49 results on '"Henderson, Tristan"'
Search Results
2. Proof of Steak
- Author
-
Crowcroft, Jon, Haddadi, Hamed, Gervais, Arthur, and Henderson, Tristan
- Subjects
Computer Science - Cryptography and Security - Abstract
We introduce Proof-of-Steak (PoS) as a fundamental net-zero block generation technique, often accompanied by Non-Frangipane Tokens. Genesis cut is gradually heated and minted (using the appropriate sauce), enabling the miners to redirect the extracted gold and the dissipated heat into the furnace, hence enabling the first fully-circular economy ever built using blockchain technology, utilising tamper-evident steak hach\'e. In this paper we present the basic ingredients for building Proof-of-Steak, assessing its global impact, and opportunities to save the world and beyond!, Comment: This is a silly article
- Published
- 2021
3. Data subject rights as a research methodology: A systematic literature review
- Author
-
Habu, Adamu Adamu and Henderson, Tristan
- Published
- 2023
- Full Text
- View/download PDF
4. The skills-maintenance, competence paradigm for the evolving role of a Paramedic
- Author
-
Henderson, Tristan
- Subjects
610.73 ,Paramedic ,Paramedicine ,Emergency Care ,Clinical Skills ,Skill-set ,Scope of Practice ,Confidence ,Competence ,Ambulance Service - Abstract
The UK paramedic profession has undergone significant development since professional regulation almost twenty years ago. Improvement planning within the NHS has also driven change. The result is a large and developing paramedic skill set. The skills performed and incidents attended by paramedics are highly variable in relation to the frequency with which they will be encountered as well as the procedural complexity. This consideration, in the context of the literature around clinical skills practice, competence, confidence and perception of performance invites inquiry in relation to competence of paramedics, as well as their ability to recognise practice issues. The aims of this study were to: (i) develop a map of incidents attended and skills commonly used in one UK ambulance service, (ii) assess the performance of clinicians across different types of skills and (iii) explore clinicians’ perceptions of their competence and confidence in relation to their objectively assessed performance. The study was carried out in two phases: Phase one was a retrospective review of clinical records (n=600), seeking to establish the frequency of incidents attended and skills practiced by UK paramedics and Phase two examined actual and perceived competence in clinical skills across a range of frequency and complexity, it also explored confidence (n= 69 paramedic participants). This was achieved through participation in a simulated clinical scenario and completion of a number of measures, participants also completed questionnaires in relation to the scenario and clinical skills.
- Published
- 2020
5. Automating dynamic consent decisions for the processing of social media data in health research
- Author
-
Norval, Chris and Henderson, Tristan
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Computers and Society ,Computer Science - Machine Learning ,Computer Science - Social and Information Networks - Abstract
Social media have become a rich source of data, particularly in health research. Yet, the use of such data raises significant ethical questions about the need for the informed consent of those being studied. Consent mechanisms, if even obtained, are typically broad and inflexible, or place a significant burden on the participant. Machine learning algorithms show much promise for facilitating a 'middle ground' approach: using trained models to predict and automate granular consent decisions. Such techniques, however, raise a myriad of follow-on ethical and technical considerations. In this paper, we present an exploratory user study (n = 67) in which we find that we can predict the appropriate flow of health-related social media data with reasonable accuracy, while minimising undesired data leaks. We then attempt to deconstruct the findings of this study, identifying and discussing a number of real-world implications if such a technique were put into practice.
- Published
- 2019
6. How prepared are newly qualified allied health professionals for practice in the UK? A systematic review
- Author
-
Brennan, Nicola, primary, Burns, Lorna, additional, Mattick, Karen, additional, Mitchell, Alexandra, additional, Henderson, Tristan, additional, Walker, Keith, additional, and Gale, Thomas, additional
- Published
- 2024
- Full Text
- View/download PDF
7. Beyond the EULA: Improving consent for data mining
- Author
-
Hutton, Luke and Henderson, Tristan
- Subjects
Computer Science - Computers and Society - Abstract
Companies and academic researchers may collect, process, and distribute large quantities of personal data without the explicit knowledge or consent of the individuals to whom the data pertains. Existing forms of consent often fail to be appropriately readable and ethical oversight of data mining may not be sufficient. This raises the question of whether existing consent instruments are sufficient, logistically feasible, or even necessary, for data mining. In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments used. Using three case studies, we use the new paradigm of human-data interaction to examine whether these existing approaches are appropriate. We then introduce an approach to consent that has been empirically demonstrated to improve on the state of the art and deliver meaningful consent. Finally, we propose some best practices for data collectors to ensure their data mining activities do not violate the expectations of the people to whom the data relate., Comment: preprint version; book chapter to appear in "Transparent Data Mining for Big and Small Data", Studies in Big Data Series, Springer
- Published
- 2017
8. Contextual Consent: Ethical Mining of Social Media for Health Research
- Author
-
Norval, Chris and Henderson, Tristan
- Subjects
Computer Science - Human-Computer Interaction ,Computer Science - Computers and Society ,Computer Science - Social and Information Networks - Abstract
Social media are a rich source of insight for data mining and user-centred research, but the question of consent arises when studying such data without the express knowledge of the creator. Case studies that mine social data from users of online services such as Facebook and Twitter are becoming increasingly common. This has led to calls for an open discussion into how researchers can best use these vast resources to make innovative findings while still respecting fundamental ethical principles. In this position paper we highlight some key considerations for this topic and argue that the conditions of informed consent are often not being met, and that using social media data that some deem free to access and analyse may result in undesirable consequences, particularly within the domain of health research and other sensitive topics. We posit that successful exploitation of online personal data, particularly for health and other sensitive research, requires new and usable methods of obtaining consent from the user.
- Published
- 2017
9. Human-Data Interaction: The Human Face of the Data-Driven Society
- Author
-
Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, and Crowcroft, Jon
- Subjects
Computer Science - Computers and Society ,Computer Science - Human-Computer Interaction ,Computer Science - Social and Information Networks - Abstract
The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data. We propose that the interactions between these agents warrants a new topic of study: Human-Data Interaction (HDI). In this paper we discuss how HDI sits at the intersection of various disciplines, including computer science, statistics, sociology, psychology and behavioural economics. We expose the challenges that HDI raises, organised into three core themes of legibility, agency and negotiability, and we present the HDI agenda to open up a dialogue amongst interested parties in the personal and big data ecosystems.
- Published
- 2014
10. Case Studies and Challenges in Reproducibility in the Computational Sciences
- Author
-
Arabas, Sylwester, Bareford, Michael R., de Silva, Lakshitha R., Gent, Ian P., Gorman, Benjamin M., Hajiarabderkani, Masih, Henderson, Tristan, Hutton, Luke, Konovalov, Alexander, Kotthoff, Lars, McCreesh, Ciaran, Nacenta, Miguel A., Paul, Ruma R., Petrie, Karen E. J., Razaq, Abdul, Reijsbergen, Daniël, and Takeda, Kenji
- Subjects
Computer Science - Computational Engineering, Finance, and Science ,Computer Science - Digital Libraries - Abstract
This paper investigates the reproducibility of computational science research and identifies key challenges facing the community today. It is the result of the First Summer School on Experimental Methodology in Computational Science Research (https://blogs.cs.st-andrews.ac.uk/emcsr2014/). First, we consider how to reproduce experiments that involve human subjects, and in particular how to deal with different ethics requirements at different institutions. Second, we look at whether parallel and distributed computational experiments are more or less reproducible than serial ones. Third, we consider reproducible computational experiments from fields outside computer science. Our final case study looks at whether reproducibility for one researcher is the same as for another, by having an author attempt to have others reproduce their own, reproducible, paper. This paper is open, executable and reproducible: the whole process of writing this paper is captured in the source control repository hosting both the source of the paper, supplementary codes and data; we are providing setup for several experiments on which we were working; finally, we try to describe what we have achieved during the week of the school in a way that others may reproduce (and hopefully improve) our experiments., Comment: This paper was written at the First Summer School on Experimental Methodology in Computational Science Research, St Andrews, August 4-8, 2014, http://blogs.cs.st-andrews.ac.uk/emcsr2014
- Published
- 2014
11. Planet-scale Human Mobility Measurement
- Author
-
Hui, Pan, Mortier, Richard, Henderson, Tristan, and Crowcroft, Jon
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Computers and Society ,Computer Science - General Literature - Abstract
Research into, and design and construction of mobile systems and algorithms requires access to large-scale mobility data. Unfortunately, the wireless and mobile research community lacks such data. For instance, the largest available human contact traces contain only 100 nodes with very sparse connectivity, limited by experimental logistics. In this paper we pose a challenge to the community: how can we collect mobility data from billions of human participants? We re-assert the importance of large-scale datasets in communication network design, and claim that this could impact fundamental studies in other academic disciplines. In effect, we argue that planet-scale mobility measurements can help to save the world. For example, through understanding large-scale human mobility, we can track and model and contain the spread of epidemics of various kinds., Comment: 6 pages, 2 figures
- Published
- 2009
12. The effects of relative delay in networked games
- Author
-
Henderson, Tristan Nicholas Hoang
- Subjects
794.8 - Abstract
Games are one of the most popular multiuser applications currently in use on the Internet. They have become so in spite of the lack of Quality of Service (QoS) guarantees offered by the current Internet, which are typically believed to be a requirement for delay-sensitive multimedia applications such as games. Understanding how networked games have become popular is therefore important for designing applications that can become successful with or without the presence of QoS guarantees. One reason for the popularity of games may be the interaction between players in a multiuser game. It is this interaction that compels users to play a networked game, since without other players there is little benefit to the networked component of the game. Players may be willing to tolerate lower QoS if they are able to enjoy a game with other users. This thesis examines users' preferences for one QoS parameter, delay, in networked First Person Shooter (FPS) games. We consider a player's absolute delay (the delay between a player and the game server), and their relative delay (the difference between a user's delay and that of the other players). We employ controlled and uncontrolled objective and subjective experiments: monitoring of publicly-available game servers, group experiments, a survey of game players, and controlling the delay to servers for the FPS game, Half-Life. We find that users are drawn to game servers where they can interact with a greater number of players. Delay has a greater effect on a player's decision to join a game than to leave, and a player's tolerance for delay increases with the time that they remain in the game. Although they believe relative delay to be important, in practice users are more concerned about absolute than relative delay, and can find it difficult to accurately distinguish their relative delay.
- Published
- 2003
13. Online learning as a commons : supporting students' data protection preferences through a collaborative digital environment
- Author
-
Wong, Janis, Racine, Lea, Henderson, Tristan, Ball, Kirstie, University of St Andrews. School of Management, University of St Andrews. Centre for Research into Equality, Diversity & Inclusion, and University of St Andrews. School of Computer Science
- Subjects
Data commons ,LB Theory and practice of education ,MCC ,ZA4050 ,ZA4050 Electronic information resources ,Online learning ,NCAD ,LB ,AC ,Commons ,Data protection ,Education - Abstract
The COVID-19 pandemic has accelerated the adoption of technology in education, where higher education institutions had to implement online teaching models overnight, without time for due consideration of appropriate data protection practices or impact assessments. The General Data Protection Regulation (GDPR) attempts to limit the negative effects caused by the digitisation of education such as lecture capture, tutorial recording, and education surveillance. The GDPR, however, may be insufficient in removing the power imbalance between students and their institutions, where students as data subjects have no choice but to accept their institutions’ terms or be locked out of academia. To increase protection of students’ autonomy, we propose an online learning data protection-focused data commons to support their agency with regards to protecting their personal data. We explain how a commons could apply to online learning, then develop and test an application to put the commons into practice. From our results, we find that although over 50% of students trust universities and staff with their online learning personal data, more transparency on institutional policies and data protection rights can support higher online learning participation rates, help mitigate potential data protection harms, and give students agency over their personal data beyond consent. We conclude that further research is required to move away from consent as the lawful basis for tutorial recordings, support inclusive online learning pedagogies, and balance the implementation of educational technologies with the need to deliver online learning to benefit students’ academic experience. Publisher PDF
- Published
- 2023
14. 'I Didn't Sign Up for This!': Informed Consent in Social Network Research
- Author
-
Hutton, Luke, Henderson, Tristan, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,H Social Sciences ,QA75 Electronic computers. Computer science ,~DC~ ,NDAS ,BDC ,R2C - Abstract
This work was funded by the Engineering and Physical Sciences Research Council (EPSRC) through a Doctoral Training Grant. The issue of whether, and how, to obtain informed consent for research studies that use social network data has recently come to the fore in some controversial cases. Determining how to acquire valid consent that meets the expectations of participants, while minimising the burden placed on them, remains an open problem. We apply Nissenbaum’s model of contextual integrity to the consent process, to study whether social norms of willingness to share social network data can be leveraged to avoid burdening participants with too many interventions, while still accurately capturing their own sharing intent. We find that for the 27.7% of our participants (N = 109) who conform to social norms, contextual integrity can be used to significantly reduce the time taken to capture their consent, while still maintaining accuracy. Our findings have implications for researchers conducting such studies who are looking to acquire informed consent without having to burden participants with many interactions. Publisher PDF
- Published
- 2021
15. Making Social Media Research Reproducible
- Author
-
Hutton, Luke, Henderson, Tristan, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science ,3rd-DAS - Abstract
The huge numbers of people using social media makes online socialnetworks an attractive source of data for researchers. But in order for the resultant huge numbers of research publications that involve social media to be credible and trusted, their methodologies,considerations of data handling and sensitivity, analysis, and so forth must be appropriately documented. We believe that one way to improve standards and practices in social media research is to encourage such research to be made reproducible, that is, to have sufficient documentation and sharing of research to allow others to either replicate or build on research results. Enabling this fundamental part of the scientific method will benefit the entire social media ecosystem, from the researchers who use data, to the people that benefit from the outcomes of research.
- Published
- 2021
16. Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks
- Author
-
Parris, Iain, Ben Abdesslem, Fehmi, and Henderson, Tristan
- Published
- 2014
- Full Text
- View/download PDF
17. Data protection for the common good: Developing a framework for a data protection-focused data commons
- Author
-
Wong, Janis, primary, Henderson, Tristan, additional, and Ball, Kirstie, additional
- Published
- 2022
- Full Text
- View/download PDF
18. Written evidence to the Joint Committee on Human Rights (together with ORG, Article 19, Index on Censorship 2020) - Digital Contact Tracing Apps (NHSX)
- Author
-
Chowdhury, Niaz, Coldicutt, Rachel, Corrigan, Ray, Crowcroft, Jon, Gervassis, Nicholas, Grossman, Wendy, Harkens, Adam, Henderson, Tristan, Hintz, Arne, Huppert, Julian, Karanasiou, Argyro, Korff, Douwe, Jackman, MIles, Map, Maureen, McEvedy, Victoria, McStay, Andrew, Phippen, Andy, Price, Blaine, Romero Moreno, Felippe, Rosner, Gilad, Ruiz, Javier, Callender Smith, Robin, Sommer, Peter, Tambini, Damian, and Veale, Michael
- Subjects
RA0421 ,KD ,K1 - Abstract
We welcome the JCHR aim of providing certainty and comprehensive protection for individuals’ rights, in light of the upcoming deployment of the NHSX Contact Tracing system. Clarifying the available safeguards would allow the public to better understand the functioning of the NHSX application, the consequences for their rights, and the remedies at their disposal. Further, as emergency situations may require rapid and bold responses, and protections of rights enshrined in law should be strengthened accordingly: in turn, public scrutiny and enforcement of rights would be enabled to keep pace with such rapid developments. Likewise, we reject Matt Hancock’s communication to the JCHR that a Bill is unnecessary as sufficient safeguards are present in Data Protection legislation and other general policy commitments; they are not. Data protection regulations leave a scope for differing protections and approaches, as they are not tailored to the situation at hand. On the other hand, public confidence would benefit greatly from a more specific approach which ensures particularly high protections.\ud Having said that, we are concerned about a number of issues raised in the current text of the draft Digital Contact Tracing (Data Protection) Bill. \ud We have divided those concerns into three groups:\ud Missed Opportunities: we believe the Bill overlooks certain risks, whose potential for undermining public trust is significantly high;\ud Overlaps and Coordination with the GDPR: we find that some provisions enshrined in this Bill are at risk of overlapping, conflicting or not properly coordinating with the current data protection regime;\ud Other Areas for Improvements: finally, we cover certain aspects of the Bill which could be improved upon, in order to better attain the purposes of this Bill.\ud Each of these groups entails a number of issues, each (i) introducing the clause or clauses being discussed, (ii) briefly analysing the issues being raised, and (iii) recommending suitable changes to the Bill. With this, we hope to contribute to ensuring that the Joint Committee on Human Rights Bill can really provide citizens with choice, control and confidence over the Government use of their personal data. Please note that these concerns and considerations are not exhaustive. We would thus welcome the opportunity to discuss these concerns with the JCHR with a view to furthering and enhancing their work on technological responses to COVID-19.
- Published
- 2020
19. Co-Creating Autonomy: Group Data Protection and Individual Self-determination within a Data Commons
- Author
-
Wong, Janis, primary and Henderson, Tristan, primary
- Published
- 2020
- Full Text
- View/download PDF
20. Poster: Enabling useful data sharing through format identification and text mining
- Author
-
Akestoridis, Dimitrios-Georgios, Henderson, Tristan, University of Edinburgh, EDINA, Digital Curation Centre, figshare, eprints, Jisc, Arkivum, and Aridhia
- Subjects
Data sharing ,text mining - Abstract
Poster presented at RepoFringe 2016 by Dimitrios-Georgios Akestoridis of the University of Ioannina and Tristan Henderson of the University of St Andrews.
- Published
- 2016
21. Modelling multicast pricing using networked games
- Author
-
Henderson, Tristan
- Subjects
GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,GeneralLiterature_MISCELLANEOUS ,ComputingMilieux_MISCELLANEOUS - Abstract
Poster presented at ACM SIGCOMM 2000, Stockholm, Sweden (http://conferences.sigcomm.org/sigcomm/2000/)
- Published
- 2016
- Full Text
- View/download PDF
22. CRAWDAD: A Wireless Network Data Archive for WiSec Researchers
- Author
-
Henderson, Tristan, Kotz, David, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,ComputingMilieux_MISCELLANEOUS - Abstract
We present the CRAWDAD wireless network data archive, the largest archive of its type. CRAWDAD hosts 115 wireless network datasets and tools, many of which are of use, and have been used, for wireless network research. CRAWDAD datasets should be of interest to the WiSec community, and similarly that the community might be interested in contributing data to the archive. Postprint
- Published
- 2016
- Full Text
- View/download PDF
23. Understanding ethical concerns in social media privacy studies
- Author
-
McNeilly, Sam, Hutton, Luke, Henderson, Tristan, and University of St Andrews. School of Computer Science
- Subjects
Social media ,QA75 ,Privacy ,Research ,QA75 Electronic computers. Computer science - Abstract
There are myriad ethical considerations with conducting social media studies, in particular those investigating privacy concerns in such sites. We are interested in understanding how to address these concerns, and in particular wish to discuss our empirical work at this workshop and how to progress further in this space. Postprint
- Published
- 2013
24. Context-based personalised settings for mobile location sharing
- Author
-
Abdesslem, Fehmi Ben, Henderson, Tristan, Brostoff, Sacha, Sasse, M. Angela, EPSRC, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science - Abstract
This work was supported by the Engineering and Physical Sciences Research Council [grant number EP/G002606/1]. Location-Based Services (LBSes) are increasing in popularity, but create many privacy concerns for users. LBSes usually rely on the same default privacy settings for all users. In this position paper, we claim that such settings are inappropriate for location sharing and that settings should instead rely on contextual information to recommend personalised privacy settings for users. We present results of an initial user study (n=80) to corroborate this position, and suggest avenues for further research. Postprint
- Published
- 2011
25. Understanding mobile social behaviour using smartphones
- Author
-
Abdesslem, Fehmi Ben, Henderson, Tristan Nicholas Hoang, EPSRC, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science - Abstract
This work is funded by the EPSRC/TSB Privacy Value Networks project (EP/G002606/1). Understanding the behaviour of users as they share information with mobile social applications is important for enhancing their experiences and improving the services provided. In this paper, we present an approach to studying users’ behaviour with the Experience Sampling Method, using a single mobile device to ask questions of users and simultaneously monitor their activities and contexts. While our approach presents benefits compared to traditional questionnaires, we also present the challenges faced, and the problems still to be explored. Postprint
- Published
- 2010
26. Mobile experience sampling: Reaching the parts of Facebook other methods cannot reach
- Author
-
Abdesslem, Fehmi Ben, Parris, Iain, Henderson, Tristan Nicholas Hoang, EPSRC, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science - Abstract
Paper presented at the Privacy and Usability Methods Pow-wow (PUMP) workshop, in conjunction with the 24th BCS International Conference on Human-Computer Interaction. This work is funded by the EPSRC/TSB Privacy Value Networks project (EP/G002606/1). Location-aware Social Network Sites (SNS) are now widely used by mobile phone users, enabling users to share their location in real time to their social network. Such location-sharing may introduce privacy concerns depending on the user, the location being shared, and the people to whom they are shared. The study of such privacy concerns is difficult, as a user filling out a questionnaire may forget the exact reasons for sharing. We have explored the Experience Sampling Method (ESM) for in situ capture of users’ experiences. This paper describes our mobile phone ESM testbed and presents preliminary results obtained from a 2-week experiment with 40 students sharing their location in real time on Facebook, a popular SNS. Preprint Non
- Published
- 2010
27. Facebook or Fakebook? The effect of simulation on location privacy user studies
- Author
-
Parris, Iain, Abdesslem, Fehmi Ben, Henderson, Tristan Nicholas Hoang, EPSRC, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science - Abstract
Paper presented at the Privacy and Usability Methods Pow-wow (PUMP) workshop, in conjunction with the 24th BCS International Conference on Human-Computer Interaction. This work is supported by the EPSRC Privacy Value Networks project, EP/G002606/1. Postprint
- Published
- 2010
28. Social delay-tolerant network routing
- Author
-
Bigwood, Gregory John, Henderson, Tristan Nicholas Hoang, Bhatti, Saleem Noel, EPSRC, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science - Abstract
Paper presented at the 2nd ICC Winter Workshop on Complexity in Social Systems Routing in mobile delay-tolerant networks faces new challenges such as mobility and the dynamic nature of the network. Social network information may be useful for routing since mobile nodes in the same social network may be encountered more often and thus be more successful at message-passing. Collecting this social network information, however, can be challenging. We compare a social network traced from user encounters with a user-declared social network, and show some of the differences between these two networks. Postprint Non
- Published
- 2009
29. PFClust: an optimised implementation of a parameter-free clustering algorithm
- Author
-
Musayeva, Khadija, primary, Henderson, Tristan, additional, Mitchell, John BO, additional, and Mavridis, Lazaros, additional
- Published
- 2014
- Full Text
- View/download PDF
30. Editorial
- Author
-
Vasalou, Asimina, primary, Henderson, Tristan, additional, and Joinson, Adam, additional
- Published
- 2013
- Full Text
- View/download PDF
31. Targeted Advertising on the Handset: Privacy and Security Challenges
- Author
-
Haddadi, Hamed, Hui, Pan, Henderson, Tristan, Brown, Ian, Haddadi, Hamed, Hui, Pan, Henderson, Tristan, and Brown, Ian
- Published
- 2011
32. Planet-scale Human Mobility Measurement
- Author
-
Hui, Pan, Mortier, Richard, Piorkowski, Michal, Henderson, Tristan, Crowcroft, Jon, Hui, Pan, Mortier, Richard, Piorkowski, Michal, Henderson, Tristan, and Crowcroft, Jon
- Abstract
Research into, and design and construction of mobile systems and algorithms requires access to large-scale mobility data. Unfortunately, the research community lacks such data. For instance, the largest available human contact traces contain only 100 nodes with very sparse connectivity, limited by experimental logistics. In this paper we pose a challenge to the community: how can we collect mobility data from billions of human participants? We re-assert the importance of large-scale datasets in communication network design, and claim that this could impact fundamental studies in other academic disciplines. In effect, we argue that planet-scale mobility measurements can help to save the world. For example, through understanding large-scale human mobility, we can track and model and contain the spread of epidemics of various kinds. © 2010 ACM.
- Published
- 2010
33. Promoting Tolerance for Delay Tolerant Network Research
- Author
-
Crowcroft, Jon, Yoneki, Eiko, Hui, Pan, Henderson, Tristan, Crowcroft, Jon, Yoneki, Eiko, Hui, Pan, and Henderson, Tristan
- Abstract
So what is all this DTN research about anyway? Sceptics ask: "Why are there no DTN applications?", or "Why is DTN performance so miserable?" This article attempts to address some of these complaints. We present suggestions of expectations for applications, and metrics for performance, which suggest a more tolerant view of research in the area.
- Published
- 2008
34. A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux
- Author
-
Bateman, Martin, Bhatti, Saleem, Bigwood, Greg, Rehunathan, Devan, Allison, Colin, Henderson, Tristan, Miras, Dimitrios, Bateman, Martin, Bhatti, Saleem, Bigwood, Greg, Rehunathan, Devan, Allison, Colin, Henderson, Tristan, and Miras, Dimitrios
- Abstract
There is a growing interest in the use of variants of the Transmission Control Protocol (TCP) in high-speed networks. ns-2 has implementations of many of these high-speed TCP variants, as does Linux. ns-2, through an extension, permits the incorporation of Linux TCP code within ns-2 simulations. As these TCP variants become more widely used, users are concerned about how these different variants of TCP might interact in a real network environment — how fair are these protocol variants to each other (in their use of the available capacity) when sharing the same network. Typically, the answer to this question might be sought through simulation and/or by use of an experimental testbed. So, we compare with TCP NewReno the fairness of the congestion control algorithms for 5 high-speed TCP variants — BIC, Cubic, Scalable, High-Speed and Hamilton — on both ns-2 and on an experimental testbed running Linux. In both cases, we use the same TCP code from Linux. We observe some differences between the behaviour of these TCP variants when comparing the testbed results to the results from ns-2, but also note that there is generally good agreement.
- Published
- 2008
35. Enabling useful data sharing through format identification and text mining
- Author
-
Dimitrios-Georgios Akestoridis and Henderson, Tristan
- Abstract
Poster presented at the Edinburgh Repository Fringe 2016 (http://rfringe16.blogs.edina.ac.uk/)
36. Recommending Location Privacy Preferences in Ubiquitous Computing
- Author
-
Yuchen Zhao, Ye, Juan, Henderson, Tristan, and University of St Andrews. School of Computer Science
- Subjects
QA75 ,QA75 Electronic computers. Computer science ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,ComputingMilieux_MISCELLANEOUS - Abstract
Location-Based Services have become increasingly popular due to the prevalence of smart devices. The protection of users’ location privacy in such systems is a vital issue. Conventional privacy protection methods such as manually predefining privacy rules or asking users to make decisions every time they enter a new location may not be usable, and so researchers have explored the use of machine learning to predict preferences. Model-based machine learning classifiers which are used for prediction may be too computationally complex to be used in real-world applications. We propose a location-privacy recommender that can provide users with recommendations of appropriate location privacy settings through user-user collaborative filtering. We test our scheme on real world dataset and the experiment results show that the performance of our scheme is close to the best performance of model-based classifiers and it outperforms model-based classifiers when there are no sufficient training data. Postprint
37. Human-data interaction
- Author
-
Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, Crabtree, Andy, Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, and Crabtree, Andy
- Abstract
We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets) and background (e.g., road tra c management, financial systems) technologies. This has permitted, and continues to permit, new gloss on existing interactions (e.g., online banking) as well as distinctively new interactions (e.g., massively scalable distributed real-time mobile gaming). An e ect of this increasing pervasiveness of networked computation in our environments and our lives is that data are also now ubiquitous: in many places, much of society is rapidly becoming “data driven”.
38. Beyond the EULA: Improving consent for data mining
- Author
-
Cerquitelli, Tania, Quercia, Daniele, Pasquale, Frank, Hutton, Luke, Henderson, Tristan, Cerquitelli, Tania, Quercia, Daniele, Pasquale, Frank, Hutton, Luke, and Henderson, Tristan
- Abstract
Companies and academic researchers may collect, process, and distribute large quantities of personal data without the explicit knowledge or consent of the individuals to whom the data pertains. Existing forms of consent often fail to be appropriately readable and ethical oversight of data mining may not be sufficient. This raises the question of whether existing consent instruments are sufficient, logistically feasible, or even necessary, for data mining. In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments used. Using three case studies, we use the new paradigm of human-data interaction to examine whether these existing approaches are appropriate. We then introduce an approach to consent that has been empirically demonstrated to improve on the state of the art and deliver meaningful consent. Finally, we propose some best practices for data collectors to ensure their data mining activities do not violate the expectations of the people to whom the data relate.
39. Beyond the EULA: Improving consent for data mining
- Author
-
Cerquitelli, Tania, Quercia, Daniele, Pasquale, Frank, Hutton, Luke, Henderson, Tristan, Cerquitelli, Tania, Quercia, Daniele, Pasquale, Frank, Hutton, Luke, and Henderson, Tristan
- Abstract
Companies and academic researchers may collect, process, and distribute large quantities of personal data without the explicit knowledge or consent of the individuals to whom the data pertains. Existing forms of consent often fail to be appropriately readable and ethical oversight of data mining may not be sufficient. This raises the question of whether existing consent instruments are sufficient, logistically feasible, or even necessary, for data mining. In this chapter, we review the data collection and mining landscape, including commercial and academic activities, and the relevant data protection concerns, to determine the types of consent instruments used. Using three case studies, we use the new paradigm of human-data interaction to examine whether these existing approaches are appropriate. We then introduce an approach to consent that has been empirically demonstrated to improve on the state of the art and deliver meaningful consent. Finally, we propose some best practices for data collectors to ensure their data mining activities do not violate the expectations of the people to whom the data relate.
40. Human-data interaction
- Author
-
Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, Crabtree, Andy, Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, and Crabtree, Andy
- Abstract
We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets) and background (e.g., road tra c management, financial systems) technologies. This has permitted, and continues to permit, new gloss on existing interactions (e.g., online banking) as well as distinctively new interactions (e.g., massively scalable distributed real-time mobile gaming). An e ect of this increasing pervasiveness of networked computation in our environments and our lives is that data are also now ubiquitous: in many places, much of society is rapidly becoming “data driven”.
41. Human-data interaction
- Author
-
Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, Crabtree, Andy, Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, and Crabtree, Andy
- Abstract
We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets) and background (e.g., road tra c management, financial systems) technologies. This has permitted, and continues to permit, new gloss on existing interactions (e.g., online banking) as well as distinctively new interactions (e.g., massively scalable distributed real-time mobile gaming). An e ect of this increasing pervasiveness of networked computation in our environments and our lives is that data are also now ubiquitous: in many places, much of society is rapidly becoming “data driven”.
42. Human-data interaction
- Author
-
Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, Crabtree, Andy, Mortier, Richard, Haddadi, Hamed, Henderson, Tristan, McAuley, Derek, Crowcroft, Jon, and Crabtree, Andy
- Abstract
We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets) and background (e.g., road tra c management, financial systems) technologies. This has permitted, and continues to permit, new gloss on existing interactions (e.g., online banking) as well as distinctively new interactions (e.g., massively scalable distributed real-time mobile gaming). An e ect of this increasing pervasiveness of networked computation in our environments and our lives is that data are also now ubiquitous: in many places, much of society is rapidly becoming “data driven”.
43. Co-creating data protection solutions through a commons
- Author
-
Wong, Janis, Henderson, Tristan, and Ball, Kirstie
- Subjects
Data protection ,Commons ,Data governance ,Data protection rights ,Privacy ,Co-creation ,Data stewardship ,Online learning ,Data ,Data commons - Abstract
In our data-driven society, personal data affecting individuals as data subjects is increasingly being collected and processed by sizeable, international companies. While data protection laws and privacy technologies attempt to limit the impact of data breaches and privacy scandals, they rely on individuals having a detailed understanding of the available recourse, resulting in the responsibilisation of data protection. Existing data stewardship frameworks incorporate data protection considerations and employ data-protection-by-design principles but may not include data subjects in the process itself, relying on supplementary legal doctrines to strengthen data protection enforcement. Current data protection solutions also lack support for protecting individual autonomy over personal data through co-creation and participation, particularly where there is socio-technical and communal value to collaborative data from which data subjects may not currently benefit. These challenges motivate the application of a theoretical and practical framework that can encourage co-creation of data protection solutions, increase awareness of different stakeholder interests, and rebalance power between data subjects and data controllers. In this thesis, we propose adapting the commons framework to create a data protection-focused data commons. We conduct interviews with commons experts to identify the institutional barriers to creating a commons and challenges of incorporating data protection principles into a commons. We propose requirements for establishing a data protection-focused data commons by applying our interview findings and data protection principles. We then deploy the data protection-focused data commons using an online learning use case. We conduct a study to explore the usefulness of the commons for supporting students' agency and co-creating data protection solutions in response to tutorial recordings, their consent preferences, and attitudes towards privacy and online learning. We find that a data protection-focused data commons as a socio-technical framework can support the collaboration and co-creation of data protection solutions for the benefit of data subjects.
- Published
- 2022
- Full Text
- View/download PDF
44. Mobility multihoming duality for the Internet Protocol
- Author
-
Yanagida, Ryo, Bhatti, Saleem Noel, and Henderson, Tristan
- Subjects
Computer networking ,Mobility ,Multihoming ,IPv6 ,Linux kernel ,Mobility-multihoming duality ,Internet ,Internet Protocol ,Real-time video ,ILNP ,Identifier-Locator Network Protocol ,Identifier-Locator split architecture ,Multipath ,Linux - Abstract
In the current Internet, mobile devices with multiple connectivity are becoming increasingly common; however, the Internet protocol itself has not evolved accordingly. Instead, add-on mechanisms have emerged, but they do not integrate well. Currently, the user suffers from disruption to communication on the end-host as the physical network connectivity changes. This is because the IP address changes when the point of attachment changes, breaking the transport layer end-to-end state. Furthermore, while a device can be connected to multiple networks simultaneously, the use of IP addresses prevents end-hosts from leveraging multiple network interfaces - a feature known as host multihoming, which can potentially improve the throughput or reliability. While solutions exist separately for mobility and multihoming, it is not possible to use them as a duality solution for the end-host. This work extended ILNPv6, an engineering solution of Identifier-Locator Network Protocol (ILNP) implemented as a superset of IPv6 on the Linux kernel. The existing implementation was extended to enable mobility and multihoming duality. First, the mobility implementation was enhanced to support continuous mobility; a comparative analysis against Mobile IPv6 (MIPv6) showed superior performance during a series of handoffs. Second, multihoming was implemented and integrated with mobility; the evaluation with a flexible multi-connectivity scenario with load-balancing showed negligible loss and consistent throughput. Finally, the impact of the combined mobility-multihoming mechanism was evaluated with a real-time video streaming application showing continuous uninterrupted real-time video playback up to 2160p (4K ultra high definition). Overall, this work has demonstrated that mobility-multihoming duality is possible for end-hosts over IPv6 for existing applications without changing the network infrastructure.
- Published
- 2022
- Full Text
- View/download PDF
45. Recommending privacy preferences in location-sharing services
- Author
-
Zhao, Yuchen, Henderson, Tristan, and Ye, Juan
- Subjects
621.382 ,Location-based services ,LBS ,Location-sharing services ,LSS ,Recommender systems ,User studies ,Privacy preferences ,User acceptance ,Opportunistic networks ,Security ,Shilling attack ,Reputation systems ,TK5105.65Z5 - Abstract
Location-sharing services have become increasingly popular with the proliferation of smartphones and online social networks. People share their locations with each other to record their daily lives or satisfy their social needs. At the same time, inappropriate disclosure of location information poses threats to people's privacy. One of the reasons why people fail to protect their location privacy is the difficulty of using the current mechanisms to manually configure location-privacy settings. Since people's location-privacy preferences are context-aware, manual configuration is cumbersome. People's incapability and unwillingness to do so lead to unexpected location disclosures that violate their location privacy. In this thesis, we investigate the feasibility of using recommender systems to help people protect their location privacy. We examine the performance of location-privacy recommender systems and compare it with the state-of-the-art. We also conduct online user studies to understand people's acceptance of such recommender systems and their concerns. We revise our design of the systems according to the results of the user studies. We find that user-based collaborative filtering can accurately recommend location-privacy preferences and outperform the state-of-the-art when training data are insufficient. From users' perspective, their acceptance of location-privacy recommender systems is affected by the openness and the context of recommendations and their privacy concerns about the systems. It is feasible to use data obfuscation or decentralisation to alleviate people's concerns and meanwhile keep the systems robust against malicious data attacks.
- Published
- 2017
46. Applying contextual integrity to the study of social network sites
- Author
-
Hutton, Luke and Henderson, Tristan
- Subjects
302.30285 ,Social network sites ,Reproducibility ,Privacy ,Ethics ,Facebook ,Social media ,Contextual integrity ,HM742.H8 ,Online social networks--Research ,Privacy ,Online social networks--Research--Moral and ethical aspects ,Software architecture - Abstract
Social network sites (SNSs) have become very popular, with more than 1.39 billion people using Facebook alone. The ability to share large amounts of personal information with these services, such as location traces, photos, and messages, has raised a number of privacy concerns. The popularity of these services has enabled new research directions, allowing researchers to collect large amounts of data from SNSs to gain insight into how people share information, and to identify and resolve issues with such services. There are challenges to conducting such research responsibly, ensuring studies are ethical and protect the privacy of participants, while ensuring research outputs are sustainable and can be reproduced in the future. These challenges motivate the application of a theoretical framework that can be used to understand, identify, and mitigate the privacy impacts of emerging SNSs, and the conduct of ethical SNS studies. In this thesis, we apply Nissenbaum's model of contextual integrity to the study of SNSs. We develop an architecture for conducting privacy-preserving and reproducible SNS studies that upholds the contextual integrity of participants. We apply the architecture to the study of informed consent to show that contextual integrity can be leveraged to improve the acquisition of consent in such studies. We then use contextual integrity to diagnose potential privacy violations in an emerging form of SNS.
- Published
- 2015
47. Practical privacy and security for opportunistic networks
- Author
-
Parris, Iain and Henderson, Tristan
- Subjects
005.8 ,Opportunistic networks ,Privacy ,Security ,Social networks ,TK5105.77P2 ,Ad hoc networks (Computer networks)--Security measures ,Online social networks - Abstract
When in physical proximity, data can be directly exchanged between the mobile devices people carry - for example over Bluetooth. If people cooperate to store, carry and forward messages on one another's behalf, then an opportunistic network may be formed, independent of any fixed infrastructure. To enable performant routing within opportunistic networks, use of social network information has been proposed for social network routing protocols. But the decentralised and cooperative nature of the networks can however expose users of such protocols to privacy and security threats, which may in turn discourage participation in the network. In this thesis, we examine how to mitigate privacy and security threats in opportunistic networks while maintaining network performance. We first demonstrate that privacy-aware routing protocols are required in order to maintain network performance while respecting users' privacy preferences. We then demonstrate novel social network routing protocols that mitigate specific threats to privacy and security while maintaining network performance.
- Published
- 2014
48. Using self-reported social networks to improve opportunistic networking
- Author
-
Bigwood, Greg and Henderson, Tristan
- Subjects
004.6 - Abstract
Opportunistic networks provide an ad hoc communication medium without the need for an infrastructure network, by leveraging human encounters and mobile devices. Routing protocols in opportunistic networks frequently rely upon encounter histories to build up meaningful data to use for informed routing decisions. This thesis shows that it is possible to use pre-existing social-network information to improve existing opportunistic routing protocols, and that these self-reported social networks have a particular benefit when used to bootstrap an opportunistic routing protocol. Frequently, opportunistic routing protocols require users to relay messages on behalf of one another: an act that incurs a cost to the relaying node. Nodes may wish to avoid this forwarding cost by not relaying messages. Opportunistic networks need to incentivise participation and discourage the selfish behaviour. This thesis further presents an incentive mechanism that uses self-reported social networks to construct and maintain reputation and trust relationships between participants, and demonstrates its superior performance over existing incentive mechanisms.
- Published
- 2012
49. Enabling network mobility support
- Author
-
Rehunathan, Devan and Henderson, Tristan
- Subjects
621.384 - Abstract
As computing devices become increasingly portable, it is becoming necessary to support Mobility as a core network functionality. The availability of devices such as smartphones, tablets, laptops as well as wireless network infrastructure is opening up the possibility of using Network Mobility to cater for multiple mobile nodes simultaneously. Network mobility may be useful in a number of mobile scenarios, where a large number of mobile nodes are moving in unison. A number of operational benefits stand to be gained by aggregating these nodes into a single mobile unit. Unfortunately, the current state for network mobility support, especially in terms of network layer protocols, is limited. This is in part due to the inherent complexity of mobile network scenarios, the high cost of testing mobile network protocols in operational environments and the difficulties in implementing such protocols. This thesis looks at how network mobility support may be better enabled by making experimentation with mobile networks more accessible. It shows this by first showing how analytical approaches can be useful in mobile network applications, as they abstract away from experimental details and allow for more straight forward protocol comparisons. It then goes on to look at the tools available to study mobile network protocols, where it introduces and extends an existing tool that uses virtual machines to allow for the study of mobile network protocols. Finally, it demonstrates a practical method in which mobile network support may be easily enabled in a practical setting.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.