42 resultados para workshops (seminars)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract This seminar will introduce an initial year of research exploring participation in the development of a bilingual symbol dictionary. Symbols can be a communication and literacy ‘lifeline’ for those unable to communicate through speech or writing. We will discuss how an online system has been built to overcome language, cultural and literacy skill issues for a country where 86% are expatriates but the target clients are Arabic born individuals with speech and language impairments. The symbols in use at present are inappropriate and yet there is no democratic way of providing a ‘user voice’ for making choices, let alone easy mechanisms for adapting and sharing newly developed symbols across the nation or extended Arabic world. This project aims to change this situation. Having sourced a series of symbols that could be adapted to suit user’s needs, the team needed to encourage those users, their carers and therapists to vote on whether the symbols would be appropriate and work with those already in use. The first prototype was developed and piloted during the WAISfest in 2013. The second phase needs further voting on the most suitably adapted symbols for use when communicating with others. There is a requirement to have mechanisms for evaluating the outcome of the votes, where symbols fail to represent accurate meanings, have inappropriate colours, representations and actions etc. There also remains the need to collect both quantitative and qualitative data. Not easy in a climate of acceptance of the expert view, a culture where to be critical can be a problem and time is not of the essence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Passwords are the most common form of authentication, and most of us will have to log in to several accounts every day which require passwords. Unfortunately, passwords often do not do a good job of proving who we are, and come with a host of usability problems. Probably the only reason that passwords still exist is that there often isn't a better alternative, so we are likely to be stuck with them for the foreseeable future. Password cracking has been a problem for years, and becomes more problematic as computer become more powerful and attackers get a better idea of the sort of passwords people use. This presentation will look at two free password cracking tools: Hashcat and John the Ripper, and how even a non-expert on a laptop (i.e. me) can use them effectively. An introduction to some of the research surrounding the economics and usability of passwords will also be discussed. Note that the speaker is not an expert in this area, so it will be a fairly informal since I'm sure you're all tired after a long term.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-time geoparsing of social media streams (e.g. Twitter, YouTube, Instagram, Flickr, FourSquare) is providing a new 'virtual sensor' capability to end users such as emergency response agencies (e.g. Tsunami early warning centres, Civil protection authorities) and news agencies (e.g. Deutsche Welle, BBC News). Challenges in this area include scaling up natural language processing (NLP) and information retrieval (IR) approaches to handle real-time traffic volumes, reducing false positives, creating real-time infographic displays useful for effective decision support and providing support for trust and credibility analysis using geosemantics. I will present in this seminar on-going work by the IT Innovation Centre over the last 4 years (TRIDEC and REVEAL FP7 projects) in building such systems, and highlights our research towards improving trustworthy and credible of crisis map displays and real-time analytics for trending topics and influential social networks during major news worthy events.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In their second year, our undergraduate web scientists undertake a group project module (WEBS2002, led by Jonathon Hare & co-taught by Su White) in which they get to apply what they learnt in the first year to a practical web-science problem, and also learn about team-working. For the project this semester, the students were provided with a large dataset of geolocated images and associated metadata collected from the Flickr website. Using this data, they were tasked with exploring what this data could tell us about the world. In this seminar the two groups will present the outcomes of their work. Team Alpha (Ellie Hamilton, Clayton Jones & Alok Acharya) will present their work on "The relationship between Group Photos, Social Integration and Suicide". This work aims to explore whether levels of social integration (which Durkheim posited as a factor in "Egoistic Suicide" rates) can be predicted by measuring the proportion of photos of groups of people to photos of individuals within a geographical region. Team Bravo (Agnieszka Grzesiuk-Szolucha, Thomas Leese & Ammaar Tawil) will present their work on "Sentiment Analysis on Flickr Photo Tags to Classify a Photo as Positive or Negative, In Order to Determine the Happiness of a Country or Region". This work explores whether estimates of sentiment made by applying SentiWordNet to Flickr tags correlate with indices of world happiness and socio-economic well-being.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker: Dr Kieron O'Hara Organiser: Time: 04/02/2015 11:00-11:45 Location: B32/3077 Abstract In order to reap the potential societal benefits of big and broad data, it is essential to share and link personal data. However, privacy and data protection considerations mean that, to be shared, personal data must be anonymised, so that the data subject cannot be identified from the data. Anonymisation is therefore a vital tool for data sharing, but deanonymisation, or reidentification, is always possible given sufficient auxiliary information (and as the amount of data grows, both in terms of creation, and in terms of availability in the public domain, the probability of finding such auxiliary information grows). This creates issues for the management of anonymisation, which are exacerbated not only by uncertainties about the future, but also by misunderstandings about the process(es) of anonymisation. This talk discusses these issues in relation to privacy, risk management and security, reports on recent theoretical tools created by the UKAN network of statistics professionals (on which the author is one of the leads), and asks how long anonymisation can remain a useful tool, and what might replace it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker: Lynda Hardman Organiser: Time: 04/02/2015 12:30-13:30 Location: B32/3077 Abstract The challenges of addressing gender inequalities in science, technology, engineering, mathematics and medicine is widely acknowledged. We currently hold a bronze award and ECS is one of many academic units in the University which has gained Athena Swan Charter status. In this seminar, Professor Lynda Hardman, Chair of the Informatics Europe working group "Women in Informatics Research and Education” will be explaining the causes of issued underlying gender inequality and constructive routes to addressing this important agenda. In undertaking to commit to an action plan which is a prerequisite of gaining charter status, the University or academic department agreed to accept and incorporate the Athena Swan six principles listed below: * To address gender inequalities requires commitment and action from everyone, at all levels of the organisation * To tackle the unequal representation of women in science requires changing cultures and attitudes across the organisation * The absence of diversity at management and policy-making levels has broad implications which the organisation will examine * The high loss rate of women in science is an urgent concern which the organisation will address * The system of short-term contracts has particularly negative consequences for the retention and progression of women in science, which the organisation recognises * There are both personal and structural obstacles to women making the transition from PhD into a sustainable academic career in science, which require the active consideration of the organisation. This seminar is designed to provide an opportunity to explore these issues NOTE: Lynda will be basing here talk on some of the work she directed as chair of the "Women in Informatics Research and Education” working group. The purpose of the working group is to actively participate and promote actions that contribute to improve gender balance in Information and Communication Sciences and Technologies. The first concrete result of the working group's activities was the publication of the booklet "More Women in Informatics Research and Education" in 2013. The booklet is a compact source of clear and simple best practices to deans and heads of departments that aim to increase the participation of women as both students and employees in their institutions. Many tips included were also inspired by colleagues already in leading positions who have already implemented actions in their institutions to attract more women and ensure their continued participation in the organization at commensurate ratios with their male colleagues. The booklet is endorsed by the European Commission and features a foreword by Neelie Kroes, Vice-President of the European Commission, responsible for the Digital Agenda.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Following the success of Bay 9's Pecha Kucha, this week Bay 8 are providing the next instalment of the newly established tradition of Pecha Kucha. In 6m40s and 20 slides, each member of Bay 8 will introduce themselves, explaining their background and research interests, so you can put a name to the face, and chat after the event if you have common interests. These mini talks aim to support the collaborative nature of WAIS by introducing each member to the wider group. This week the bay members and Pecha Kuchas are: - The Public Health Analogy in Web Security (Huw) - Social Networking Features in Digital Behaviour Change Interventions (Roushdat) - Computers, Psychology and a lot of coffee (Anna) - Law, computer science and that annoying thing you have to say you’ve read before you can use a website (Emma)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Introduction: This seminar is on the topic of "GamerGate", an international movement, ostensibly about "ethics in video game journalism" but which has become inextricably linked with extreme forms of online misogyny, rape and death threats towards women in the industry. It is of relevance to all Web science researchers, because it raises many issues of free speech, online governance, trolling and (not least) the representation of women in the tech industry. Our guest speaker (Mark Bernstein) is known for his criticism of the movement, and his work was featured in an article in the Guardian last week. He is a longtime collaborator in the field of hypertext and online media research, who co-orgainsed our annual international Web Science conference two years ago. Based in Boston, US, he will be speaking to us via Skype on Wednesday morning, to give us some background on the Gamergate phenomenon and to explain the recent developments regarding Wikipedia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As our world becomes increasingly interconnected, diseases can spread at a faster and faster rate. Recent years have seen large-scale influenza, cholera and ebola outbreaks and failing to react in a timely manner to outbreaks leads to a larger spread and longer persistence of the outbreak. Furthermore, diseases like malaria, polio and dengue fever have been eliminated in some parts of the world but continue to put a substantial burden on countries in which these diseases are still endemic. To reduce the disease burden and eventually move towards countrywide elimination of diseases such as malaria, understanding human mobility is crucial for both planning interventions as well as estimation of the prevalence of the disease. In this talk, I will discuss how various data sources can be used to estimate human movements, population distributions and disease prevalence as well as the relevance of this information for intervention planning. Particularly anonymised mobile phone data has been shown to be a valuable source of information for countries with unreliable population density and migration data and I will present several studies where mobile phone data has been used to derive these measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This talk will present an overview of the ongoing ERCIM project SMARTDOCS (SeMAntically-cReaTed DOCuments) which aims at automatically generating webpages from RDF data. It will particularly focus on the current issues and the investigated solutions in the different modules of the project, which are related to document planning, natural language generation and multimedia perspectives. The second part of the talk will be dedicated to the KODA annotation system, which is a knowledge-base-agnostic annotator designed to provide the RDF annotations required in the document generation process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many of the most successful and important systems that impact our lives combine humans, data, and algorithms at Web Scale. These social machines are amalgamations of human and machine intelligence. This seminar will provide an update on SOCIAM, a five year EPSRC Programme Grant that seeks to gain a better understanding of social machines; how they are observed and constituted, how they can be designed and their fate determined. We will review how social machines can be of value to society, organisations and individuals. We will consider the challenges they present to our various disciplines.