Browse: Faculty of Engineering and Physical Sciences > School of Electronics and Computer Science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Creators Name | Item Type
Jump to: A | B | C | D | E | F | G | H | I | L | M | N | O | P | R | S | T | W
Number of items: 109.

A

  1. [img]
    The narrative of arguing the personalised news
    Bay 9 are hoping to pioneer a way to encourage postgrads and staff in the lab to get over the fear of presenting their work to the group. The members of the bay will each give a 6m40s Pecha Kucha explaining their current research work through pictures. The topics of the pecha kuchas are: - Citizen Participation in News: An analysis of the landscape of online journalism (Jonny) - Argumentation on the Social Web (Tom) - From Narrative Systems to Ubiquitous Computing for Psychology - and everything in between (Charlie) - Is it worth sharing user model data? (Rikki)

    Shared with the University by
    Miss Kewalin Angkananon
  2. [img] [img]
    Anonymisation, Deanonymisation and Data Management
    Speaker: Dr Kieron O'Hara Organiser: Time: 04/02/2015 11:00-11:45 Location: B32/3077 Abstract In order to reap the potential societal benefits of big and broad data, it is essential to share and link personal data. However, privacy and data protection considerations mean that, to be shared, personal data must be anonymised, so that the data subject cannot be identified from the data. Anonymisation is therefore a vital tool for data sharing, but deanonymisation, or reidentification, is always possible given sufficient auxiliary information (and as the amount of data grows, both in terms of creation, and in terms of availability in the public domain, the probability of finding such auxiliary information grows). This creates issues for the management of anonymisation, which are exacerbated not only by uncertainties about the future, but also by misunderstandings about the process(es) of anonymisation. This talk discusses these issues in relation to privacy, risk management and security, reports on recent theoretical tools created by the UKAN network of statistics professionals (on which the author is one of the leads), and asks how long anonymisation can remain a useful tool, and what might replace it.

    Shared with the University by
    Miss Kewalin Angkananon
  3. [img] [img]
    More women in informatics research and education
    Speaker: Lynda Hardman Organiser: Time: 04/02/2015 12:30-13:30 Location: B32/3077 Abstract The challenges of addressing gender inequalities in science, technology, engineering, mathematics and medicine is widely acknowledged. We currently hold a bronze award and ECS is one of many academic units in the University which has gained Athena Swan Charter status. In this seminar, Professor Lynda Hardman, Chair of the Informatics Europe working group "Women in Informatics Research and Education” will be explaining the causes of issued underlying gender inequality and constructive routes to addressing this important agenda. In undertaking to commit to an action plan which is a prerequisite of gaining charter status, the University or academic department agreed to accept and incorporate the Athena Swan six principles listed below: * To address gender inequalities requires commitment and action from everyone, at all levels of the organisation * To tackle the unequal representation of women in science requires changing cultures and attitudes across the organisation * The absence of diversity at management and policy-making levels has broad implications which the organisation will examine * The high loss rate of women in science is an urgent concern which the organisation will address * The system of short-term contracts has particularly negative consequences for the retention and progression of women in science, which the organisation recognises * There are both personal and structural obstacles to women making the transition from PhD into a sustainable academic career in science, which require the active consideration of the organisation. This seminar is designed to provide an opportunity to explore these issues NOTE: Lynda will be basing here talk on some of the work she directed as chair of the "Women in Informatics Research and Education” working group. The purpose of the working group is to actively participate and promote actions that contribute to improve gender balance in Information and Communication Sciences and Technologies. The first concrete result of the working group's activities was the publication of the booklet "More Women in Informatics Research and Education" in 2013. The booklet is a compact source of clear and simple best practices to deans and heads of departments that aim to increase the participation of women as both students and employees in their institutions. Many tips included were also inspired by colleagues already in leading positions who have already implemented actions in their institutions to attract more women and ensure their continued participation in the organization at commensurate ratios with their male colleagues. The booklet is endorsed by the European Commission and features a foreword by Neelie Kroes, Vice-President of the European Commission, responsible for the Digital Agenda.

    Shared with the University by
    Miss Kewalin Angkananon
  4. [img] [img]
    Open Data
    Shared with the University by
    Miss Kewalin Angkananon
  5. [img] [img]
    Password cracking for fun and profit
    Abstract Passwords are the most common form of authentication, and most of us will have to log in to several accounts every day which require passwords. Unfortunately, passwords often do not do a good job of proving who we are, and come with a host of usability problems. Probably the only reason that passwords still exist is that there often isn't a better alternative, so we are likely to be stuck with them for the foreseeable future. Password cracking has been a problem for years, and becomes more problematic as computer become more powerful and attackers get a better idea of the sort of passwords people use. This presentation will look at two free password cracking tools: Hashcat and John the Ripper, and how even a non-expert on a laptop (i.e. me) can use them effectively. An introduction to some of the research surrounding the economics and usability of passwords will also be discussed. Note that the speaker is not an expert in this area, so it will be a fairly informal since I'm sure you're all tired after a long term.

    Shared with the University by
    Miss Kewalin Angkananon
  6. [img] [img]
    Pecha Kucha: Bay 8
    Abstract Following the success of Bay 9's Pecha Kucha, this week Bay 8 are providing the next instalment of the newly established tradition of Pecha Kucha. In 6m40s and 20 slides, each member of Bay 8 will introduce themselves, explaining their background and research interests, so you can put a name to the face, and chat after the event if you have common interests. These mini talks aim to support the collaborative nature of WAIS by introducing each member to the wider group. This week the bay members and Pecha Kuchas are: - The Public Health Analogy in Web Security (Huw) - Social Networking Features in Digital Behaviour Change Interventions (Roushdat) - Computers, Psychology and a lot of coffee (Anna) - Law, computer science and that annoying thing you have to say you’ve read before you can use a website (Emma)

    Shared with the University by
    Miss Kewalin Angkananon
  7. [img] [img]
    Scalable real-time crisis mapping and analytics of social media streams for disaster management and breaking news
    Real-time geoparsing of social media streams (e.g. Twitter, YouTube, Instagram, Flickr, FourSquare) is providing a new 'virtual sensor' capability to end users such as emergency response agencies (e.g. Tsunami early warning centres, Civil protection authorities) and news agencies (e.g. Deutsche Welle, BBC News). Challenges in this area include scaling up natural language processing (NLP) and information retrieval (IR) approaches to handle real-time traffic volumes, reducing false positives, creating real-time infographic displays useful for effective decision support and providing support for trust and credibility analysis using geosemantics. I will present in this seminar on-going work by the IT Innovation Centre over the last 4 years (TRIDEC and REVEAL FP7 projects) in building such systems, and highlights our research towards improving trustworthy and credible of crisis map displays and real-time analytics for trending topics and influential social networks during major news worthy events.

    Shared with the University by
    Miss Kewalin Angkananon
  8. [img] [img]
    What can Flickr photographs tell us about the world?
    In their second year, our undergraduate web scientists undertake a group project module (WEBS2002, led by Jonathon Hare & co-taught by Su White) in which they get to apply what they learnt in the first year to a practical web-science problem, and also learn about team-working. For the project this semester, the students were provided with a large dataset of geolocated images and associated metadata collected from the Flickr website. Using this data, they were tasked with exploring what this data could tell us about the world. In this seminar the two groups will present the outcomes of their work. Team Alpha (Ellie Hamilton, Clayton Jones & Alok Acharya) will present their work on "The relationship between Group Photos, Social Integration and Suicide". This work aims to explore whether levels of social integration (which Durkheim posited as a factor in "Egoistic Suicide" rates) can be predicted by measuring the proportion of photos of groups of people to photos of individuals within a geographical region. Team Bravo (Agnieszka Grzesiuk-Szolucha, Thomas Leese & Ammaar Tawil) will present their work on "Sentiment Analysis on Flickr Photo Tags to Classify a Photo as Positive or Negative, In Order to Determine the Happiness of a Country or Region". This work explores whether estimates of sentiment made by applying SentiWordNet to Flickr tags correlate with indices of world happiness and socio-economic well-being.

    Shared with the University by
    Miss Kewalin Angkananon
  9. [img] [img]
    Wikipedia and Gamergate
    Abstract Introduction: This seminar is on the topic of "GamerGate", an international movement, ostensibly about "ethics in video game journalism" but which has become inextricably linked with extreme forms of online misogyny, rape and death threats towards women in the industry. It is of relevance to all Web science researchers, because it raises many issues of free speech, online governance, trolling and (not least) the representation of women in the tech industry. Our guest speaker (Mark Bernstein) is known for his criticism of the movement, and his work was featured in an article in the Guardian last week. He is a longtime collaborator in the field of hypertext and online media research, who co-orgainsed our annual international Web Science conference two years ago. Based in Boston, US, he will be speaking to us via Skype on Wednesday morning, to give us some background on the Gamergate phenomenon and to explain the recent developments regarding Wikipedia.

    Shared with the University by
    Miss Kewalin Angkananon

B

  1. [img] [img]
    Big Data or Right Data?
    Abstract Big data nowadays is a fashionable topic, independently of what people mean when they use this term. But being big is just a matter of volume, although there is no clear agreement in the size threshold. On the other hand, it is easy to capture large amounts of data using a brute force approach. So the real goal should not be big data but to ask ourselves, for a given problem, what is the right data and how much of it is needed. For some problems this would imply big data, but for the majority of the problems much less data will and is needed. In this talk we explore the trade-offs involved and the main problems that come with big data using the Web as case study: scalability, redundancy, bias, noise, spam, and privacy. Speaker Biography Ricardo Baeza-Yates Ricardo Baeza-Yates is VP of Research for Yahoo Labs leading teams in United States, Europe and Latin America since 2006 and based in Sunnyvale, California, since August 2014. During this time he has lead the labs in Barcelona and Santiago de Chile. Between 2008 and 2012 he also oversaw the Haifa lab. He is also part time Professor at the Dept. of Information and Communication Technologies of the Universitat Pompeu Fabra, in Barcelona, Spain. During 2005 he was an ICREA research professor at the same university. Until 2004 he was Professor and before founder and Director of the Center for Web Research at the Dept. of Computing Science of the University of Chile (in leave of absence until today). He obtained a Ph.D. in CS from the University of Waterloo, Canada, in 1989. Before he obtained two masters (M.Sc. CS & M.Eng. EE) and the electronics engineer degree from the University of Chile in Santiago. He is co-author of the best-seller Modern Information Retrieval textbook, published in 1999 by Addison-Wesley with a second enlarged edition in 2011, that won the ASIST 2012 Book of the Year award. He is also co-author of the 2nd edition of the Handbook of Algorithms and Data Structures, Addison-Wesley, 1991; and co-editor of Information Retrieval: Algorithms and Data Structures, Prentice-Hall, 1992, among more than 500 other publications. From 2002 to 2004 he was elected to the board of governors of the IEEE Computer Society and in 2012 he was elected for the ACM Council. He has received the Organization of American States award for young researchers in exact sciences (1993), the Graham Medal for innovation in computing given by the University of Waterloo to distinguished ex-alumni (2007), the CLEI Latin American distinction for contributions to CS in the region (2009), and the National Award of the Chilean Association of Engineers (2010), among other distinctions. In 2003 he was the first computer scientist to be elected to the Chilean Academy of Sciences and since 2010 is a founding member of the Chilean Academy of Engineering. In 2009 he was named ACM Fellow and in 2011 IEEE Fellow.

    Shared with the University by
    Mr Roushdat Elaheebocus

C

  1. [img] [img]
    Preview
    2015 Exam Report: ‘Open Up’ Digital Democracy Commission’s Report
    The Speaker’s Commission on Digital Democracy has published its report ‘Open Up’. The report recommends how Parliament can use digital technology to help it to be more transparent, inclusive, and better able to engage the public with democracy.

    Shared with the World by
    Prof Leslie Carr
  2. [img]
    Preview
    [img]
    Preview
    Caches and Content Delivery
    Getting content from server to client can be more complicated than we have discussed so far. This lecture discusses how caching and content delivery networks help to make the Web work.

    Shared with the World by
    Prof Leslie Carr
  3. [img]
    How was the Web Invented
    A lecture about the Web, it's history and sociotechnical coconstitution, for precessional students

    Shared with the World by
    Prof Leslie Carr
  4. [img]
    Preview
    Institutions & Their Data
    A panel presentation at Repository Fringe 2015

    Shared with the World by
    Prof Leslie Carr
  5. [img]
    Preview
    Open Access to Research: A Broad Take On Understanding policy, preparing for the future
    Looking at the Wider Picture of Open Access and other Open Agendas affecting Universities

    Shared with the World by
    Prof Leslie Carr
  6. [img] [img]
    Parliamentary Select Committees
    What kind of advice do people offer when Parliament asks for it? What seems to be effective?

    Shared with the University by
    Prof Leslie Carr
  7. [img]
    Preview
    [img]
    Prof Les Carr interviews Bebo White
    Prof Les Carr interviews Bebo White about the Early Web and the Future Web – the Internet of Things

    Shared with the World by
    Prof Leslie Carr
  8. [img]
    Preview
    [img]
    Preview
    Net Neutrality
    Some discussion points about net neutrality

    Shared with the World by
    Prof Leslie Carr
  9. [img] [img]
    Big Data: Wrongs and Rights by Andrew Cormack (WAIS Seminar)
    Abstract: Big Data has been characterised as a great economic opportunity and a massive threat to privacy. Both may be correct: the same technology can indeed be used in ways that are highly beneficial and those that are ethically intolerable, maybe even simultaneously. Using examples of how Big Data might be used in education - normally referred to as "learning analytics" - the seminar will discuss possible ethical and legal frameworks for Big Data, and how these might guide the development of technologies, processes and policies that can deliver the benefits of Big Data without the nightmares. Speaker Biography: Andrew Cormack is Chief Regulatory Adviser, Jisc Technologies. He joined the company in 1999 as head of the JANET-CERT and EuroCERT incident response teams. In his current role he concentrates on the security, policy and regulatory issues around the network and services that Janet provides to its customer universities and colleges. Previously he worked for Cardiff University running web and email services, and for NERC's Shipboard Computer Group. He has degrees in Mathematics, Humanities and Law.

    Shared with the University by
    Miss Priyanka Singh

D

  1. [img]
    Artificial Intelligence
    Pearon's resource from the Brookshear Chapter

    Shared with the University by
    Prof Hugh Davis
  2. [img]
    Preview
    [img]
    Drafting a Research Proposal
    set of resources and activities about drafting a research Proposal: selecting a suitable theme, and topic. Identify key research questions from proposal and hypothesis. Contains videos and activities

    Shared with the World by
    Dr Yvonne Howard
  3. [img] [img]
    Bay 13 pecha kucha
    The talks are by EA Draffan, Nawar Halabi, Gareth Beeston and Neil Rogers. In 6m40s and 20 slides, each member of Bay 13 will introduce themselves, explaining their background and research interests, so those in WAIS can put a name to a face, and chat after the event if there are common interests.

    Shared with the University by
    Mr Roushdat Elaheebocus

E

  1. [img] [img]
    WAIS Fest 2015 - Wrap up
    WAISfest is an opportunity to explore an area of research that isn't part of your day-to-day job, for 3 days. It's kinda like your Google 20% time. At the kick off session, a set of themes will be presented, and you get to choose which group to work with. Then for a few working days, you get to work on this challenge, before presenting what you've achieved at the end.

    Shared with the University by
    Mr Roushdat Elaheebocus
  2. [img] [img]
    A data-driven approach to disease control
    As our world becomes increasingly interconnected, diseases can spread at a faster and faster rate. Recent years have seen large-scale influenza, cholera and ebola outbreaks and failing to react in a timely manner to outbreaks leads to a larger spread and longer persistence of the outbreak. Furthermore, diseases like malaria, polio and dengue fever have been eliminated in some parts of the world but continue to put a substantial burden on countries in which these diseases are still endemic. To reduce the disease burden and eventually move towards countrywide elimination of diseases such as malaria, understanding human mobility is crucial for both planning interventions as well as estimation of the prevalence of the disease. In this talk, I will discuss how various data sources can be used to estimate human movements, population distributions and disease prevalence as well as the relevance of this information for intervention planning. Particularly anonymised mobile phone data has been shown to be a valuable source of information for countries with unreliable population density and migration data and I will present several studies where mobile phone data has been used to derive these measures.

    Shared with the University by
    Mr Roushdat Elaheebocus

F

  1. [img]
    Preview
    [img]
    Preview
    Data Markets and Personal Data
    Shared with the World by
    Prof Leslie Carr

G

  1. [img]
    Data Storage
    Shared with the World by
    Dr Nicholas Gibbins
  2. [img]
    Access Structures
    Shared with the World by
    Dr Nicholas Gibbins
  3. [img]
    Preview
    Advanced Transactions
    Shared with the World by
    Dr Nicholas Gibbins
  4. [img]
    Preview
    Before the Relational Model
    Shared with the World by
    Dr Nicholas Gibbins
  5. [img]
    Coursework Specification: Individual Report
    Shared with the University by
    Dr Nicholas Gibbins
  6. [img]
    DBMS Architecture
    Shared with the World by
    Dr Nicholas Gibbins
  7. [img]
    Preview
    Data Streams
    Shared with the World by
    Dr Nicholas Gibbins
  8. [img]
    Data Types
    Shared with the World by
    Dr Nicholas Gibbins
  9. [img]
    Preview
    Data Warehousing
    Shared with the World by
    Dr Nicholas Gibbins
  10. [img]
    Preview
    [img]
    Preview
    Description Logics
    Shared with the World by
    Dr Nicholas Gibbins
  11. [img]
    Preview
    Information Retrieval
    Shared with the World by
    Dr Nicholas Gibbins
  12. [img]
    Preview
    Introduction
    Shared with the World by
    Dr Nicholas Gibbins
  13. [img]
    Introduction
    Shared with the World by
    Dr Nicholas Gibbins
  14. [img]
    Preview
    Linked Data
    Shared with the World by
    Dr Nicholas Gibbins
  15. [img]
    Preview
    Logging and Recovery
    Shared with the World by
    Dr Nicholas Gibbins
  16. [img]
    Preview
    Message Queues
    Shared with the World by
    Dr Nicholas Gibbins
  17. [img]
    Multidimensional Access Structures
    Shared with the World by
    Dr Nicholas Gibbins
  18. [img]
    Preview
    NoSQL: Beyond RDBMS
    Shared with the World by
    Dr Nicholas Gibbins
  19. [img]
    Preview
    OWL
    Shared with the World by
    Dr Nicholas Gibbins
  20. [img]
    Preview
    Ontology Design Patterns
    Shared with the World by
    Dr Nicholas Gibbins
  21. [img]
    Preview
    Parallel Databases
    Shared with the World by
    Dr Nicholas Gibbins
  22. [img]
    Preview
    Peer-to-Peer Systems
    Shared with the World by
    Dr Nicholas Gibbins
  23. [img]
    Preview
    Query Processing
    Shared with the World by
    Dr Nicholas Gibbins
  24. [img]
    Relational Algebra
    Shared with the World by
    Dr Nicholas Gibbins
  25. [img]
    Preview
    Streaming Semantic Data
    Shared with the World by
    Dr Nicholas Gibbins
  26. [img]
    Preview
    The Web Standards Process
    Shared with the World by
    Dr Nicholas Gibbins
  27. [img]
    Transactions and Concurrency
    Shared with the World by
    Dr Nicholas Gibbins
  28. [img]
    Preview
    Vocabularies and Applications
    Shared with the World by
    Dr Nicholas Gibbins
  29. [img] [img]
    Minecraft Fairy Ventnor
    Shared with the World by
    Mr Christopher Gutteridge
  30. [img] [img]
    Minecraft Ventnor Model
    Shared with the World by
    Mr Christopher Gutteridge
  31. [img] [img]
    Minecraft Ventnor Open Data
    Shared with the World by
    Mr Christopher Gutteridge
  32. [img]
    Open Data
    Shared with the University by
    Dr Nicholas Gibbins
  33. [img] [img]
    Southampton Minecraft Model v1
    See README.TXT file for more details. Unpack and move resulting folder into your Minecraft 'saves' folder.

    Shared with the World by
    Mr Christopher Gutteridge
  34. [img] [img]
    The End of the World Wide Web
    Nothing lasts forever. The World Wide Web was an essential part of life for much of humantiy in the early 21st century, but these days few people even remember that it existed. Members of the Web Science research group will present several possible scenarios for how the Web, as we know it, could cease to be. This will be followed by an open discussion about the future we want for the Web and what Web Science should be doing today to help make that future happen, or at least avoid some of the bad ones.

    Shared with the University by
    Mr Roushdat Elaheebocus
  35. [img]
    Preview
    When Open Access meets Open Data
    Shared with the World by
    Mr Christopher Gutteridge

H

  1. [img]
    Preview
    [img]
    Preview
    Computer Applications: Algorithms
    Shared with the World by
    Mr Rikki Prince
  2. [img] [img]
    Computer Applications: Algorithms 2 - Parameterisation
    Shared with the University by
    Mr Rikki Prince
  3. [img]
    Preview
    Software Development Life Cycles and Process Models
    This presentation describes the evolution of Software Development Lifecycles (SDLCs) from the first formally proposed linear models including, the Waterfall (Royce 1970) through to iterative prototyping models (Spiral and Win-Win Spiral) and incremental, iterative models used in Agile Methods. We discuss the problems iinherent in each prpoosal and how successive models attempt to solve them.

    Shared with the World by
    Prof David Millard
  4. [img] [img]
    Computer Applications: Assignment 1
    Shared with the University by
    Mr Rikki Prince
  5. [img] [img]
    Computer Applications: Online Identity
    Privacy and online identity

    Shared with the University by
    Mr Rikki Prince
  6. [img]
    Preview
    [img]
    Preview
    Computer Applications: Our Digital World
    Week 1

    Shared with the World by
    Mr Rikki Prince
  7. [img] [img]
    Computer Applications: Information Literacy
    digital literacy:information and reproduction

    Shared with the University by
    Mr Rikki Prince

I

  1. [img]
    Advanced databases
    Shared with the University by
    Prof Elena Simperl

L

  1. [img]
    On the usage of the Web of Data
    Shared with the University by
    Dr Nicholas Gibbins

M

  1. [img] [img]
    Introduction to Soft Systems Modelling
    Two lectures that introduce the idea of modelling in the large, and contrasts hard system and soft system modelling. The second lecture goes into detail on a number of specific methods for analysing a system (CATWOE and CSH) and on modelling a system (Systems Diagrams and Personas).

    Shared with the World by
    Prof David Millard
  2. [img] [img]
    Dynamic Document Generation from Semantic Web Data
    This talk will present an overview of the ongoing ERCIM project SMARTDOCS (SeMAntically-cReaTed DOCuments) which aims at automatically generating webpages from RDF data. It will particularly focus on the current issues and the investigated solutions in the different modules of the project, which are related to document planning, natural language generation and multimedia perspectives. The second part of the talk will be dedicated to the KODA annotation system, which is a knowledge-base-agnostic annotator designed to provide the RDF annotations required in the document generation process.

    Shared with the University by
    Mr Roushdat Elaheebocus

N

  1. [img]
    Gender, Feminism and the Web
    Shared with the World by
    Prof Leslie Carr

O

  1. [img] [img]
    Political Economy of the Web
    Slides to introduce political economy, and its relevance to the study of the Web. Brief review of methods and issues.

    Shared with the World by
    Emeritus F Kieron O'Hara
  2. [img] [img]
    Can you tell if they're learning?
    The proliferation of Web-based learning objects makes finding and evaluating online resources problematic. While established Learning Analytics methods use Web interaction to evaluate learner engagement, there is uncertainty regarding the appropriateness of these measures. In this paper we propose a method for evaluating pedagogical activity in Web-based comments using a pedagogical framework, and present a preliminary study that assigns a Pedagogical Value (PV) to comments. This has value as it categorises discussion in terms of pedagogical activity rather than Web interaction. Results show that PV is distinct from typical interactional measures; there are negative or insignificant correlations with established Learning Analytics methods, but strong correlations with relevant linguistic indicators of learning, suggesting that the use of pedagogical frameworks may produce more accurate indicators than interaction analysis, and that linguistic rather than interaction analysis has the potential to automatically identify learning behaviour.

    Shared with the University by
    Mr Roushdat Elaheebocus

P

  1. [img] [img]
    "Thematically Analysing Social Network Content During Disasters Through the Lens of the Disaster Management Lifecycle" & "Investigating Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization"
    Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.

    Shared with the University by
    Mr Roushdat Elaheebocus
  2. [img] [img]
    Predicting sense of community and participation by applying machine learning to open government data
    Community capacity is used to monitor socio-economic development. It is composed of a number of dimensions, which can be measured to understand the possible issues in the implementation of a policy or the outcome of a project targeting a community. Measuring community capacity dimensions is usually expensive and time consuming, requiring locally organised surveys. Therefore, we investigate a technique to estimate them by applying the Random Forests algorithm on secondary open government data. This research focuses on the prediction of measures for two dimensions: sense of community and participation. The most important variables for this prediction were determined. The variables included in the datasets used to train the predictive models complied with two criteria: nationwide availability; sufficiently fine-grained geographic breakdown, i.e. neighbourhood level. The models explained 77% of the sense of community measures and 63% of participation. Due to the low geographic detail of the outcome measures available, further research is required to apply the predictive models to a neighbourhood level. The variables that were found to be more determinant for prediction were only partially in agreement with the factors that, according to the social science literature consulted, are the most influential for sense of community and participation. This finding should be further investigated from a social science perspective, in order to be understood in depth.

    Shared with the University by
    Mr Roushdat Elaheebocus
  3. [img] [img]
    CSS Practical
    The CSS that we wrote in the lecture, applied to the updated Tortoise and Hare HTML story created in week 1. (Note that there's 3 different stylesheets attached. Use View > Page Styles to see them all in Firefox.) Also links to Zen Garden so you can do the group task.

    Shared with the World by
    Mr Rikki Prince
  4. [img] [img]
    ReST Practical
    In the tutorial we explored the PayPal API as an example of an API that implements HATEOAS.

    Shared with the University by
    Mr Rikki Prince
  5. [img] [img]
    Web Architecture: HTML Practical
    Resources from the HTML session on 6th October 2015

    Shared with the University by
    Mr Rikki Prince
  6. [img] [img]
    Web Architecture: HTTP Practical
    A summary of the HTTP calls we made during the tutorial session.

    Shared with the University by
    Mr Rikki Prince

R

  1. [img] [img]
    The Open Web of Things as a means to unlock the potential of the IoT
    Abstract: There is a lot of hype around the Internet of Things along with talk about 100 billion devices within 10 years time. The promise of innovative new services and efficiency savings is fueling interest in a wide range of potential applications across many sectors including smart homes, healthcare, smart grids, smart cities, retail, and smart industry. However, the current reality is one of fragmentation and data silos. W3C is seeking to fix that by exposing IoT platforms through the Web with shared semantics and data formats as the basis for interoperability. This talk will address the abstractions needed to move from a Web of pages to a Web of things, and introduce the work that is being done on standards and on open source projects for a new breed of Web servers on microcontrollers to cloud based server farms. Speaker Biography -Dave Raggett : Dave has been involved at the heart of web standards since 1992, and part of the W3C Team since 1995. As well as working on standards, he likes to dabble with software, and more recently with IoT hardware. He has participated in a wide range of European research projects on behalf of W3C/ERCIM. He currently focuses on Web payments, and realising the potential for the Web of Things as an evolution from the Web of pages. Dave has a doctorate from the University of Oxford. He is a visiting professor at the University of the West of England, and lives in the UK in a small town near to Bath.

    Shared with the University by
    Mr Roushdat Elaheebocus
  2. [img] [img]
    On lions, impala, and bigraphs: modelling interactions in Ubiquitous Computing
    As ubiquitous systems have moved out of the lab and into the world the need to think more systematically about how there are realised has grown. This talk will present intradisciplinary work I have been engaged in with other computing colleagues on how we might develop more formal models and understanding of ubiquitous computing systems. The formal modelling of computing systems has proved valuable in areas as diverse as reliability, security and robustness. However, the emergence of ubiquitous computing raises new challenges for formal modelling due to their contextual nature and dependence on unreliable sensing systems. In this work we undertook an exploration of modelling an example ubiquitous system called the Savannah game using the approach of bigraphical rewriting systems. This required an unusual intra-disciplinary dialogue between formal computing and human- computer interaction researchers to model systematically four perspectives on Savannah: computational, physical, human and technical. Each perspective in turn drew upon a range of different modelling traditions. For example, the human perspective built upon previous work on proxemics, which uses physical distance as a means to understand interaction. In this talk I hope to show how our model explains observed inconsistencies in Savannah and ex- tend it to resolve these. I will then reflect on the need for intradisciplinary work of this form and the importance of the bigraph diagrammatic form to support this form of engagement. Speaker Biography Tom Rodden Tom Rodden (rodden.info) is a Professor of Interactive Computing at the University of Nottingham. His research brings together a range of human and technical disciplines, technologies and techniques to tackle the human, social, ethical and technical challenges involved in ubiquitous computing and the increasing used of personal data. He leads the Mixed Reality Laboratory (www.mrl.nott.ac.uk) an interdisciplinary research facility that is home of a team of over 40 researchers. He founded and currently co-directs the Horizon Digital Economy Research Institute (www.horizon.ac.uk), a university wide interdisciplinary research centre focusing on ethical use of our growing digital footprint. He has previously directed the EPSRC Equator IRC (www.equator.ac.uk) a national interdisciplinary research collaboration exploring the place of digital interaction in our everyday world. He is a fellow of the British Computer Society and the ACM and was elected to the ACM SIGCHI Academy in 2009 (http://www.sigchi.org/about/awards/).

    Shared with the University by
    Mr Roushdat Elaheebocus

S

  1. [img] [img]
    The Age of Social Machines
    Many of the most successful and important systems that impact our lives combine humans, data, and algorithms at Web Scale. These social machines are amalgamations of human and machine intelligence. This seminar will provide an update on SOCIAM, a five year EPSRC Programme Grant that seeks to gain a better understanding of social machines; how they are observed and constituted, how they can be designed and their fate determined. We will review how social machines can be of value to society, organisations and individuals. We will consider the challenges they present to our various disciplines.

    Shared with the University by
    Mr Roushdat Elaheebocus
  2. [img]
    Preview
    [img]
    UbiCamp Videos
    Overview slides with screenshots

    Shared with the World by
    Dr Jian Shi
  3. [img]
    Preview
    UbiCamp for Staff
    Shared with the World by
    Dr Jian Shi
  4. [img]
    Preview
    [img]
    Preview
    UbiCamp for Students
    Shared with the World by
    Dr Jian Shi
  5. [img]
    Independent learning and time management
    Shared with the University by
    Prof Elena Simperl
  6. [img]
    Introduction
    Shared with the University by
    Prof Elena Simperl
  7. [img]
    Ontologies
    Shared with the University by
    Prof Elena Simperl
  8. [img]
    Technical writing
    How to write a technical report, finding and evaluating online sources, citations

    Shared with the University by
    Prof Elena Simperl

T

  1. [img]
    Data Science MSc - Introduction to Data Science. MongoDB Tutorial
    Shared with the University by
    Dr Ramine Tinati

W

  1. [img] [img]
    User-Centred Methods for Measuring the Value of Open Data
    A project to identify metrics for assessing the quality of open data based on the needs of small voluntary sector organisations in the UK and India. For this project we assumed the purpose of open data metrics is to determine the value of a group of open datasets to a defined community of users. We adopted a much more user-centred approach than most open data research using small structured workshops to identify users’ key problems and then working from those problems to understand how open data can help address them and the key attributes of the data if it is to be successful. We then piloted different metrics that might be used to measure the presence of those attributes. The result was six metrics that we assessed for validity, reliability, discrimination, transferability and comparability. This user-centred approach to open data research highlighted some fundamental issues with expanding the use of open data from its enthusiast base.

    Shared with the University by
    Mr Roushdat Elaheebocus
  2. [img]
    Preview
    COMP1205 LEPP1-4 Set Book Overview
    pdf extract of set book

    Shared with the World by
    Dr Su White
  3. [img]
    COMP1205 LEPP: BCS Code of Conduct
    Notes, slides, links

    Shared with the University by
    Dr Su White
  4. [img]
    Preview
    [img]
    Preview
    COMP1205 Legal and Ethical issues Introduction
    Notes, slides, links. See also notes on ECS module page: https://secure.ecs.soton.ac.uk/module/1617/COMP1205/33423/

    Shared with the World by
    Dr Su White
  5. [img]
    Preview
    COMP1205 Revision Lecture
    Lecture Slides

    Shared with the World by
    Dr Su White
  6. [img]
    Preview
    [img]
    Preview
    COMP1205 Technical report and plagiarism tutorial

    Shared with the World by
    Dr Su White
  7. [img]
    Preview
    [img]
    Preview
    COMP1205: Workplace perspectives
    Notes, slides, links

    Shared with the World by
    Dr Su White
  8. [img]
    Preview
    [img]
    Preview
    FY-RTS3 Webliography
    Useful/relevant sites: Mindsets

    Shared with the World by
    Dr Su White
  9. [img] [img]
    Interdisciplinary Approaches: Readings 2
    Tiropanis et al 2015 can be used as a model for a comparison of disciplinary approaches Trowler 2013 discusses conceptualising the idea of 'discipline' Hughes 2013 reviews some of the key previous papers All references can be found in the module mendeley collection WEBS 6203 https://www.mendeley.com/groups/4904781/webs6203/ WEBS2002 https://www.mendeley.com/groups/4931801/webs2002/

    Shared with the World by
    Dr Su White
  10. [img]
    Preview
    [img]
    Preview
    Interdisciplinary approaches: Readings 1
    Biglan (1975a,1975b) Ortega Gasset (1930) , Chynoweth (2009) All references can be found in your mendeley collection WEBS6203 https://www.mendeley.com/groups/4904781/webs6203/ WEBS2002 https://www.mendeley.com/groups/4931801/webs2002/

    Shared with the World by
    Dr Su White
  11. [img]
    Preview
    Technical report mark scheme
    Mark scheme for technical report. 2015 COMP1205 updated 2018/19

    Shared with the World by
    Dr Su White
  12. [img] [img]
    Technical report revision lecture
    Specification for technical report, allocations (2015) mark scheme are at http://www.edshare.soton.ac.uk/14582 A template for a technical report and other support materials are found at http://www.edshare.soton.ac.uk/14581

    Shared with the University by
    Dr Su White
  13. [img] [img]
    Preview
    Technical report template. List of additonal writing resources
    A set of support material to be used when preparing a technical report. Includes report template. The second document shows links to other supporting materials specific to the University.

    Shared with the World by
    Dr Su White
  14. [img]
    Preview
    WEB6203 Interdisciplinary Thinking 15-16 Overview
    Basic workplan

    Shared with the World by
    Dr Su White
  15. [img]
    WEB6203 Interdisciplinary Thinking: Poster Task
    Shared with the World by
    Dr Su White
  16. [img]
    Preview
    WEB6203 Interdisciplinary Thinking: Readings 4
    Why Blog? read this compelling auto ethnography All references can be found in our mendeley collection https://www.mendeley.com/groups/4904781/webs6203/

    Shared with the World by
    Dr Su White
  17. [img]
    Preview
    [img]
    Preview
    WEBS6203 Interdisciplinary Thinking: Poster Examples
    Shared with the World by
    Dr Su White
  18. [img]
    Preview
    [img]
    Writing guide
    Shared with the World by
    Dr Su White
This list was generated on Fri Mar 29 06:10:17 2024 UTC.