Browse: Faculty of Engineering and Physical Sciences > School of Electronics and Computer Science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Creators Name | Item Type
Number of items: 160.
  1. [img]
    10 - Programming Principles: Super and Sub-classes
    In this session we introduce inheritance - one of the cornerstone concepts of object oriented programming. We look at how to define super and sub-classes, how to maintain encapsulation using the super() constructor, and why it is useful to use substitution to hold references to sub-classes in references typed as their super-class.

    Shared with the World by
    Prof David Millard
  2. [img] [img]
    12 - Programming Principles: Testing and Debugging
    In this session we look at the sorts of errors that occur in programs, and how we can use different testing and debugging strategies (such as unit testing and inspection) to track them down. We also look at error handling within the program and at how we can use Exceptions to manage errors in a more sophisticated way. These slides are based on Chapter 6 of the Book 'Objects First with BlueJ'

    Shared with the University by
    Prof David Millard
  3. [img] [img]
    13 - Programming Principles: Software Design
    In this session we look at some of the basics of good code design, including avoiding duplication and designing for loose coupling and high cohesion.

    Shared with the University by
    Prof David Millard
  4. [img]
    14 - Programming Principles: Abstract Classes and Interfaces
    In this session we look at how to use Abstract Classes and Interfaces in Object Oriented Design - especially as a way to get all the advantages of multiple inheritance without any of the problems.

    Shared with the World by
    Prof David Millard
  5. [img] [img]
    Preview
    15 - Programming Principles: Designing Applications
    In this session we look at the how to use noun verb parsing to try and identify the building blocks of a problem, so that we can start to create object oriented solutions. We also look at some of the challenges of software engineering, and the processes that software engineers use to meet them, and finally we take a look at some more Design Patterns that may help us reuse well known and effective solutions in our own designs.

    Shared with the World by
    Prof David Millard
  6. [img]
    A User-Centric Approach to eCertificate for Electronic Identities (eIDs) Management in Mobile Environment
    The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment with a user-centric approach. Mobile devices have been chosen because they provide mobility, personal use and high computational complexity. The inherent user-centricity also allows the user to personally manage the ID information and to display only what is required. The chosen path to develop the protocol is to migrate the existing eCert technologies implemented by the Learning Societies Laboratory in Southampton. By comparing this protocol with the analysis of the eID problem domain, a new solution has been derived which is compatible with both systems without loss of features.

    Shared with the University by
    Mr Michele Schiano Di Zenise
  7. [img] [img]
    Agile methodologies
    Outlines of both Scrum and Dynamic Systems Development Model

    Shared with Selected Users by
    Mr Jonathan Taylor
  8. [img]
    Preview
    Aproaches to Learning
    Covers some of ways people think about learning - used for first year class to help them think about what they are doing and what works best for them.

    Shared with the World by
    Prof Hugh Davis
  9. [img]
    Behaviour and Network Dynamics in Social Networks
    Shared with the University by
    Prof Thanassis Tiropanis
  10. [img] [img]
    Case Studies
    Case studies related to content taught in IT Systems. CASE STUDY LIST: Banco do Brasil WAN Case Study Brighton WiMAX Case Study Burlington Linux Case Study Google Docs Case Study Networks in Agribusiness Case Study

    Shared with Selected Users by
    Mr Jonathan Taylor
  11. collection
    Collaborative Working
    Shared with Selected Users by
    Mr Thomas Deamer
  12. collection
    Commercial Issues in IT
    Shared with Selected Users by
    Mr Thomas Deamer
  13. collection
    Computational Systems
    some resources on agile methods and enterprise architecture frameworks

    Shared with Selected Users by
    Mr Jonathan Taylor
  14. collection
    Databases and Database Application
    Shared with Selected Users by
    Mr Jonathan Taylor
  15. [img]
    Preview
    [img]
    Preview
    Digital Britain
    Only a Digital Britain can unlock the imagination and creativity that will secure for us and our children the highly skilled jobs of the future. Only a Digital Britain will secure the wonders of an information revolution that could transform every part of our lives. Only a Digital Britain will enable us to demonstrate the vision and dynamism that we have to shape the future.

    Shared with the World by
    Prof Leslie Carr
  16. [img] [img]
    Enterprise Architecture notes/white papers
    A collection of notes and white papers regarding Enterprise Architecture

    Shared with Selected Users by
    Mr Jonathan Taylor
  17. [img]
    Preview
    Game Theory Introduction
    Shared with the World by
    Prof Thanassis Tiropanis
  18. [img]
    Graph Theory and Social Networks
    Shared with the University by
    Prof Thanassis Tiropanis
  19. [img] [img]
    INFO 2009 - Group 9 - KungFu Rabbits
    This is the folder for 2011/2012 group 9 for INFO2009 (CWK2). The resource is an interactive website. Users: cre1g10, rjt2g10, gl10g10, jb23g10, jdr1g10

    Shared with the World by
    Mr James Robinson
  20. [img] [img]
    INFO2009 Group 16 - The Rice Box Resources
    INFO2009, Coursework 2, Green ICT/IT

    Shared with Selected Schools/Units by
    Miss Yizhi Chen
  21. collection
    IT Modelling
    Shared with Selected Users by
    Mr Thomas Deamer
  22. collection
    IT Systems
    resources for the new 15 credit IT Systems module.

    Shared with Selected Users by
    Mr Jonathan Taylor
  23. collection
    Laser Work
    Shared with Selected Users by
    Miss Louise Moules
  24. [img] [img]
    Laser work
    Shared with Selected Users by
    Miss Louise Moules
  25. [img]
    Preview
    Linked Data Infrastructures and HE Challenges
    ECSS Talk

    Shared with the World by
    Prof Thanassis Tiropanis
  26. [img] [img]
    Mobile OS Whitepaper Summaries
    A summary of white papers on Android, IOS, Symbian and Series 40 Mobile Operating Systems

    Shared with Selected Users by
    Mr Jonathan Taylor
  27. collection
    Object Orientated PHP
    To replace Application Scripting and Contemporary Programming Principles

    Shared with Selected Users by
    Mr Thomas Deamer
  28. [img] [img]
    Online Social Networking Issues Within Academia and Pharmacy Education
    Shared with the University by
    Mr Taekyun Kim
  29. [img]
    Preview
    OpenIMAJ - Tutorial - Simple Mosaic
    Shared with the World by
    Dr Sina Samangooei
  30. collection
    Personal & Professional Development
    Shared with Selected Users by
    Miss Louise Moules
  31. [img] [img]
    Personal & Professional development - Resources
    Shared with Selected Users by
    Miss Louise Moules
  32. [img]
    Purity of Disciplines
    XKCD comic showing the purity of diciplines. Although this is funny, you'll soon find out that the humour wears off if you stay in academia.

    Shared with the World by
    Prof Leslie Carr
  33. [img]
    REALISE Transferability Workshop
    This is about open innovation, open source and assistive technology as part of a JISC project developing an innovation market place for AT projects.

    Shared with the World by
    Mrs E.A. Draffan
  34. [img] [img]
    Security & Information Technology
    Shared with Selected Users by
    Miss Louise Moules
  35. collection
    Security & Information Technology
    Shared with Selected Users by
    Miss Louise Moules
  36. [img]
    Social Networking Technologies: Project Launch
    Students taking the 20 credit version of the course (COMP6052) will work in groups of 6 to develop and design a new social networking tool/application/website. The teams will work on their design throughout the semester, and keep a design and development blog that will act as a digital portfolio of their work. At the end of the semester they will also be asked to submit an individual reflective summary that will outline their teams objectives and progress, their part in its progress, and a critical analysis of whether or not they were successful. At the end of the course teams will be asked to pitch their ideas to an interdisciplinary Dragon's Den style panel who will expect them to not only have created something that is technical viable, but will also want to see other economic, social, legal and ethical factors taken into consideration. In this presentation we explain the structure of the group project, what is expected in the blog, and explore some potential ideas to help students understand the scope of the work required. The outcome of the group project does not have to be a fully working piece of software, instead we are looking for a well developed idea that contains enough detail to be convincing to the panel.

    Shared with the University by
    Prof David Millard
  37. [img]
    Social Networks the Tertius Iungens
    Shared with the University by
    Mr Taekyun Kim
  38. [img]
    Preview
    The Social Semantic Web
    Shared with the World by
    Prof Thanassis Tiropanis
  39. [img]
    Value in Web 2.0
    COMP6051, COMP6052 Notes Social Networking Technologies: Value in Web 2.0

    Shared with the University by
    Prof Thanassis Tiropanis
  40. collection
    Web Design
    A collection of resources created for the Web Design Module. Please note that this link directs you to another share.

    Shared with Selected Users by
    Mr Jonathan Taylor
  41. [img] [img]
    Web Design Labs
    additional Labs created for web design module. Topics covered: HTML 5, Jquery and javascript debugging

    Shared with Selected Users by
    Mr Jonathan Taylor
  42. [img] [img]
    Web Design Labs (E-assessment)
    Multiple choice quizzes for each lab

    Shared with Selected Users by
    Miss Louise Moules
  43. [img] [img]
    What is Cybercrime and what do we do about?
    A guest lecture by Professor David S.Wall from the University of Durham. This talk will explore the way that networked technology has transformed criminal behaviour. The first part will map out cybercrimes and identify the challenges they pose for both criminologists and also regulators. The second part will show that cybercrimes are informational, networked and global. In this section it will also be shown that cybercrimes are highly disorganised forms of offending when compared to the organisation of more 'traditional' crimes, but display some new organisational logics of their own. The third part of the talk will illustrate how the 'culture of fear' that has arisen around cybercrime has placed demands upon government and police - demands that, for reasons related to the distinct nature of cybercrimes, are hard to resolve. The fourth and final part will look at the new policing arrangements that are designed, it is argued here, to close the reassurance gap.

    Shared with the University by
    Mrs Claire Wyatt
  44. [img]
    Preview
    Writing Technical Reports and Papers
    A brief coverage of the structure of a paper/report and some hints on writing and avoiding plagiarism

    Shared with the World by
    Prof Hugh Davis
  45. [img]
    Preview
    [img]
    Preview
    benefits of facebook
    Shared with the World by
    Mr Shahin Jahromi
  46. [img]
    informative website
    Shared with the University by
    Mr Stelios Mousouros
  47. [img]
    Preview
    snn introduction
    Shared with the World by
    Mr Shahin Jahromi
  48. [img]
    Preview
    trust recommender
    Shared with the World by
    Mr Shahin Jahromi
  49. [img] [img]
    INFO2009 - Team 'DROP TABLE groups;
    Edshare for INFO2009 coursework 2 - Team 'DROP TABLE groups;

    Shared with the World by
    Mr Patrick Naish
  50. [img]
    Preview
    [img]
    Preview
    COMP6047 Exam Proforma
    Shared with the World by
    Prof Leslie Carr
  51. [img]
    Preview
    Perl Assessment
    Perl programming overview for EPrints to support assessment 1

    Shared with the World by
    Prof Leslie Carr
  52. [img]
    Preview
    [img]
    Preview
    Personal Learning Environments? or Society’s Learning Environment?
    Keynote Presentation at PLE2011. What kind of Web have we got? What kind of Web does a Learning Individual need? What kind of Web does a Learning Society need?

    Shared with the World by
    Prof Leslie Carr
  53. [img] [img]
    Web vs Apps
    Shared with the World by
    Prof Leslie Carr
  54. [img] [img]
    What is the Web?
    An introductory lecture on Web Science, taking a kind of devils advocate position by suggesting that the Web is a piece of runaway technology that escaped from research labs prematurely.

    Shared with the World by
    Prof Leslie Carr
  55. [img]
    Preview
    [img]
    Preview
    Writings on Open Access
    Shared with the World by
    Prof Leslie Carr
  56. [img]
    Preview
    [img]
    Preview
    Reviewing Process
    Shared with the World by
    Prof Leslie Carr
  57. [img]
    Preview
    [img]
    Preview
    Policy Skills for Web Scientists
    Practical group based work on reading and interrogating evidence and writing policy briefings/critiques

    Shared with the World by
    Prof Leslie Carr
  58. [img] [img]
    INFO2009 A presentation with quiz and tutorial on Web 3.0
    A resource for the teaching of concepts involved in 'web 3.0', including a powerpoint presentation with quiz, and accompanying tutorial

    Shared with the University by
    Mr David Chang
  59. [img]
    Preview
    [img]
    Preview
    INFO2009 resource: Infographic on the evolution of Open Source Software
    Infographic providing a timeline of important events in the history of open source software since the fifties. Also includes stats for OSS licenses, usage in Business and reasons for participating in an OSS community.

    Shared with the World by
    Mr Marinos Mavrommatis
  60. [img] [img]
    Preview
    Cyber Crime
    Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years.

    Shared with the World by
    Prof Leslie Carr
  61. [img]
    Team A (Group 23)
    This website has been created to raise awareness of potential issues surrounding file sharing and the penalties than can be imposed if you are caught sharing copyrighted content.

    Shared with the University by
    Mr Greg Cramer
  62. [img]
    Preview
    [img]
    Learning to Program in Python
    Shared with the World by
    Prof Leslie Carr
  63. [img]
    Preview
    [img]
    Abstraction: From Transistors to Computers and from Bits to Programs
    Takes the Tanenbaum (Structured Computer Organisation) approach to show how application of successive levels of abstraction allow us to understand how computers are made from transitors and how they are programmed.

    Shared with the World by
    Prof Hugh Davis
  64. [img]
    Preview
    [img]
    Learning, Teaching and Lesson Planning
    This resource was designed for use with MSc Web Scientists as an introduction to a coursework that requires them to produce some teaching materials.

    Shared with the World by
    Prof Hugh Davis
  65. [img]
    Timeline of Computing
    Actually this is a timeline of Learning Technology but has all teh important dates in it

    Shared with the World by
    Prof Hugh Davis
  66. [img]
    Writing Research Proposals
    Shared with the University by
    Prof Hugh Davis
  67. [img]
    Preview
    Introduction to Research Methods
    Just one lecture for first year. Its objective is to show that there exists more than on approach to tackling a research question - and that not all disciplines approach things the same way!

    Shared with the World by
    Prof Hugh Davis
  68. [img] [img]
    Group 15 (Snav) - The Data Protection Act 1998
    An online tutorial outlining the definitions and principles of the Data Protection Act. Contains questions on scenarios which allow the user to test their knowledge, as well as a downloadable space-shooter game which gets the user to answer Data Protection Act questions.

    Shared with the University by
    Mr Liam De Valmency
  69. [img]
    Preview
    Accessible Digital Resources
    Accessible etexts from curriculum materials for those with print impairments - strategies for conversion and reading using assistive technologies.

    Shared with the World by
    Mrs E.A. Draffan
  70. [img]
    Preview
    REALISE project - final case study
    This document describes the REALISE project, its successes and challenges. There are transferability plans for sustainability.

    Shared with the World by
    Mrs E.A. Draffan
  71. [img]
    Preview
    CV workshop resources
    slides, example CVs, good and bad, links to relevant sites

    Shared with the World by
    Dr Su White
  72. [img]
    COMP6028 Individual Report
    Shared with the University by
    Dr Nicholas Gibbins
  73. [img]
    COMP6028 Ontology Design Exercise
    Shared with the University by
    Dr Nicholas Gibbins
  74. [img]
    COMP6050 Ontology Design Exercise
    Shared with the University by
    Dr Nicholas Gibbins
  75. [img]
    Exercise 1 Feedback, 2011-2012
    Shared with the University by
    Dr Nicholas Gibbins
  76. [img]
    Implementing Information Retrieval Systems
    Shared with the World by
    Dr Nicholas Gibbins
  77. [img]
    Information Retrieval
    Shared with the World by
    Dr Nicholas Gibbins
  78. [img] [img]
    Preview
    Making Links: Fundamentals of Hypertext and Hypermedia
    Shared with the World by
    Dr Nicholas Gibbins
  79. [img]
    Preview
    [img]
    Telling Tales: Hypertext Writing
    Shared with the World by
    Dr Nicholas Gibbins
  80. [img] [img]
    Preview
    Trailblazers: The History of Hypertext
    Shared with the World by
    Dr Nicholas Gibbins
  81. [img]
    Preview
    Agile Game: A Project Management Game for Agile Methods
    Since mid-1990s, companies have adopted agile methods and incorporated them in their development methodologies. For this reason, future project managers and developers need to have a full understanding of these methods. At present, the university’s approach to agile methods is theoretical and is not reflected during the development of a product and their practical use. The purpose of this project is the creation of a software system in the form of a game, named Agile Game, which simulates their use. The system is designed for use as supplementary material in lectures, to help students understand agile methods, to present their use within a project, and to demonstrate how they differ from traditional project management methodologies. The final system, which is web based, was implemented using PHP, MySQL and JavaScript. It was fully tested against the requirements and evaluated by peer students. The evaluation showed that the majority of users were satisfied with the system but they thought that it should contain more detailed information at every step of the game. For this reason, some parts of the design and the content were reviewed to meet user requirements.

    Shared with the World by
    Miss Aikaterini Gkritsi
  82. [img]
    Preview
    What is Hidden Within the Cloud?
    Shared with the World by
    Miss Aikaterini Gkritsi
  83. [img]
    Preview
    Linked Data - A little goes a long way
    Presentation about the University Linked Open Data Service to Insitutional Web Managers Workshop 2011.

    Shared with the World by
    Mr Christopher Gutteridge
  84. [img]
    Preview
    Presentation to OggCamp 2011 about Linked Open Data & Data.Southampton.
    Shared with the World by
    Mr Christopher Gutteridge
  85. [img]
    Preview
    Southampton Open Data Service - Talk to Digital Economy Group
    This is a talk on the new University Open Data Service, some of the applications it's already being put to, and some of the things we hope to do next.

    Shared with the World by
    Mr Christopher Gutteridge
  86. [img] [img]
    Health Inequalities
    Shared with the University by
    Prof Leslie Carr
  87. [img] [img]
    Social Construction of Technology
    Shared with the World by
    Prof Leslie Carr
  88. [img] [img]
    INFO 2009 Resource
    Coursework 2, Security Sock-puppet Show

    Shared with the University by
    Miss Emily Rigby
  89. [img]
    INFO2009 Group 20 - Resource
    INFO2009 2011/2012 Session, Group 20 (One Direction) resource on surveillance

    Shared with the World by
    Mr David Hulme
  90. [img]
    Preview
    [img]
    How The Web Devalues Creativity
    By lowering the barriers to communication, the Web has not made it possible for writers to make more money; instead large corporate aggregators are taking advantage of creators to make themselves rich. MaryAnn Johanson is the creator of one of the oldest independent film review sites on the web (flickfilosopher.com). In this lecture she addresses the problems of the long tail for the long tailees. How can a creative professional make a living through the Web, when all the power is held by the aggregators? So much for radical disintermediation... This share contains the lecture slides (see slide #29-30 for the summary of her argument), the lecture audio, further reading, a link to her web site and a critique of The Longer Tail from students at another Web Science Trust Network lab.

    Shared with the World by
    Prof Leslie Carr
  91. [img] [img]
    INFO2009 Group 17 - Team Scopophobia - Security
    This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security

    Shared with the World by
    Mr Ignas Kaziukenas
  92. [img] [img]
    Preview
    Transparency & Privacy
    The Transparency Agenda of the 2010/1 UK Coalition government promises to revolutionise government, public services and public engagement, by ‘holding politicians and public bodies to account, reducing the deficit and delivering better value for money in public spending, and realising significant economic benefits by enabling businesses and non-profit organisations to build innovative applications and websites using public data’, to quote the then Prime Minister. This is an ambitious programme with laudable aims, yet it naturally has limits.

    Shared with the World by
    Prof Leslie Carr
  93. [img]
    JavaScript and Dart
    Shared with the World by
    Prof Leslie Carr
  94. [img] [img]
    INFO2009 Group 3, FlowerPower - Educational video about DRM
    This video contains an overall description of DRM as an introduction, and a discussion about the controversy around DRM techniques.

    Shared with the University by
    Mr Oscar Mariani Elola
  95. [img]
    INFO2009 - Computer Crime Learning Resource
    An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009

    Shared with the University by
    Mr Daniel Corbishley
  96. [img]
    Explaination of ArrayList remove() Methods
    In the example code you can see that when the remove(Object o) method is called the Integer is not cast to an int and the matching is done using the object's .equals() method rather than using ==

    Shared with the World by
    Mr Patrick Mcsweeney
  97. [img] [img]
    Preview
    Open Source Licenses in Academia
    A Seminar about the advantages of using open source licenses as a complimentary strategy to the academic publish process.

    Shared with the World by
    Mr Patrick Mcsweeney
  98. [img]
    03 - Programming Principles: Methods
    In this session we look at how to create more powerful objects through more powerful methods. We look at parameters and call by value vs. call by reference; return types; and overloading.

    Shared with the World by
    Prof David Millard
  99. [img]
    Preview
    [img]
    Preview
    04 - Programming Principles: Computational Thinking
    In this session we look at how to think systematically about a problem and create a solution. We look at the definition and characteristics of an algorithm, and see how through modularisation and decomposition we can then choose a set of methods to create. We also compare this somewhat procedural approach, with the way that design works in Object Oriented Systems. We also have a brief look at codings style in Java, with the help of the Google Java Style Guide: https://google.github.io/styleguide/javaguide.html

    Shared with the World by
    Prof David Millard
  100. [img]
    Preview
    05 - Programming Principles: Encapsulation and Constructors
    In this session we look at the public and protected keywords, and the principle of encapsulation. We also look at how Constructors can help you initialise objects, while maintaining the encapsulation principle.

    Shared with the World by
    Prof David Millard
  101. [img]
    11 - Programming Principles: Polymorphism
    In this session we build on inheritance and look at overriding methods and dynamic binding. Together these give us Polymorphism - the third pillar of Object Oriented Programming - and a very powerful feature that allows us to build methods that deal with superclasses, but whose calls get redirected when we pass in sub-classes.

    Shared with the World by
    Prof David Millard
  102. [img]
    Preview
    A Brief History of the Web
    The Web is now so ingrained in our lives that it is easy to forget that it is less than twenty years old. But the History of Web goes back much further, to the pioneering technologists who built the first hypertext systems and the men and women before them who imagined great libraries of interconnected information that would augment human intellect and drive civilization forward. In this lecture we will explore the pre-digital origins of the Web, look at how it developed into the mass communication system we have today, and speculate on the next stages of its evolution in the context of Web Science and Social Media.

    Shared with the World by
    Prof David Millard
  103. [img]
    Introduction to the Social Networking Systems Course
    These are the Introduction slides for Comp6051 Social Networking Technologies. They outline the structure of the course, and give a (very brief) overview of the topics covered.

    Shared with the World by
    Prof David Millard
  104. [img]
    Preview
    [img]
    Preview
    Power and Influence
    Like any form of human interaction and communication it is possible to view Social Media as a means for the powerful to influence and control the less powerful. But what is power on social media, how might we measure or affect it, and does it translate to the real world? In this lecture we will look at the philosophical definitions of power, and explore how it has been analysed in social networks and social media systems. We will also look at the characteristics of social networks that impact on power, including Homophily, Heterophily, CyberBalkanization and Thresholds of Collective Action. Finally we will ask what evidence there is that power in social media can affect what goes on in the real world, and explore some real and fictional examples of protest to see what the consequences of social media actually are on sometimes violent political debate. Concluding that the power of social media often lies with those operating the network, or with access to the data, rather than the individuals using the system.

    Shared with the World by
    Prof David Millard
  105. [img]
    Preview
    [img]
    Preview
    Privacy
    Privacy is a concept that has been with us for hundreds of years, but it is relatively recently (the last 130 years or so) that it has been seen as something that needs protection as a legal right. Technology has presented many challenges to privacy, from the printing press to recording devices to communication hacking, but Social Media seems to present something new - a phenomenon of people giving up their personal information to an extent that would be considered extraordinary just a generation ago. In this lecture we look at attitudes and behaviors around privacy, see how social norms have shaped our expectations of privacy, and how we have come to trade our privacy for value, making complex (and sometimes ill-informed) risk decisions. We will also explore how people really behave on Social Media systems, to see whether we (as a society) should be concerned about modern attitudes to privacy, and whether there are any advantages that might balance that concern. Finally we look at how technology can be applied to the problems of privacy, both as a preventative measure, but also by aiding transparency and helping people to make better privacy decisions. These slides were updated for 2014.

    Shared with the World by
    Prof David Millard
  106. [img]
    Review: Social Media and Abstract Nouns
    The revision slides for our Social Media course, contains major lessons learned throughout the course, and an example exam question (on trust).

    Shared with the University by
    Prof David Millard
  107. [img]
    Preview
    [img]
    Preview
    The New Web Literacy
    Web 2.0 is sometimes described as the read/write web, giving everyday users the chance to create and share information as well as to consume information created by others. Social media systems are built on this foundation of participation and sharing, but what is the mindset of these users, and are they quite so everyday as we might suppose? The skills and attitudes held by users can be described as their literacy, and there has been a lot of debate over the last few years about how to describe these literacies, and design for them. One field that has been changed radically by this notion is Technology Enhanced Learning (TEL) where a fierce debate has raged about the potential of a new generation of highly literate digital natives, and Edupunks have argued for open and personal systems that challenge traditional models of institutional control. In this session we look at the arguments surrounding digital literacy and examine TEL as an example of how social media can change an application domain.

    Shared with the World by
    Prof David Millard
  108. [img]
    Preview
    The Web 2.0 Development Survival Guide
    Building software for Web 2.0 and the Social Media world is non-trivial. It requires understanding how to create infrastructure that will survive at Web scale, meaning that it may have to deal with tens of millions of individual items of data, and cope with hits from hundreds of thousands of users every minute. It also requires you to build tools that will be part of a much larger ecosystem of software and application families. In this lecture we will look at how traditional relational database systems have tried to cope with the scale of Web 2.0, and explore the NoSQL movement that seeks to simplify data-storage and create ultra-swift data systems at the expense of immediate consistency. We will also look at the range of APIs, libraries and interoperability standards that are trying to make sense of the Social Media world, and ask what trends we might be seeing emerge.

    Shared with the World by
    Prof David Millard
  109. [img]
    Preview
    [img]
    Preview
    Trust
    Trust is a complex philosophical, social and technical notion, but it underlies many of our digital interactions including e-commerce and collective intelligence. In this lecture we will look at how different disciplines, including Psychology, Sociology and Economics have come to understand Trust through the lens of their own studies, aims and goals, and will explore how computer scientists and software engineers have implemented trust models based on policy, provenance and reputation. We will take a closer look at both Global and Local reputation-based trust, and see how assumptions of transitivity and asymmetry are useful. Finally we will look at trust in information, otherwise known as credibility, and look at the phenomenon of fake news and how trust methods have been used to combat it.

    Shared with the World by
    Prof David Millard
  110. [img]
    02 - Programming Principles: Variables, Primitives, Objects and Scope
    In this session we look more closely at the way that Java deals with variables, and in particular with the differences between primitives (basic types like int and char) and objects. We also take an initial look at the scoping rules in Java, which dictate the visibility of variables in your program

    Shared with the World by
    Prof David Millard
  111. [img] [img]
    Preview
    08 - Programming Principles: The Java Library
    In this session we point you at the Java Library, and go into some more details on how Strings work. We also introduce the HashMap class (a very useful type of collection).

    Shared with the World by
    Prof David Millard
  112. [img]
    Preview
    [img]
    Preview
    01 - Programming Principles: Introduction to Java
    In this lecture we look at key concepts in Java: how to write, compile and run Java programs, define a simple class, create a main method, and use if/else structures to define behaviour.

    Shared with the World by
    Prof David Millard
  113. [img] [img]
    Preview
    06 - Programming Principles: Loops and Arrays
    In this session we look at the different types of loop in the Java language, and see how they can be used to iterate over Arrays.

    Shared with the World by
    Prof David Millard
  114. [img] [img]
    Preview
    07 - Programming Principles: Collections and Iterators
    In this session we look at how we can use collection objects like ArrayList as a more advanced type of array. We also introduce the idea of generics (forcing a collection to hold a particular type) and see how Java handles the autoboxing and unboxing of primitives. Finally we look at Iterators, a common design pattern for dealing with iteration over a collection.

    Shared with the World by
    Prof David Millard
  115. [img]
    Preview
    [img]
    Preview
    Programming I - Starting Out
    In this lecture we describe the structure of the Programming I module at the University of Southampton, look at the definitions and paradigms of programming, and take a look ahead to the key things that we will be covering in the weeks ahead.

    Shared with the World by
    Prof David Millard
  116. [img] [img]
    Preview
    The Digital Dream Team - Digital Divide (Group 4)
    This vessel contains the poster and artefact link for The Digital Dream Teams' project

    Shared with the World by
    Mr Douglas Moore
  117. [img]
    E Assessment for Web Design Labs
    Small quizzes designed to reinforce learning from web design labs.

    Shared with Selected Users by
    Mr Jonathan Taylor
  118. [img] [img]
    Introduction to the Library for 1st Year ECS Students
    There is an accompanying quiz in Blackboard on the INFO1010 page, and a link to a survey. (Look under Course Documents)

    Shared with the University by
    Prof Hugh Davis
  119. [img] [img]
    Group 19 - Website Resource
    Our website is a resource that describes equality and shows examples of bad Web accessibility. The website is hosted at: http://users.ecs.soton.ac.uk/wjvh1g10/index.html

    Shared with the World by
    Mr Ashley Patrick
  120. [img]
    Preview
    Communities on the Web
    Shared with the World by
    Prof Leslie Carr
  121. [img]
    Preview
    [img]
    Preview
    Digital Inequality
    Shared with the World by
    Prof Leslie Carr
  122. [img] [img]
    Science
    Shared with the World by
    Prof Leslie Carr
  123. [img]
    Preview
    [img]
    Preview
    Social Structuring on the Web
    Shared with the World by
    Prof Leslie Carr
  124. [img] [img]
    Technology and Modernity
    Shared with the World by
    Prof Leslie Carr
  125. [img]
    INFO1016 Revision Slides
    These are the slides where I summarised what I thought are the important parts of the operating systems course. They are mostly slides borrowed from the original course slides, so thank you to Thanassis for those. For full details about the topics, please refer to the full lecture slides and the course textbook.

    Shared with the University by
    Mr Rikki Prince
  126. [img]
    Cybercrime - An Interactive Presentation
    Presentation slides + mini quiz on the topic of cybercrime.

    Shared with the University by
    Miss Cathy Jin
  127. [img]
    Preview
    Toward 2^W beyond Web 2.0
    From its inception as a global hypertext system, the Web has evolved into a universal platform for deploying loosely coupled distributed applications. 2^W is a result of the exponentially growing Web building on itself to move from a Web of content to a Web of applications.

    Shared with the World by
    Prof Leslie Carr
  128. [img]
    Programming Principles: Exceptions
    Slides for COMP1004 Lectures on Exceptions

    Shared with the University by
    Dr Julian Rathke
  129. [img]
    Programming Principles: Statics
    Slides for COMP1004 Lecture on Statics

    Shared with the University by
    Dr Julian Rathke
  130. [img]
    Programming Principles: The Strategy Pattern
    Slides for COMP1004 Lecture on the Strategy Pattern

    Shared with the University by
    Dr Julian Rathke
  131. [img]
    Social Computing Data Repository
    Social Computing Data Repository hosts data from a collection of many different social media sites, most of which have blogging capacity. Some of the prominent social media sites included in this repository are BlogCatalog, Twitter, MyBlogLog, Digg, StumbleUpon, del.icio.us, MySpace, LiveJournal, The Unofficial Apple Weblog (TUAW), Reddit, etc. The repository contains various facets of blog data including blog site metadata like, user defined tags, predefined categories, blog site description; blog post level metadata like, user defined tags, date and time of posting; blog posts; blog post mood (which is defined as the blogger's emotions when (s)he wrote the blog post); blogger name; blog post comments; and blogger social network.

    Shared with the World by
    Prof Leslie Carr
  132. [img]
    Group 21 Slartibartfast - Group Resource
    Informative website about Anonymous/LulzSec and Denial of Service attacks

    Shared with the University by
    Mr Jonathan Seager
  133. [img]
    Preview
    Legal Issues in Social Networking
    Legal Issues in Social Networking - Analyzed Paper

    Shared with the World by
    Mr Amir Sezavar Keshavarz
  134. [img]
    Preview
    Motivations for Social Networking at Work
    Motivations for Social Networking at Work - Analyzed Paper

    Shared with the World by
    Mr Amir Sezavar Keshavarz
  135. [img]
    Preview
    Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace
    Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace - Analyzed Paper

    Shared with the World by
    Mr Amir Sezavar Keshavarz
  136. [img] [img]
    Preview
    INFO 2009 Coursework 2 - Go Green - Group 7 - Green ICT
    A Website on GREEN ICT by the Go Green Group as a part of the resource set made for the Info2009 2011-12 coursework

    Shared with the World by
    Miss Shreeprabha Aggarwal
  137. [img] [img]
    INFO2009 - Team Helios
    Resource for INFO2009 Coursework 2 - Team Helios. The video covers the topic of open government data and the benefits and drawbacks to producing and using it.

    Shared with the University by
    Mr David Smith
  138. [img] [img]
    Participatory Inequality
    Shared with the University by
    Prof Leslie Carr
  139. [img] [img]
    Info2009 CW Tutorial Website
    Security Tutorial Website

    Shared with the University by
    Mr Yupeng Zhou
  140. [img]
    Preview
    Open Access: How the Case Has Been Made
    How the argument for Open Access hasd been made to government and the research industry over the last ten years.

    Shared with the World by
    Prof Leslie Carr
  141. [img] [img]
    INFO2009 - Group 14: DRM & Copyright
    A short video about DRM & Copyright (with chins).

    Shared with the University by
    Mr Thomas Thorpe
  142. [img]
    The Social Enterprise
    Shared with the University by
    Prof Thanassis Tiropanis
  143. [img]
    Preview
    Information source evaluation matrix
    An information source evaluation matrix, produced by the Library at De Montfort University

    Shared with the World by
    Dr Su White
  144. [img] [img]
    INFO2009 Power Point
    Shared with the University by
    Mr Noel Varanda
  145. [img] [img]
    INFO2009 - Security Issues in home computing
    By antipirates

    Shared with the University by
    Mr Noel Varanda
  146. [img] [img]
    Green ICT - (JT)2L
    A set of lecture slides and accompanying text tutorial.

    Shared with the University by
    Mr Jhim Verame
  147. [img]
    Preview
    [img]
    Academic Integrity Resources - links and guides
    an online tutorial, a pdf version, a powerpoint presentation, links to regulations.

    Shared with the World by
    Dr Su White
  148. [img] [img]
    Green IT (includes High Powered Computing) - background reading
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
    Dr Su White
  149. [img]
    Preview
    [img]
    Preview
    INFO1010 Ethics in Practice
    Slides with associated activities and reading list to Introduce in Practice to Computer Science and IT undergraduates

    Shared with the World by
    Dr Su White
  150. [img] [img]
    INFO2009 Resource Summary 2011-12
    Slides which summarise the team resources produced for INFO2009

    Shared with the University by
    Dr Su White
  151. [img]
    Preview
    [img]
    PhD Supervision up to 9 months
    Information and guidance for students in the early stages of their PhD studies

    Shared with the World by
    Dr Su White
  152. [img] [img]
    Privacy and Security - background grey literature online
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
    Dr Su White
  153. [img]
    Preview
    [img]
    Preview
    Smart Meetings - background reading
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
    Dr Su White
  154. [img]
    Preview
    Technical Report Background Reading Guidance and Links
    Handout which contains a set of links to a variety of background resources associated with the topics for a technical report coursework. Resources are clustered into three overview areas, but contain links which be used to address each of the six questions scenarios.

    Shared with the World by
    Dr Su White
  155. [img] [img]
    INFO2009 Educational Resources: Security
    Contains visually-appealing and informative "infographics" containing descriptions of common security vulnerabilities and general information about security. Suitable for use in a blog post or printed out and on the wall in an educational area. Also contains video podcasts demonstrating common security exploits in realistic web systems, and offering practical advice on fixing them. Created by "Am and the Raging Otters".

    Shared with the University by
    Mr Sam Whitehall
  156. [img]
    Preview
    Open Data
    Diverse attitudes to open data

    Shared with the World by
    Prof Leslie Carr
  157. [img]
    Preview
    [img]
    Preview
    INFO1010 Presentation Slots and Guidance 11-12
    summary of requirements and slot allocation

    Shared with the World by
    Dr Su White
  158. [img]
    Preview
    [img]
    Preview
    INFO1010: Organisational Perspectives
    lecture in professional issues which looks at organisations likely to employ our students and suggests how students might work towards identifying and achieving their employment objectives

    Shared with the World by
    Dr Su White
  159. [img] [img]
    INFO2009 2011-12 Case Study Examination
    materials for open book examination to be held during semester 1 exam period 2011-12

    Shared with the University by
    Dr Su White
  160. [img]
    Preview
    [img]
    Sustainability and Diversity
    lecture slides and resources for class mainly concerned with sustainability - also gives recap on perspectives on diversity which have been integrated into other lectures through the semester

    Shared with the World by
    Dr Su White
This list was generated on Thu Nov 21 15:56:07 2024 UTC.