*)
5/$&$.'% +.% '#$% 8#0&$.% &0123/$7% N/&'% 3&% )$&8/+<$)% <*% '#$% +.90/63.'&:% "#$&$% 9$3'(/$&% 2$/$%
'#$.% 7*"0) !%) "5!&'1!) "5$-,1,!) &"$&"*"/!'.3") 3'-7"*:% "#+&% 5/08$&&% 23&% 3+)$)% <*% /$-$43.'%
)08(6$.'3/*%$4+)$.8$%J5(<-+8+'*%&'3'$6$.'&7%&0123/$%63.(3-&7%$'8:K%2#$/$%355/05/+3'$%3.)%
23&%&(55-$6$.'$)%<*%9$3'(/$%)$&8/+5H0.&%63)$%<*%=$*%+.90/63.'&%)(/+.,%'#$%+.'$/4+$2&:
Intersecting Narratives
1994
The arXiv
1994 - 2001
1991 - Present
Paul Ginsparg
Follett Report
eLibs
Programme
eLib Open
Journals Project
1999
CogPrints
Budapest Open
Access Initiative
Stevan Harnad
1991
WWW
Turnkey
Repository
Software
Santa Fe,
OAI-PMH
! P&'%6$$H.,%09%F5$.%
! C+/&'%ST%/$50&+'0/+$&%
! F1$.%&$$.%3&%3%
! A-$8'/0.+8%5/$U5/+.'%
G/8#+4$&%D.+H3H4$%+.%@3.'3%
5/0,/366$%04$/&$$.%
+"8,//,/8)%6)!2")F$"/)
3/8#+4$%90/%&8+$.HN8%
C$7%_$2%j$;+80
<*%'#$%cD@d
G11"**)#%3"#"/!
5(<-+83H0.%J2$<U
! j$'%'0%)$4$-05%&'3.)3/)&%
! B/060'$)%3%D17-!7&")%6) ! G%V83--%'0%38H0.W%90/%
388$&&+<-$%+.%PeeXK
3.)%5/0'080-&%90/%'#$)
12'/8"E%'023/)&%'#$%
383)$6+8&%'0%H*"-6<
! A65#3&+&$)%'#$%$%;"&)
,/!"&%$"&'+,-,!(%09%$U5/+.'%
(&$%09%$U/$&0(/8$&%+.%
'&12,3"I%5(<-+83H0.&%
%6)2($"&!"5!),/)
V3/8#+4$&W%OkQ
ST%-+</3/*%5/38H8$%OgQ
0.-+.$
*12%-'&-()&"*"'&12
! ?+&8(&&$)%'#$%.$$)%90/%
! C(.)$)%&$4$/3-%
! C0/$)02$)%'#$%
! f+,#-+,#'$)%3%
,/*.!7.%/'-)&"$%*,!%&,"*)
"5$"&,#"/!'-)"<$&,/!)
.$$)%90/%-,/?,/8)
8066(.+'*%09%
3.))H!7&/?"()&"$%*,!%&()
&"$%*,!%&()$&%9"1!*%
0,*!&,+7!"0)"<$&,/!)
383)$6+8&%%$"/-()
*%:;'&"I
3.)%$-$8'/0.+8%h0(/.3-&%
'&12,3"*
0,*!&,+7./8)!2",&)
! ?$4$-05$)%HFGJ)B&%!%1%-)
J$:,:%F5$.%c0(/.3-&7%
&"*"'&12%0.%'#$%
6%&)K"!'0'!')L'&3"*./8I%
d0,B/+.'&K
D.'$/.$'%3.)%I$<:%
&'3.)3/)%'0%-+.=%/$50&+'0/*%
!"#$%&'()*&+,-$.)/$0&)*&/"#&)/#$/1$1&#"&2$&3&4"-5.$#$&()*#"67&"8&$)#($6&1)9)#3.&.)2636)$*:&6$5"*)#"6)$*&"6&#($&"5$/&344$**&
6$'3)3'3
-";$-$/#<&=#&)*&6$56$*$/#3,;$&3/1&"/.7&)/4.>1$*&?$7&$;$/#*&3*&1)*4>**$1&27&)/#$6;)$@$$*<
Conclusions
! "#$%&'()*%#+,#-+,#'$)%'#$%!"#$%&'&()*!'+,-,*'.%/)'/0)!"12/,1'-)-,#,!'.%/*%+.#$/$.'%+.%
&0123/$%)$4$-056$.'7%3&%2$--%3&%'#$%,/!"&$&".3")4"5,+,-,!()%6)0"3"-%$"&)$&,%&,."*)'#3'%
$6$/,$%)(/+.,%'#$%5/08$&&%09%)$&+,.:
! "#$%'$8#.+83-%80)$%/$4$3-$)%3%&$/+$&%09%$;5-+8+'%43-($&%$6<$))$)%+.%'#$%20/=>02&%3.)%9$3'(/$&%
09%09%?@538$%3.)%AB/+.'&%'#3'%$&,%&,.*"0)!2")17&'.%/)%6)0,8,!'-)%+9"1!*)%3"&)%$"/)'11"**,+,-,!(:
! C(/'#$/60/$7%'#$%(&$%09%DE&%3&%3%6$8#3.+&6%90/%FG%+&%&H--%1%/./8"/!)%/)!2")$&,%&,."*)%6)!2")
1%##7/,."*)%6)$&'1.1"%'#3'%(&$%3.)%80.H.(0(&-*%3)35'%'#$6%'0%&(+'%'#$+/%.$$)&:
d$/'3+.% 3'-7"*) '/0) 6"'!7&"*) !2'!) ;"&") $&,%&,.*"0% 04$/% 0'#$/&% )(/+.,% '#$%
&0123/$% )$&+,.% 5/08$&&% #34$% $6$/,$)% '#/0(,#% '#$% +650/'3.8$% 5-38$)% 0.%
8$/'3+.% 9(.8H0.3-+H$&% <*% '#$% +.'$/4+$2$$&:% "#$% 5/$&$.8$% 09% '#$&$% "5$-,1,!)
3'-7"*% #+,#-+,#'&% '#$% #+&'0/+83-% +.>($.8$% 09% '#$% .3//3H4$% $4$.'&% 3.)% <*%
$;'$.&+0.%)/32&%3a$.H0.%'0%$%**,+-")*%7&1"*)%6)"#"&8"/!)!"/*,%/*%+.%DE&%J$:,:%
'#$% )$&+/$% '0% 80--$8'% 8$/'3+.% 6$'3)3'3% <$90/$% 5/04+)+.,% 05$.% 388$&&% '0% 3%
/$80/)K:
adaptability
usability
l
l
l
configurability
open licence
helpdesk, support
graphical interface
interactivity
curation
metadata harvesting
download capabilities
metadata creation
embargo features
References
R4+%;)772,:38%7"8%
4"I+%6++,%+_"7:,:,9%
34+%3+;4,:;"/%;)-+%)0%
=>G%"//%"/),9K
What values
should (we)
build into
repositories?
!"#$!"##$%&'$%()*+$%!'$%",-%."/0)#-$%1'%!)2/-%34+%5+6%6+%"%3+7*)#"#8%9/:3;4<%=,%!"#$%&'"(&"$)*(+","(&"$-./.$%>"/+:94$%?)#34%
!"#)/:,"$%@1A$%BCDC'
!%#$EFA='%E2-"*+G3%F*+,%A;;+GG%=,:H"HI+$%4J*KLL555'62-"*+G3)*+,";;+GG:,:H"HI+')#9'%M+6#2"#8%BCCB'
!&#$M/","9:,$%A'%N'$%M"#:,)/"$%O'%N'%P'$%",-%P+3Q9+#$%P'%N'%R4+%3+;4,:;"/%;)-+%)0%34+%:,3+#,+3L5)#/-%5:-+%5+6'%),'0&12$%345'"6$'($
7"5'1$)*884('&10*($%DSTUVK%UCW%X%UBY$%Z+;+76+#%BCCC'
!'#$A66"3+$%N'%=,I+,H,9%34+%=,3+#,+3'%P=R%(#+GG$%!"76#:-9+$%PA$%DWWW'
!(#$M#:+-7",$%E'%9481($:124"6$1(5$3;"$<"6'=($*+$)*8>43",$?"&;(*2*=@'%!1&=%/+;32#+%,)3+G'%!"76#:-9+%@,:I+#G:38%(#+GG$%
!"76#:-9+$%DWWS'
!)#%M/","9:,$%A'%N'$%M/","9:,$%!'%M'$%",-%M/","9:,$%N'%R+;4,:;"/%;)-+%",-%34+%G);:"/%;),G3#2;H),%)0%34+%:,3+#,+3'%A"B$7"5'1$1(5$
%*&'"3@$%DBTBVKDSW%X%DW[$%BCDC'
!*#%\#++,$%A'%R)5"#-G%34+%-:9:3"/%/:6#"#8K%.)5%#+/+I",3%:G%+&:6%3)%*#";HH),+#G<%A"B$C"D'"B$*+$E&15"8'&$F'#,1,'1(6;'>$%]TDVK]W%X%
UY$%DWWS'
!+#%\:,G*"#9$%('$%&2;+$%>'$%",-%^",%-+%1)7*+/$%.'%!"//%0)#%*"#H;:*"H),%:,%34+%@(1%:,:H"HI+%":7+-%"3%34+%02#34+#%*#)7)H),%)0%
"234)#%G+/0X"#;4:I+-%G)/2H),G$%F*+,%A#;4:I+G%=,:H"HI+$%N2/8%DWWW'
?;'6$6345@$B16$&*(54&3"5$'($1&&*,51(&"$B'3;$3;"$G('D",6'3@$*+$%*43;18>3*(H$1>>,*D"5$"3;'&6$1>>2'&10*($ICJKLMN%IL//O-PQ$!""#$%&'()*+,"#-./$E22$'&*(6$B","$64>>2'"5$#@$3;"$A*4(N,*R"&3S$T',5$#@$K2'7H$I(D"2*>"$#@$E2"U1(5,'1$I55'(=6H$V5"1$#@$E(5,"B$F16W"@H$X4"60*($#@$%4>",E0&$F1#6H$I(D"2*>"$#@$E2"U1(5,'1$I55'(=6H$J"1,6$#@$),'6$<*##'(6H$A"3B*,W$#@$T,"((1($A*D1W$1(5$
I('=81$#@$<1('"2$F21816$%*3*Q$N142$J'(6>1,=$'81="S$;Y>SZZ#'3Q2@Z/[DX\%GH$%3"D1($91,(15$'81="$#@$);,'6$T12&*8#"S$;Y>SZZ#'3Q2@Z/MK4E25
18
Motivation
Identifying and visualising attention to learning supports feedback on learner progress1, the development of collective
intelligence2, automation of metadata annotation3 and facilitates personalised learning4. This research project re-positions
the Digital Artefacts for Learning Engagement (DiAL-e) toolkit5 as a coding schema, and applies language analysis to
identify attention to learning in user comments associated with MOOC learning objects.
Results
References
1. Najjar, Duval & Wolpers, 2006; 2. Shum, 2003;
3. Downes, 2004; 4. Beck & Woolf, 2000;
5. Burden & Atkinson, 2008
Image credits
University of Southampton 2014; Noun Project 2014
19
Games
Social
Multimedia
Portal
Retail
News
Listings
Search
Retail
Profiling Scenarios
Human value lists can be used to describe emotional responses to stimuli. Kahle and Kennedys (1984) List of
Values methodology was used in this study as it is simple to understand and has a strong foundation in previous
research.
Using these values it is possible to build a value profile for different scenarios which allows for comparison
between vastly different situations. These profiles were found to be significantly different between the scenarios of
Web use in the above diagram.
The graphs on the right show mean values of users scores for each value when browsing a retail website, such as
Amazon, and a social media website, such as Facebook.
The differences between these example profiles allow for comparing and contrasting different scenarios in terms
of the needs people want fulfilled when using them. There is a clear contrast between these two examples,
showing the users have very different value requirements for each.
This method has obvious business implications in motivating users to try new products and services. It can also be
used as a predictor for the values people will want to be represented by new types of products and services. For
example a social news website will likely elicit a value response which is a combination of the profiles for social
media and news, and therefore an advertiser would want to appeal to a value profile generated from these.
The method also has research implications, as vast differences in the values people assign to different activities are
areas for investigation as to why this occurs, especially when they are unexpected.
References
Kumar, R. and Tomkins, A. (2010), A characterization of online browsing behavior, Proceedings of the 19th International Conference on the World Wide Web
Kahle, L. R. and Kennedy, P. (1984), Using the list of values (LOV) to understand consumers, The Journal of Consumer Marketing 6(3), 512.
Social
20
21
Background
Methodology
A sample of 1000 unique threads was generated from each project. A coding
scheme was subsequently created, drawn from relevant literature suggesting
potential methodologies and other sources of influence on discussion content.
Content analysis was carried out by identifying the percentage of posts which
corresponded to each section of the coding scheme. Subsequently, discursive
saturation was carried out on each sample. This is a qualitative coding method,
where discourse is analysed for specialist, context-independent terminology
(Dowling, 1994). The discursive saturation of samples was then compared to
the discursive saturation of tutorials and descriptions surrounding the relevant
projects.
Findings
Snapshot Serengeti
Planet Four
Discursive saturation
Discursive saturation varies within projects. Generally, project complexity had some effect on discursive saturation the more complex Notes from Nature had
higher peak-saturation than less complex projects. However, specific activities were associated with particular levels of discursive saturation. Threads discussing
classifications, plus threads discussing underlying scientific principles, had relatively high levels of discursive saturation. Threads collecting types of image and
engaging in more social activities showed a relatively low level of discursive saturation. This aligns with Bernsteins (1999) theory on vertical and horizontal
hierarchies of activity. Further analysis has suggested that individual users show a preference for particular types of activity and make use of an associated level
of discursive saturation. This suggests influence resulting from users as individuals, in terms of motivation and individual use of language (Bakhtin, 2010).
gjvh1g13@soton.ac.uk!
Online anonymity!
Individuals who try to escape surveillance seek online
anonymity trough anonymity technologies, such as Tor.
Next to political dissidents and concerned citizens,
individuals with more dubious intentions, such as
terrorists, paedophiles and drug traders, use Tor to escape
prosecution. A prominent site on which individuals use
such anonymity is Silk Road. Group polarisation and
deindividuation are seen as consequences of anonymity.!
Silk Road!
Online hidden marketplace on which
mainly illegal drugs are sold
Opened
February 2011
Websites on the Dark Web, such as Silk Road, can often only be
accessed with onion routing network Tor, which anonymises tra#c.!
Remains open
October 2014
Re-opened
November 2013
Drugs!
Drugs!
Drugs!
Marketplace!
Marketplace!
Money !
Money!
Political/Philosphical debate!
Political/Philosphical debate!
Troll/Joke/Conspiracy!
Troll/Joke/Conspiracy!
Scam!
Other!
Other!
Other!
20
40
60
80
100
Political/Philosphical debate!
Troll/Joke/Conspiracy!
20
40
60
80
100
20
40
60
80
100
22
23
!"#$%&'('$)*+$,)--&#-'$./$01#*$2)3)4$$
5*$6*3-#1-#*#7-&)8$9#-'1#:;<#!
"#$%&&%!'%()*+!,-./01234#5#&6%-67)!!
879*+:;4#+4<!=+!>;4%!?%++;4!@!A+#B*44#+!>*4(;*!C%++!
D&5+*9+*&*7+4!
E4*+4!.$#!%;F!5#!0*&*+%5*!*-#&#F;-!:%(7*!B+#F!G9*&!=%5%!!
H#%(!;4!5#!-+*%5*!I+FJ!!,745!%994J!5#!K*+;:*!:%(7*!
89*-;I-!F#L:%L#&%(!47M0+#79!#B!74*+4!N!4;F9(O!$%-)*+4P!
A#97(%+(O!;K*&LI*K!%4!+;4)Q5%)*+4!M75R!
R857K;*4!4$#.!5$*O!*F9(#O!+;4)Q+*K7-L#&!45+%5*0;*4!N1P!
!
!
S=%5%!5$%5!;4!F#45!:%(7%M(*!5#!9+;:%5*!
#+0%&;4%L#&4!%&K!-#&47F*+4!;4!5$*!K%5%!
5$%5!;4!F#45!9+#5*-5*K6V!
SX$*+*!;4&Y5!%!-7(57+*!#B!5+%&49%+*&-O!%&K!
)&#.(*K0*6V!
!
!
ST!5$#70$5!;5!.#7(K!M*!*%4ORT!.%4!4#!&%U:*6V!
SW#7!&**K!K**9!9#-)*54!5#!4745%;&!O#7+4*(B!
(#&0!*F$!5#!0*5!5$*!K%5%6V!
G9*&!H#:*+&F*&5!=%5%!
Z#+*!:%(7%M(*!5$%&!A7M(;-!8*-5#+!T&B#+F%L#&!%4!F#+*!%--*44;M(*!
[*F#:;&0!B+;-L#&!B+#F!;&B#+F%L#&!F%+)*5!#9*&4!#99#+57&;5O!B#+!
;&-+*%4*K!*F9(#OF*&5!%&K!5%\!+*:*&7*4!
H#:*+&F*&5!;4!!M*45!9(%-*K!5#!*\9(#;5!;54!#.&!MO9+#K7-54!B#+!
9+#I5!N*0!X+%K;&0!]7&K4J!XB>!%994P!
A+#9*+!+#(*!;4!-$%F9;#&;&0!;&&#:%L#&!;&!G9*&!=%5%R!
R6^75!5$;4!$%4!5#!M*!F#+*!5$%&!$%-)%5$#&4!%&K!-#F9*LL#&4!
!
!
Z*5$#K#(#0O!
[*47(54!
!
T&5*+:;*.*K!B#7&K*+4J!
;&:*45#+4!%&K!4799#+5*+4!#B!!
*%+(O!45%0*!-#F9%&;*4!
74;&0!G9*&!=%5%!
!
C#F9;(*K!M%++;*+4!%&K!
-$%((*&0*4!B+#F!M(#04!%&K!
-%4*!457K;*4!
!
D&0%0*K!.;5$!74*+4J!!
97M(;4$*+4!#+!%-%K*F;-4!
A*#9(*J!!-(*%&!#+!
(;&)*K!K%5%J!%+*!)*O!5#!5$*!
9+#-*44!
!
Z%&O!45%)*$#(K*+4!%+*!
;&:#(:*KJ!!,745!
97M(;4$*+Q74*+!
!
X$*!Ed!G9*&!=%5%!-7(57+*!
;4!!:%(7*!-+*%L#&Q(*K!
!
T&4;0$54!
SW#7!&**K!!
5$*!+;0$5!
-#&&*-L#&4!!
;&!5$*!
0#:*+&F*&56V!
A*+49*-L:*4!#&!G9*&!=%5%!7L(;5O!%&K!45%&K%+K4!%+*!4;57%L#&%(!
X$*!*&5+*9+*&*7+;%(!74*+!5%)*4!%!F#+*!9+%0F%L-!:;*.!#B!G9*&!
=%5%!5$%&!5$#4*!$*(K!MO!%-%K*F;%!%&K!-;:;(!4*+:%&54!
X$*!+*(%L#&4$;9!M*5.**&!K%5%!97M(;4$*+4!%&K!74*+4!&**K4!5#!M*!
%&!;&5*+%-L:*J!-#&L&7#74!K;%(#07*!!
G9*&!K%5%!;4!%!9+#-*44J!!%!9+#9*+5O!
SD&5+*9+*&*7+4!
4**)!
B#+0;:*&*44J!
!
9*+F;44;#&6V!
N1P!]#+(%&;J!=!%&K!Z7((;&4J!"6!N/___P!A*+-*;:*K![;4)4!%&K!C$#;-*4!;&!D&5+*9+*&*7+4!`*.!
a*&57+*!=*-;4;#&4J!!"#$%&'(")(*#+,%-++(.-%/#$,%0(1b<c!2_bQ2//!
24
Category
Health
Assessment
Question
00:00
Answer
How is your
health in general?
Answer
--Please Choose --
Your stats
Success Rate
Question:
What % of .. ?
Answer:
Questions
Answered
Fastest Correct
Answer
10%
Answer
Explanation:
Correct Answer
Streak
10% of active
people eat
Answer
Next
Sorry, that
was
incorrect
HealthQuest: Can an
Educational Quiz Lead to
Behaviour Change?
By Anna Weston
aw3g10@soton.ac.uk
@anna_west0n
Introduction
Theories
Experiment
1,044,407 emergency
admissions were
potentially avoidable in
2012/13.
Transtheoretical Model
Hypothesis
1: Learning
Hypothesis
2: Behaviour
Hypothesis
3: Nudges
Self-management
reduces admissions by
increasing the patients
understanding and
coping mechanisms
Social Cognitive
Theory (SCT)
Control Group
1.! Health self-assessment
2.! Test: 20 random
questions (no feedback)
3.! 2-week break
4.! Test: 20 random
questions (no feedback)
5.! Health self-assessment
Experimental Group:
1.! Health self-assessment
2.! Test: 20 random
questions (no feedback)
3.! 2-weeks playing the
quiz (with feedback)
4.! Test: 20 random
questions (no feedback)
5.! Health self-assessment
Behaviour Economics
Intention-Behaviour Gap
Emotional Arousal
Optimism Bias
Gain/Loss-Framed Messages
Social Nudges
'()$&(01&2##"3(#4&56&20%7$3%&84&9(3:#,;(0)&<=>&
?"$%:50&@A&
3%
4*+%
2%
3*+%
2*+%
1%
1*+%
0%
/%
0*+%
!"#$%
&'()%
/*+%
.%
&'()%
!"#$%
-%
.*+%
-*+%
,%
,*+%
*%
*+%
-.5,.5//%
-.5,/501%
,450.5./%
,450/501%
,46*36,/%
,46*36,/%
-,6*36,/%
-,6*36,/%
!(7"%89":#;%
9'::"##%<=$"%+%
-!
Longitudinal Studies
-! More participants for a longer
period of time would provide
further insights into this area
including data for participant
engagement and retention
B"-8$3&56&C5-;D$)$1&?"$%:50%&50&F(#G&E()$&
Future Work
,**+%
!"##$%%&'()$&*&
+,-$&.!$#%/&
4%
Integrated Change
(I-Change) Model
-0*%
-,3%
B"-8$3&56&C5-;D$)$1&&
?"$%:50%&
Can an educational
quiz app help increase
self-management and
bring about behaviour
change?
-**%
Intervention Email
Sent
,42%
,0.%
,0*%
,**%
,*,%
/0%
0*%
..%
,0%
-!
App Development
-! Such as Gamification
*%
*%
E()$&56&C5-;D$)$1&?"$%:50&
2%
*%
25
26
In the absence of institutional policy, what is the creator/facilitator perspective on the aims and
consequences of MOOC development at the University of Southampton? The literature indicates
commercial, democratic and research concerns motivate MOOC development in HE.
Learning designers
Facilitators/trainers
Management
Content providers
Grounded theory analysis was conducted on stakeholder interview data, generating explanatory
concepts: top-down leadership, changing the educational culture, and embedding MOOCs in
face-to-face courses. An underlying sense of momentum for change was also identified.
Reputation
building
Influence educational
culture
Develop e-learning
practice culture
Exploit MOOCs as
research tool
Embed MOOCs in F2F
courses
Conclusion
MOOC development is mainly perceived as a way to advance the interests of the university, rather
than for wider open educational goals in education. However, MOOCs are also seen as a dynamic
for internal educational change and development, and as a way to realign teaching and learning
methods with wider processes and concerns in a Web-connected world.
Image sources:
knowledgehut.com 2014
tap.iop.org/momentum/220/
page_46435.html 2014
27
28
30
!"!#!$!%&!$!
'!$!,
!
" #
" $ #
$# $#%%& ' (("%
)*
%
!"
#$
$#
%
&%
'
( )*+&
31
Interdisciplinary Approach
This project combines insight from
Psychology, Finance and Computer
Science to help build an
understanding of the role of the web
in the investor decision making
process.
Key Questions
- How do investors interact with
online information?
- Can online footprints give
estimates of investor mood?
- How important is the role of
investor mood in the stock
market?
Proposed Methods
- Differentiating public
mood and investor
mood from online
social media
- Applying psychological
models of mood to
social media analysis
- Testing models against
individual stock
prices/market indices
Supervisors
Prof. Johnnie Johnson (Management)
Dr. Tiejun Ma (Management)
Prof. Ming-Chien Sung (Management)
Dr. Thanassis Tiropanis (Electronics and Computer
Science)
PHDObservatory
RESEARCHERS 2012/2016
MOOC
32
MISSION
logging the growth and evolution
of MOOCs;
open
tracking platforms and technologies
WHO WE ARE
Education
education
technologies
Web Science CDT
Library
Health Sciences
University of Southampton
33
Web Science
Internet Intermediaries
Internet technology requires the insertion of intermediaries,
such as Internet access and service providers, web
Technology
Security Techniques might:
- be difficult to implement
- be ineffective (i.e. high-speed Internet backbone
networks)
- violate fundamental principles of Internet
governance (i.e. net neutrality)
- infringe upon users rights (i.e. right to be forgotten)
- be subject to misuse (i.e. surveillance by
governments or private entities)
Economics
Lack of economic incentives as a hurdle to the
implementation of effective security measures
Law
Internet
intermediaries best
suited to safeguard
the Internet
But necessary
security measures
not in place
Network insecurity
still an open
problem
Politics
Different priorities/perceptions of users rights
34
1.
2.
Avatars
Virtual Environments
The relationship between the player and avatar is complex and multi-faceted. Reid (in Filiciak,
2003, p.90) believes that as well as performing and behaving according to the player's wishes, the
attribution of behaviour and body makes avatars a manifestation of the self beyond the realms of
the physical, existing in a space where identity is self-defined rather than pre-ordained". Nguyen
(2009) describes a visual interface which allows users to generate new
bodies and design new selves" - superficially, at least. These processes of self-creation may be so
much virtual make-up to be changed at will, or as changeable bodies they may pose an incipient
and significant challenge" to the nature of identity. In this interpretation the avatar can act as a
reinforcement of the subject, or may be part of the creation or reconstruction of a new subject
through which the player can perform.
How much of the `self' that is represented by an avatar is still contested. Nonetheless as the
primary identity cue" in online environments, it may be expected that our avatars have a
significant impact on how we behave online" (Fox et al.) and potentially even in the material
world. Due to the effects of mediated embodiment, players who create avatars that look and
behave less like themselves might experience a shift in their own behaviour and how they
perceive themselves, partially adhering to a new identity that is
inferred from their avatars" (Fox et al.) as part of a phenomenon
known as the Proteus effect.
Goffman maintained the centrality of the physical body in social interactions and development. To
him, the body occupies a mediating stance in negotiating identity between self and selfrepresentation, personal and social, as well as participating in the practice that make up routines
and behaviours. This body is nonetheless encumbered by its physicality, mired in convention and
labouring through bodily appearance and personal acts: dress, bearing, movement and position.
To some extent, the avatar body obeys the same conventions as the material, such as
communications both verbal (text or voice chat) and non-verbal (hand gestures) and visual
depictions of emotions" (McCreery et al.), as well as usually being given a gender, race and sexual
orientation (Consalvo). This indicates that synthetic worlds are not discrete from material ones,
and hints at the potential rearticulation of social frameworks onto these spaces.. Certainly,
evidence suggests that prejudices and stereotyping behaviours have
transgressed bodily boundaries into the online world (Rellstab; Kendall; Christodes et al.). This is
what Nguyen (2009) refers to
this as `incoherence': digital bodies can be made anew according to the whims of their users, and
social identity detached from material flesh, but these indicators of change and fluidity are not
the apex of freedoms" as they can be reaccommodated into hegemonic realities by equally fluid
rearticulations of power". This echoes findings by Ducheneaut et al. (2009); that player choices
with regards to their avatars are highly socialised.
This section is concerned with both personal and social avatar interaction and addresses both initial
research aims. As the notion of the avatar as sex object is instigated by a curious but not uncommon
phenomenon in virtual worlds, that of gender-switching, this section also returns to a consideration of
the mediating role played by technology in the relationship between a player and their in-game avatar.
Determining players' reasons for doing so has had varying levels of success, as it would appear that
there is not one overarching motivator. Rather, the reasons can vary widely according to the player and
their gender, and different methodologies have uncovered a wide range. More recent studies by Martey
et al. and Yee claimed that a significant motivator in gender-switching is that of aesthetics - male players
simply preferred to see a female avatar on the screen, rather than a male. While these studies did not
refute previous research which points to embodiment or behavioural changes such as
the Proteus Effect , they highlighted the unconscious nature of these practices. This reinforces the
mediating aspect of virtual worlds and highlights the distance between player and avatar, bridged not
only by technology but also by the look.
In many ways the female avatar body is in fact primed to be seen as a sex object. Female characters in
video games are forced into a narrow set of highly codified, pre-existing categories to be temporally
inhabited as an easily assumed, ready-to-be-invaded vessel" (Lahti). For the most part they are passive
sexual objects acting as visual adornment for the target audience (which is presumed to be male)
(Ivory). Socially, virtual worlds are often masculine and sometimes misogynistic spaces (Fox and Tang),
creating a gender-imbalanced framework. This is part of a self-perpetuating cycle in which games are
developed by men who have predominantly played games developed for a male audience. The male
point of view is therefore entrenched and largely unquestioned. The fetishistic aspects of these male
fantasies have become largely invisible to male gamers" (Yee), but are noticed and criticized by female
game-players, for whom sexualised female avatars act as a constant reminder of their not-belonging.
The social structures that govern both the real and online worlds have been named and described
in many different ways within the field of sociology, however I want to argue that those
conceptualised and inspired by Bourdieu are of most relevance here. Of particular relevance to
this research are the notions of habitus, field, capital,
and distinction as a practice.
The need for social science study in video games has not gone unnoticed, as the introduction to
the first issue of Games and Culture (2006), which called for an increase in the application of
cultural theory and ethnography in games studies, made clear. While the field had always been
intrinsically interdisciplinary, there remained (and remains) a need to address issues of
inequalities such as access, race, class, and gender given the importance of profit, consumerism,
and capitalism more generally in gaming" (Boellstorff). The author defined three potential arenas
for the anthropological study of games and culture which both emphasise the discreteness of
game-world and real-world
culture, and highlight their reflexivity: `Game cultures' (game-specific cultural practices),`cultures
of gaming' (gaming as a cultural practice), and `gaming of cultures' (the effect of gaming on
broader non-virtual culture). Of these, it is the potential of both `game cultures' and `gaming of
cultures' which are particularly relevant here, the former describing a player microcosm which
shares a collective cultural unconscious perhaps expressed through environments such as virtual
game-worlds and online blogs and communities, while the latter implies a reflexivity between
game- and material-worlds, with the potential for cultural `gamification'. It is my proposal that
the habits, shared mindset, and subconscious rules practised by the participants of these game
cultures represent an observable habitus, and that this habitus is constituted and practiced within
what Bourdieu would recognise as a field.
I would argue that the collective mindset within this `gamer' subcultural field is one which,
through content and communication, is often expressed as predominantly male-dominated and orientated in both industry and audience, contributing to the marginalisation of female players
and characters (Yee). It has been suggested that inhabitants of this field often distance themselves
from femininity by, for example, creating content which caters to male fantasy and the
fetishisation of the female body, or engaging in harassment and verbal abuse of women in these
spaces (Fox et al; Fox and Tang; Kendall; Martey).
Elzabi Rimington
University of Southampton
58/3129
Salisbury Road
Highfield Campus
Hampshire
SO17 1BJ
07525429416
emr2g08@soton.ac.uk
35
Crime Deviancy
This Research
My research involves a detailed account of
the history of copyright law, psychological
descriptions of pirates and their behaviour,
and sociological investigation of the nature
of piracy, law and deviancy. The current
literature on piracy does not go far in
illuminating these issues. Much of the
current research is incomplete, inaccurate,
and contradictory. Summaries of some of the
issues in this field are presented below along
with a description of the future of this
research.
What is Piracy?
There are legal battles on-going regarding
how copyright is defined in the context of the
Web and digital distribution. Yet research
participants are often presented with
questions like Do you pirate?. Its often
assumed that participants definitions of
piracy are accurate without behavioural
checks. Services like Youtube2MP3, unofficial
uploaders and streaming services, along with
a variety of other phenomena, have
complicated the status of Web user behaviour
often leaving legality unclear. At the very
least, legality is often misunderstood by users
(and legal professionals). Like the question of
who are pirates?, the assumptions of legal
understanding in this research area remain
untested.
Conclusions
The idea of intellectual property inspires diverse opinions.
Regardless, I would argue that the current conclusions regarding
copyright infringement, as it is perpetrated on the Web
(internet piracy), are not based on clearly established facts. This
research aims to investigate the interactions between the
moral/ethical beliefs of pirates and their understanding of the
law, to establish clearer accounts of pirate methodologies, and
to examine how businesses have attempted to operate on a
Web with pervasive digital piracy.
Background
How can the United Nations evaluate Living Labs which are
not amenable to traditional economic or fiscal analysis?
Research Question
A Holistic Model
Web Science
Acknowledgements
References
Future Work
Eamonn Walls ~ ew1g12@soton.ac.uk | PhD Candidate, Web Science Centre for Doctoral Training | School of Electronics and Computer Science, University of Southampton
36
37
jrw1g08@soton.ac.uk
@jenwelch15
Jen_welch15
Related work
Jennifer Welch
Prof Susan Halford
Dr Mark Weal
Prof Gerry Stoker
The research
[i]f the Internet can provide a canvas upon which nations can paint their social, linguistic,
cultural, and political beliefs, then perhaps the physical struggle for safe cultural havens and
1. Conceptual framework
McCormick (2002)
The role of the Web and ICTs in peacebuilding is at present widely under-researched, yet
there is a prevalent assumption of the many potentials of their uses to improve the relevance
and impact of post-conflict peacebuilding practice. The literature on the subject is small, but
in 2004 already Sanjana Hattotuwa (2004: 39) highlighted an increasing confluence between
ICT, conflict transformation and peacebuilding. In 2013, Stability Journal launched a special
collection on New Technologies for Peace and Development, while earlier academic work on
the uses of the web for peacebuilding or conflict transformation processes focused on the
role of so-called digital diasporas (Brinkerhoff, 2011, 2007; Turner, 2008; Kent, 2006). These
academic developments have been paralleled by increased policy and practical attention to
the topic.
2. Practice review
Opening of the first international conference on ICTs for peacebuilding Build Peace
Peace through Technology, at MIT (Cambridge, MA) in April 2014
howtobuildup.org
38
Revenge Pornography
Abigail Whitmarsh
Web Science CDT
University of Southampton
Background
Revenge Pornography describes the act of publishing on the Web pornographic images of a person without their consent. It is a phenomenon
that has been enabled through the development of the Web and almost universal public access to digital photography and file sharing
technology. Many sites include revenge in their title, including the site I have identified for research which reads My Ex Get Revenge.
Anyone can appear on a revenge pornography Website however, most victims are female and more men than women view the sites.
Uploader
Viewer
Commenter
Research
Methods
Research Aim
Why do men engage with revenge pornography
websites?
Research Questions
How large is the community who use revenge
pornography sites and how quickly does
pornographic material get consumed?
Can we identify and differentiate between
users in this context?
What added value does revenge pornography
websites offer over other forms of online
pornography?
Website
Victim
Literature
Pornography is a controversial topic. Radical feminists viewed pornography as
placing an overwhelming emphasis on male sexual pleasure and female
domination, arguing that pornography was reflective and self-perpetuating in its
ideology; not only reinforcing gender stereotypes but also adding to them. This
view point has been criticised by liberals for being censorious and by other
feminists for being too deterministic. Early studies of pornography focused on the
effect pornography has on women and ignored men. Men are the biggest
consumers of pornography and by disregarding the impact pornography has on
them ignores a significant and important area of research . Technology has
changed the way pornography is produced and consumed. Cheaper and portable
devices allow for easy creation and distribution of pornographic images. Web 2.0
has added an extra dimension of community and social value to pornographic
Websites. Revenge pornography websites utilises the technology and provides a
platform for users of the site to easily post details and images of their ex partner,
simultaneously engaging with a community who enjoying viewing pornography
which has been displayed without the consent of the person in the material.
Web Science
Acknowledgements
The Digital Economy Programme is a Research
Councils UK cross council initiative led by
EPSRC and contributed to by AHRC, ESRC and
MRC.
My PhD supervisors; Gethin Rees and Elena
Simperl Elena Simperl
7"$% )%$
"*$%"
8$'
&
& 1
-"'*
40
?7-@1:((1*1:A57;-
!"#$%&'()*+$,-$.'/'$0$12#&$3#"'4),5&6$74'85'/)*+$9)25'8)2'/),*2$12)*+$7:,*,():2$/,$;(<&,4#$.#:)2),*$=5<<,&/$
This research introduces the concept that reasoning and decision-making, when
facilitated by Visual Analytic tools and processes, can be improved through the use
of Web technologies to evaluate user interaction events and the application of
Economic theories. The field of visual analytics is an extension of data visualisation
that provides tools and processes for extracting information from raw data by
enabling user-interaction, highlighting an opportunity to observe and record chains
of user events that are generated. . The work addresses the following research
questions:
1. To what extent does data visualisation affect the choices and behaviour of
analysts using visual analytic tools on the Web?
2. To what extent can interaction data be used to identify the influence of
framing for VA tools on the Web?
3. Can interaction data be used to identify framing effects in visualisations on
the web and to improve measurable analytic performance ?
9;=1>?$>@>?A!;B=$0$!C7$D73$>E7$1=7.$>BEF==$G>@A$;@.1=!E;7=
!"#"$%&'()(*%$"+,%#(-./0&"$'(
!12345(52167*8()(9*:7*4(16-(
;&"<"<((&.<=+,<.(
Theories are emerging from Visual Analytics and Visualisation literature which
suggest that interaction events can provide insights into the utility of design and can
inform new developments in data visualisation. This research examines visualisations
for the presence of framing effects - a established concept in Economics - by utilising
an existing taxonomy of action types commonly used in visual analytic applications.
4/+,+>"/<(
Symbols aquired from thenounproject.com are public license except for those under the CC Attribution license: Bomb by Scott Lewis. Corporation by Stephen Copinger. Dollar (sign) and Twitter by Lubo Volkov. Dollar (bill) by Christopher Beach.
Globe by Nicholas Menghini. Chevron by Christopher T. Howlett. Military Vehicle and Airplane by Luke Anthony Firth. Dangerous Area, UN Office, Police, Water, NGO Office and Storm Surge by OCHA Visual Information Unit.
41
Introduction
Crime preoccupies the media and our TV schedules; it fills our
fiction shelves and is a large part of public spending, whether via
warfare and defence, or policing.
A report suggests that the amount spent on combating just violent crime
equates to 7.7% of the UKs GDP, or 4,700 for every household. [5] Is
this effective spending?
How much is this spending driven by crime statistics? Police.uk is a site provided by the U.K.s Home Office which presents open crime data, supporting the Governments transparency and accountability agenda.
How much are the data / statistics shaped by technology or social causes
policy, culture, administration, bureaucracy? Can the transparency
agenda help in understanding this? [2]
Web Science can help us to classify these crime apps and websites, sometimes referred to as Crime Social Machines. Understanding the data and
information ecosystem which allows society to address crime, helps us understand the sites singularly.
Three dimensions:
Results
Acknowledgments
The work in this paper was funded by the Research Councils UK
Digital Economy Programme, Web Science Doctoral Training Centre,
University of Southampton, EP/G036926/1 and by SOCIAM: The
Theory and Practice of Social Machines, funded by the UK Engineering
and Physical Sciences Research Council (EPSRC) under grant number
EP/J017728/1 comprising the Universities of Southampton, Oxford and
Edinburgh.
Method
42
Introduction
We spend a vast amount of time on the Web and much of that time is spent
reading
However, with the large amount of information available we cannot read it
all in great detail, therefore we engage in skim reading (Lui , 2005; Morkes &
Nielsen, 1997)
Skim reading has been shown to negatively affect comprehension (Carver,
1984; Just & Carpenter, 1987 ; Dyson & Haselgrove, 2000)
Others have shown that there is a different between important and
unimportant information. The important information does not receive the
same loss of comprehension that the unimportant information does
(Masson, 1982; Reader & Payne, 2007; Duggan & Payne, 2009)
Experiment
Experimental Conditions
2 x 2 x 2 within-participant
design
Question 1:
Does skim reading affect
the way we read
hypertext?
32 participants
160 experimental sentences
inserted into 40 edited Wikipedia
pages (4 in each)
20 pages read were normally, 20
pages were skim read
Question 2:
Does skim reading
affect comprehension?
160 comprehension questions
(4 after each stimulus)
50% asked about important
sentences
50% asked about unimportant
sentences
Figure 2. Example stimulus with fixations of
normal reading
Results
Figure 3. Task Type x Word Type interaction in skipping probability and Task Type x Word Type x Word
Frequency interaction in single fixation durations
Comprehension results
Comprehension was reduced when skim reading
Comprehension was marginally better for the questions related to
the important sentences compared to the unimportant sentences
when skim reading
Conclusion
Does skim reading affect the way we read hypertext?
Yes, the linked words were skipped less when skim reading
compared to the unlinked words
When the linked words were fixated they were processed fully,
unlike the unlinked words that showed no frequency effect in the
skim reading condition
What does this mean for reading on the Web?
If participants are using linked words to suggest important
information and using them as anchor points to guide their
movement through the text, then the choice of which words to add
links to needs to be considered very carefully
This is because skim readers focus primarily on linked words and use
them as a marker for the most important information
43
Trust
Collaboration
Accountability
Deliberation
Transparency
Consultation/Protest
Open Data
Data published by default
Support
Reusable Data
Exchange hacks
Web wallet hacks
Pool attacks
Market manipulation
Double spends
Buer overow
Mining attacks (selsh mining)
Deviancy
Who are the relevant authorities for handling cryptocurrency related crime?
The scrip
scripting
ng language is a forth like non
nonTuring complete stack based language with
approximately 190 dierent
erent commands.
Services have sprung up, known as web wallets, who hold private keys for individuals.
But these services have become targets due
to the amount of money they hold.
Criminal Opportunities
es
Scripting
ng Language
Laundering
Malware (mining malware, wallet stealing malware, clipboard malware)
Privacy/deanonymisation attacks
Education?
Defence
Other attacks
Chargeback scams
Attacks against the individual
Targeted attacks that exploit the Ponzi schemes
Social engineering attacks
consumer
Attack Category
Research Questions
ons
Cryptocurrencies, such as Bitcoin, are decentralised online currencies. Unlike at currencies, their creation, distribution and
value are not governed by law and they are typically not associated with any single o
oine
ine jurisdic
jurisdiction.
on. The technology behind
these currencies provides users with a high degree of privacy,
and their implementa
implementation
on means that they have no central
point of opera
operation, failure or control. These currencies allow the
direct transfer of value between individuals online, without the
inconvenience, cost or trust required with a third party such as
a bank or payment processor (e.g. PayPal).
Background
Dr Craig Webber
WebberCriminology
Webber
Criminology
Dominic Hobson
Hobsondom.hobson@soton.ac.uk
Hobson
dom.hobson@soton.ac.uk
Unlike traditional
onal payment services, there is no central point of
contact for cryptocurrencies. As a large por
portion
on of cybercrime is
motivated
vated by money, authori
authorities
es can typically approach money
service providers such as banks or PayPal and request information on individuals, freeze nances, or block users from such
services altogether. This is not possible with cryptocurrencies.
Ethereum oers
ers smart contracts, extending the idea of a transaction scripting
ng language with a Turing complete language.
Applications
ons of blockchain tech
What impact has the technology behind cryptocurrencies had on cybercrime, security
and policing?
44
45
Giant strides have been taken recently in developing theories and techniques of identity attribution
from data indirectly linked to individuals either alone, or in combination with other data.
These challenge traditional distinctions found in data protection and privacy laws between two
categories of information: PERSONAL DATA and NON-PERSONAL DATA.
Consider the inferences that might be made from communications metadata alone:
You spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.
Research Questions:
To what extent are we anonymous online? What exactly do we mean by anonymous?
Can we rely on anonymisation techniques to hide our identities?
What weight should be placed on indirect digital identifiers and their links to a person? (e.g. Should I bear any liability for
what happens via an IP address linked to my home? Should the same IP address be deemed my personal data worthy of
legal data protection against those who might use it to try to identify my offline identity?)
What is the harm from digital identity attribution? Does it extend beyond a privacy harm? What is its value?
http://blogs.law.harvard.edu/billofhealth/files/2013/05/Screen-shot-2013-05-13-at-3.02.09-PM.png
Alison Knight
University of Southampton
A.M.Knight@soton.ac.uk
Web Science
46
The Problem
=
Handwriting
Recognition
2 4
2
[TEX]
x=\frac{-b\pm\sqrt
{b^2-4ac}}{2a}
[/TEX]
Background
Rationale
Simplify digitisation of
mathematics expressions
Use current handwriting
recognition techniques to
translate handwritten work
into computer codes
Develop socially-informed
interface to reduce
technology-induced
cognitive overload while
working electronically
Could also be used to
interface with any online
communication tool.
Milestones
References: [1] Ahmed (2008). Support Mathematical Instruction in Web-Based Learning System Using Object-Oriented Approach. ICACTE'08. IEEE.
[2] Mikusa et al. (2005). Features and advantages of WME: a Web-based mathematics education system. SoutheastCon05. IEEE.
[3] Lo et al. (2013). MathPen: identifying and solving the problems of online collaborative learning for mathematics. ICTMT11.
Funded by Research Councils UK Digital Economy,
Web Science Doctoral Training Centre, EP/G036926/1.
47
Expanding Graphs
Symmetry in Complex Networks
David Matthews
Supervisors: Dr J.W. Anderson, Dr. R. Carare and
Dr B. MacArthur
University of Southampton
Symmetry
One less studied property of real world networks is the degree
to which these networks are symmetric. Symmetry in a network effectively means that certain vertices play precisely the
same role in the graph. This redundancy naturally reinforces
the graph against an attack by providing structural backups
[2].
dm1x07@soton.ac.uk
Trees
History
The theory of random graphs began with Erdos in the 1940s
and 1950s. Erdos used probabilistic methods to demonstrate
the existence of graphs with particular properties without
needing to explicitly construct these graphs
Results
Thus far we have used a formalised notion of symmetry called
the automorphism group of a graph in order to investigate the
typical degree of symmetry to be found in a variety of models
of growing random trees. We have utilised such models of
growing graphs to, for example, model phenomena as diverse
as Alzheimers disease and the World Wide Web.
References
[1] Reka Albert and Albert-Laszlo Barabasi. Statistical mechanics of complex networks. Reviews of modern physics,
74(1):47, 2002.
[2] Ben D. Macarthur, Ruben J. Sanchez-garca, and James W.
Anderson. Symmetry in complex networks. Discrete Applied Mathematics, pages 35253531, 2008.
[3] Duncan J Watts and Steven H Strogatz. Collective dynamics of small-worldnetworks. nature, 393(6684):440442,
1998.
48
!"#$%&'()*$+,-'./"0'$,'0/+'1)2+')3'0/+'.+4'
$%'0/+'567,6$0')3'8+,0/+0$9':67&+7;<!
1+4+99"'=",/''
7%>&?@A,)0)%B"9B6#'
"#$%&'()*&)+!,&*-%))*&!./01%&(2%!,*$%!3!,&*-%))*&!"#)/2!4/5-*&6!
.*2-*&7(28!0*!/2!(6%/5()0(9!$%&9%$0(*2!*-!:%/#0;!()!(29%))/205;!/0!01%!-*&%-&*20!*-!:*6(5;!6%:/0%!(2!9*20%7$*&/&;!
)*9(%0;<!=1()!()!6#%>!2*0!*25;!0*!01%!$*$#5/&(0;!*-!/99%))(:5%!&*#0%)!0*!/50%&(28!:*6(%)>!)#91!/)!6(%0>!%?%&9()%!/26!
9*)7%0(9)>!:#0!/5)*!$&%))#&%)!0*!0/@%!&%)$*2)(:(5(0;!-*&!A:*6;!$&*B%90)C!D"1(55(28>!EFFGH<!=1%!I%:!1/)!0&/2)-*&7%6!01%!
$&*6#90(*2!/26!9(&9#5/0(*2!*-!!7%6(/>!/26!2*2J7%6(/!(7/8%)>!/26!1/)!/50%&%6!01%!I/;)!(26('(6#/5)!K(26!(2-*&7/0(*2>!
9*2)#7%&!$&*6#90)>!/26!9*77#2(9/0%!/:*#0!)$%9(K(9!:*6(5;!())#%)<!=1()!01%)()!%?$5*&%)!01%!&*5%!*-!01%!I%:!(2!$#&)#(0!
*-!/%)01%0(9!)#&8%&;L!M#%)0(*2(28!1*I!01%!I%:!()!(7$5(9/0%6!(2!A:*6;!$&*B%90)C!7*&%!:&*/65;L!01%!(2K5#%29%!*-!01%!I%:!
*2!7/@(28!:*6(%)>!#)(28!01%!9/)%!)0#6;!*-!/%)01%0(9!)#&8%&;>!/26!1*I!I%:!#)%&)!I1*!/&%!)1/$(28!:*6(%)!N!:*01!
$1;)(9/5!/26!'(&0#/5!N!/&%!(2!0#&2!)1/$(28!01%!I%:<!
1+,+"79/'C4D+90$E+,'
.+4'
:9$+%9+'
H+"20/''
:9$+%9+,'
:)9$)2)&;'
'
()*;'57)D+90,'
G/+'()*;'
F",+':06*;-'8+,0/+0$9':67&+7;'
1+3+7+%9+,''
O)@%8//&6>!"<L!\%&0)%2>!U<.<L!_/28%&>!R<!DEFFEH!A=1%!X*6;!.*2)#7%6+!R%K5%?('(0;!/26!.*)7%0(9!"#&8%&;C>!2,&3!)$)0&'
#/*'4#51"%+/0>!]Z!D]FH+!YZGJ`]!
\(66%2)>!O<!D]ZZ]H!4)*"5/+%&'#/*'6"$.78*"/%+%&9'6"$.'#/*'6)3+"%&'+/'%!"':#%"'4)*"5/';0">!./7:&(68%+!,*5(0;!
"1(55(28>!.<!DEFFGH!<!"'=)*&'#/*'6)3+#$'<!")5&>!_*26*2+!"/8%>!E26!Q6(0(*2!
!
I,'0/+'()*;'"'57)*690')3'0/+'.+4<'
O9@2*I5%68%7%20+!=1%!P(8(0/5!Q9*2*7;!,&*8&/77%!()!/!R%)%/&91!.*#29(5)!ST!9&*))!9*#29(5!(2(0(/0('%!5%6!:;!Q,"R.!/26!
9*20&(:#0%6!0*!:;!O4R.>!Q"R.!/26!UR.!
Sh
le
dg
e
Kn
ow
rc
h
Re
se
a
at
io
n
n
hi
bi
tio
Ed
uc
Ex
n
io
at
el
g
tin
ke
ar
M
R
ic
bl
e
tiv
ra
ist
in
m
Ad
Pu
ar
in
g
Cultural Heritage
Organisations on the Web
Knowledge
Online Cultural
Heritage
(OCH)
Data
Information
Javier Pereda
Knowledge
j.pereda@soton.ac.uk
Wisdom
Web Science
DTC
Informatum Production
Informatum Sharing
Engagement withInformatum
In the process of dening dierent levels of interaction and/or type of user levels in OCH, Taylor (1967)
provides a set of dierent perspectives of how a user/visitor might attempt to gain knowledge.
Visceral
Conscious
Formalised
Compromised
User Experience
Constructivism
Demateriallisation
Physical
Environment
Objects/Artifacts
Tangible
Static
Persistent
Intangible
Dynamic
Transient
Informatum
Digital
World
Tangible Interaction
(Campenhout, et.al., 2013)
TUIs present an interactive paradigm where a wider range of opportunities can be exploited. An example of this
is the capability of dierent levels of digital inclusion to be applied into interactive interfaces.
Supervisors
50
Method
Participants
40 undergraduate students (Female = 27, Male = 13) completed this study in
exchange for course credit. Participants were randomly allocated to either a Control
or Experimental condition.
Design
Study used a 2(Condition) x2(Gender) x2(Room Type) x2 (Movement) mixed design.
Apparatus
This study used a virtual environment which participants were required to navigate
and explore. This was modelled on the University of Southampton Shackleton
Building (44), using 3DSMax 2012. Participants controlled their movement using the
arrow keys, but could not interact with items within the environment.
Group Control explored a replica of the building with no additional navigation aids. In
contrast Group Experimental also saw large coloured bands on the top of each of the
walls, based on their compass facing (North Blue, East Yellow, South Green and West
Red)
Procedure
Participants explored the outside and inside of the virtual building before completing
four orientation trials. At the start of each orientation trial Participants found
themselves within rooms in the virtual building and were asked to turn to face a nonvisible external landmark. Once participants were happy with their position they
proceeded to the next trial.
Two rooms in the orientation trials were external, allowing the use of external visual
cues to orientate. The other two rooms were internal, over looking the inner
courtyard, and required an understanding of the spatial relationship between the
internal and external cues to complete the task. One of the external rooms and one
of the internal rooms had been visited previously in the acquisition trials.
Results
Orientatation Error (in degrees)
140
140
120
120
100
Female
Male
80
100
60
40
40
20
20
External
Unvisited
Internal
Unvisited
External
Visited
Internal
Visited
Female
Male
80
60
External Internal
Unvisited Unvisited
External
Visited
Internal
Visited
Results suggest that without the coloured cues Females in Group Control found it
difficult to orient within the inner rooms, especially if they had not previously
visited.
A 4-way mixed design ANOVA revealed a main effect of room type, F(1,36)= 4.45,
P<0.05 suggesting it was more difficult to perform the task from an internal room. A
main effect of movement, F(1, 36) = 9.96, p<0.01 suggests that the orientation task
was more difficult from within a room which participants had not previously visited.
No other main effects were significant. There was a significant 4-way interaction,
F(1, 36) = 6.91, p<0.05. Further analysis via simple main effects revealed that there
was only an effect of gender in Group Control in the Internal room to which the
participants had not previously moved, F(1, 144) = 8.96, p<0.01. This suggests that
females found it harder than males to orientate in this room, but this impairment in
spatial updating was removed by the addition of the coloured cues.
Conclusion
Participants within the control condition struggled to automatically update their
position within internal rooms, suggesting they were unable to update multiple
environments simultaneously. This is consistent with previous findings, using real
world tasks (Wang & Brockmole, 2003)
The effect of movement offers partial support for Klatzky et al. (1998). Participants
made greater orientation errors within rooms which they had not previously visited.
However many were able to remain oriented within the virtual environment without
the need for physical movement.
There was no overall effect of gender, but a gender difference was apparent when
participants were required to use internal cues. Females within Group Control were
unable to effectively update their orientation automatically within the internal
room. The addition of colour cues however allowed females in Group Experimental to
orient as well as the males. This is consistent with females greater reliance on direct
landmark cues (Lawton, 1994).
Results suggest that losing track of where you are within a virtual environment can
be reduced by the addition of salient visual cues which are associated with external
orienting features.
References
Klatsky, R.L., Loomis, J.M., Beall, A.C., Chance, S.S., & Golledge, R.G. (1998). Spatial updating of self-position and orientation during real,
imagined, and virtual locomotion. Psychological Science, 9, 293298
Lawton, C. A. (1994). Gender differences in way-finding strategies: Relationship to spatial ability and spatial anxiety. Sex Roles, 30, 765-779.
Lawton, C. A., & Morrin, K. A. (1999). Gender differences in pointing accuracy in computer-simulated 3D mazes. Sex Roles, 40, 73-92.
Riecke, B.E., Cunningham, D.W., & Buelthoff, H.H. (2007) Spatial updating in virtual reality: the sufciency of visual information.
Psychological Research, 71, 298313.
Rieser, J. J. (1989). Access to knowledge of spatial structure at novel points of observation. Journal of Experimental Psychology: Learning,
Memory, and Cognition, 15, 1157-1165.
Tlauka, M., Brolese, A., Pomeroy, D.E., & Hobbs, W. (2005), Gender differences in spatial knowledge acquired through simulated exploration
of a virtual shopping centre, Journal of Environmental Psychology, 25, 111-118.
Wang, R.F. & Brockmole, J.R. (2003) Simultaneous spatial updating in nested environments. Psychonomic Bulletin & Review. 10, 981986
Acknowledgments
This research was funded by the Research Councils UK Digital Economy Program, Web Science Doctoral Training Centre,
University of Southampton. EP/G036926/1
RESEARCH POSTER PRESENTATION DESIGN 2012
www.PosterPresentations.com
51
Memory Institutions
and the Web
On the web, the audience of heritage is very different. Young people and
people of different socio-economic backgrounds engage with content with a
history or archaeology focus much more readily online than they do offline. In
addition to this, the audiences of this kind of content are finding information
and knowledge about these topics away from the large authoritative
organisations. An online user will come across the information in a different
way, and this is key to the success of sharing heritage knowledge online.
Content online still needs to be collected and categorised, to be interpreted
and then presented: to be curated. Open data is an essential component to
this re-discovery of information. Social networking systems, the tools and
platforms where people are creating and sharing content are essential to the
future of museums. Museums are the appropriate institution to exhibit data
from the web that relates to cultural memory, and that the adoption of open
data and real engagement with the social aspects of the web will be integral to
this occurring.
Online metadata indexes make collections and objects within collections
findable. The serendipity of the case study, Retronaut, and the fun and relaxed
way that the site and its associated social networking platforms engage with
audiences is illustrative of this potential.
Notes: http://theculturalheritageweb.wordpress.com
Thoughts: @nicoleebeale
References:
52
Since its inception 25 years ago the World Wide Web has facilitated an explosion of
information unprecedented in its scale. Many websites are said to embody the Webs
censor-free, information anarchy. This has led to widespread anxiety about the fidelity
of some of this information and its potential to do harm. As the myth of the Digital
Native is debunked, young people, it is now claimed, are exceptionally vulnerable to this
new danger; they are declared nave and lacking in the crucial new literacies needed to
discern fact from fiction.
This work investigates the reality of these fears and claims. Drawing on case studies
from two very different institutions a state sector FE college with a largely white
working class intake and a prestigious independent fee paying school with an ethnically
diverse intake the research explores how groups of 16-18 year olds access, interpret
and use information. It focusses on controversial information involving issues such as
immigration, climate-change, and government cover-ups and makes use of multiple
methods including interviews and workshops as well as proxy servers to digitally record
everything young people do on the Web. The data suggests highly differentiated, classbased practices grounded in the social, material and cultural contexts of everyday life
that can be better understood by combining Bourdieusian and Foucauldian theoretical
frameworks.
Acknowledgement: The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and
contributed to by AHRC, ESRC and MRC
53
Web
Science
Dissemination &
Disaggregation
54
William Fyson
Dr Simon Coles
Prof Les Carr
The models that govern scholarly discourse have developed over hundreds of years to produce a rigid and stable system for
exchanging research outputs. Whilst the mechanisms in place have served academia well, the Web presents an opportunity
for a number of innovations. Yet despite potential benefits, changes in academic publishing have been relatively
unforthcoming compared to many industries now dominated by the Web. Only by understanding the complex socio-technical
dynamics that underpin the system are we able to determine why the Web may not have enabled a scholarly utopia, that it has
to potenital to create.
Dissaggregation
Discussions
Posters
Workflows
Presentations
Datasets
Workshops
Collaborations
Thesis
Methodologies
Contacts
Ideas
The Redactor tool assists researchers with disseminating their work to the
widest audience possible. It allows a user to remove any elements that inhibit
wider dissemination and assists the user with finding alternative content that
may be more suitably distributed.
For example, images can be replaced with Creative Commons licenced
alternatives, or a user can distribute their own images by embedding licences in
the metadata.
Available at: http://users.ecs.soton.ac.uk/rwf1v07/redactor/
The Creative Commons suite of licences allow anyone
to publish their work openly whilst still requiring
anyone who uses the work to attribute the original
author. Thus the licences are useful to publish any
research outcomes, including papers and data sets.
Reward &
Recognition
The system that drives research relies on researchers building their reputation
as someone who contributes useful knowledge to their community. Thus to
encourage an open and disaggregated scholarly discourse, it must be easier
for researchers to prove the validity of their work to their peers, show the
impact of their work to institutions and demonstrate their skills and experience
to industry.
An online portfolio of a researchers work may be one way to achieve this,
aiming to elevate disaggregated research outputs to the level enjoyed by
journal articles. Provenance metadata provides vital context to research
outputs and Altmetrics could be used to help demonstrate a wide range of
impact.
Provenance
Peers
conte
xt
skills
validation
knowledge
Industry
Community
impa
ct
AltMetrics
visu
ns
tio
alisa
University
The Disaggregator tool takes a user's document and assists the user in
extracting discrete chunks of knowledge that can be distributed in their own
right - in a Chemistry context as illustrated below, this may involve extracting
the data that represents a compound or a reaction from a thesis, so that it can
be more easily shared and used and built upon.
Once a work has been disaggregated, the resultant items of data and
information are available to be exploited by a researcher to further enhance
their reputation and be used by their peers. Further research will look into
associating items extracted by the disaggregator with an ORCID and
publishing results to blogging platforms to further explore ideas of reward and
recognition.
55
Introduction
On the 23 of April 2013, a fake tweet was sent from the White House's twitter
account. A few minutes later the price of the Standard and Poor's 500 index,
representing 500 of the highest valued companies in the US dived by nearly 1%.
1 tweet accounted for the loss of nearly 1% of the value of the US Economy.
In a sense this is not surprising, financial news services like Bloomberg and
Reuters regularly update and publish indices of media sentiment towards
stocks. Over the last 4-5 years researchers have begun to look for models of
media sentiment which can be used to predict prices. The results of this
research are, however, generally quite disappointing.
The reason for this is that the way language relates to offline events is a
difficult thing to model. Language is temporally uncertain, in that a
statement can be about an event in the future, past or present. Also as yet
there is no literature which describes how to model word frequency
movements over time.
The aim of this PhD is to define a methodology that tackles these issues.
56
57
Christopher Hughes
Dr Lorraine Warren
Dr Jason Noble
58
T ERHI N URMIKKO
D R J ACOB D AHL
D R K IRK M ARTINEZ
D R G RAEME E ARL
University of Southampton University of Oxford University of Southampton University of Southampton
of competence.
59
C.J.Phethean@soton.ac.uk
VALUE
This framework has been produced as a result of a mixed methods investigation into what influences the creation of value on social media for
charities. It goes beyond existing free analytic services that rarely take into account the context of the organisation in question, and instead focuses
on what their aims are, how they relate to their supporters' reasons for using social media to connect with a charity, and how these aspects are
reflected in actual behaviour on the sites.
1. SOCIAL THEORIES
On the web, behaviour are a crystallisation of existing behaviour studied in social science.
- Important phenomenon on the web and in the society in general is the tendency of
change instead of static state [13] [5]. This particularity is exacerbated on
Information Stream where life of an URL cited on Twitter is around 2.3 hours [2].
Aim:
Linking theoretical reections about social behaviour to their methodological implications with
the new form of data available. Theses links are created in order to develop practical solution
to understand group formation on Social Network Sites, specically on Twitter.
Social
Processes
60
Dynamic
Network
Micro-Blogging
Behaviour
Time
Quantitative
Production
Access
2. TYPE OF DATA
3. BIG DATA
- The combined impact of scale, breadth and complexity increase the diculty to
nd useful information.
- Diculty to verify the coherence of dataset and be sure the information measured
are eectively the one supposed [10].
Databases
4. FRAGMENTATION
Data
Qualitative
- Lack of unication of data and they are not focused on individuals making
the comparison overtime dicult.
Computer Analysis
Network analysis
Algorithm Analysis
REFERENCES
[2] Bitly blog - you just shared a link. how long will people pay attention?
http://blog.bitly.com/post/9887686919/you-just-shared-a-linkhow-long-will-people-pay, September 2011.
[3] E. Bakshy, J. M Hofman, W. A Mason, and D. J Watts. Everyones an inuencer: Quantifying inuence on twitter.
In Proceedings of the fourth ACM international conference on Web search and data mining,pages 6574. ACM, 2011.
[4] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user inuence in twitter:
The million follower fallacy. In 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 2010.
[5] J. Cho and H. Garcia-Molina. Estimating frequency of change. ACM Transactions
on Internet Technology (TOIT), 3(3):256290, 2003.
[6] B. Latour. Reassembling the social. Oxford University Press Oxford, 2005.
[7] R., Rogers. The end of the virtual: Digital methods. Amsterdam University Press, 2009.
[8] M. Savage, and R. Burrows. The coming crisis of empirical sociology. Sociology 41(5):885-903, 2007.
[9] M. Savage, and R. Burrows. Some further reections on the coming crisis of empirical sociology.
Sociology 43(4):762, 2009.
[10] M. Thelwall. Interpreting social science link analysis research: A theoretical framework.
Journal of the American Society for Information Science and Technology 57(1):60-68, 2006.
[11] J. Urry. Mobile sociology. The British journal of sociology, 51(1): 185-203, 2000.
[12] J. Weng, E. P Lim, J. Jiang, and Q. He. Twitterrank: nding topic-sensitive inuential twitterers. pages 261-270
in Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010.
[13] J. Wilbanks. I have seen the paradigm shift, and it is us. In T. Hey et al. (Eds.), The fourth paradigm (pp. 209-214).
Redmond, WA: Microsoft Research, 2009.
[14] J., Yang, and J. Leskovec. . Patterns of temporal variation in online media. Pp. 177-186 in Proceedings of the fourth ACM
international conference on Web search and data mining. ACM, 2011.
5. DISCONNECTION
- Computer science has useful tools to analyse dataset and developing a epistemological approach
of the 4th paradigm
- "New scientic methodology based on the power of data-intensive science, understood as the
capturing, curation, and analyse of large data" [12]
- But, there is a risk of understanding the human behaviour as the best algorithm results,
developing a human-engineering without understanding the meaning of the interaction
- The solution is inter-disciplinary : connecting the social science theories to the computer science.
- Theoretically: Social sciences bringing already conceived concepts and reections about
notion of network and time within human, giving integrate understanding of interaction and
- Methodologically: Finding solution about the implications of big data with computer side
conception (scalabilty) but also by having a comprehension of the meaning of data.
- Both disciplines will benet of the interaction
- Social science :
- Using existing and adequate tools instead of creating new one [8][9]
- Having the opportunity to use dataset with new kind of information to test the existing
theories.
- Computer science:
- Using concepts allowing the understanding of human behaviour upon the algorithm
perspective.
- Knowing which variables is important to store, analyse and understand.
Olivier PHILIPPE
op1e10@ecs.soton.ac.uk
61
Methods
The study was comprised of three stages:
Background
Medicines and drugs are subject to national and state/federal
regulation. The misuse, illegal consumption and purchase of
drugs and medicines is not a new phenomenon, but it is one
which the Web may enable or magnify, opening up as it does
access to online information and purchasing.
The provision, purchase and supply of prescription only
medicines are typically regulated by national or state law. This
can vary between countries; each with their own licensing body
(e.g. UK The Medicines and Healthcare products Regulatory
Agency (MHRA) and the US The Food and Drug
Administration (FDA). Current UK medicines legislation is
comprised of the Medicines Act 1968 and approximately 200
statutory instruments. Much of this legislation has not kept up
with developments online and the Web is notoriously difficult to
police
Findings
The forum and survey data show the wide variety of medicines
available to buy online, and that the Web is a source of discussion
and debate about such purchasing. These data also indicate that
there are websites that do not follow regulatory standards in
requiring prescriptions and consultations for prescription only
medicine.
The interviews show that people talk about the purchasing medicine
online in relation to other consumptive behaviour on and offline.
People that have purchased medicine from the Web presented
justifications for their behaviour. Such justifications involved
availability, convenience and need to support the online purchasing.
Impact / deployment
to procure them. What is legitimately available is constantly shifting and the Web
does not always reflect this, allowing sales toAcknowledgement:
be conducted outside
Theauthorised
Digital Economy Programme is a Research Councils UK
forms of supply.
cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC
62
CLEANWEB UK REPORT
How British Companies are using the Web for Economic Growth & Environmental Impact
SONNY MASERO, JACK TOWNSEND
https://eprints.soton.ac.uk/369513/
References:
Routledge, P., & Cumbers, A. (2009). Global Justice Networks: Geographies of
Transnational Solidarity. Manchester University Press.