Browse: Faculty of Physical & Applied Sciences > School of Electronics and Computer Science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Creators Name | Item Type
Jump to: Resource | Collection
Number of items: 164.

Resource

  1. [img]
    A User-Centric Approach to eCertificate for Electronic Identities (eIDs) Management in Mobile Environment
    The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment with a user-centric approach. Mobile devices have been chosen because they provide mobility, personal use and high computational complexity. The inherent user-centricity also allows the user to personally manage the ID information and to display only what is required. The chosen path to develop the protocol is to migrate the existing eCert technologies implemented by the Learning Societies Laboratory in Southampton. By comparing this protocol with the analysis of the eID problem domain, a new solution has been derived which is compatible with both systems without loss of features.

    Shared with the University by
    Profile Picture Mr Michele Schiano Di Zenise
  2. [img] [img]
    Agile methodologies
    Outlines of both Scrum and Dynamic Systems Development Model

    Shared with Selected Users by
  3. [img]
    Preview
    Aproaches to Learning
    Covers some of ways people think about learning - used for first year class to help them think about what they are doing and what works best for them.

    Shared with the World by
  4. [img]
  5. [img] [img]
    Case Studies
    Case studies related to content taught in IT Systems. CASE STUDY LIST: Banco do Brasil WAN Case Study Brighton WiMAX Case Study Burlington Linux Case Study Google Docs Case Study Networks in Agribusiness Case Study

    Shared with Selected Users by
  6. [img]
    Preview
    [img]
    Preview
    Digital Britain
    Only a Digital Britain can unlock the imagination and creativity that will secure for us and our children the highly skilled jobs of the future. Only a Digital Britain will secure the wonders of an information revolution that could transform every part of our lives. Only a Digital Britain will enable us to demonstrate the vision and dynamism that we have to shape the future.

    Shared with the World by
  7. [img] [img]
    Enterprise Architecture notes/white papers
    A collection of notes and white papers regarding Enterprise Architecture

    Shared with Selected Users by
  8. [img]
    Preview
  9. [img]
  10. [img] [img]
    INFO 2009 - Group 9 - KungFu Rabbits
    This is the folder for 2011/2012 group 9 for INFO2009 (CWK2). The resource is an interactive website. Users: cre1g10, rjt2g10, gl10g10, jb23g10, jdr1g10

    Shared with the World by
    Profile Picture Mr James Robinson
  11. [img] [img]
    INFO2009 Group 16 - The Rice Box Resources
    INFO2009, Coursework 2, Green ICT/IT

    Shared with Selected Schools/Units by
    Profile Picture Miss Yizhi Chen
  12. [img] [img]
    Laser work
    Shared with Selected Users by
  13. [img]
    Preview
  14. [img] [img]
    Mobile OS Whitepaper Summaries
    A summary of white papers on Android, IOS, Symbian and Series 40 Mobile Operating Systems

    Shared with Selected Users by
  15. [img] [img]
  16. [img]
    Preview
    OpenIMAJ - Tutorial - Simple Mosaic
    Shared with the World by
    Profile Picture Dr Sina Samangooei
  17. [img] [img]
  18. [img]
    Preview
    Programming Principles: Abstract Classes and Interfaces
    In this session we look at how to use Abstract Classes and Interfaces in Object Oriented Design - especially as a way to get all the advantages of multiple inheritance without any of the problems.

    Shared with the World by
  19. [img]
    Programming Principles: Designing Applications
    In this session we look at the how to use noun verb parsing to try and identify the building blocks of a problem, so that we can start to create object oriented solutions. We also look at some of the challenges of software engineering, and the processes that software engineers use to meet them, and finally we take a look at some more Design Patterns that may help us reuse well known and effective solutions in our own designs.

    Shared with the University by
  20. [img]
    Preview
    Programming Principles: Loops and Arrays
    In this session we look at the different types of loop in the Java language, and see how they can be used to iterate over Arrays.

    Shared with the World by
  21. [img]
    Programming Principles: Software Design
    In this session we look at some of the basics of good code design, including avoiding duplication and designing for loose coupling and high cohesion.

    Shared with the University by
  22. [img]
    Programming Principles: Super and Sub-classes
    In this session we introduce inheritance - one of the cornerstone concepts of object oriented programming. We look at how to define super and sub-classes, how to maintain encapsulation using the super() constructor, and why it is useful to use substitution to hold references to sub-classes in references typed as their super-class.

    Shared with the University by
  23. [img]
    Programming Principles: Testing and Debugging
    In this session we look at the sorts of errors that occur in programs, and how we can use different testing and debugging strategies (such as unit testing and inspection) to track them down. We also look at error handling within the program and at how we can use Exceptions to manage errors in a more sophisticated way. These slides are based on Chapter 6 of the Book 'Objects First with BlueJ'

    Shared with the University by
  24. [img]
    Purity of Disciplines
    XKCD comic showing the purity of diciplines. Although this is funny, you'll soon find out that the humour wears off if you stay in academia.

    Shared with the World by
  25. [img]
    REALISE Transferability Workshop
    This is about open innovation, open source and assistive technology as part of a JISC project developing an innovation market place for AT projects.

    Shared with the World by
  26. [img] [img]
  27. [img]
    Social Networking Technologies: Project Launch
    Students taking the 20 credit version of the course (COMP6052) will work in groups of 6 to develop and design a new social networking tool/application/website. The teams will work on their design throughout the semester, and keep a design and development blog that will act as a digital portfolio of their work. At the end of the semester they will also be asked to submit an individual reflective summary that will outline their teams objectives and progress, their part in its progress, and a critical analysis of whether or not they were successful. At the end of the course teams will be asked to pitch their ideas to an interdisciplinary Dragon's Den style panel who will expect them to not only have created something that is technical viable, but will also want to see other economic, social, legal and ethical factors taken into consideration. In this presentation we explain the structure of the group project, what is expected in the blog, and explore some potential ideas to help students understand the scope of the work required. The outcome of the group project does not have to be a fully working piece of software, instead we are looking for a well developed idea that contains enough detail to be convincing to the panel.

    Shared with the University by
  28. [img]
  29. [img]
    Preview
  30. [img]
    Value in Web 2.0
    COMP6051, COMP6052 Notes Social Networking Technologies: Value in Web 2.0

    Shared with the University by
  31. [img] [img]
    Web Design Labs
    additional Labs created for web design module. Topics covered: HTML 5, Jquery and javascript debugging

    Shared with Selected Users by
  32. [img] [img]
    Web Design Labs (E-assessment)
    Multiple choice quizzes for each lab

    Shared with Selected Users by
  33. [img] [img]
    What is Cybercrime and what do we do about?
    A guest lecture by Professor David S.Wall from the University of Durham. This talk will explore the way that networked technology has transformed criminal behaviour. The first part will map out cybercrimes and identify the challenges they pose for both criminologists and also regulators. The second part will show that cybercrimes are informational, networked and global. In this section it will also be shown that cybercrimes are highly disorganised forms of offending when compared to the organisation of more 'traditional' crimes, but display some new organisational logics of their own. The third part of the talk will illustrate how the 'culture of fear' that has arisen around cybercrime has placed demands upon government and police - demands that, for reasons related to the distinct nature of cybercrimes, are hard to resolve. The fourth and final part will look at the new policing arrangements that are designed, it is argued here, to close the reassurance gap.

    Shared with the University by
  34. [img]
    Preview
    Writing Technical Reports and Papers
    A brief coverage of the structure of a paper/report and some hints on writing and avoiding plagiarism

    Shared with the World by
  35. [img]
    Preview
    [img]
    Preview
    benefits of facebook
    Shared with the World by
  36. [img]
    informative website
    Shared with the University by
    Profile Picture Mr Stelios Mousouros
  37. [img]
    Preview
    snn introduction
    Shared with the World by
  38. [img]
    Preview
    trust recommender
    Shared with the World by
  39. [img] [img]
    INFO2009 - Team 'DROP TABLE groups;
    Edshare for INFO2009 coursework 2 - Team 'DROP TABLE groups;

    Shared with the World by
    Profile Picture Mr Patrick Naish
  40. [img]
    Preview
    [img]
    Preview
  41. [img]
    Preview
    Perl Assessment
    Perl programming overview for EPrints to support assessment 1

    Shared with the World by
  42. [img]
    Preview
    [img]
    Preview
    Personal Learning Environments? or Society’s Learning Environment?
    Keynote Presentation at PLE2011. What kind of Web have we got? What kind of Web does a Learning Individual need? What kind of Web does a Learning Society need?

    Shared with the World by
  43. [img] [img]
    Web vs Apps
    Shared with the World by
  44. [img] [img]
    What is the Web?
    An introductory lecture on Web Science, taking a kind of devils advocate position by suggesting that the Web is a piece of runaway technology that escaped from research labs prematurely.

    Shared with the World by
  45. [img]
    Preview
    [img]
    Preview
  46. [img]
    Preview
    [img]
    Preview
    Reviewing Process
    Shared with the World by
  47. [img]
    Preview
    [img]
    Preview
    Policy Skills for Web Scientists
    Practical group based work on reading and interrogating evidence and writing policy briefings/critiques

    Shared with the World by
  48. [img] [img]
    INFO2009 A presentation with quiz and tutorial on Web 3.0
    A resource for the teaching of concepts involved in 'web 3.0', including a powerpoint presentation with quiz, and accompanying tutorial

    Shared with the University by
    Profile Picture Mr David Chang
  49. [img]
    Preview
    [img]
    Preview
    INFO2009 resource: Infographic on the evolution of Open Source Software
    Infographic providing a timeline of important events in the history of open source software since the fifties. Also includes stats for OSS licenses, usage in Business and reasons for participating in an OSS community.

    Shared with the World by
    Profile Picture Mr Marinos Mavrommatis
  50. [img] [img]
    Preview
    Cyber Crime
    Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years.

    Shared with the World by
  51. [img]
    Team A (Group 23)
    This website has been created to raise awareness of potential issues surrounding file sharing and the penalties than can be imposed if you are caught sharing copyrighted content.

    Shared with the University by
    Profile Picture Mr Greg Cramer
  52. [img]
    Preview
    [img]
  53. [img] [img]
    Abstraction: From Transistors to Computers and from Bits to Programs
    Takes the Tanenbaum (Structured Computer Organisation) approach to show how application of successive levels of abstraction allow us to understand how computers are made from transitors and how they are programmed.

    Shared with the World by
  54. [img]
    Preview
    [img]
    Learning, Teaching and Lesson Planning
    This resource was designed for use with MSc Web Scientists as an introduction to a coursework that requires them to produce some teaching materials.

    Shared with the World by
  55. [img]
    Timeline of Computing
    Actually this is a timeline of Learning Technology but has all teh important dates in it

    Shared with the World by
  56. [img]
    Writing Research Proposals
    Shared with the University by
  57. [img]
    Preview
    Introduction to Research Methods
    Just one lecture for first year. Its objective is to show that there exists more than on approach to tackling a research question - and that not all disciplines approach things the same way!

    Shared with the World by
  58. [img] [img]
    Group 15 (Snav) - The Data Protection Act 1998
    An online tutorial outlining the definitions and principles of the Data Protection Act. Contains questions on scenarios which allow the user to test their knowledge, as well as a downloadable space-shooter game which gets the user to answer Data Protection Act questions.

    Shared with the University by
    Profile Picture Mr Liam De Valmency
  59. [img]
    Preview
    Accessible Digital Resources
    Accessible etexts from curriculum materials for those with print impairments - strategies for conversion and reading using assistive technologies.

    Shared with the World by
  60. [img]
    Preview
    REALISE project - final case study
    This document describes the REALISE project, its successes and challenges. There are transferability plans for sustainability.

    Shared with the World by
  61. [img]
    Preview
    CV workshop resources
    slides, example CVs, good and bad, links to relevant sites

    Shared with the World by
  62. [img]
  63. [img]
  64. [img]
  65. [img]
  66. [img]
  67. [img]
  68. [img] [img]
    Preview
  69. [img]
    Preview
    [img]
  70. [img] [img]
    Preview
  71. [img]
    Preview
    Agile Game: A Project Management Game for Agile Methods
    Since mid-1990s, companies have adopted agile methods and incorporated them in their development methodologies. For this reason, future project managers and developers need to have a full understanding of these methods. At present, the university’s approach to agile methods is theoretical and is not reflected during the development of a product and their practical use. The purpose of this project is the creation of a software system in the form of a game, named Agile Game, which simulates their use. The system is designed for use as supplementary material in lectures, to help students understand agile methods, to present their use within a project, and to demonstrate how they differ from traditional project management methodologies. The final system, which is web based, was implemented using PHP, MySQL and JavaScript. It was fully tested against the requirements and evaluated by peer students. The evaluation showed that the majority of users were satisfied with the system but they thought that it should contain more detailed information at every step of the game. For this reason, some parts of the design and the content were reviewed to meet user requirements.

    Shared with the World by
  72. [img]
    Preview
  73. [img]
    Preview
    Linked Data - A little goes a long way
    Presentation about the University Linked Open Data Service to Insitutional Web Managers Workshop 2011.

    Shared with the World by
  74. [img]
    Preview
  75. [img]
    Preview
    Southampton Open Data Service - Talk to Digital Economy Group
    This is a talk on the new University Open Data Service, some of the applications it's already being put to, and some of the things we hope to do next.

    Shared with the World by
  76. [img] [img]
    Health Inequalities
    Shared with the University by
  77. [img] [img]
  78. [img] [img]
    INFO 2009 Resource
    Coursework 2, Security Sock-puppet Show

    Shared with the University by
    Profile Picture Miss Emily Rigby
  79. [img]
    INFO2009 Group 20 - Resource
    INFO2009 2011/2012 Session, Group 20 (One Direction) resource on surveillance

    Shared with the World by
    Profile Picture Mr David Hulme
  80. [img]
    Preview
    [img]
    How The Web Devalues Creativity
    By lowering the barriers to communication, the Web has not made it possible for writers to make more money; instead large corporate aggregators are taking advantage of creators to make themselves rich. MaryAnn Johanson is the creator of one of the oldest independent film review sites on the web (flickfilosopher.com). In this lecture she addresses the problems of the long tail for the long tailees. How can a creative professional make a living through the Web, when all the power is held by the aggregators? So much for radical disintermediation... This share contains the lecture slides (see slide #29-30 for the summary of her argument), the lecture audio, further reading, a link to her web site and a critique of The Longer Tail from students at another Web Science Trust Network lab.

    Shared with the World by
  81. [img] [img]
    INFO2009 Group 17 - Team Scopophobia - Security
    This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security

    Shared with the World by
    Profile Picture Mr Ignas Kaziukenas
  82. [img]
    Preview
    [img]
    Preview
    Something on legal issues
    holding title for set of slides and summary notes to be used in INFO2009

    Shared with the World by
  83. [img] [img]
    Preview
    Transparency & Privacy
    The Transparency Agenda of the 2010/1 UK Coalition government promises to revolutionise government, public services and public engagement, by ‘holding politicians and public bodies to account, reducing the deficit and delivering better value for money in public spending, and realising significant economic benefits by enabling businesses and non-profit organisations to build innovative applications and websites using public data’, to quote the then Prime Minister. This is an ambitious programme with laudable aims, yet it naturally has limits.

    Shared with the World by
  84. [img]
    JavaScript and Dart
    Shared with the World by
  85. [img] [img]
    INFO2009 Group 3, FlowerPower - Educational video about DRM
    This video contains an overall description of DRM as an introduction, and a discussion about the controversy around DRM techniques.

    Shared with the University by
    Profile Picture Mr Oscar Mariani Elola
  86. [img]
    INFO2009 - Computer Crime Learning Resource
    An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009

    Shared with the University by
    Profile Picture Mr Daniel Corbishley
  87. [img]
    Explaination of ArrayList remove() Methods
    In the example code you can see that when the remove(Object o) method is called the Integer is not cast to an int and the matching is done using the object's .equals() method rather than using ==

    Shared with the World by
  88. [img] [img]
    Preview
    Open Source Licenses in Academia
    A Seminar about the advantages of using open source licenses as a complimentary strategy to the academic publish process.

    Shared with the World by
  89. [img]
    A Brief History of the Web
    The Web is now so ingrained in our lives that it is easy to forget that it is less than twenty years old. But the History of Web goes back much further, to the pioneering technologists who built the first hypertext systems and the men and women before them who imagined great libraries of interconnected information that would augment human intellect and drive civilization forward. In this lecture we will explore the pre-digital origins of the Web, look at how it developed into the mass communication system we have today, and speculate on the next stages of its evolution in the context of Web Science and Social Media.

    Shared with the World by
  90. [img]
    Introduction to the Social Networking Systems Course
    These are the Introduction slides for Comp6051 Social Networking Technologies. They outline the structure of the course, and give a (very brief) overview of the topics covered.

    Shared with the World by
  91. [img] [img]
    Power and Influence
    Like any form of human interaction and communication it is possible to view Social Media as a means for the powerful to influence and control the less powerful. But what is power on social media, how might we measure or affect it, and does it translate to the real world? In this lecture we will look at the philosophical definitions of power, and explore how it has been analysed in social networks and social media systems. We will also look at the characteristics of social networks that impact on power, including Homophily, Heterophily, CyberBalkanization and Thresholds of Collective Action. Finally we will ask what evidence there is that power in social media can affect what goes on in the real world, and explore some real and fictional examples of protest to see what the consequences of social media actually are on sometimes violent political debate.

    Shared with the World by
  92. [img] [img]
    Privacy
    Privacy is a concept that has been with us for hundreds of years, but it is relatively recently (the last 130 years or so) that it has been seen as something that needs protection as a legal right. Technology has presented many challenges to privacy, from the printing press to recording devices to communication hacking, but Social Media seems to present something new - a phenomenon of people giving up their personal information to an extent that would be considered extraordinary just a generation ago. In this lecture we look at attitudes and behaviors around privacy, see how social norms have shaped our expectations of privacy, and how we have come to trade our privacy for value, making complex (and sometimes ill-informed) risk decisions. We will also explore how people really behave on Social Media systems, to see whether we (as a society) should be concerned about modern attitudes to privacy, and whether there are any advantages that might balance that concern. Finally we look at how technology can be applied to the problems of privacy, both as a preventative measure, but also by aiding transparency and helping people to make better privacy decisions. These slides were updated for 2014.

    Shared with the World by
  93. [img]
    Preview
    Programming Principles: Collections and Iterators
    In this session we look at how we can use collection objects like ArrayList as a more advanced type of array. We also introduce the idea of generics (forcing a collection to hold a particular type) and see how Java handles the autoboxing and unboxing of primitives. Finally we look at Iterators, a common design pattern for dealing with iteration over a collection.

    Shared with the World by
  94. [img]
    Preview
    Programming Principles: Computational Thinking
    In this session we look at how to think systematically about a problem and create a solution. We look at the definition and characteristics of an algorithm, and see how through modularisation and decomposition we can then choose a set of methods to create. We also compare this somewhat procedural approach, with the way that design works in Object Oriented Systems,

    Shared with the World by
  95. [img]
    Preview
    Programming Principles: Encapsulation and Constructors
    In this session we look at the public and protected keywords, and the principle of encapsulation. We also look at how Constructors can help you initialise objects, while maintaining the encapsulation principle.

    Shared with the World by
  96. [img]
    Preview
    Programming Principles: Methods
    In this session we look at how to create more powerful objects through more powerful methods. We look at parameters and call by value vs. call by reference; return types; and overloading.

    Shared with the World by
  97. [img]
    Preview
    Programming Principles: Polymorphism
    In this session we build on inheritance and look at overriding methods and dynamic binding. Together these give us Polymorphism - the third pillar of Object Oriented Programming - and a very powerful feature that allows us to build methods that deal with superclasses, but whose calls get redirected when we pass in sub-classes.

    Shared with the World by
  98. [img]
    Preview
    Programming Principles: Starting Out
    In this lecture we describe the structure of the Programming Principles course at Southampton, look at the definitions and paradigms of programming, and take a look ahead to the key things that we will be covering in the weeks ahead.

    Shared with the World by
  99. [img]
    Review: Social Media and Abstract Nouns
    The revision slides for our Social Media course, contains major lessons learned throughout the course, and an example exam question (on trust).

    Shared with the University by
  100. [img] [img]
    The New Web Literacy
    Web 2.0 is sometimes described as the read/write web, giving everyday users the chance to create and share information as well as to consume information created by others. Social media systems are built on this foundation of participation and sharing, but what is the mindset of these users, and are they quite so everyday as we might suppose? The skills and attitudes held by users can be described as their literacy, and there has been a lot of debate over the last few years about how to describe these literacies, and design for them. One field that has been changed radically by this notion is Technology Enhanced Learning (TEL) where a fierce debate has raged about the potential of a new generation of highly literate digital natives, and Edupunks have argued for open and personal systems that challenge traditional models of institutional control. In this session we look at the arguments surrounding digital literacy and examine TEL as an example of how social media can change an application domain.

    Shared with the World by
  101. [img]
    Preview
    The Web 2.0 Development Survival Guide
    Building software for Web 2.0 and the Social Media world is non-trivial. It requires understanding how to create infrastructure that will survive at Web scale, meaning that it may have to deal with tens of millions of individual items of data, and cope with hits from hundreds of thousands of users every minute. It also requires you to build tools that will be part of a much larger ecosystem of software and application families. In this lecture we will look at how traditional relational database systems have tried to cope with the scale of Web 2.0, and explore the NoSQL movement that seeks to simplify data-storage and create ultra-swift data systems at the expense of immediate consistency. We will also look at the range of APIs, libraries and interoperability standards that are trying to make sense of the Social Media world, and ask what trends we might be seeing emerge.

    Shared with the World by
  102. [img] [img]
    Trust
    Trust is a complex philosophical, social and technical notion, but it underlies many of our digital interactions including e-commerce and collective intelligence. In this lecture we will look at how different disciplines, including Psychology, Sociology and Economics have come to understand Trust through the lens of their own studies, aims and goals, and will explore how computer scientists and software engineers have implemented trust models based on policy, provenance and reputation. We will take a closer look at both Global and Local reputation-based trust, and see how assumptions of transitivity and asymmetry are useful. Finally we will explore trust issues around the largest known store of human knowledge: the Wikipedia

    Shared with the World by
  103. [img]
    Preview
    Programming Principles: Introduction to Java
    In this lecture we look at key concepts in Java: how to write, compile and run Java programs, define a simple class, create a main method, and use if/else structures to define behaviour.

    Shared with the World by
  104. [img]
    Preview
    Programming Principles: The Java Library
    In this session we point you at the Java Library, and go into some more details on how Strings work. We also introduce the HashMap class (a very useful type of collection).

    Shared with the World by
  105. [img]
    Preview
    Programming Principles: Variables, Primitives, Objects and Scope
    In this session we look more closely at the way that Java deals with variables, and in particular with the differences between primitives (basic types like int and char) and objects. We also take an initial look at the scoping rules in Java, which dictate the visibility of variables in your program

    Shared with the World by
  106. [img] [img]
    Preview
    The Digital Dream Team - Digital Divide (Group 4)
    This vessel contains the poster and artefact link for The Digital Dream Teams' project

    Shared with the World by
    Profile Picture Mr Douglas Moore
  107. [img]
    E Assessment for Web Design Labs
    Small quizzes designed to reinforce learning from web design labs.

    Shared with Selected Users by
  108. [img] [img]
    Introduction to the Library for 1st Year ECS Students
    There is an accompanying quiz in Blackboard on the INFO1010 page, and a link to a survey. (Look under Course Documents)

    Shared with the University by
  109. [img] [img]
    Group 19 - Website Resource
    Our website is a resource that describes equality and shows examples of bad Web accessibility. The website is hosted at: http://users.ecs.soton.ac.uk/wjvh1g10/index.html

    Shared with the World by
    Profile Picture Mr Ashley Patrick
  110. [img]
    Preview
  111. [img]
    Preview
    [img]
    Preview
    Digital Inequality
    Shared with the World by
  112. [img] [img]
    Science
    Shared with the World by
  113. [img]
    Preview
    [img]
    Preview
  114. [img] [img]
  115. [img]
    INFO1016 Revision Slides
    These are the slides where I summarised what I thought are the important parts of the operating systems course. They are mostly slides borrowed from the original course slides, so thank you to Thanassis for those. For full details about the topics, please refer to the full lecture slides and the course textbook.

    Shared with the University by
  116. [img]
    Cybercrime - An Interactive Presentation
    Presentation slides + mini quiz on the topic of cybercrime.

    Shared with the University by
    Profile Picture Miss Cathy Jin
  117. [img]
    Preview
    Toward 2^W beyond Web 2.0
    From its inception as a global hypertext system, the Web has evolved into a universal platform for deploying loosely coupled distributed applications. 2^W is a result of the exponentially growing Web building on itself to move from a Web of content to a Web of applications.

    Shared with the World by
  118. [img]
    Programming Principles: Exceptions
    Slides for COMP1004 Lectures on Exceptions

    Shared with the University by
  119. [img]
    Programming Principles: Statics
    Slides for COMP1004 Lecture on Statics

    Shared with the University by
  120. [img]
    Programming Principles: The Strategy Pattern
    Slides for COMP1004 Lecture on the Strategy Pattern

    Shared with the University by
  121. [img]
    Social Computing Data Repository
    Social Computing Data Repository hosts data from a collection of many different social media sites, most of which have blogging capacity. Some of the prominent social media sites included in this repository are BlogCatalog, Twitter, MyBlogLog, Digg, StumbleUpon, del.icio.us, MySpace, LiveJournal, The Unofficial Apple Weblog (TUAW), Reddit, etc. The repository contains various facets of blog data including blog site metadata like, user defined tags, predefined categories, blog site description; blog post level metadata like, user defined tags, date and time of posting; blog posts; blog post mood (which is defined as the blogger's emotions when (s)he wrote the blog post); blogger name; blog post comments; and blogger social network.

    Shared with the World by
  122. [img]
    Group 21 Slartibartfast - Group Resource
    Informative website about Anonymous/LulzSec and Denial of Service attacks

    Shared with the University by
    Profile Picture Mr Jonathan Seager
  123. [img]
    Preview
    Legal Issues in Social Networking
    Legal Issues in Social Networking - Analyzed Paper

    Shared with the World by
    Profile Picture Mr Amir Sezavar Keshavarz
  124. [img]
    Preview
    Motivations for Social Networking at Work
    Motivations for Social Networking at Work - Analyzed Paper

    Shared with the World by
    Profile Picture Mr Amir Sezavar Keshavarz
  125. [img]
    Preview
    Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace
    Trust and Privacy Concern Within Social Networking Sites - A Comparison of Facebook and MySpace - Analyzed Paper

    Shared with the World by
    Profile Picture Mr Amir Sezavar Keshavarz
  126. [img] [img]
    Preview
    INFO 2009 Coursework 2 - Go Green - Group 7 - Green ICT
    A Website on GREEN ICT by the Go Green Group as a part of the resource set made for the Info2009 2011-12 coursework

    Shared with the World by
    Profile Picture Miss Shreeprabha Aggarwal
  127. [img] [img]
    INFO2009 - Team Helios
    Resource for INFO2009 Coursework 2 - Team Helios. The video covers the topic of open government data and the benefits and drawbacks to producing and using it.

    Shared with the University by
  128. [img] [img]
    Participatory Inequality
    Shared with the University by
  129. [img] [img]
    Info2009 CW Tutorial Website
    Security Tutorial Website

    Shared with the University by
    Profile Picture Mr Yupeng Zhou
  130. [img]
    Preview
    Open Access: How the Case Has Been Made
    How the argument for Open Access hasd been made to government and the research industry over the last ten years.

    Shared with the World by
  131. [img] [img]
    INFO2009 - Group 14: DRM & Copyright
    A short video about DRM & Copyright (with chins).

    Shared with the University by
    Profile Picture Mr Thomas Thorpe
  132. [img]
    Social Enterprise
    Shared with the University by
  133. [img]
    Preview
    Information source evaluation matrix
    An information source evaluation matrix, produced by the Library at De Montfort University

    Shared with the World by
  134. [img] [img]
    INFO2009 Power Point
    Shared with the University by
    Profile Picture Mr Noel Varanda
  135. [img] [img]
    INFO2009 - Security Issues in home computing
    By antipirates

    Shared with the University by
    Profile Picture Mr Noel Varanda
  136. [img] [img]
    Green ICT - (JT)2L
    A set of lecture slides and accompanying text tutorial.

    Shared with the University by
    Profile Picture Mr Jhim Verame
  137. [img]
    Preview
    [img]
    Academic Integrity Resources - links and guides
    an online tutorial, a pdf version, a powerpoint presentation, links to regulations.

    Shared with the World by
  138. [img] [img]
    Freedom Of Information Act
    Link to various resources appropriate for revising the FOI

    Shared with the World by
  139. [img] [img]
    Green IT (includes High Powered Computing) - background reading
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
  140. [img]
    Preview
    [img]
    Preview
    INFO1010 Ethics in Practice
    Slides with associated activities and reading list to Introduce in Practice to Computer Science and IT undergraduates

    Shared with the World by
  141. [img]
    Preview
    INFO2009 - Information Networks
    Process Lecture to identify sources of information, exchange tips and techniques, update the student wiki and contribute to research activities for courseworks (annotated bibliography, poster, information resource)

    Shared with the World by
  142. [img] [img]
    INFO2009 Resource Summary 2011-12
    Slides which summarise the team resources produced for INFO2009

    Shared with the University by
  143. [img]
    Preview
    [img]
    PhD Supervision up to 9 months
    Information and guidance for students in the early stages of their PhD studies

    Shared with the World by
  144. [img] [img]
    Privacy and Security - background grey literature online
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
  145. [img]
    Preview
    [img]
    Preview
    Smart Meetings - background reading
    Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

    Shared with the World by
  146. [img]
    Preview
    Technical Report Background Reading Guidance and Links
    Handout which contains a set of links to a variety of background resources associated with the topics for a technical report coursework. Resources are clustered into three overview areas, but contain links which be used to address each of the six questions scenarios.

    Shared with the World by
  147. [img] [img]
    INFO2009 Educational Resources: Security
    Contains visually-appealing and informative "infographics" containing descriptions of common security vulnerabilities and general information about security. Suitable for use in a blog post or printed out and on the wall in an educational area. Also contains video podcasts demonstrating common security exploits in realistic web systems, and offering practical advice on fixing them. Created by "Am and the Raging Otters".

    Shared with the University by
    Profile Picture Mr Sam Whitehall
  148. [img]
    Preview
    Open Data
    Diverse attitudes to open data

    Shared with the World by
  149. [img]
    Preview
    [img]
    Preview
    INFO1010 Presentation Slots and Guidance 11-12
    summary of requirements and slot allocation

    Shared with the World by
  150. [img]
    Preview
    [img]
    Preview
    INFO1010: Organisational Perspectives
    lecture in professional issues which looks at organisations likely to employ our students and suggests how students might work towards identifying and achieving their employment objectives

    Shared with the World by
  151. [img] [img]
    INFO2009 2011-12 Case Study Examination
    materials for open book examination to be held during semester 1 exam period 2011-12

    Shared with the University by
  152. [img]
    Preview
    [img]
    Sustainability and Diversity
    lecture slides and resources for class mainly concerned with sustainability - also gives recap on perspectives on diversity which have been integrated into other lectures through the semester

    Shared with the World by
  153. [img]
    example share for INFO2009
    This share is designed to show students how to create a share for their INFO2009 coursework includes link to example video at http://youtu.be/Bcr9AdL7ttc

    Shared with the World by

Collection

  1. collection
    Collaborative Working
    Shared with Selected Users by
  2. collection
    Commercial Issues in IT
    Shared with Selected Users by
  3. collection
    Computational Systems
    some resources on agile methods and enterprise architecture frameworks

    Shared with Selected Users by
  4. collection
  5. collection
    IT Modelling
    Shared with Selected Users by
  6. collection
    IT Systems
    resources for the new 15 credit IT Systems module.

    Shared with Selected Users by
  7. collection
    Laser Work
    Shared with Selected Users by
  8. collection
    Object Orientated PHP
    To replace Application Scripting and Contemporary Programming Principles

    Shared with Selected Users by
  9. collection
  10. collection
  11. collection
    Web Design
    A collection of resources created for the Web Design Module. Please note that this link directs you to another share.

    Shared with Selected Users by
This list was generated on Sun Oct 22 06:26:55 2017 UTC.