Professional Documents
Culture Documents
October 2016
Web Science
Centre for Doctoral Training
The Centre for Doctoral Training in Web Science is funded by the EPSRC, and
underlines Southamptons pre-eminence in this new research discipline. Web Science
has an ambitious agenda. It is inherently interdisciplinary as much about social and
organisational behaviour as about technology. Its research programme targets the
Web as a primary focus of attention, adding to our understanding of its architectural
principles, its development and growth, its capacity for furthering global knowledge
and communication, and its inherent values of trustworthiness, privacy and respect
for social boundaries. The first year of the training programme is a taught MSc and
includes short courses and project work tailored to each students research interests.
This is followed by three years of challenging and original research at PhD level.
This booklet details the current MSc students academic and professional
backgrounds along with their research plans for the future. It also includes a research
poster from each of our PhD researchers.
The Digital Economy Theme is a Research Councils UK cross council initiative led by
EPSRC and contributed to by AHRC, ESRC, and MRC. This work was supported by
the EPSRC through grants EP/G036926/1 and EP/L016117/1.
Content
Biography | MSc Students 2016
Jacqueline AYLING 1
Maria BOBKOVA 1
Ed GILLBARD 2
Justyna JONAK 2
Sofia KITROMILI 3
Cat MORGAN 3
Travis RALPH-DONALDSON 4
Bernard ROPER 4
Rachel TAYLOR-HAMILTON 5
Robert THORBURN 5
Jonathan STANIFORTH 6
Amy WALES 6
Clarissa BROUGH Listening to Gender: The Role of Online Music Networks in the Construction 7
and Performance of Gender Identity
Anna KENT-MULLER Could Music Recommendation Systems be Enhanced by using Musical Analysis 11
of Encoded Data?
Fernanda SANTOS-SANCHEZ Applying Web Analysis Techniques to Clinical Text: Analyzing the Effect of 14
Emotive Materials on Clinical Trial Recruitment and Retention Rates
Chira Tochia Understanding Young Childrens' Pathway to Digital Literacy and the Effects 15
this has their Identity
Christopher ADETUNJI Enterprise Mobility And Big Data Analytics: A Leverage For Corporate Knowledge 17
Management
Nada AL BUNNI Investigating the Online Public Sphere for the Arabic World 18
Neil AMOS Social Media and the Far Right: Web 2.0, Opportunity for the English Defence 19
League?
Briony GRAY Social Media and Natural Disasters: A Framework for Web 2.0 23
Sarah HEWITT The Problem with Identifying Misogynist Language on Twitter (and other online 24
social spaces)
Dola MAJEKODUNMI Investigating Customer Attitudes and preferences in Social Media Banking 25
Keisha TAYLOR Moving Beyond Local to Assess how Intangible Assets are Developed by Micro, 27
Small and Medium Enterprises (MSMEs) on the Global Web
Niko TSAKALAKIS Identity Assurance: Technical Implementation in the UK and its Legal Implications 29
Emma CRADOCK Understanding How to Talk Formally About Personal Data to Make Data 33
Processing More Transparent
Conrad DSOUZA Predicting Selections from Past Performance Data: A Case Study 35
Predicting Winners of Horse Racing
Faranak HARDCASTLE Back on the Track of Do Not Track: Raising Transparency in the Online# 36
Behavioural Tracking Ecosystem
Laura HYRJAK Youth, Drugs And The Web: Exploring Youths Use Of The Web To Access 37
And Research NPS
Sami KANZA Bringing The Modern Power Of The Web To Chemical Research 38
Amy LYNCH Examining the Activated Patient: A Qualitative Study of How and Why 39
Diabetic Patients Use the Web to Aid Self-Management of their Disease
Neil MACEWAN Navigating the Dangers of Victim Blaming and Scapegoating within UK 40
Cyber Security
Jessica OGDEN Institutional Repositories on the Web: Intersecting Narratives and Technical 42
Code
Gert JAN VAN HARDEVELD Online Criminal Transaction Processes: Using Crime Script Analysis to Identify 48
Interceptive Opportunities
Johanna WALKER The Risks And Barriers Of Open Data: An Entrepreneurial Perspective 49
Steven WHITE Aligning Learning Theory, Learning Design And Trust In MOOCs 52
Research Posters | PhD Researchers 2012 2016
James BAKER Immersion in Serious Games: A Model for Immersive Factors in Educational 53
Games
Gareth BEESTON Innovation Competitions on the Web: An Analysis of Open Data Usage in 54
Innovation Production to Tackle Social Challenges
Robert BLAIR Is Social Media Being Used to Support Non-Formal Learning by School 55
Children?
Ian BROWN The DNA of Web Observatories 56
Caroline HALCROW SPENCE: A Model to Describe, Measure and Map Online/Offline Community (O/OC) 59
William LAWRENCE The Investor Decision Making Process - A Web Science Perspective 60
Manuel LEN URRUTIA Understanding Attitudes Towards MOOCs in Higher Education Institutions 61
Keiran RONES The Web and Digital Pirates: Who Are Pirates and do they Understand the 64
Law?
Eamonn WALLS How to Make the World a Better Place in 5 Easy Steps 65
Paul BOOTH Visual Analytics: The Framing of Data & User Behaviour 68
Timothy DAVIES Shaping the Civic Impacts of Open Data on the Web 69
Gemma FITZSIMMONS Skim Reading: An Adaptive Strategy for Reading on the Web 71
Rebecca NASH Making Bodies: What is the Role of the Web on Womens Engagement with 77
Aesthetic Surgery??
Javier PEREDA Enhancing Engagement with Online Cultural Heritage 78
Research Posters | PhD Researchers 2010 2014
Craig ALLISON Orienting Within Complex Digital Environments: Bridging the Gap Between the 79
Inside and Out to Reduce Disorientation
Nicole BEALE Memory Institutions And The Web 80
Jaymie CAPLEN Online Behaviour Of States: The Effect Of Different Strategies on Populations And 81
International Relations
Huw DAVIES Abandoned Youth? the Problem of Youths Lack of Digital Literacy 82
Huw FRYER Reimagining the Public Health Analogy for Web Security 83
Christopher HUGHES A Multi-Dimensional Framework of the ICT Innovation System: An Agent Based 87
Approach for Policy Making
Terhi NURMIKKO Web Science for Ancient History: Deciphering Proto-Elamite Online 88
Christopher PHETHEAN Revealing the Value of Social Media for Charitable Organisations 89
Olivier PHILIPPE How can we Develop Sociological Approaches to Design a New Model for 90
Understanding Relationships on the Web
Lisa SUGIURA Buying Medicine from the Web 91
Philip WADDELL Exploring the Use of the Web in Global Justice Networks 93
Laura GERMAN Academic Research Data Re-usage in a Digital Age: Modelling Best Practice 94
Sarosh KHAN The Emergent Threat of Defamation Online: The Need for a New Model Governing 95
Online Defamation with the Emergence of Social Web Technologies
Russell NEWMAN Modelling Speculative Behaviour In Web 2.0 And Social Media Companies 96
Jacqueline AYLING
J.A.Ayling@soton.ac.uk
Maria BOBKOVA
mb3n15@soton.ac.uk
My fascination by every aspect of the Web has brought me to this course: every
action, participation and choice brings an array of research questions. I like
facing challenges and get inspired everyday by bright and innovative people.
What particularly interests me is the future of the Web and predictions
especially on the subject of personal data value from commercial and individual
prospect. The greatest challenge for me is to bring some sustainable positive
change in the interest of the public.
1
MSc Students 2016
Ed GILLBARD
ej16g15@ecs.soton.ac.uk
Justyna JONAK
jkj1n15@soton.ac.uk
One of the research areas of interest to me is open justice and privacy. Open
courts are a fundamental feature of any democratic society, as they can
guarantee a fairy judicial system.
The Web is a place where the public can readily access information about trials
and cases at low costs. Currently, most of the courts in the UK are starting to
adopt an electronic system. This means that more and more government data
will become available on the Web, thus contributing to the transparency and
accountability of the government. One should not forget, however, that there is
a delicate line between open justice and privacy. At courtrooms, a large volume
of information is gathered. This is problematic in that defendants are judged,
punished, and shamed. The disclosure of court records with personal details
raises serious concerns about privacy. In addition to the Web, social
technologies facilitate live-publishing on a global scale. There is no regulation on
what can be published or blogged online by concerned citizens. This can lead to
people posting information about cases that are subsequently declared
mistrials. I believe that, in order to implement the concept of open justice on the
Web, the electronic system for open justice must be adequate addressed and
the aforementioned factors need to be taken into account.
I intend to research this topic by undertaking a multidisciplinary approach
involving legal, philosophical, technical, and criminological perspectives.
2
MSc Students 2016
Sofia KITROMILI
sk1n15@soton.ac.uk
Cat MORGAN
C.E.Morgan@soton.ac.uk
3
MSc Students 2016
Travis RALPH-DONALDSON
tjrd1n16@ecs.soton.ac.uk
Bernard ROPER
B.A.Roper@soton.ac.uk
4
MSc Students 2016
Rachel TAYLOR-HAMILTON
R.E.T.Hamilton@soton.ac.uk
Before joining the Web Science Centre for Doctoral Training I worked in
Education and Policy. My role being that of a Principle Examiner for an
international exam board and a Head of Biology at an FE College. My
background in Biology and Biochemistry led me to discover the sub discipline
of Web Science; Health Web Science initially, drawing my interest into the
impact of the Webs health-related uses on the design, structure, and further
development of the Web. The distributed and adaptable nature of the Web
encompasses many disciplines which require collaboration to study the
impact of the connections among Web users. I am interested in how the Web
is shaped by our 21st Century societys medical and healthcare needs and
conversely how web related technologies can facilitate health. In particular,
Web-based communities and the associated generation of Web-based data in
preventative medicine and surveillance of disease. My career ambitions are in
research and development of personalised medicine, integrating the
enormous knowledge base of the Web with individuals data to provide the
right treatment to the right people in the most efficient way possible.
@racheltayham
linkedin.com/in/rachel-taylor-hamilton-msc-99874b43
Robert THORBURN
R.H.Thorburn@soton.ac.uk
BA , BA (Hons), MA ( Philosophy)
MBA, University of Stellenbosch
5
MSc Students 2016
Jonathan STANIFORTH
J.Staniforth@soton.ac.uk
I have worked in the Web development industry for approximately two years as
a full-stack developer. Projects I have worked on include developing the front-
end of 'iDEA'for the Duke of York.
Amy WALES
A.Wales@soton.ac.uk
BSc Law
MSc Law
I undertook both my Undergraduate degree and MSc in Law whilst also taking
on various pro bono activites and work experience in the legal industry. I also
went on to take my Legal Practice course in London. I have worked in London
for various legal firms working mostly on Big Data and Internet Law specifically.
My reserach interests are primarily centred around Data Protection and Big
Data and I would like to further my research in this area, especially in regard to
data regulation and its importance to the Web
6
Research Posters | PhD Researchers 2015 2019
7
Research Posters | PhD Researchers 2015 2019
8
Research Posters | PhD Researchers 2015 2019
9
Research Posters | PhD Researchers 2015 2019
10
Research Posters | PhD Researchers 2015 2019
11
Research Posters | PhD Researchers 2015 2019
12
Research Posters | PhD Researchers 2015 2019
13
Research Posters | PhD Researchers 2015 2019
14
Research Posters | PhD Researchers 2015 2019
15
Research Posters | PhD Researchers 2015 2019
16
Research Posters | PhD Researchers 2014 2018
School of Electronics
and Computer Science
Corporate
Knowledge Flow
Knowledge Flow
Corporate
17
Research Posters | PhD Researchers 2014 2018
Abstract
The Studied Problem The political and social movements in the Arab world have received wide media
coverage in the western countries and have emphasized the role of social media in
Arab states have experienced tremendous social and such movements. The literature on the Arab Spring has generated many questions
yet to be addressed in order to fully understand how the social media affected and
political upheaval recently. These upheavals are
continue to affect the public in the Arab states. This work aims to study the
significant not only for those states, but also the emergence of online public sphere for the Arab users. The concept of public sphere
consequences on traditional social patterns and the identifies historical formation of democratic societies and it also posits a model of
impact on radically altered lives. Traditions have lost what an ideal society should be. This makes it a good candidate to use as
their decisive role in the destiny of the people in theoretical framework in order to understand the role of social media in the Arab
these situations. states. The statistical indicators suggest Facebook is providing a sphere for public
to discuss their public concerns. This research will use the techniques of social
Social divisions caused by civil war and the diasporas
network analysis to analyse the structure and the participants of this sphere and
that follow wholesale destruction have, however, how it is evolving during the political and social movements.
been penetrated by the use of new networking
technology that provides people with different
opportunities of connectivity and opens new venues
for diverse civil society groups to act as political Research Motivations
agents.
Although there is a rich literature that has been dedicated to
Social media has provided people with a medium not
only to vent their rage and despair, but also to study the recent social and political movements in the Arab
rethink their identities and values beyond the states as a manifestation of the potentials of the online social
traditional forms . This paper examines the transition networks, this literature has generated more questions to
from highly regulated and controlled web by
research on.
authoritarian regimes over the mass media and all
o Why Arab states have experienced different scenarios and
other traditional mediums to the current context of
various outcomes of their uprisings during the Arab Spring.
online connectivity. Some authors suggest that the
online social networks are enabling the emergence o The impact of social media on politics is continuous and it
of a new Arab public sphere. requires ongoing observation and analysis.
18
Research Posters | PhD Researchers 2014 2018
19
Research Posters | PhD Researchers 2014 2018
20
Research Posters | PhD Researchers 2014 2018
www.nicfair.co.uk
In a networked society, many individuals learn by autonomously creating, cultivating and activating relationships with the
people, organisations, devices and services around them in order to efficiently gather information from distributed on- and
offline sources. These relationships form their Personal Learning Network (PLN). PLNs are egocentric, socio-contextually
dependent, complex and used in different ways for different purposes in different learning contexts. They are a powerful,
modern tool through which formal and non-formal learning can occur, as they reflect the wider social changes resulting
from the World Wide Web and mobile communication technology.
The Framework for Understanding Personal Learning Networks draws conceptually on the Social Sciences approaches of
Actor Network Theory and Situational Analysis; the Educational theory of Connectivism; and the Network Science
toolkit of Social Network Analysis. It uses quantitative data to describe what PLNs look like and qualitative data to explain
why they look like that. Interaction patterns occurring across PLNs can be identified and used to inform educational
pedagogy, methodology and instructional design.
Example Social Network Graph
The Case Study sits at the centre of each network and the frequency of
Example Filtered Purposive Network Graph
interaction between nodes is represented by the width of the edges. It is
also possible to weight interactions by their duration.
Interaction patterns can be easily identified and then explained with the
socio-contextual data captured in post-data-collection, structured inter-
view. Patterns can therefore be categorised as either specific to the Case
Studys context or generalizable across PLNs. General patterns can be used
to inform educational developments in networked learning.
21
Research Posters | PhD Researchers 2014 2018
22
Research Posters | PhD Researchers 2014 2018
Briony Gray Social Media and
University of
Southampton
Natural Disasters: A
Bjg1g11@soton.ac.uk Framework for Web 2.0
Background
In the past decade social media and the Web have played an increasing role in emergencies and disasters,
primarily as they offer a means of two-way reliable and accessible communication. Examples of social media
include Facebook, Twitter, blogs such as Wordpress, video channels such as Youtube, professional sites such
as LinkedIn and general forums. They are used in a number of ways which range from individuals passing on
warning information, to governments distributing real-time updates or advice during an event. Social media
and Web use during disasters may be conceptualised into two broad categories: the first is used to
disseminate information and to receive communications, the second is used as a management tool.
The impact of social media in disaster situations however is reliant on a number of underlying factors. These
have been synthesised into key overriding themes that existing literature highlight at emergent areas which
require further study. Firstly, accessibility to the Web and subsequently social media is a vital consideration
to the effectiveness of online disaster management strategies. Secondly, the reliability of online information
shared on social media and other forms of communication has a direct link to the level of risk an individual
is subject to. Thirdly, usability of online sources, tools, applications and channels has clear connotations to
how effective these resources may be used. While the utility of social media during disasters remains
intriguing, many applications, tools and platforms remain either speculative, in their infancy, or have been
subject to unexplained underlying factors that subvert their potential.
Methodology
In order for social media uses to be fully understood and integrated into disaster management the Web must also be
studied as it represents the intermediary between the individual, and online information. Related works synthesise
information regarding social media use/users and benefits/limitations in analysis frameworks for application to specific
disaster events, however these are lacking in key areas required for better understanding and improvements, and fail to
synthesise broad ranging information designed to be applied across multiple different disasters. This study sought to
address these gaps in knowledge by assessing the role of the Web in online disaster communications and questioning
whether this can be synthesised into disaster frameworks. Secondly, it questioned whether the incorporation of recent
literature is able to produce a more insightful analysis framework, and thus more detailed application. Finally, it sought
to evaluate whether the incorporation of an interdisciplinary perspective may broaden the explanations of said
framework, leading to more effective social media disaster management tools.
The qualitative nature of the study data, and the application to a number of varying case studies meant that a framework
was the most suitable way of synthesising information. To generate such a framework the study followed a number of
steps:
1. Relevant literature was searched for and a database made of suitable articles. These were identified through
key term searches using Google and Academic databases. The shortlist contained 59 individual papers.
2. Grounded theory and inductive coding were applied to the shortlist of papers, which produced a series of
categories explaining how and why social media was used during disasters (according to the literature).
3. Each category had appropriate sections of papers slotted in according to theme and content. This produced
a framework of 44 categories which illustrated the range of uses for social media during a disaster.
4. The framework was then applied to a case study to demonstrate relevancy and insight to a disaster situation
where social media and Web 2.0 had been used, which exceeded the usefulness of other existing frameworks.
5. Suitable conclusions were drawn from the framework application, and future suggestions provided.
Results
The study produced a framework featuring 44 categories which took a number of considerations into account. These were broken down into the four key themes
highlighted by the literature review (accessibility, usability, reliability and effectiveness). They indicated several trends within the literature that previous
frameworks had not fully discussed or explained: firstly, there had been a rapid development in technology and software that was able to be utilised by disaster
management strategies. Secondly, there was a growing evaluation of the Web as the intermediary to social media. Finally, it was evident that offline and online
situations still differed dramatically, and that confusion between the two was a considerable limitation to the effective use of social media during disasters.
Accessibility A number of categories in the analysis framework indicated that Web accessibility remained a vital issue. This is because geographical differences
in location, household income, poverty levels, geographical internet spread and online authentication issues impacted who was able to gain access to the Web,
and therefore social media. Less economically developed countries were shown to have the lowest access to the Web during disasters, with ethnicity and location
also having a direct affect to Web access.
Reliability The reliability of information spread on social media was shown to be impacted in a number of ways throughout many framework categories. These
included unintentional spread of false information, malicious spread of information or terrorism, sharing information without verified sources or information
filtering systems not functioning as they were intended to. The categories however highlighted the fact that information reliability was an area in which individuals
and organisations were becoming increasingly critical of, leading to improved online information standards.
Usability The usability of the Web was broken down into two categories. The first was technical usability which involved the technical design, proficiency and
success of software and hardware during disasters. The framework found that this was the area in which huge improvements and investments were being made
both in research groups and on a governmental scale. These took the form of innovative tools, applications and protocols. Social usability involved the ability of
individuals to use the Web effectively and to understand the information on it. The framework showed that differences in computer literacy, the age at which
someone was first exposed to the Web, and how many technical devices and individual owned made an impact in management effectiveness.
Accessibility issues were demonstrated by tweets which stated that local Nepalese people did not own, or owned fewer, devices that could connect to the Web throughout the disaster. Reliability
issues were highlighted by the general confusion of the Facebook safety check application, which was made use of by individuals on a global scale rather than in Nepal alone. This confused rescue
efforts, and created discrepancies between online and offline situations. Reliability was also demonstrated by the lower than expected count of the standardised disaster hashtag #NepalEarthquake
in comparison to other hashtags, meaning that the spread of online information was not as easily traceable. Usability issues were shown in the manifestation of public unrest regarding the Nepalese
government. Tweets which called individuals around the world to invest in charities rather than to donate to the government for fear of corruption evidently represents underlying social factors and
political friction. The assessment of the Web as an intermediary to social media produced valuable insight to the analysis framework application, which was evidenced by the range of accessibility
issues shown in the Nepal tweet dataset. The range and depth of issues attributed to accessibility barriers meant that emerging theories regarding the Web, such as online identities and Web
perception, were able to be discussed unlike in related frameworks. Similarly, the incorporation of an interdisciplinary perspective allowed for the identification of underlying factors often overlooked
in related general frameworks, such as the presence of political frictions between the public and government.
Future development of the framework should focus on the creation of a translation system where a minimum of three individuals would translate and interpret the context of a tweet. This would ensure
a reduction in human error and/or bias, and develop a clearer idea of tweet context than individual translation alone. The application of the framework to the Nepal dataset demonstrated that the
research questions had been addressed, and that interdisciplinary, recent and Web-focus literature have produced a valuable insight to the case study. Consequently, in the future the framework may
be utilised by various tools, applications and online resources for improvements to online disaster management strategies that are both interdisciplinary and relevant.
23
Research Posters | PhD Researchers 2014 2018
24
Research Posters | PhD Researchers 2014 2018
Theoretical Framework
Rogers Diffusion of Innovation
Relative Advantage
Methodology
Attitudes and intention to adopt
Social Media Banking
Compatibility
A quantitative method approach was chosen for the study. The data used
for the study were in two categories, the primary data and secondary
data. The secondary data included a theoretical background from
journals, financial reports and market reviews of banks. The primary data
Complexity for this study was obtained directly from participants using a structured
questionnaire sent by email to University students. The questionnaire
had two sections- section one comprised of questions to obtain
information on the demographics of the respondents and section two
Trialability contained questions that collected data related to the influence of the
five attributes of innovation on the perception and attitude of
respondents to social media banking. A 5 point Likert scale (a
psychometric scale) was used and they were coded accordingly. The
questionnaire consisted of 34 questions measuring five variables. A
Observability reliability test using Cronbachs Alpha method was done to ensure
internal reliability of the multiple scale items used in the questionnaire.
Main findings
The study identified Facebook, Twitter and YouTube as the most
frequently used social channels by UK banks .
Convenience and ease of use were the major incentives for the use of
social media banking for the respondents .
Overall the respondents perceived data security and privacy as barriers to
adoption of social media banking .
The results showed that relative advantage, compatibility and trialability
were statistically significantly associated with attitudes of respondents
towards social media banking.
Reference
Rogers, E. M. (2003). Diffusion of
innovations, 5th edition New York: Simon &
Schuster Adult Publishing Group.
25
Research Posters | PhD Researchers 2014 2018
Rafael Melgarejo-Heredia
rm2e14@soton.ac.uk
Supervisors: Prof. Leslie Carr,
Prof. Susan Halford PUBLIC WEB
While humans communicate, they create interaction spaces, where we integrate,
share, express, collaborate, and coordinate actions, within either a community
or a social structure. The Web and its infrastructure the Internet add speed
and breadth to this interaction, to this communication, to the point that,
conversations may take overall dimensions, giving the sensation of a
community entanglement, which spontaneously creates an interdependent global
space, an immeasurable transductive virtual contact-zone, through a flow of
coordination of actions that affects all participants.
GOVERNMENTS
CORPORATIONS
DARK WEB
26
Research Posters | PhD Researchers 2014 2018
Keisha'Candice'Taylor'
keisha.taylor@soton.ac.uk'
Moving'Beyond'Local'to'Assess'how'Intangible'
Assets'are'Developed'by'Micro,'Small'and'Medium'
!
Enterprises'(MSMEs)'on'the'Global'Web!! !
!
Business! Geography
(Strategic Management)! (Economic Geography)!
27
Research Posters | PhD Researchers 2014 2018
28
Research Posters | PhD Researchers 2014 2018
Identity Assurance
technical implementation in the UK and its legal implications
Niko Tsakalakis | N.Tsakalakis@southampton.ac.uk Supervised by: Dr. Kieron OHara | Dr. Sophie Stalla-Bourdillon
29
Research Posters | PhD Researchers 2014 2018
Cultural Cultural
Producers Consumers
Recommender
Systems
Cultural'intermediaries'are$occupations$defined$by$Pierre$Bourdieu$as$taste$makers$who$
mediate$between$the$production/consumption$of$culture.$They$are$underpinned$ by$their$cultural$
legitimacy$and$expertise$(cultural$capital),$and$they$operate$within$a$structured$field$of$relations
How might Bourdieus theories be extended to think about recommender
systems? How might other theories be combined to achieve this?
Bourdieu Actor'Network'Theory
Capital$(economic,$cultural,$social)$is$the$ The$social/material$world$understood$in$terms$of$
accumulation$of$labour in$all$its$forms heterogeneous$(human/non)$actorDnetworks$
Cultural$capital is$the$basis$of$legitimacy$and$ There$is$a$delegation$of$labour amongst$actors$in$
expertise$of$intermediaries order$to$make$technologies$exist$and$function
Habitus$is$the$internalised norms$of$the$field$of$ Delegation$results$in$the$prescription$of$behavior$
relations$and$it$manifests$in$regulated$practice between$human/non$actors$in$an$actorDnetwork
Socio9Technical'System'Framework
A'framework'for'examining'how'cultural'capital'might'be'co9constituted'and'how'
habitus'regulates'the'actions'of'socio9technical'(e.g.'recommender)'systems
Cultural'capital'(intermediary$expertise)$can$be$explained$by$the$accumulation$of$
delegated'labour amongst$human/nonDhuman$actors$in$a$socioDtechnical$system
Habitus and$regulatory$norms$of$the$field$manifests$in$the$prescription'of'behavior'
from$human$to$nonDhuman$and$vice$versa
Jack Webster
jw30g11@soton.ac.uk
Prof. Susan Halford, Dr. Brian Hracs &
Dr. Nick Gibbins
Image$Credit:$http://appadvice.com/appnn/2015/06/rockDoutDwithDtheseDstreamingDmusicDservices
30
Research Posters | PhD Researchers 2013 2017
HYPERTEXT KNOWLEDGE://
FARMERS,FETTLERS OR FLANEURS?
Knowledge, stored as hypertext, doesnt naturally retain its relevance. The knowledge
may evolve or become obsolescent, as may its context within the web of other
hypermedia. Curation of the media persists the data but not necessarily its meaning or
relevance. How is this relevance retained:
Who undertakes this task in collaborative hypertexts and what is their skill-set?
How is this work privileged over other contributors yet given proper oversight?
Curation Skill-set
Trust Context
Lorem ipsum dolor sit
Web
amet, consectetur
adipiscing elit.
Quisque cursus mi in
metus volutpat, quis
egestas ipsum
Formalisms Visualisation
metus volutpat, quis
egestas ipsum
tristique. Vivamus
sagittis.
Mark Anderson
mwra1g13@soton.ac.uk
31
Research Posters | PhD Researchers 2013 2017
32
Research Posters | PhD Researchers 2013 2017
Understanding(How(to(Talk(Formally(
about(Personal(Data(to(Make(Data(
Processing(More(Transparent(
RQ5:$How$can$the$DIKW$Hierarchy$be$adapted$and$applied$to$the$EU$data$protec+on$
framework$to$make$personal$data$processing$more$transparent?$$
The$hierarchy$is$used$to$contextualize$data,$
Wisdom:$ Accumulated( knowledge.( Allows( informa6on,$ knowledge,$ and$ some6mes$
understanding( of( how( to( apply( concepts( from( wisdom,$with$respect$to$one$another$and$to$
one( domain( to( new( situa>ons( or( problems.(
Ability( to( see( beyond( the( horizon( and( to( act( iden6fy$and$describe$the$processes$involved$
cri>cally(or(prac>cally(in(any(given(situa>on.( in$ transforming$ a$ lower$ level$ en6ty$ in$ the$
$$$$Wisdom$$
hierarchy$(e.g.$data)$to$an$en6ty$at$a$higher$
Knowledge:$ Created( by( establishing( links( with( level$in$the$hierarchy$(e.g.$informa6on).$$
e x i s > n g( k n o w l e d g e ,( i n f o r m a > o n ,(
understanding,( capability,( experience,( skills( Knowledge$$
and(values.(((
Informa+on:$Data(processed(for(a(
purpose,(provides(answers(to(who,(what,( Informa+on$ Classica>on,( rearranging/sor>ng,( aggrega>ng,(
where(and(when(ques>ons.(( performing( calcula>ons( upon,( and( selec>on( of( data(
converts(it(into(informa>on.((
Data:$ Symbols( without( context,( lacks( Data$
meaning( or( value,( is( unorganised( and(
unprocessed.(
33
Research Posters | PhD Researchers 2013 2017
An#interdisciplinary#reconstruc1on#of#digital#
Digital(CiEzenship( ci1zenship#to#build#a#stronger#founda1on#for#a#
future#Pro9human#Web.#
IntroducEon#
My# work# is# intended# for# those# interested# in# digital# ci1zenship# and# shaping# a# founda1on# for# a# pro9human# future# for# the# Web,# through#
encouraging#digital#rights#and#responsibili1es#across#what#is#now#rapidly#becoming#a#global,#post9na1onal#digital#community#of#ci1zens.#This#
focuses,#presently,#on#an#intellectually#challenging#discussion,#rather#than#analysis#of#quan1ta1ve#or#qualita1ve#ndings,#though#it#will#build#
upon#both#of#these#in#the#future,#as#well#as#u1lising#a#comprehensive#body#of#interdisciplinary#literature#and#a#range#of#relevant#case#studies.#
Overview#
Digital# ci1zenship# and# the# pro9human# future# of# the# Web# have# Web 3.0
been# fervently# debated,# forming# diverse# interpreta1ons;# only#
now# is# an# emerging# associa1on# being# made,# moving# beyond# an#
implicit# rela1onship.# A# complex# issue# in# its# own# right,# digital#
ci1zenship#requires#deconstruc1on,#as#it#is#a#term#predicated#on#
conceptual#debates,#such#as#Mossberger#et#al.#(2008)#and#Ribble#
(2010),#which#align#a#deni1on#towards#an#extension#of#physical#
Digital Citizens, not
na1on9state# ci1zenship.# As# such,# liPle# recogni1on# iden1es# the#
Semantics?
f
need#to#shape,#as#well#as#the#existence#of,#a#digital#post9na1onal#
ci1zenry,#born#from#the#co9cons1tu1onal#nature#of#the#Web.##
#
Likewise,# a# Pro9human# Web# is# tenta1vely# expressed# as#
fundamental# to# its# future.# Yet,# this# is# dominated# by# a# pressing#
epistemological# vision# to# realise# the# Seman1c# Web# 3.0;# # future#
direc1on# is# ambiguous.# Therefore,# I# propose# a# theore1cal#
argument,#one#strongly#inuenced#by#the#philosophical#paradigm#
of# a# hermeneu1c# circle,# which# u1lises# a# discussion# that# moves#
back# and# forth# between# the# individual# components# of# digital#
ci1zenship# and# the# whole# of# the# Pro9human# Web,# to# illustrate#
their#connec1vity#and#highlight#future#direc1on#for#both.##
#
Discussion# PASSPORT
An#important#aspect#of#re9envisioning#the#future#of#a#Pro9human#
Web# is# grounding# it# in# digital# ci1zenship,# rather# than# seman1cs.#
This#creates,#however,#conict;#it#is#unclear#whether#both#can#be#
realised# simultaneously.# We# must# deconstruct# current# debates#
about# digital# ci1zenship,# ques1oning# their# robustness.# Indeed,#
many# of# these# are# ambiguously# aligned# to# scholarship# of# Conclusion#
ci1zenship#itself,#such#as#T.H.#Marshall#(1950),#describing#what#is#
barely# extended# physical# ci1zenship,# rather# than# actual# digital# The# vision# of# a# Seman1c# Web# and# a# Pro9human# Web,#
ci1zenship,# so# nega1ng# of# socio9technical# and# co9cons1tu1onal# characterised# by# digital# ci1zenship,# aord# clashing#
views#which#must#be#considered#in#discussion#and#deni1on.## epistemological#and#ontological#posi1ons;#top9down,#technically#
# determinis1c,# and# boPom9up,# socio9technical# revolu1ons,#
Such# debates,# in# fact,# fail# to# link# digital# ci1zenship# to# digital# necessita1ng# further# explora1on.# Hence,# both# the# Pro9human#
rights#and#responsibili1es.#We#must,#then,#reinforce#the#posi1on# Web#and#post9na1onal#digital#ci1zenship#necessitate#equality#of#
that# digital# ci1zenship# is# a# post9na1onal# and# postmodernist# digital# rights# and# responsibili1es# across# the# global# stage,# with#
concept,#rather#than#a#ci1zenship#bolt#on.#Whilst#many,#such#as# scholarship#developing#mechanisms#to#realise#this#universally.##
Berners9Lee# (2014),# argue# for# such# recogni1on,# this# remains# #
largely#abstract#regarding#ci1zenship#scholarship.#Hence,#views#of# In#future#reconstruc1ons#and#discussions,#we#must#shape#digital#
digital#ci1zenship#must#be#reconstructed#with#a#deni1on#rooted# ci1zenship# within# the# Pro9human# Web# by# ensuring# recogni1on#
in# self9determina1on# of# ci1zens# who# are# digitally# situated,# but# of# the# changing# aYtudes# towards# na1onality,# as# individuals#
globally# located# and# networked.# To# accomplish# this,# we# must# become#globally#connected#in#a#post9na1onal#globalised#society.#
realise# a# framework# of# digital# rights# and# responsibili1es# that# are# The# Web# is# dened# by# social# and# the# technical# solu1ons;# we#
oset#against,#but#dis1nct#from,#contemporary#human#rights.# need#both#to#ensure#a#future#vision#grounded#in#digital#rights.##
# !(
Michael(J.(Day([mjd1g13@soton.ac.uk](
BernersGLee,( T.( (2014).( Tim( BernersGLee( on( the( Web( at( 25:( the(
past,(present(and(future.(In:(Wired!Magazine,!March(2014.((
Marshall,( T.H.( (1950).( Ci.zenship! And! Social! Class:! and! other!
University(of(Southampton(
essays.(Cambridge:(University(Press.((
Mossberger,( K.,( Tolbert,( J.( McNeal,( R.( (2008).( Digital! Ci.zenship,!
The!Internet,!Society!and!Par.cipa.on.!Cambridge,(Massachuse\s:(
Web(Science(InsEtute(
MIT(Press.(
Ribble,(M.((2011).(Digital!Ci.zenship!in!Schools.(Washington:(ISTE.!
34
Research Posters | PhD Researchers 2013 2017
score functions vary. However, by taking the dierence this ranking information. We can also measure the accu-
Abstract
between the scores both voters assign a pairwise score racy of predictions made from both the betting market
of 2 to the pair {i, j}. Thus pairwise scores reduce the information and the ranking.
We aim to apply Topological Data Analysis (TDA) tech- eect of the subjectivity of the local rankings.
niques to predict which alternative will be selected based Based on these results, adjustments have made to the
on past selections. These selections can refer to the prod- HodgeRank algorithm which have improved the predic-
ucts bought in online marketplaces by consumers or the 3. Graphical Representation tive ability of the rankings generated. These alterations
behaviour exhibited by users online, amongst other inter- include varying the importance of each race and placing
pretations. We can graphically represent score functions and pairwise greater emphasis on better results.
The algorithm used in this project is adapted from scores by a simplicial complex. The vertices (nodes)
HodgeRank, a method for ranking alternatives and iden- of this complex are the alternatives to be ranked. Pairs 6. Results
tifying inconsistencies in datasets. Applying a more so- of alternatives are joined by an edge if a voter has scored
phisticated version of the algorithm, we generate rankings both alternatives and the direction of the edge indicates We have applied the improved HodgeRank algorithm to
and use them as the basis of the predictions. which alternative is preferred. three years of past data and the rankings produced have
Figure 1 shows a score function, f0, and pairwise scoring been used as a predictive variable for two years of fu-
Horse racing is used as a case study with the aim of bet-
function, f1, of 4 alternatives. ture observations. Two conditional logit models were
ter predicting the winners of horse races from a dataset
created, one with just the betting market information
of past results from 2008 to 2012.
and the other which included the ranking predictive vari-
Applying the ranking as a predictive variable to future, able. Comparing these models, the following results were
unseen data, predictions of the winners are made and obtained:
compared to the recorded outcomes.
Table 1: Conditional Logit Model Results
35
Research Posters | PhD Researchers 2013 2017
Figure 3.[9]
However, having transparency does not make OBT practices accountable. This
raises a second question: `How to increase accountability in OBT practices? As
part of our future work, we plan to find answers to this by exploring mechanisms
that enable and encourage OBT entities to adopt and engage with DNT and
TATE. Additionally we aim to investigate the potential future implementation of
Figure 2.[9] them from the lens of Science and Technology Studies.
1. Mayer, J. R. & Mitchell, J. C. (2012),Third-party web tracking: Policy and technology. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 413-427. Available at http://dl.acm.org/citation.cfm?id=2310703.
2. Narayanan, A. & Shmatikov, V. ( 2008), Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP '08). IEEE Computer Society, Washington, DC, USA, 111-125. Available at http://dl.acm.org/citation.cfm?id=1398064.
3. Lohr, S. (2013), Sizing up big data, broadening beyond the Internet. The New York Times. Available at http://www.cs.columbia.edu/igert/courses/E6898/Sizing_Up_Big_Data.pdf, Last accessed oct 2015.
4. Ramirez, E. (2013), The Privacy Challenges of Big Data: A View from the Lifeguards Chair. Available at https://www.ftc.gov/sites/default/files/documents/public_statements/privacy-challenges-big-data-view-lifeguards-chair/130819bigdataaspen.pdf, Last accessed June 2015.
5. Singer, N. F.T.C. (2013), F.T.C Member Starts Reclaim Your Name Campaign for Personal Data. The Business of Technology (BITS). Available at http://bits.blogs.nytimes.com/2013/06/26/reclaim-your-name/?_r=0, Last accessed Oct 2015.
6. Barocas, S. (2014), Panic Inducing: Data Mining, Fairness, and Privacy. Phd dissertation, New York University.
7. Madden, M. (2014), Public Perceptions of Privacy and Security. Pew Research Center. at http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf
8. Using an open source platform for measuring dynamic web content developed by Stanford Security Lab and The Center for Internet and Society Available at fourthparty.info .
9. Some of the information used in these diagrams are based on; Acar, G. et al. (2014), The Web never forgets: Persistent tracking mechanisms in the wild. in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 674689. Available at https://dl.acm.org/citation.cfm?id=2660347; and
Cookie Matching, Google Developers, Available at https://developers.google.com/ad-exchange/rtb/cookie-guide?hl=en, Last accessed June 2015.
36
Research Posters | PhD Researchers 2013 2017
Background
Novel psychoactive substances (NPS) can be defined as psychoactive drugs which are not prohibited by the Misuse of Drugs Act
1971, and which people in the UK are seeking for intoxicant use. By declaring NPS as not for human consumption, these substances
can be sold legally online to anyone with a credit or debit card. Within the UK, popular rhetoric has created a connection between NPS,
the web and todays youth, resulting in fear and panic over the ease of access to these substances and the threat this provides to young
people. Within this discourse, the web is posited through a technologically determinist stance, viewed simply as a deviant and dangerous
place which both increases access to, and heavily promotes the use of NPS. Youth are placed as vulnerable, unable to resist the webs
temptations as well as being unable to evaluate the information presented to them. In this way, societal fears are often oversimplified,
ignoring the complexity of the relationship between the web and the NPS user. This research aims to establish how young people
themselves view their relationship with the web, and whether they construct the web as a viable resource for obtaining NPS. By learning
about youths own opinions we are in a better position to tackle the problem of NPS, particularly to assess whether the web can
conversely be used as a site for risk minimisation as opposed to risk amplification.
37
Research Posters | PhD Researchers 2013 2017
Bringing!the!Modern!Power!of!the!Web!to!Chemical!Research!
Researcher:!Sami!Kanza!(sk11g08@soton.ac.uk),!Supervisors:!Nick!Gibbins!(Computer!Science)!&!Jeremy!Frey!(Chemistry)!
Chemistry!ELNs! Survey'of'Chemistry'So0ware'Usage'
Free!Version!
Requires!Other!
Unspecied!
' Other!
Open!Source!
Mac!
Windows!
' SemanQc!Web!
Commercial!
Web!Based!
Independent!
'' Chemistry!Bibliographic!Database!
Chemical!Datacase!&!InformaQcs!
0! 10! 20! 30! 0! 5! 10! 15!
Chemical!KineQcs!&!Process!Simulator!
Nano!Structure!Modelling!
Organic!Synthesis!
Quantum!Chemistry!
Molecular!Editor!
Molecular!Modelling!!
What'other'type'of'so0ware'would'you'like'to'be'created?'
'
So#ware( to( draw( all( chemistry( diagrams," Markush! structures," Open"
UCD!! 'Source," Convert' all' chemical' formats' to' other' formats," Calculate( mw(
mol( and( yields( from( mass( data( input," Create! rectangular! Nano!
''
parQcles," Crystal" structure" predic4on," Input' tools' for' LAMMPS,(
Graphing( So#ware," Calculate! funcQonal! groups! connecQng! atom!
classes," Retrosynthesis" probabili4es," Database' of' computa:onal'
Ethnography!! Approaches' results," 3D( data( rendering( so#ware," Bejer! integraQon," Web" based"
chemical"synthesizer,"Video'maker,"Spectroscopy(simula;ons,!Integrate!
CollaboraQon!! exisQng!tools!with!each!other!""
"
"
"
Cloud! "
" ""
CollaboraQve!
"
Future'Work'
Solu:on' PlaTorm!Independent!
!
1.!IdenQfy!tools!that!can!be!integrated!into!ELN!
Domain!Specic!! 2.!Analyze!strengths!and!weaknesses!of!past!systems!
3.!Determine!current!ELN!pracQce!
SemanQc!
4.!Develop!a!prototype!
38
Research Posters | PhD Researchers 2013 2017
What is Diabetes? A metabolic disease that develops when blood glucose is too high.
Blood levels have to be regulated.
What causes
Genetics
Diabetes? Age Ethnicity
Obesity
Diabetes prevalence Is increasing and the Web is seen as a useful tool to support disease
management.
Research Questions:
How is chronic illness self-management changing with the continued growth of social networking
sites and personal health tracking devices?
How are technology and policy intersecting to influence healthcare and health service delivery?
Are people with diabetes activated patients? How are activated patients discursively constructed?
Research Objectives:
To examine patient activity within public support groups pertaining to different Types of diabetes (Type 1, Type 2 and Gestational Diabetes) on
All#stats:#Diabetes#UK#
All#images:#ickr.com#
39
Research Posters | PhD Researchers 2013 2017
In researching cybercrime,
what can critical victimology
tell us that positivist
victimology cannot?
40
Research Posters | PhD Researchers 2013 2017
41
SAVING THE WEB
the Politics and Performativity of Web Archiving
JESSICA OGDEN
Context jessica.ogden@soton.ac.uk @ j es s o g den
Since the mid-1990s institutions such as national
libraries and the Internet Archive have been archiving
the Web through the harvesting, collection and Motivations for Web Archiving
preservation of web objects (e.g. websites, web
pages and social media) in web archives [1]. Much of
the focus of the web archiving community has been
Academic
on the continued development of technologies and
Facilitate long-term maintenance and
practices for web collection development [2], with
preservation of scholarly citations and
increased attention in recent years on facilitating the
unpublished academic outputs
scholarly use of web archives [3].
Support web-based research, including
This research will take a step back to consider the discursive, textual, structural or feature
place of web archives in light of postmodernism, the analyses of web content
archival turn [4] and emergent questions over the
ever-expansive role of the archive in everyday life.
Legislation
One of the main characteristics of web archiving is
that the process of archiving itself may change
Often required as part of public record
retainment of government Web presence
what is archived, thus creating something that is Non-print legal deposit laws for deposition
Digital Heritage
not necessarily identical to what was once online.[5] of digital online publications
Web archives have been positioned Regulatory compliance for private sector
as tools for the collection and web-based document retention
storage of digital cultural heritage
Problematising Web Archiving Motivations move beyond saving
Web archives embody a variety of meanings and websites to also saving social Technologies
forms within different communities of practice, as context that give web resources
dictated by the circumstances of their creation and meaning [8] Pace of web development
use. The mechanisms and circumstances surrounding Missing elements in
the production of web archives are fundamental to harvested data
understanding them as new forms of social data [6]. Challenges Path dependencies in
This research proposes to re-situate web archives as
collection software
places of knowledge and cultural production in their Legal and Ethical
own right, by implicating both the web archivist and Social media archives
technologies in the shaping of the politics of Limitations of access due to reliant on data access
ephemerality [7] that lead to the creation, copyright restrictions regimes dictated by APIs
maintenance and use of web archives. In short: Ethical implications of data defining the object
collection without consent Consequences of epistemological/ontological
Issues of achieving perspectives on selection + collection practices
how does web archival practice (the who, (geographic, language) and their role in determining use
what and how) change what is known representativeness of a Web archives as subjective reconstructions of
global Web the live Web
about the Web?
43
Research Posters | PhD Researchers 2013 2017
.blind
.ceiling.light .desk.light
.tv
#livingRoom
#bedroom
.washer #home
#utilityRoom #kitchen .hob
.dryer
.microwave
The number of smart devices in our environments is increasing and controlling them all using individual smartphone apps is
becoming less plausible.
To make these devices more manageable and interoperable we can assign an ID and class to each device and each context (which
could be a room. Then we can select devices individually and in complex groups using CSS (Cascading Style Sheet) selectors.
For example #home #utilityRoom .dryer selects any dryers in the utility room context. Or #home .light selects all lights of all
types in the house.
Beyond this we could make style sheets similar to CSS to control multiple devices at the same time, for example setting up the
same living space for a party, a movie or a study space.
There is also a lot of potential for using this approach in commercial and industrial settings.
Images from the Noun Project (thenounproject.com), by Aaron K. Kim, Crea>ve Stall, Andrew Liebchen, San>ago Arias, Christopher Pond and Edward Boatman
44
Research Posters | PhD Researchers 2013 2017
Sophie'Parsons'
' ! # " sp13g10@soton.ac.uk'
'
3: " " !( !" !" %#"
# !( !" " # !( "#$#?
45
Research Posters | PhD Researchers 2013 2017
46
Research Posters | PhD Researchers 2013 2017
Feedback Rewards
Design guidelines: Design guidelines:
Provide systematic, quantitative Utilise non-transparent, irregular
performance feedback reward criteria
47
Research Posters | PhD Researchers 2013 2017
Carding
Carding forums are used by cybercriminals to buy
and sell stolen credit card data. Members of such
forums use pseudonyms to communicate with one
another to make sure they stay out of hands of law
enforcement. On the left, a representation of carding
in its simplest form can be seen. Sellers obtain
stolen credit card details and offer them on various
carding forums to buyers. However, in this process,
there are many steps that have to be taken and from
which can be deviated. I will map these steps with
crime script analysis.
Describe( Propose(
Propose(
Analyse( Talk(to(LE( common( feasible(
Create(scripts(( preventa:ve(
tutorials( professionals( criminal( intercep:ve(
measures(
improvisa:ons( methods(
48
Research Posters | PhD Researchers 2013 2017
The$Risks$and$Barriers$of$Open$Data:$$
An$Entrepreneurial$Perspec;ve!
Johanna!Walker!jcw2g13@soton.ac.uk!!
Supervisors:!Dr!Lisa!Harris!&!Professor!Leslie!Carr!
Entrepreneurs! I!thought!it!would!be!easyI!was!so!nave.!
Users!who!aim!to!generate!economic!value!from!Open!Data!! You!need!deep!pockets!to!sustain!yourself!
Goal!is!to!create!rm,!not!just!apps,!to!derive!value!
long!enough!to!get!the!data.!
Specic!moLvaLonal!subgroup!of!users!(not!simply!hackers)!
Popularly!idenLed!as!riskQtakers!but!
Studies!show!they!employ!riskQreducLon!strategies!(1)! Open!Government!Data!
! More!valuable!than!Public!Sector!InformaLon!as!more!accessible!
! Removing!fricLon!from!informaLon!market!opens!opportunity!for!
increased!employment!and!tax!revenues!
Data!that!is!most!valuable!to!private! Government!is!not!best!placed!to!exploit!its!own!byproducts!for!
prot!(eg!Trading!Funds,!TfL!apps)!
organisaLons!and!consumers!is!the!data! Proper!role!is!championing!innovaLon!in!Open!Data!
that!is!most!protected.! .But!this!has!to!be!more!than!hackathons!and!compeLLons!
!
There!isnt!a!culture!of!transparency!and! !
knowledge.!
!
Methodology! Results!
! !
Interviewed!founders,! People,!not!clean!or!
investors!and!supporters!of!! linked!data,!are!key!to!the!
early!stage!companies! process!
using!Open!Data! !
! Many!stakeholders!are!
Compiled!barriers!and! involved,!not!just!
challenges!from!blogs!and! publisherQuser!
case!studies! !
! The!UK!Open!Data!culture!
Engaged!with!users,!not! is!not!value!creaLonQled!
publishers!or!academics! !
! !
Insights!
You!need!! PerspecLves!on!Open!Data!uLlity!and!standards!are!situaLonal! Entrepreneurs!
the!right! The!entrepreneurial!user!takes!a!more!pragmaLc!view!of!Open! seek!
Data!than!those!held!by!academia!and!civil!servants!
connecLons!! forgiveness,!
The!relaLonship!between!data!publishers!and!users!needs!to!be!
in!the! an!interacLve,!conLnuous!dialogue!!
not!
government.! Open!data!is!a!process,!not!a!property! permission.!
!
(1)!Forlani,!D!and!Mullins,!J.!(2000)!Perceived!Risks!and!Choices!in!Entrepreneurs!New!
Venture!Decisions,!Journal(of(Business(Venturing(15:4!305Q322!
49
Research Posters | PhD Researchers 2013 2017
Digital Behaviour
Change Q3a. Do disengaging users
Intervention
follow a pattern of behaviour?
Engaging
Autonomy Motivation
Disengaging
Q2
Relatedness
Competence
Self-Determination Theory
Q3
Point of
Q1 Disengagement Q4
Engagement
Q5
Q4. What is
disengagement?
Q1. How is engagement Website/App
conceptualised? Re-engagement Disengagement
This can be during or at the end of
a session. It can be long-term or
short-term. It is a period of time
away from the site or app.
Q5a. Are there common barriers to
dBCIs which cause disengagement?
Q5b. Can these barriers be overcome
to re-engage a disengaging user?
Leanne Morrison
Supervisors Mark Weal
Lucy Yardley
50
Research Posters | PhD Researchers 2013 2017
51
Research Posters | PhD Researchers 2013 2017
Web$and$Internet$Science,$University$of$Southampton$
Do#conven(onal#understandings#of#online#learning#community#and#trust#apply#in#MOOCs?#
Social$construcIvist$approaches$to$online$educaIon$emphasise$interacIon$and$communicaIon$and$rely$on$the$
development$of$community$to$support$deep$and$criIcal$thinking$online.$This$implies$the$need$for$trust$between$
parIcipants$as$an$important$dimension$of$community.$$However,$the$potenIally$massive$numbers$of$learners$involved$in$
MOOCs,$and$the$disIncIve$paKerns$of$behaviour$and$moIvaIons$of$these$parIcipants$raise$quesIons$about$the$nature$
(or$perhaps$even$existence)$of$community$and$trust$in$MOOCs.$
reputaIon$ interacIon$$$$$$$$$$$$$$$
vulnerability$ collaboraIon$
expectaIons$ community$
Online#trust# Learning#theory,#community#and#trust#
a" psychological" state" comprising" the" inten1on" to" accept" FutureLearn$social$construcIvist$underpinnings:$
vulnerability"based"upon"posi1ve"expecta1ons"of"the"inten1ons" ConversaIonal$learning8$
or"behaviour"of"another$1# Development$of$learning$communiIes9$
pervasive$and$disInct$from$F2F$contexts2$ InteracIon$and$criIcal$thinking10$
risk$and$uncertainty$in$online$interacIons3$ $
$ Trust$as$fundamental$aspect$of$community$in$social$
Trust#systems# construcIvist$learning$theory:$
Foster$cooperaIon11$
ReputaIonNbased$approaches$$focus$on$behaviour4$
Enables$successful$group$learning12 $$
Predict$future$behaviour$from$past$acIons$
Required$in$MOOC$learning13$
Inform$judgements$of$benevolence/credibility$of$counterparts5$
$ #
Trust#as#under>researched#in#e>learning# Need#for#support#structures#in#design#
ParIcipant$interacIon$has$limits$in$MOOCs14$
new$interacIon$paradigms$demand$trust6$
Building$trust$challenging$in$MOOCs15$
dearth$of$literature$on$$trust$in$online$learning$7$
Need$mentor$curaIon,$aggregaIon,$and$presence15$
$
Recognise$boundaries$of$openness$15$
$
Trust$theories$ Learning$theory$
MOOC$
Design$
Trust$systems$ Learning$design$
Mixed#methods#research#design#
Quan(ta(ve # # # # # # #Qualita(ve#
N$Surveys$of$parIcipant$percepIons$of$community$and$trust $ $ $N$Literature$review$on$educaIonal$communiIes$/$crowds$
N$AnalyIcs$of$learner$data $ $ $ $ $ $N$Virtual$ethnography$of$discussion$fora#
Research#direc(ons#
Can$MOOC$parIcipants$be$seen$as$a$community$as$understood$in$educaIonal$theory?$
What$is$the$nature$and$extent$of$trust$relaIonships$that$exist$between$MOOC$parIcipants,$and$between$parIcipants$and$mentors?$
How$can$MOOC$designers$best$align$learning$theory,$MOOC$design,$and$technical$systems$facilitaIng$development$of$trust?$$
$
References$(Mendeley):$hKp://bit.ly/1MLeXgD$
52
Research Posters | PhD Researchers 2012 2016
Education
Relevance - Players feel more immersed in
an educational game if its educational
content is made relevant to the player, i.e.
the player feels that they can use the Sequencing- It is important to ensure that
content in their own life the content is presented in an appropriate
order, in terms of what skills and
The first category summarises immersion in knowledge they require to progress
Gameplay Integration - An educational
the games educational content. This game is more immersive when its
involves how to maximise the possibility of educational content is integrated into the
learning the material within the game, by gameplay, so the two do not feel distinct
emphasising why it should matter to the from each other while playing
player in the real world, and by presenting it
naturally within the progression of a game.
Gameplay
Balanced Challenge - A player can become
more easily immersed in an educational
game if the challenges it presents are Guidance - There needs to be appropriate
balanced to the players abilities (it does guidance provided to the player when
not feel too hard or too easy) they get stuck, in order to reduce their
frustration and keep them focused on the
Feedback - To prevent the player getting challenge
The second category outlines the factors in
too frustrated with an educational game,
gameplay that influence a players
it is important to provide frequent, helpful
immersion. This includes the way the
feedback on how well they are progressing
games challenges are designed, and the
through the game
underlying feedback mechanisms they
employ.
Narrative - The game must feature a Scenario - Educational games can be more
Agency compelling narrative. This includes immersive if they have unfamiliar setting,
establishing clear goals for the player, because they can more readily disengage
ensuring consistency in the game world, from the real world, and can approach the
and keeping the story flexible enough so educational content presented from a
that the player is able to influence it new perspective
Curiosity - Players become more immersed Identity Projection - The player becomes
in a game when the game world and the more engaged with an educational game if
story stimulates curiosity (e.g. through they feel in control of their in-game
interesting details within the world, or character, and feel invested in the role
mysteries and surprises in the narrative) they play in the game
The third category focuses on factors which
let the player feel like an active, immersed
participant in the games virtual world. In this Experimentation - Educational games are more engaging when they
way, the players learning feels more allow players to experiment with the ideas they are trying to teach (i.e.
immediately important and consequential. allow the players to use the educational content to solve challenges)
53
Research Posters | PhD Researchers 2012 2016
54
Research Posters | PhD Researchers 2012 2016
Objec&ve
By exploring percepAons held by stakeholders at the
operaAonal level it may be determined whether barriers
to non-formal learning supported by social media exist Percentage of comments for percepAon of social media
due to limitaAons of pupils or technology and eecAng selecAon of social media to support not-formal
determine whether, or indeed if, they can be overcome learning
through educaAon, policy, or some form of technical
soluAon.
Preferred InteracAon
Though not idenAed as a specic theme an interesAng
aspect of social media alluded to by parAcipants was
that of interacAon type. This chart shows the percentage
of comments made by parAcipants with regard the type
of interacAon they would describe as normally taking
SupporAng Non-Formal Learning part in and the inuence it would have on their decision
to use social media in support of non-formal learning.
From the survey data collected in study one it was suggested
that social media was being used to support not-formal
learning but at a low level and with no clear indicaAon how it
was being used.
The Digital Economy Theme is a Research Councils UK cross council iniAaAve led by EPSRC and contributed to by AHRC, ESRC, and MRC
55
Research Posters | PhD Researchers 2012 2016
The$D.N.A.$of$
Web$Observatories$ Web Science
Ian$C.$Brown$
Web$Science$Ins+tute,$University$of$Southampton$
WHAT?$
HOW?$
WHY?$
eni6on$
ature$
rchetypes$
ACADEMIC!KNOWLEDGE$
COMMUNITY!CONTROL$ BUSINESS!RESOURCE$
56
Research Posters | PhD Researchers 2012 2016
Web Science
jrw1g08@soton.ac.uk
The role of ICTs for Jennifer Gaskell
@jenwelch15
Jen_welch15
Post-Conflict Peacebuilding Prof Susan Halford
Dr Mark Weal
Prof Gerry Stoker
2. Practice review
Opening of the first international conference on ICTs for peacebuilding Build Peace How are ICTs being used
Peace through Technology, at MIT (Cambridge, MA) in April 2014
in peacebuilding
contexts, for what
purpose and with what
impacts?
howtobuildpeace.org howtobuildup.org
CC BY 3.0 Meeting designed by Dan Hetteix from the Noun Project; Interview designed by Sarah Abraham from the Noun Project
57
Lawrence Green
How quickly is new web based Technology How Does Distance and Time effect peoples Supervised By:
Adopted? decision making on travelling? Tiejun Ma
Virtual Globes like Google Earth provide new Thanassis Tiropanis
information on terrain Johnnie Johnson
Ming-Chien Sung
Virtual Globes more popular than any other
web technolgy and even Facebook!
Is Distance OR Time more important
in decision making?
Information from Virtual Globes is used in complex decision We analyse decisions in a repeated choice experiment $PMPVSDPEFENBQ
over 3 years.
TIPXJOHEFOTJUZPGIPSTF
making over 18 years.
SBDFUSBJOFSTBOEUIF
1. How quickly does information from a new technology diffuse 1. Calculate how far each horse has travelled to a race
MPDBUJPOTPGUIFSBDF
DPVSTFTNBSLFUPOUIF
through a financial market?
2. Use statistical models to analyse whether distance NBQ
58
2. If new information is not immediately discounted, what is the and probability of winning are linked
economic impact of the information diffusing through a market? 3. Test the economic imact of this information
Research Posters | PhD Researchers 2012 2016
Information from new technology takes a Trip Time is more important than Distance
number of years to fully diffuse through a People will travel further if the likelihood of
market winning is greater
There are significant opportunities for Over a 3 year period statistical models can
economic profit be used to generate a profit in betting
markets
5IF%JHJUBM&DPOPNZ5IFNFJTB3FTFBSDI$PVODJMT6,
DSPTTDPVODJMJOJUJBUJWFMFECZ&143$BOEDPOUSJCVUFEUPCZ
")3$
&43$
BOE.3$5IJTXPSLXBTTVQQPSUFECZUIF
&143$
HSBOUOVNCFS&1(
Research Posters | PhD Researchers 2012 2016
59
Research Posters | PhD Researchers 2012 2016
Interdisciplinary Approach
This project combines insight from
Psychology, Finance and Computer
Science to help build an
understanding of the role of the web
in the investor decision making
process.
Key Ques7ons
- How do investors interact with
online informa7on?
- Can online footprints give
es7mates of investor mood?
- How important is the role of
investor mood in the stock
market?
Proposed Methods
- Dieren7a7ng public
mood and investor
mood from online
social media
- Applying psychological
models of mood to
social media analysis
- Tes7ng models
against individual
stock prices/market
indices
Supervisors
Prof. Johnnie Johnson (Management)
Dr. Tiejun Ma (Management)
Prof. Ming-Chien Sung (Management)
Dr. Thanassis Tiropanis (Electronics and Computer
Science)
60
Research Posters | PhD Researchers 2012 2016
Abstract
Higher Education Institutions (HEIS) are facing the disrup-
tion of MOOCs as a technological innovation with chances of
altering the Higher Education landscape. MOOCs are now a METHODS
reality in an increasing number of universities, which is
provoking a wide range of reactions both in faculty members
Desk Survey Questionnaires Interviews
and academic leaders. This project aims to capture these
perceptions by enquiring university staff with different levels
Survey of specific facts reported Addressed at educators in HEIs (mainly Addressed at a selection of participants in the
of responsibility within the institution. The results of this in specialist magazines such as lecturers), both involved and not involved questionnaires, AND academic leaders in
study are intended to inform about how the inclusion of Times Higher Education and The in production or delivery of MOOCs HEIs.
Chronicle of Higher Education.
MOOCs in the educational catalogues of universities is
All sources curated with Scoop.it
perceived within the faculty so that the best course of action
is chosen accordingly.
What are the plans of academic leaders How are the observed universities incorporating
regarding MOOCs? MOOCs?
For them, what is the role of MOOCs at the university? What resources are they dedicating (human, financial), and
where do the budgets come from?
What are their boundaries? What domains of
traditional education MOOCs should not trespass? What is the role of MOOCs within their organisational
strategy?
61
Research Posters | PhD Researchers 2012 2016
Law Economics
Mechanisms Adoption of a
Adoption of for changing risk
approved codes
of conduct ISPs security management
culture frame
Law enforcement
mechanisms: better
incentives for
compliance, serious
sanctions for non-
compliance
Supervisors:
Dr Tim Chown (ECS)
Web Science Dr Sophie Stalla-Bourdillon (Faculty of Business&Law)
62
Research Posters | PhD Researchers 2012 2016
63
time represents the immanent structure of the social world. There are many participants develop and acquire in the form of competencies and credentials
forms of capital and they continue to emerge and re-emerge in different social and that they also invest in valued cultural objects or artefacts (Malaby, 2006).
environments, occasionally needing re-negotiation into more manageable This may differ according to the type of synthetic environment being discussed,
conceptual constraints. The three most fundamental according to Bourdieu are depending on which goals and achievements are framed as particularly
economic, social, and cultural (Bourdieu, 1986). desirable. Certainly it seems no stretch to assume that expertise can be
demarcated in any game with a levelling mechanic, purely by whether the
player is low- or high-level (Malaby, 2006), but there are other factors which
may come into play. For example, in World of Warcraft rare achievements such
as exploring the game world in its entirety or finding particularly rare treasure
will bestow a title on the player, surely indicating a practice of institutionalised
Designing a project which has the capability to effectively answer this question,
cultural capital. In the MMOBA League of Legends, players enter tournaments
while bearing in mind the implications of the literature, is a challenging part of
to be ranked against each other, their standing (a complicated score based on
this process. Ethical considerations, practicality, and rigour must all be taken
ratios of not only wins to losses but ratios of kills to deaths) indicated by
into account. As virtual-worlds research is quite new, there is no
medallions and ranks. Climbing ranks takes time, skill, and concentrated
predetermined method to follow. Instead, I took into consideration methods of
effort. The reward for such an investment goes beyond a ranking number and a
practice and analysis which have proven successful for a number of other
virtual gew-gaw, rather it is in the conference of authority and the
researchers.
acknowledgement of skill above that of other players.
An ethnographic approach to this research could have been undertaken in both
While there is a burgeoning body of research on capital in video games and
the real and virtual world, or simply online. I chose a virtual ethnography
virtual environments, far less work has been done on the possibility of
followed by semi-structured interviews. The understanding was that this would
distinction existing in some form. Nonetheless, as microcosms of society, it
offer less of an insight into a particular players lived experiences of gaming as
must be that distinguishing behaviours can be observed. Bourdieu would seem
part of their life, but that it would also be less invasive while still allowing for a
to agree, claiming as he did in 1980 that while it might be most prominent in
reflexive and participant-focused approach to answering the research question.
Contact: art, there is no area of practice in which the intention of purifying, refining and
Elzabi Rimington I spent approximately one hour a day, four days a week and at varying times of
sublimating facile impulses and primary needs cannot assert itself (2010:176).
University of Southampton day immersed in the League of Legends environment. This time was spent both
In-game experience is tallied by levels, and highly experienced, elite players
in and out of game instances making field notes and forming social ties.
scorn clumsy newbies or noobs. In this they make displays of cultural capital,
58/3129 Preliminary results are encouraging.
indicating that further distinguishing practices may be found.
Salisbury Road
Highfield Campus
Hampshire
SO17 1BJ
07525429416
emr2g08@soton.ac.uk
Image jon-jonz.deviantart.com and Riot Games
Research Posters | PhD Researchers 2012 2016
64
Research Posters | PhD Researchers 2012 2016
university of southampton
Abstract
This project aims to explore the ways in which digital, web and
IN PARTNERSHIP WITH mobile technologies (DWMTs) might or might not contribute to
making the world a slightly less bad place (SLBP). The point is that
u JAMIES COMPUTERS, SOCIETY OF ST JAMES people have different ideas about what a SLBP might look like.
Methodology
Wider Application
Acknowledgements
65
Research Posters | PhD Researchers 2012 2016
Revenge Pornography
Abigail Whitmarsh
Web Science CDT
University of Southampton
Background
Revenge Pornography describes the act of publishing on the Web pornographic images of a person without their consent. It is a phenomenon
that has been enabled through the development of the Web and almost universal public access to digital photography and file sharing
technology. Legal responses aimed at ending revenge pornography have focused heavily on the either the owner of the Website, as in the cases
of Hunter Moore, Kevin Bollaert, Craig Brittain and Casey Meyering or by criminalising the act of uploading material without the consent of
the subject. England and Wales have taken the latter approach, and with the Criminal Justice and Courts Bill 2015 it is now an offence for a
person to disclose a private sexual photography or film if the disclosure is made a) without the consent of an individual who appears in the
photograph or film, and b) with the intention of causing that individual distress.
Analysis
A total of 396 posts were made to the Revenge Pornography Website over the 28 days (672 hours).
270 posts remained on the Website for the full 672 hours, 126 were removed before the full month.
378 posts featured women, 18 featured men.
The true percentage of posts that feature women on this revenge pornography Website is between 93% and 98% at a
confidence level of 95%.
The 95% confidence interval for the number of views that a post featuring a woman receives is between 32892.4 and 36272.5
and 95% confidence interval for the number of views that a post featuring a man receives is between 6660 and 8263.
The 95% confidence interval for the number of comments that a post featuring a woman receives is between 14 and 15. The
95% confidence interval for the number of comments that a post featuring a man receives is between 6 and 9.
Maximum Number of Views for All Posts Over 28 Days Number of Posts to Revenge Porngraphy Website by Subject's
Posts that Remained Live Gender Over 28 Days
140000 35
120000 30
N 25
N 100000 u
u m
m b
b e
e 20
80000 r
r
o
o Male Male
f
f Female Female
15
60000 P
V o
i s
e t
w s 10
s 40000
5
20000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
0
Day
101
106
111
116
121
126
131
136
141
146
151
156
161
166
171
176
181
186
191
196
201
206
211
216
221
226
231
236
241
246
251
256
261
266
1
6
11
16
21
26
31
36
41
46
51
56
61
66
71
76
81
86
91
96
Acknowledgements
The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC.
My PhD supervisors; Gethin Rees, Elena Simperl and Craig Webber
Web Science
66
Research Posters | PhD Researchers 2011 2015
Supervisors:
PERSONAL DATA AND TRANSPARENCY Lisa Harris, Management
David Millard, Computer Science
Reuben Binns, rb5g11@soton.ac.uk, @RDBinns, www.reubenbinns.com/blog Michel O'Floinn, Law
Personal data: what, why, where? What kinds of personal data are collected?
By using digital technologies we reveal information
Personal Details
about ourselves such as likes and dislikes, purchase
Financial Details
histories, messages, emails, tweets, GPS coordinates,
Goods Provided
browsing habits and search terms. Many people now
Family, Lifestyle
track their daily activity, health and diet via the web.
Employment
Health
When combined, such data constitutes a rich digital
Education
profile of our lives. Mining and analysing this data can
Race
reveal a lot for marketers, researchers and individuals
Religion
themselves.
Trade Union
Over 350,000 organisations in the UK are required to Membership
disclose how they use personal data.
We collected these disclosures over 18 months to draw a
picture of the personal data landscape in the UK.
67
Research Posters | PhD Researchers 2011 2015
VISUAL ANALYTICS
The Framing of Data & User Behaviour: Evaluating Visualisations Using Economics to Improve Decision Support
This research introduces the concept that reasoning and decision-making, when 1. To what extent does data visualisation affect the choices and behaviour of
facilitated by Visual Analytic tools and processes, can be improved through the use analysts using visual analytic tools on the Web?
of Web technologies to evaluate user interaction events and the application of
Economic theories. The field of visual analytics is an extension of data visualisation 2. To what extent can interaction data be used to identify the influence of
that provides tools and processes for extracting information from raw data by framing for VA tools on the Web?
enabling user-interaction, highlighting an opportunity to observe and record chains
of user events that are generated. . The work addresses the following research 3. Can interaction data be used to identify framing effects in visualisations on
questions: the web and to improve measurable analytic performance ?
VISUAL ANALYTICS & THE WEB ARE USED ACROSS MANY INDUSTRIES
Theories are emerging from Visual Analytics and Visualisation literature which The use of interaction data in VA tools is an important step towards improving
suggest that interaction events can provide insights into the utility of design and can analysts performance and to be used to assist in building more effective analysis
inform new developments in data visualisation. This research examines visualisations environments The application of framing effects represents a significant
for the presence of framing effects - a established concept in Economics - by utilising contribution to VA and Web Science by providing a new tool to better inform
an existing taxonomy of action types commonly used in visual analytic applications. design processes and improve the utility of VA on the Web.
Economics is concerned with social A By capturing chains of user interactions B Framing a problem in multiple ways can
phenomena while Behavioural Economics in log files and observing users the affect decision-making. Visual framing has
offers to increase the explanatory power of potential affect of visual framing can be mapped been explored in the context of positive or negative
economics by providing it with more out. A/B tests and lab experiments are applied to ratings (see below right). Howver, this approach
realistic psychological foundations. Beyond confirm either: (1) A reduction in errors in data has not previously been applied in a commerical
Framing Effects it is possible that Prospect interpretation. (2) The increasing efficiency / setting or with a VA tools that
Theory, Risk & Uncertainty, Bounded timeliness of decisions, or (3) impovements in enable insights interactively
Rationality, Heuristics and Bias could be comprehension in a given doman (military, stock using Web technologies.
applied in the future. trading, and crisis response).
Symbols aquired from thenounproject.com are public license except for those under the CC Attribution license: Bomb by Scott Lewis. Corporation by Stephen Copinger. Dollar (sign) and Twitter by Lubo Volkov. Dollar (bill) by Christopher Beach.
Globe by Nicholas Menghini. Chevron by Christopher T. Howlett. Military Vehicle and Airplane by Luke Anthony Firth. Dangerous Area, UN Office, Police, Water, NGO Office and Storm Surge by OCHA Visual Information Unit.
68
Research Posters | PhD Researchers 2011 2015
October 2015
various micro- and macroscopic levels. It is also about engineering protocols and providing
infrastructure, and ensuring that there is t between the infrastructure and the society that hosts it. Web
Science must coordinate engineering with a social agenda, policy with technical constraints and
possibilities, analysis with synthesis...[1]. Berners-Lee et. al. (2006) A Framework for Web Science.
Over the last six years open data has moved into the policy mainstream. Transparency and openness, mediated
through machine-readable re-usable data, is increasingly a key public policy tool of choice for decision makers. From
the scal accountability and anti-corruption agenda, to the new global Sustainable Development Goals (SDGs) open
data, is central to the delivery strategy. At the same time, open data is discussed as a crucial resource for economic
growth and innovation: with government collected data targeted as a particularly valuable raw material for private
sector exploitation.
Neither social, nor the economic, impacts of open data are a foregone conclusion. Policy choices, technical designs,
and how they unfold together in different contexts around the world shape the impacts of open data.
Pragmatic research starts from a particular problem. The starting point for this enquiry: How can the civic potential of
open government data best be promoted?. The enquiry has four steps:
(1) Establishing scope: Open data is a global phenomena: but how does it vary across the world?
What balance must be struck between local and global interventions.
The Open Data Barometer combines expert survey and secondary data to build up a multi-dimensional
picture of open data across 86 countries.
- Widespread presence of Open Government Data Initiatives: but varying depth of government support
- Limited implementation of Open Denition [Machine Readable + Open License + Freely available]
- Cluster analysis identities four groups of countries - including one sided initiatives, focussing on
economic goals to the exclusion of civic potential of open data;
Future work: comparing 2013, 2014 and forthcoming 2015 Barometer data.
(2) Exploring initiatives: How is the implementation of open data policy shaped at the country level?
Civic life is frequently constructed at a national level, so the way open data ideas are transposed in different
country contexts can inform analysis on opportunities for intervention. An in-depth reading of policy
documents offers an empirical basis for this.
- Method: Six countries selected based on political, economic and social diversity. Policy timelines
constructed, and documents read and coded;
- Findings: Open data policy used to focus on reconstructing data infrastructures of the state;
- A shift over time from civic to economic focus of open data discourse in most countries;
Future work: Tracking the impact of global policy initiatives, including Open Government Partnership, and
International Open Data Charter on focus countries.
(3) Investigating infrastructures: Whilst national open data agendas may tend to diverge,
policy and technology standards bring back common global elements. Data standards play a central role
in determining how data can be used, who by, and what for. Interviews with data standards creators and
users & participant observation in data standards communities offers a route into infrastructural
inversion: revealing the way in which standards are shaped, and then shape the civic potential of open
data.
- Data standards constitute a complex infrastructure of schema, identiers and compliance tools;
- Data standards are shaped by the data publishers or users closest to them in their early stages;
- Data standard infrastructures, once developed, are resistant to substantial change;
Future work: evaluating the impact of interventions into data standard development.
(4) Synthesis & action: The test of pragmatic enquiry is practical. Given a social agenda that seeks greater equality between citizens, and
greater inclusion of all citizens in governance and decision making, has the enquiry identied successful strategies for action? Finding this out is
ultimately the nal step of this enquiry > www.opendataimpacts.net
69
Research Posters | PhD Researchers 2011 2015
Introduction Method
Crime preoccupies the media and our TV schedules; it fills our
fiction shelves and is a large part of public spending, whether via Grounded Theory and the Web
warfare and defence, or policing.
Grounded Theory is underpinned by philosophy of science,
A report suggests that the amount spent on combating just violent crime Wittgensteins family resemblances, American pragmatism,
equates to 7.7% of the UKs GDP, or 4,700 for every household. [5] Is symbolic interactionism, Kantianism, Mills system of
this effective spending? differences, Baconian inductivism and Aristotelian axiology.
How much is this spending driven by crime statistics? Police.uk is a site pro- Grounded Theory appropriate for Web research:
vided by the U.K.s Home Office which presents open crime data, support- Allows the theorist to revise their findings as they move through
ing the Governments transparency and accountability agenda.
the discovery process.
How much are the data / statistics shaped by technology or social causes
policy, culture, administration, bureaucracy? Can the transparency The process of undertaking research on the responsive web
agenda help in understanding this? [2] can affect the thing being researched, for example in
examining websites, talks to site designers affect the sites as
Web Science can help us to classify these crime apps and websites, some- designers are influenced by questions about design, intent,
times referred to as Crime Social Machines. Understanding the data and competition, data provenance and policy.
information ecosystem which allows society to address crime, helps us un- A methodological approach is required which accepts some
derstand the sites singularly.
interplay between the observer and the thing observed,
without this making the results of observation invalid.
Hence the reactive impact that investigators have upon their
data bears more on the scope than on the credibility of an
Three dimensions: Results emerging theory. The technique that forces investigators to stay
close to their data, and which constitutes the systemisation of
the approach, is the constant comparative method.[4]
How crime is addressed , mediating processes and Mainstream science looks for reproducibility in results as being
what the system does. fundamental to the scientific method; where we carry out web
Implications: Home Office crime data (and the official crime searches with results returned via Google, data returned may
statistics that it comes from) is largely performance data, not be the same from moment to moment, depending on data
knowledge-based and sits within the context of assurance and centre locations, indexing, and the constant addition of new
mapping as a way of scientific understanding. links to the web that then may alter search results. [1]
Similar looking crime map sites leverage fear of crime coming Grounded theory allows this; the focus is on creating a
from risk analyses to sell services including data itself. methodology that lets researchers apply it or alter it
Open crime data is about policing, rather than crime. It is themselves, as it fits their needs. The aim of this research
shaped by the social systems it moves through and the method is building theory, not testing theory. [3] Such an
processes it undergoes, and the way in which it is mandated. approach is pragmatic and suits fluid data results coming from
To understand why a crime is reported and why it appears on the web.
a map, we have to examine these confluences.
It is possible to differentiate similar-looking sites by
investigating which sites they link to and which sites are linking
to them and the economics of risk and fear.
We can see:
(a) How crime data is used; apparent worry about faked
data dissolves into a more sensible discussion of the social
origins of policing data; if the target culture were removed this
might then remove perverse incentives to shape data
according to often irrational targets.
(b) We have seen how data can be crowdsourced, and started
to examine some of the attendant problems of anonymity,
evaluation and incentives. These first two points presumably
help not only the public, but the police themselves.
(c) We have asked whether data and apps such as these can
help us to address crime, without increasing fear of crime, and
looked at the way in which the information economy might
drive some designers to sell crime data or a sense of safety
through leveraging fear of crime. Next stepsto produce
Policing Social Machine signatures.
Acknowledgments
The work in this paper was funded by the Research Councils UK
Digital Economy Programme, Web Science Doctoral Training Centre,
University of Southampton, EP/G036926/1 and by SOCIAM: The
Theory and Practice of Social Machines, funded by the UK Engineering
and Physical Sciences Research Council (EPSRC) under grant number
EP/J017728/1 comprising the Universities of Southampton, Oxford and
Edinburgh.
70
Research Posters | PhD Researchers 2011 2015
Skim Reading: An Adaptive Strategy for Reading on the Web
Gemma Fitzsimmons, Mark J Weal, & Denis Drieghe
University of Southampton
Contact email: G.Fitzsimmons@soton.ac.uk
Introduction
We spend a vast amount of time on the Web and much of that time is spent To explain these findings, it was suggested that an adaptive satisficing
reading strategy was being used to gain as much information from the text in
However, with the large amount of information available we cannot read it reduced time
all in great detail, therefore we engage in skim reading (Lui , 2005; Morkes & A satisficing strategy is where an individual searches through alternatives
Nielsen, 1997) until an acceptable threshold is met. In this case the individuals search for
Skim reading has been shown to negatively affect comprehension (Carver, where information gain is high and when it drops below a certain threshold,
1984; Just & Carpenter, 1987 ; Dyson & Haselgrove, 2000) they move on to a new piece of text
Others have shown that there is a different between important and In this experiment we explore whether a satisficing skim reading strategy is
unimportant information. The important information does not receive the used when reading on the Web and whether hyperlinks have an impact on
same loss of comprehension that the unimportant information does the strategy
(Masson, 1982; Reader & Payne, 2007; Duggan & Payne, 2009)
Experiment
Experimental Conditions
2 x 2 x 2 within-participant Question 1: Question 2:
design Does skim reading affect Does skim reading
the way we read affect comprehension?
Task Type: Normal/Skimming
hypertext?
Word Type: Linked/Unlinked 160 comprehension questions
Word Frequency: High/Low (4 after each stimulus)
32 participants
160 experimental sentences 50% asked about important
inserted into 40 edited Wikipedia sentences
Sentence Rating - Each sentence pages (4 in each) 50% asked about unimportant
of the stimuli was also rated by 20 pages read were normally, 20 sentences
Figure 1. SR-Research EyeLink 1000 eye tracker
set-up
20 independent participants on pages were skim read Figure 2. Example stimulus with fixations of
its general importance normal reading
Results
Figure 3. Task Type x Word Type interaction in skipping probability and Task Type x Word Type x Word Figure 4. Average accuracy for comprehension questions
Frequency interaction in single fixation durations
Eye Movement Results Comprehension results
The linked words were less likely to be skipped when skimming Comprehension was reduced when skim reading
Faster reading speed in skimming condition Comprehension was marginally better for the questions related to
No frequency effect observed for the unlinked words while the important sentences compared to the unimportant sentences
skimming when skim reading
Conclusion
Does skim reading affect the way we read hypertext? Does skim reading affect comprehension?
Yes, the linked words were skipped less when skim reading Yes, comprehension accuracy does decline when skim reading, but
compared to the unlinked words participants did perform better when the comprehension questions
When the linked words were fixated they were processed fully, was related to the important sentences
unlike the unlinked words that showed no frequency effect in the Taken together with the eye movement results we can suggest that
skim reading condition skim readers could be engaging in a satisficing strategy
What does this mean for reading on the Web? By focusing on important sentences and using hyperlinks as a guide
If participants are using linked words to suggest important to where the important information may be, the participants could
information and using them as anchor points to guide their reduce the speed-comprehension trade-off that comes with skim
movement through the text, then the choice of which words to add reading
links to needs to be considered very carefully
This is because skim readers focus primarily on linked words and use
Web
them as a marker for the most important information Science
71
Research Posters | PhD Researchers 2011 2015
Trust Collaboration
Accountability Deliberation
Transparency Consultation/Protest
Support
Open Data
72
Research Posters | PhD Researchers 2011 2015
What impact has the technology behind cryptocurrencies had on cybercrime, security
and policing?
Dominic Hobsondom.hobson@soton.ac.uk
Dr Craig WebberCriminology
Professor Vladimiro SassoneComputer Science
Background Attack Category Deviancy Defence Applications of blockchain tech
Originally invented and released under the pseudonym Satoshi Attack against currency Double spends Source code review? Bitcoin was the first to use a blockchain - a public ledger which
Nakamoto, Bitcoin is seen as the first cryptocurrency. The refer- Exploits vulnerabilities in the Buffer overflow allows a distributed network to come to a consensus via proof-
ence client was released as open source software and has now protocol or reference client Mining attacks (selfish mining) of-work (PoW). Participants agree to accept the history which
spawned over 500 different cryptocurrencies. has had the most work done to create it. Work for Bitcoin in-
Cryptocurrencies, such as Bitcoin, are decentralised online cur- volved hashing the last block of transaction in hope that the ran-
Attacks against infrastructure Exchange hacks Cryptocurrency spe- dom result starts with a pre-set amount of 0s.
rencies. Unlike fiat currencies, their creation, distribution and
Exploit weaknesses in the infra- Web wallet hacks cific security practices
value are not governed by law and they are typically not associ- This consensus method has been altered and applied to network
structure (e.g. off protocol) Pool attacks and standards?
ated with any single offline jurisdiction. The technology behind to solve problems other than just transactions.
Market manipulation
these currencies provides users with a high degree of privacy, Namecoin presents a censorship resistant DNS system, where
and their implementation means that they have no central transaction instead represent registrations of a .bit domain.
point of operation, failure or control. These currencies allow the Attacks against the individual Chargeback scams Education?
Targeted attacks that exploit the Ponzi schemes Ethereum offers smart contracts, extending the idea of a trans-
direct transfer of value between individuals online, without the
73
consumer Social engineering attacks action scripting language with a Turing complete language.
inconvenience, cost or trust required with a third party such as
Maidsafe uses Safecoins to automatically reward developers and
a bank or payment processor (e.g. PayPal).
contributors to its decentralised storage network.
Despite there being ~$5billion worth of cryptocurrencies in cir-
culation and lots of media coverage (particularly relating to Other attacks Laundering Twister serves as a P2P microblogging platform, using the torrent
crime), very little research, particularly social or criminological Malware (mining malware, wallet steal- protocol, DHTs, and a blockchain.
research, has been conducted. ing malware, clipboard malware) Monegraph uses the Namecoin blockchain to show authenticity
Privacy/deanonymisation attacks of digital artwork.
Research Questions Scripting Language Criminal Opportunities Cryptocurrency Policy & Policing
What new criminal opportunities have been creat- A Bitcoin transaction is a set of commands. Cryptocurrencies requires users to hold the Unlike traditional payment services, there is no central point of
Transactions are verified by everyone by run- private keys to spend their currency. contact for cryptocurrencies. As a large portion of cybercrime is
ed by cryptocurrency technology?
ning the commands in the transaction. This leads to new opportunities for crime, as motivated by money, authorities can typically approach money
How is the Bitcoin transaction scripting language The scripting language is a forth like non- this is the first time it has been possible for service providers such as banks or PayPal and request infor-
being used in the wild? Turing complete stack based language with people other than banking institutions to be mation on individuals, freeze finances, or block users from such
approximately 190 different commands. responsible for their own electronic money. services altogether. This is not possible with cryptocurrencies.
What policies are in place to handle practical polic-
However, this language is poorly document- Services have sprung up, known as web wal- Cryptocurrencies do not fall within existing legal definitions of
ing differences of decentralised currencies? electronic cash due to the lack of central issuer or authority.
ed and incomplete in its implementation, in- lets, who hold private keys for individuals.
At what point will national companies and au- cluding reserved commands by Satoshi, and But these services have become targets due Attempts to regulate, such as New York BitLicences, include fin-
thorities begin to implement cryptocurrency spe- other commands disabled due to security to the amount of money they hold. gerprinting users for 10 years and have been met with resistance.
concerns. We would like to find out who are the relevant authorities,
cific policies? We would like to find out what new crimi-
We would like to see how this language is nal opportunities are being exploited with what policies they have in place, and if there are none, at what
Who are the relevant authorities for handling cryp- used in the wild, by quantitatively analysing cryptocurrencies with a qualitative analysis point would they consider bringing policies into place by inter-
tocurrency related crime? all transactions in the blockchain. of public forum data. viewing key authority figures
Research Posters | PhD Researchers 2011 2015
These challenge traditional distinctions found in data protection and privacy laws between two
categories of information: PERSONAL DATA and NON-PERSONAL DATA.
Consider the inferences that might be made from communications metadata alone:
You spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.
You called the suicide prevention hotline while standing on a bridge.
You rang a phone sex service at 2:24 am and spoke for 18 minutes.
You called a gynecologist, spoke for a half hour, and then called the local Family Planning Clinics number later that day.
https://www.eff.org/deeplinks/2013/06/why-metadata-matters
Research Questions:
To what extent are we anonymous online? What exactly do we mean by anonymous?
Can we rely on anonymisation techniques to hide our identities?
What weight should be placed on indirect digital identifiers and their links to a person? (e.g. Should I bear any liability for
what happens via an IP address linked to my home? Should the same IP address be deemed my personal data worthy of
legal data protection against those who might use it to try to identify my offline identity?)
What is the harm from digital identity attribution? Does it extend beyond a privacy harm? What is its value?
http://blogs.law.harvard.edu/billofhealth/files/2013/05/Screen-shot-2013-05-13-at-3.02.09-PM.png
Alison Knight
University of Southampton
A.M.Knight@soton.ac.uk
Web Science
74
Research Posters | PhD Researchers 2011 2015
2 4
=
2
[TEX]
x=\frac{-b\pm\sqrt
{b^2-4ac}}{2a}
[/TEX]
75
Research Posters | PhD Researchers 2011 2015
76
Research Posters | PhD Researchers 2011 2015
Making'Bodies:'What'is'the'Role'of'the'Web'on'
Womens'Engagement'with'Aesthetic'Surgery??!
Rebecca'Nash''
rn5g08@soton.ac.uk'
Supervisors:!Professor!Catherine!Pope!&!Professor!Susan!Halford!
Conforming!to!an!idealistic!perception!of!beauty!is!incessantly!at!the!forefront!of!bodily!debate!in!contemporary!
society.!This!is!due,!not!only!to!the!popularity!of!accessible!routes!to!altering!bodies,!such!as!diet,!exercise!and!
cosmetics,!but!also!pressures!to!take!responsibility!for!body!projects!(Shilling,!2003),!driven!by!a!cosmetic!
gaze!(Wegenstein!and!Ruck!2011.!The!Web!has!transformed!production!and!circulation!of!images,!and!altered!ways!
that!individuals!Nind!information,!consumer!products,!and!communicate!about!aesthetics.!This!thesis!explores!the!
role!of!the!Web!on!womens!engagement!with!aesthetic!surgery.!!
Research'Objectives'
How!is!aesthetic!surgery!represented!across!the!
Web?!
How!are!women!engaging!with!aesthetic!surgery!
on!the!Web?!
Is!the!Web!altering!perceptions!of!aesthetic!
surgery,!and!ideations!of!ideal!bodies?!
'
Case'Study:'Aesthetic'Surgery'
Aesthetic!surgery!is!a!practice!which!alters!the!body!
in! pursuit! of! an! aesthetic! ideal.! Becoming!
increasingly! popular! throughout! the! 20th! Century;!
media! images! idealised! certain! body! types! !
overwhelmingly! young! people! with! perfect!
Western! characteristics! W! drove! commoditisation! of!
the!body;!deNiance!of!ageing!(Askegaard!et!al.,!2002:!
795),! and! the! notion! of! the! ! body! as! a! reNlexive!
project!(Giddens,!1991;!Shilling,!2003).!The!web!has! Research'Outcomes'
opened! up! spaces! for! these! practices,! enabling! not! Continuities'and'discontinuities'of'the'Web'
only! discussion! of! aesthetic! surgery,! and! websites! In! some! cases,! materials! disseminated! online! do! not! differ!
afNiliated! with! established! organisations,! but! also! from!materials!accessible!ofNline.!However,!the!Web!departs!
unlicensed! practitioners,! potentially! risky! sites! for! from!traditional!media!in!three!main!ways:!the!3Vs,!ease!of!
aesthetic! tourism,! howWto! guides,! and! purchasing! access! and! navigation,! and! user! enrolment.! In! relation! to!
spaces! for! aesthetic! materials.! This! thesis! is! aesthetic! surgery! online,! continuities,! discontinuities! and!
exploring! these! spaces! to! comprehend! varying! contradictions!are!evident!across!spaces.!!
discourses,! and! how! they! may! impact! upon! Womens'bodies'as'perpetually'aesthetically'deKicient''
individuals!interested!in!undergoing!a!procedure.! The!Web!is!far!from!the!disembodied!space!put!forward!by!
postWhuman! theorists,! and! indeed! not! a! space! with! neat!
online/ofNline! boundaries.! It! is! a! number! of! spaces!
Research'Methods'' presenting! real! female! bodies,! possessing! real! assumed!
This! research! used! a! combination! of! Multimodal! deNiciencies,! with! real! life! consequences! for! viewers! of!
Critical! Discourse! Analysis! and! semiWstructured! materials!!
interviews! with! 20! women! who! had! engaged! with! Hypertextual'Feminism'
aesthetic!surgery!online.!! The! Web! provides! images,! discussion,! and! ways! to! alter!
! bodies! and! empowerment! comes! through! browsing! and!
References'' assessing! Web! materials! on! aesthetic! surgery.! Yet,!
Askegaard,!S.;!Gertsen,!M.C.;!Langer,!R.!(2002)!The!Body!Consumed:!ReNlexivity!and!Cosmetic!
Surgery,!Psychology)and)Marketing,!19!(10):!793W81! simultaneously,! women! are! faced! with! critiques! of!
Giddens,! A.! (1991)! Modernity) and) Self5Identity:) Self) and) Society) in) the) Late) Modern) Age,!
Cambridge:!Polity!
undesirable! bodies! ! altered! and! unaltered;! reinforcing!
Shilling,!C.!(2003)!The)Body)and)Social)Theory,!London:!Sage,!2nd!Edition!
!
structural!ideas!of!what!it!means!to!be!attractive.!!
Acknowledgement:!The!Digital!Economy!Programme!is!a!Research!Councils!UK!cross!council!initiative!led!by!EPSRC!and!
contributed!to!by!AHRC,!ESRC!and!MRC!
77
78
Research Posters | PhD Researchers 2011 2015
g
in
ar
Pu
Ad
Sh
bl
m
ic
ge
M
in
on
n
Re
ch
d
tio
ar
ist
le
iti
la
ar
ke
a
ra
ow
b
t
uc
se
io
hi
t
in
iv
Re
Kn
Ed
ns
Ex
g
e
Javier Pereda
Informatum
Due to the interdisciplinary
D I K W j.pereda@soton.ac.uk
nature of this research, data Data Information Knowledge Wisdom
and information will be Web Science
DTC
addressed as a single entity
It is by adding meaning, that the transition between the elements is
called informatum.
possible in the DIKW Model (Acko, 1989).
One of the main objectives of this research is to enhance the
engagement with data and information held in OCH.
In the process of dening dierent levels of interaction and/or type of user levels in OCH, Taylor (1967)
provides a set of dierent perspectives of how a user/visitor might attempt to gain knowledge.
Visceral Conscious Formalised Compromised
Demateriallisation
Tangible Interaction
(Campenhout, et.al., 2013)
78
Research Posters | PhD Researchers 2010 2014
122cm Bridging the Gap Between the Inside and Out to Reduce Disorientation This Po
(versio
Craig Allison1,2, Dr Edward Redhead2, Richard Treves3, Dr Matthew Jones2 asked q
If you a
1 Web Science Doctoral Training Centre, 2Psychology, 3Geography, University of Southampton templa
me day
Introduction Procedure
When we move, we can effectively keep track of where we are with limited effort Participants explored the outside and inside of the virtual building before completing
de (Riecke, Cunningham & Bulthoff, 2007). To do this we must effectively track our four orientation trials. At the start of each orientation trial Participants found
Verifyi
themselves within rooms in the virtual building and were asked to turn to face a non-
your position in terms of stationary objects, via a process of Spatial Updating. As we move
visible external landmark. Once participants were happy with their position they Go to t
within complex internal spaces, our relationship with the larger, unseen world also
proceeded to the next trial.
constantly changes. preferr
But have you ever lost track of where you are in relation
to the exit in a shopping centre? Two rooms in the orientation trials were external, allowing the use of external visual of the
cues to orientate. The other two rooms were internal, over looking the inner 100% th
Wang and Brockmole, (2003) suggest that within nested courtyard, and required an understanding of the spatial relationship between the
environments, such as rooms within a building, people internal and external cues to complete the task. One of the external rooms and one when p
can automatically update cues within their local of the internal rooms had been visited previously in the acquisition trials. quality
environment (the room), but struggle to update their
for prin
position relative to the larger outside world. Results
Klatzky et al. (1998) suggests that without physical 140 Group Control Mean Orientation Error, in Degrees,
for each trial.
140 Group Experimental Mean Orientation Error in Degrees, Using t
for each trial.
movement, for example when moving within a virtual
environment, automatic spatial updating can be impeded.
Orientatation Error (in degrees) 120 120 To add
100 Female
Male
100 Female
Male
and typ
80 80
Gender differences within spatial activities is the most
60 60 click o
pronounced of all cognitive tasks (Lawton & Morrin,1999). 40 40 frame
Gender differences in Spatial Updating have produced
mixed findings, though many report greater performance
20 20
Then, c
0 0
by males (Tlauka et al., 2005) External Internal External Internal External Internal External Internal you can
Unvisited Unvisited Visited Visited
he Unvisited Unvisited Visited Visited be foun
Because of these factors, keeping track of our position in
digital environments is a great challenge. This research Results suggest that without the coloured cues Females in Group Control found it
aims to investigate whether the addition of simple visual difficult to orient within the inner rooms, especially if they had not previously Modify
visited.
cues within a virtual nested environment could help individuals track their overall This te
to location.
A 4-way mixed design ANOVA revealed a main effect of room type, F(1,36)= 4.45,
column
Method P<0.05 suggesting it was more difficult to perform the task from an internal room. A mouse
Participants main effect of movement, F(1, 36) = 9.96, p<0.01 suggests that the orientation task
hin 40 undergraduate students (Female = 27, Male = 13) completed this study in was more difficult from within a room which participants had not previously visited.
click o
exchange for course credit. Participants were randomly allocated to either a Control No other main effects were significant. There was a significant 4-way interaction, layout
or Experimental condition. F(1, 36) = 6.91, p<0.05. Further analysis via simple main effects revealed that there
was only an effect of gender in Group Control in the Internal room to which the
the pro
Design participants had not previously moved, F(1, 144) = 8.96, p<0.01. This suggests that advanc
females found it harder than males to orientate in this room, but this impairment in
Study used a 2(Condition) x2(Gender) x2(Room Type) x2 (Movement) mixed design.
spatial updating was removed by the addition of the coloured cues.
and the
ter to
Apparatus Conclusion Import
This study used a virtual environment which participants were required to navigate Participants within the control condition struggled to automatically update their
and explore. This was modelled on the University of Southampton Shackleton position within internal rooms, suggesting they were unable to update multiple
TEXT:
Building (44), using 3DSMax 2012. Participants controlled their movement using the environments simultaneously. This is consistent with previous findings, using real placeh
arrow keys, but could not interact with items within the environment. world tasks (Wang & Brockmole, 2003)
Group Control explored a replica of the building with no additional navigation aids. In side of
contrast Group Experimental also saw large coloured bands on the top of each of the
The effect of movement offers partial support for Klatzky et al. (1998). Participants PHOTO
walls, based on their compass facing (North Blue, East Yellow, South Green and West
Red)
made greater orientation errors within rooms which they had not previously visited. in it an
However many were able to remain oriented within the virtual environment without
e it the need for physical movement. TABLES
r. docum
There was no overall effect of gender, but a gender difference was apparent when the tex
participants were required to use internal cues. Females within Group Control were
unable to effectively update their orientation automatically within the internal pasted
room. The addition of colour cues however allowed females in Group Experimental to then cl
orient as well as the males. This is consistent with females greater reliance on direct
landmark cues (Lawton, 1994). values
Results suggest that losing track of where you are within a virtual environment can Modify
be reduced by the addition of salient visual cues which are associated with external
orienting features. To chan
References Design
Klatsky, R.L., Loomis, J.M., Beall, A.C., Chance, S.S., & Golledge, R.G. (1998). Spatial updating of self-position and orientation during real,
from th
imagined, and virtual locomotion. Psychological Science, 9, 293298
Lawton, C. A. (1994). Gender differences in way-finding strategies: Relationship to spatial ability and spatial anxiety. Sex Roles, 30, 765-779. your ow
Lawton, C. A., & Morrin, K. A. (1999). Gender differences in pointing accuracy in computer-simulated 3D mazes. Sex Roles, 40, 73-92.
Riecke, B.E., Cunningham, D.W., & Buelthoff, H.H. (2007) Spatial updating in virtual reality: the sufciency of visual information.
Psychological Research, 71, 298313.
Rieser, J. J. (1989). Access to knowledge of spatial structure at novel points of observation. Journal of Experimental Psychology: Learning,
Memory, and Cognition, 15, 1157-1165.
Tlauka, M., Brolese, A., Pomeroy, D.E., & Hobbs, W. (2005), Gender differences in spatial knowledge acquired through simulated exploration
of a virtual shopping centre, Journal of Environmental Psychology, 25, 111-118.
Wang, R.F. & Brockmole, J.R. (2003) Simultaneous spatial updating in nested environments. Psychonomic Bulletin & Review. 10, 981986 201
Acknowledgments 2117
This research was funded by the Research Councils UK Digital Economy Program, Web Science Doctoral Training Centre,
University of Southampton. EP/G036926/1 Berk
RESEARCH POSTER PRESENTATION DESIGN 2012
www.PosterPresentations.com
post
79
80
Research Posters | PhD Researchers 2010 2014
Memory Institutions
My PhD looks at the potential of
web-based phenomena for local
and the Web
authority museums in the UK.
This poster presents a case study
which forms a part of a chapter of
my PhD thesis. Museums, libraries and archives are conventionally recognised
memory institutions. The web is changing this. For museums,
traditionally understood mechanisms for collecting, preserving
and interpreting the heritage of humanity and our
environments are no longer enough.
The photographs in this poster form part of the Europeana collection Vintage Animals and are curated by Retronaut.
They are multi-institutionally sourced, and owe their presence here to good metadata (which made them findable) and
comedic subject matter (which made them adorable).
On the web, the audience of heritage is very different. Young people and
people of different socio-economic backgrounds engage with content with a
history or archaeology focus much more readily online than they do offline. In
addition to this, the audiences of this kind of content are finding information
and knowledge about these topics away from the large authoritative
organisations. An online user will come across the information in a different
way, and this is key to the success of sharing heritage knowledge online.
audiences is illustrative of this potential. Robinson, H., 2012. Remembering things differently: museums, libraries and
archives as memory institutions and the implications for convergence,
Museums Management and Curatorship, 27(4): 413-429
Notes: http://theculturalheritageweb.wordpress.com
http://www.experiencewoodhorn.com/time-traveller-to-open-up-archives/
Accessed 16th February 2014
Thoughts: @nicoleebeale Supervisors: Dr. Yvonne Marshall and Dr. Graeme Earl
80
Research Posters | PhD Researchers 2010 2014
81
Research Posters | PhD Researchers 2010 2014
Since its inception 25 years ago the World Wide Web has facilitated an explosion of
information unprecedented in its scale. Many websites are said to embody the Webs
censor-free, information anarchy. This has led to widespread anxiety about the fidelity
of some of this information and its potential to do harm. As the myth of the Digital
Native is debunked, young people, it is now claimed, are exceptionally vulnerable to this
new danger; they are declared nave and lacking in the crucial new literacies needed to
discern fact from fiction.
This work investigates the reality of these fears and claims. Drawing on case studies
from two very different institutions a state sector FE college with a largely white
working class intake and a prestigious independent fee paying school with an ethnically
diverse intake the research explores how groups of 16-18 year olds access, interpret
and use information. It focusses on controversial information involving issues such as
immigration, climate-change, and government cover-ups and makes use of multiple
methods including interviews and workshops as well as proxy servers to digitally record
everything young people do on the Web. The data suggests highly differentiated, class-
based practices grounded in the social, material and cultural contexts of everyday life
that can be better understood by combining Bourdieusian and Foucauldian theoretical
frameworks.
Acknowledgement: The Digital Economy Programme is a Research Councils UK cross council initiative led by EPSRC and
contributed to by AHRC, ESRC and MRC
82
Research Posters | PhD Researchers 2010 2014
$
Malware doesnt propagate like viruses any more, so
epidemic models need to be changed
Imagining the criminal as the pathogen changes the
focus to the environment in general
A more hostile environment makes cybercrime less
worthwhile to participate in
Bad security practices are a problem for the whole
Web, not just an individual network
Web
Science
83
Research Posters | PhD Researchers 2010 2014
Disaggregation
Dr Simon Coles
The Redactor tool assists researchers with disseminating their work to the
widest audience possible. It allows a user to remove any elements that inhibit
wider dissemination and assists the user with finding alternative content that
may be more suitably distributed. A unique idenitfier for researchers,
allowing a researcher to attach
For example, images can be replaced with Creative Commons licenced
themselves to their diverse research
alternatives, or a user can distribute their own images by embedding licences in outputs, distributed across a range of
the metadata. platforms, institutions and disciplines.
84
Research Posters | PhD Researchers 2010 2014
Web Science
Introduction
On the 23 of April 2013, a fake tweet was sent from the White House's twitter
account. A few minutes later the price of the Standard and Poor's 500 index,
representing 500 of the highest valued companies in the US dived by nearly 1%.
1 tweet accounted for the loss of nearly 1% of the value of the US Economy.
In a sense this is not surprising, financial news services like Bloomberg and
Reuters regularly update and publish indices of media sentiment towards
stocks. Over the last 4-5 years researchers have begun to look for models of
media sentiment which can be used to predict prices. The results of this
research are, however, generally quite disappointing.
The reason for this is that the way language relates to offline events is a
difficult thing to model. Language is temporally uncertain, in that a
statement can be about an event in the future, past or present. Also as yet
there is no literature which describes how to model word frequency
movements over time.
The aim of this PhD is to define a methodology that tackles these issues.
85
Research Posters | PhD Researchers 2010 2014
86
Research Posters | PhD Researchers 2010 2014
87
Research Posters | PhD Researchers 2010 2014
88
Research Posters | PhD Researchers 2010 2014
Social media provide a unique opportunity for charities to reach a large audience with whom they can
engage in productive two-way conversations, for little cost. While it is often assumed that using social media
will be productive, and that charities should use these services, there is a lack of understanding regarding
what value is actually produced and where by using them. This poster presents a framework for
understanding the value that could potentially be created by a charity depending on their intentions and
motivations, communication style, audience intentions and audience engagement.
VALUE
This framework has been produced as a result of a mixed methods investigation into what influences the creation of value on social media for
charities. It goes beyond existing free analytic services that rarely take into account the context of the organisation in question, and instead focuses
on what their aims are, how they relate to their supporters' reasons for using social media to connect with a charity, and how these aspects are
reflected in actual behaviour on the sites.
89
Research Posters | PhD Researchers 2010 2014
90
Research Posters | PhD Researchers 2010 2014
Institute of Criminal
Justice Research
Methods
The study was comprised of three stages:
to procure them. What is legitimately available is constantly shifting and the Web
does not always reflect this, allowing sales toAcknowledgement:
be conducted outsideTheauthorised
Digital Economy Programme is a Research Councils UK
forms of supply. cross council initiative led by EPSRC and contributed to by AHRC, ESRC and
MRC
91
Research Posters | PhD Researchers 2010 2014
DIGITAL TAXONOMY
Knowledge is Novelty is People disseminate Options are Options are Action takes place,
AUTO-THINKING
AUTO-ACTION
MACHINE
Automated or
controlled digital Photography, satellite
and drone sensing
Computational
creativity
Ontologies, semantic
web, linked data
Auto-software update
Manufacturing robots
and drones
Robots
File download
Drones
hardware and Mathematical analysis
Simulation and Data platforms and Automated process
{User control}
Automated
software.
2D/3D Scanners
prediction
standards
optimisation
optimization
<Viruses,worms and
Scientific instruments
{Computation / {Transmission}
botnets>
2D/3D printing
Motors, actuators
processing}
Affective monitoring
{Data transfer Automated problem Networked machines
{Software}
protocols}
diagnosis
(Internet of things)
Activity records
{Cloud computing {Volunteer computing}
Installation assessment Dematerialised content
Mobile &wearable services}
drones and robots
sensors
{Computer outputs}
{Artificial intelligence {System components:
{Sensors}
agents}
software, hardware
{Memory / storage}
and digital services}
{Computer inputs}
[Digital industry
manufacturing base]
{Machine learning,
pattern and image
recognition}
3. SUSTAINABILITY
EFFECTS OR OBJECTIVES: THE SUSTAINABILITY TAXONOMY
SUSTAINABILITY
CAPABILITY
SUSTAINABILITY
PROGRESS
The major challenges that must ultimately be addressed for environmental sustainability.
Intermediate steps across
the capability processes to
build up resources for SUSTAINABLE RESOURCE USE
ENVIRONMENTAL
sustainability progress
Decoupling. Efficiency and productivity.
INTERACTIONS
Interdependent relationship of
ENERGY
OTHER RESOURCES
humans with the Earth System
Sustainability education, arts and media
Building efficiency
Water and waste water
Biodiversity and habitat
Sustainability science and knowledge Renewable energy
Food, agriculture, and fishing
conservation
development
Adaptation and resilience to
Carbon and fossil fuels
Waste, materials and mineral
Finance, insurance, resource pricing
extraction
environmental risk
Electricity distribution and storage
ICTs (cleanweb, second order applications)
Manufacturing and supply chains
Environmental health and safety,
ICTs (green computing, first order air quality
Government, regulation and e-participation
impacts)
Real estate, storage and
construction
Geoengineering
Local economy and community
Transport and electric vehicles
Consumer goods
General sustainability
Fundamental technology or resource
Cities
Font: Klima CC BY-NC-ND 4.0. Icons: Freepik, Robin Kylander, Flaticon.com. CCBY3.0; www.iconsmind.com. JACK TOWNSEND DIGITALTAXONOMY.COM 0.6
92
Research Posters | PhD Researchers 2010 2014
Web Science
93
Research Posters | PhD Researchers 2009 2013
Thesis title
Academic Research Data
Re-usage in a Digital Age:
Modelling Best Practice
Laura German
leg406@soton.ac.uk
LLB (Hons) Law, University of Southampton 2009
MSc (Dist.,) Web Science, University of Southampton 2010
Web Science PhD Candidate October 2010 to (expected completion) early 2015
Senior Research Assistant (The Ordnance Survey Data Enrichment Project) January 2014 to January 2015
Supervisory team:
Professor Mary Orr Lead Supervisor, Modern Languages, Faculty of Humanities
Professor Stephen Saxby Co-Supervisor, Law, Faculty of Business and Law
Professor Leslie Carr Co-Supervisor, Web and Internet Science, Faculty of Physical and Applied Sciences
Abstract
Recent high profile retractions such as the case of Woo Suk Hwang and others demonstrate that there are still significant
issues regarding the reliability of published academic research data. While technological advances offer the potential for
greater data re-usability on the Web, models of best practice are yet to be fully re-purposed for a digital age.
Employing interdisciplinary web science practices, this thesis asks what makes for excellent academic research across the
sciences, social sciences and humanities. This thesis uses a case study approach to explore five existing digital data platforms
within chemistry, marine environmental sciences and modern languages research. It evaluates their provenance metadata,
legal, technological and ethical frameworks. This thesis further draws on data collected from semi-structured interviews
conducted with eighteen individuals connected to these five data platforms. The participants have a wide range of expertise in
the following areas: data management, data policy, academia, law and technology.
Through the interdisciplinary literature review and cross-comparison of the three case studies, this thesis identifies the five
main principles which inform how best practice should be modelled both now and in the future. These principles are:
sustainability, discoverability, working towards a common understanding, a good user experience and accreditation. It also
reveals the key grey areas that require further investigation.
Post-doctoral project
The Ordnance Survey Data
Enrichment Project
Enriching Ordnance Survey Content: Provenance, IP and
Licensing Impacts of Data Usage from Multiple Sources
Summary January 2014 to January 2015
Researchers from the Ordnance Survey and the University of Southampton have joined together to work on an
interdisciplinary research project that focuses on data enrichment in a digital age.
Dr Jenny Harding (Ordnance Survey) and Professor Mary Orr (Modern Languages) lead the research team with Ashley Wright
(Ordnance Survey), Victoria Lavender-Seagrave (Ordnance Survey), Dr Sophie Stalla-Bourdillon (Law) and Laura German (Web
Science) as co-investigators.
This research focuses on how data at Ordnance Survey can be further enriched for business, research and leisure users
through data mining of existing data and linking to other external datasets. It explores the potential for data enrichment at
Ordnance Survey and how this could be achieved (where necessary) by modification to its existing provenance metadata,
legal, technological and ethical frameworks.
This one-year project is funded by Ordnance Survey and sponsored by the University of Southampton.
Web Science Poster. Version 1.0. Last modified by Laura German on 24 October 2014.
94
Research Posters | PhD Researchers 2009 2013
The Emergent Threat of Defamation Online: The need for a new model governing online
defamation with the emergence of social web technologies
Sarosh Khan , Phd Candidate, shrk106@soton.ac.uk
Dr Roksana Moore (Faculty of Business & Law)
Dr Mark Weal (Faculty of Applied & Physical Sciences)
Web Science Doctoral Training Centre, University of Southampton
The Problem The continued adoption of the paternal approach is no longer appropriate to govern online defamation in the U.K. in
light of the essence of the Web 2.0 environment. The ability to republish and search for content means that more individuals are engaging
with potentially defamatory content than ever before.
RT Convention Proliferation
Variation Username Date Text
Via @tagami 16/03/2007 @jasonCalacanis (via@kosso) new Nokia N-
Series phones will do Flash, Video and YouTube.
HT @TravisSeitler 22/10/2007 The Age Project: how old do I look?
http://tweetl.com/21b (HT @technosailor)
Retweet @kevinks 01/11/2007 Retweet: @AHealthyLaugh is in the Boston Globe
today, for a stand-up show shes doing tonight.
Add the funny lady on Twitter!
Retweeting @musicdt 05/01/2008 Retweeting @Bwana: Is anyone streaming live
from CES? #ces
RT @TDavid 25/01/2008 RT @BreakingNewsOn: LV Fire Department: No
major injuries and the fire on the Monte Carlo
west wing contained east win nearly contained
R/T @samflemming 20/06/2008 r/t: @danwei Live Online chat with Chinese
President Hu Jintao,. Variation
He claims he uses net to # of adopters % of # of adopters of # of retweets
know netizen concerns. total
Recycle Icon @claynewton 16/09/2008 [recycle icon] @ev of @biz re:twitterkeys [star]
http://twurl.nl/fc6trd
RT 1,836,852 89.2% 53,221,529
Through a combination of quantitative and qualitative analysis of a corpus of 80 million tweets from Jan 2007 to Oct 2009, we can
demonstrate the way in which the convention of RT has spread across the non homogeneous community of Twitter users to become the
accepted method of communication among the community. We see, RT and via exceed all others with no written rules as a standard of
behaviour through the existence of weak ties. Weak ties mean that even if individuals do not believe in a standard, they will adopt it if they
see others have adopted it.
39
95
Research Posters | PhD Researchers 2009 2013
96
Research Posters | PhD Researchers 2009 2013
97
Research Posters | PhD Researchers 2009 2013
98
Research Posters | PhD Researchers 2009 2013
99
100
Web Science Centre for Doctoral Training
http://webscience.ecs.soton.ac.uk/dtc
+44 (0) 23 80 59 27 38
@WebSciDTC
@sotonWSI
101