This is my presentation at the conference "General Online Research" (March 5, 2013, in Mannheim). Please note: I had to leave out very important issues (such as obtaining consent and publication of data) due to time constraints. You will find some information on that in the "Appendix", i.e. the last four slides :)
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Nele Heise
Keynote talk at the Workshop "Research Ethics for Data and Digital Methods", hosted on November 29, 2016 by the Institute for Cultural Inquiry (ICON) at the University of Utrecht and Data School Utrecht
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Nele Heise
Keynote talk at the Workshop "Research Ethics for Data and Digital Methods", hosted on November 29, 2016 by the Institute for Cultural Inquiry (ICON) at the University of Utrecht and Data School Utrecht
Personal online reputation: the development of an approach to investigate how...Frances Ryan
Paper presented at International Data and Information Conference, 13 January 2016
Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments
By Frances VC Ryan, Peter Cruickshank, Hazel Hall, and Alistair Lawson (Edinburgh Napier University)
Assessing the available and accessible evidence: How personal reputations are...Frances Ryan
Slides for the conference paper 'Assessing the available and accessible evidence: How personal reputations are determined and managed online' presented at Information: interactions and impact 2015, Aberdeen, 23-26 June 2015.Abstract available at http://www.iidi.napier.ac.uk/c/publications/publicationid/13382473
Beyond Open Access: Open Science and Research IntegrityHeidi Laine
Presentation given at the 2015 Academic Mindtrek Conference at the workshop "Beyond Open Access: The changing culture of producing and disseminating scientific knowledge". Workshop was organised by the Open Knowledge Foundation Finland Open Science Working Group.
Slides from a presentation of research in progress to the Social Informatics cluster meeting, 13 June 2014. The presentation outlines the approaches used in identifying and analysing the key patterns of participation and structures of the Twitter discussion events. The descriptive statistical approaches suggested by Bruns (2014) are used to analyse the Twitter events and to discuss the limits of such analysis with reference to recent debates on the nature and status of ‘data’ in digital research (boyd and Crawford 2012; Baym 2013). The extent to which this kind of analysis can reveal the power and participation strategies of Twitter users in these events was also discussed.
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxadampcarr67227
http://ojni.org/issues?p=1708 August 13, 2012
The Ethics of Internet Research
By
Susan G. Williams MSN, RN
CITATION
Williams, S. G. (June 2012). The Ethics of Internet Research. Online Journal of Nursing Informatics (OJNI), 16
(2), Available at http://ojni.org/issues/?p=1708
Abstract
Research conducted on the internet is a cost effective form of recruitment, data
collection, and analysis. Researchers can access individuals worldwide for studies
in remote areas where there is a lack of or inability to conduct research. With this
opportunity come ethical concerns such as determining a safe environment to take
a survey, research in a virtual environment, data security, confidentiality, and
performing secondary analysis on archived support group information.
Researchers should be aware of laws regarding minors and respect the core
ethical principles of beneficence, respect for persons and justice. Institutional
Review Boards at institutions conducting this type of research need specific
guidelines for researchers to follow in order to maintain the integrity of research. It
is important for future nurse researchers to incorporate new therapeutic models
and specific steps to protect the public when participating in internet research.
Ke y Words: internet, research, ethics, data collection
Introduction
The Internet or World Wide Web is changing the way people function on a daily basis. As of September 2010,
76% of Americans had either a laptop or desktop computer (Pew Internet American Life Project, 2010). Smith
(2011) identifies that 35% of Americans own a smart phone in a study conducted by the Pew Internet American
Life Project. Similarly, Kim (2011) states that “by the end of 2014, one in every three Americans, or 90 million
users is expected to have a tablet” (p.1). This capability to communicate with others online has opened many
opportunities for a researcher to recruit study participants and to collect data (Longo, 2010). An example of this
technology is tracking the progress of clients with chronic illnesses or following clients involved in longitudinal
research studies (MobileActive.org, 2012). As this type of “web-based” research grows, researchers will face
ethical concerns that are different from traditional research ethical issues (Denissen, Neumann & Van Zalk,
2010). The purpose of this article is to discuss the topic of internet research and the ethical issues that emerge
because of this process. The review of literature will present different views of this area of research and specific
ethical concerns. The article will include strategies to address these ethical issues and the status and future
directions of internet research.
Literature Review
A search on CINAHL was performed using the search terms internet, research, and ethics. The search was
limited to the last 6 years and yielded 75 articles. Both full text and peer-reviewed studies with references were
included. The author selected ten articles that.
Personal online reputation: the development of an approach to investigate how...Frances Ryan
Paper presented at International Data and Information Conference, 13 January 2016
Personal online reputation: the development of an approach to investigate how personal reputation is evaluated and managed in online environments
By Frances VC Ryan, Peter Cruickshank, Hazel Hall, and Alistair Lawson (Edinburgh Napier University)
Assessing the available and accessible evidence: How personal reputations are...Frances Ryan
Slides for the conference paper 'Assessing the available and accessible evidence: How personal reputations are determined and managed online' presented at Information: interactions and impact 2015, Aberdeen, 23-26 June 2015.Abstract available at http://www.iidi.napier.ac.uk/c/publications/publicationid/13382473
Beyond Open Access: Open Science and Research IntegrityHeidi Laine
Presentation given at the 2015 Academic Mindtrek Conference at the workshop "Beyond Open Access: The changing culture of producing and disseminating scientific knowledge". Workshop was organised by the Open Knowledge Foundation Finland Open Science Working Group.
Slides from a presentation of research in progress to the Social Informatics cluster meeting, 13 June 2014. The presentation outlines the approaches used in identifying and analysing the key patterns of participation and structures of the Twitter discussion events. The descriptive statistical approaches suggested by Bruns (2014) are used to analyse the Twitter events and to discuss the limits of such analysis with reference to recent debates on the nature and status of ‘data’ in digital research (boyd and Crawford 2012; Baym 2013). The extent to which this kind of analysis can reveal the power and participation strategies of Twitter users in these events was also discussed.
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxadampcarr67227
http://ojni.org/issues?p=1708 August 13, 2012
The Ethics of Internet Research
By
Susan G. Williams MSN, RN
CITATION
Williams, S. G. (June 2012). The Ethics of Internet Research. Online Journal of Nursing Informatics (OJNI), 16
(2), Available at http://ojni.org/issues/?p=1708
Abstract
Research conducted on the internet is a cost effective form of recruitment, data
collection, and analysis. Researchers can access individuals worldwide for studies
in remote areas where there is a lack of or inability to conduct research. With this
opportunity come ethical concerns such as determining a safe environment to take
a survey, research in a virtual environment, data security, confidentiality, and
performing secondary analysis on archived support group information.
Researchers should be aware of laws regarding minors and respect the core
ethical principles of beneficence, respect for persons and justice. Institutional
Review Boards at institutions conducting this type of research need specific
guidelines for researchers to follow in order to maintain the integrity of research. It
is important for future nurse researchers to incorporate new therapeutic models
and specific steps to protect the public when participating in internet research.
Ke y Words: internet, research, ethics, data collection
Introduction
The Internet or World Wide Web is changing the way people function on a daily basis. As of September 2010,
76% of Americans had either a laptop or desktop computer (Pew Internet American Life Project, 2010). Smith
(2011) identifies that 35% of Americans own a smart phone in a study conducted by the Pew Internet American
Life Project. Similarly, Kim (2011) states that “by the end of 2014, one in every three Americans, or 90 million
users is expected to have a tablet” (p.1). This capability to communicate with others online has opened many
opportunities for a researcher to recruit study participants and to collect data (Longo, 2010). An example of this
technology is tracking the progress of clients with chronic illnesses or following clients involved in longitudinal
research studies (MobileActive.org, 2012). As this type of “web-based” research grows, researchers will face
ethical concerns that are different from traditional research ethical issues (Denissen, Neumann & Van Zalk,
2010). The purpose of this article is to discuss the topic of internet research and the ethical issues that emerge
because of this process. The review of literature will present different views of this area of research and specific
ethical concerns. The article will include strategies to address these ethical issues and the status and future
directions of internet research.
Literature Review
A search on CINAHL was performed using the search terms internet, research, and ethics. The search was
limited to the last 6 years and yielded 75 articles. Both full text and peer-reviewed studies with references were
included. The author selected ten articles that.
Ethics, Openness and the Future of LearningRobert Farrow
What difference does openness make to ethics' This session will examine this question both from the perspective of research into OER and the use of open resources in teaching and learning. An outline of the nature and importance of ethics will be provided before the basic principles of research ethics are outlined through an examination of the guidance provided by National Institutes of Health (2014) and BERA (2014). The importance and foundation of institutional approval for OER research activities is reiterated with a focus on underlying principles that can also be applied openly.
I argue that with a shift to informal (or extra-institutional) learning there is a risk that we lose some clarity over the nature and extent of our moral obligations when working outside institutional frameworks – what Weller (2013) has termed "guerilla" research activity. Innovations of this kind could be free of licensing permissions; they could be funded by kickstarter or public-private enterprise; or they could reflect individuals working as data journalists. But we might also speak of "guerilla" education for innovations taking place on the fringes of institutional activity – from using social media to going full-blown "edupunk" (Groom, 2008). These innovations which employ variants of opennesss can also bring out morally complex situations.
I show how the principles underlying traditional research ethics can be applied openly while noting that, whether working within or outside institutions, there is almost no existing guidance that explains the ethical implications of working openly. Similar issues are raised with MOOC, which operate outside institutions but while drawing on institutional reputations and values. With this in mind I sketch out scenarios we are likely to encounter in the future of education:
- Issues around privacy, security and big data
- Intellectual property conflicts
- Ensuring fair treatment of class students and equivalent online students
- Meeting obligations to content creators
- The ethical status of MOOCs and their obligations to their students
- Moral dimensions of open licenses
- The ethics of learning analytics and the data it produces
I argue that, while models for ethical analysis have been proposed (e.g. Farrow, 2011) more attention should be paid to the ethics of being open. I conclude with an examination of the idea that we have a moral obligation to be open, contrasting prudential and ethical approaches to open education. At the heart of the OER movement, I argue, is a strong moral impulse that should be recognized and celebrated rather than considered the preserve of the ideologue: openness is not reducible to lowering the marginal cost of educational resources. Openness is a diverse spectrum and to leverage its true potential we need to reflect deeply on how technology has the power to challenge the normative assumptions we make about education.
What difference does openness make to ethics? This session will examine this question both from the perspective of research into OER and the use of open resources in teaching and learning. An outline of the nature and importance of ethics will be provided before the basic principles of research ethics are outlined through an examination of the guidance provided by National Institutes of Health (2014) and BERA (2014). The importance and foundation of institutional approval for OER research activities is reiterated with a focus on underlying principles that can also be applied openly.
I argue that with a shift to informal (or extra-institutional) learning there is a risk that we lose some clarity over the nature and extent of our moral obligations when working outside institutional frameworks – what Weller (2013) has termed "guerilla" research activity. Innovations of this kind could be free of licensing permissions; they could be funded by kickstarter or public-private enterprise; or they could reflect individuals working as data journalists. But we might also speak of "guerilla" education for innovations taking place on the fringes of institutional activity – from using social media to going full-blown "edupunk" (Groom, 2008). These innovations which employ variants of opennesss can also bring out morally complex situations.
I show how the principles underlying traditional research ethics can be applied openly while noting that, whether working within or outside institutions, there is almost no existing guidance that explains the ethical implications of working openly. Similar issues are raised with MOOC, which operate outside institutions but while drawing on institutional reputations and values. With this in mind I sketch out scenarios we are likely to encounter in the future of education:
- Issues around privacy, security and big data
- Intellectual property conflicts
- Ensuring fair treatment of class students and equivalent online students
- Meeting obligations to content creators
- The ethical status of MOOCs and their obligations to their students
- Moral dimensions of open licenses
- The ethics of learning analytics and the data it produces
I argue that, while models for ethical analysis have been proposed (e.g. Farrow, 2011) more attention should be paid to the ethics of being open. I conclude with an examination of the idea that we have a moral obligation to be open, contrasting prudential and ethical approaches to open education. At the heart of the OER movement, I argue, is a strong moral impulse that should be recognized and celebrated rather than considered the preserve of the ideologue: openness is not reducible to lowering the marginal cost of educational resources. Openness is a diverse spectrum and to leverage its true potential we need to reflect deeply on how technology has the power to challenge the normative assumptions we make about education.
KEYSTONE HPSR Initiative // Module 9: Ethnography // Slideshow 4: Ethnographic approach: Rigour & Ethics
This is the fourth slideshow of Module 9: Ethnography, of the KEYSTONE Teaching and Learning Resources for Health Policy and Systems Research
To access video sessions and slides for all modules copy and past the following link in your browser:
http://bit.ly/25vVVp1
Module 9: Ethnography
The ethnographic approach offers a unique research space to better understand context (political, social, institutional, and historical) of health policies and policy formulation; and how these policies are translated and come alive in health systems. This approach lends itself well for a nuanced analysis of the relationships between power, knowledge and practice in health systems. In this module the (a) roots of ethnographic approach, (b) distinguishing ethnography per se from qualitative research; (c) ethnographic approach and health systems as social institutions & (d) ethical issues and rigour are explored.
There are 4 slideshows in this module.
Module 9: Ethnography
-Module 9 Slideshow 1: Ethnography
-Module 9 Slideshow 2: Qualitative Research and Ethnography: Overlaps and Distinctions
-Module 9 Slideshow 3: Health Systems Ethnography
-Module 9 Slideshow 4: Ethnographic approach: Rigour & Ethics
The other modules in this series are:
Module 1: Introducing Health Systems & Health Policy
Module 2: Social justice, equity & gender
Module 3: System complexity
Module 4: Health Policy and Systems Research frameworks
Module 5: Economic analysis
Module 6: Policy analysis
Module 7: Realist evaluation
Module 8: Systems thinking
Module 10: Implementation research
Module 11: Participatory action research
Module 12: Knowledge translation
Module 13: Preparing a Research Plan
KEYSTONE is a collective initiative of several Indian health policy and systems research (HPSR) organizations to strengthen national capacity in HPSR towards addressing critical needs of health systems and policy development. KEYSTONE is convened by the Public Health Foundation of India in its role as Nodal Institute of the Alliance for Health Policy and Systems Research (AHPSR).
The inaugural KEYSTONE short course was conducted in New Delhi from 23 February – 5 March 2015. In the process of delivering the inaugural course, a suite of teaching and learning materials were developed under Creative Commons license, and are being made available as open access resources. The KEYSTONE teaching and learning resources include 38 videos and 32 slide presentations organized into 13 modules. These materials cover foundational concepts, common approaches used in HPSR, and guidance for preparing a research plan.
These resources were created and are made available through support and funding from the Alliance for Health Policy & Systems Research (AHPSR), WHO for the KEYSTONE initiative.
Framework for an Ethics of Open EducationRobert Farrow
A presentation on the role of ethics of open education from the Open Education Global 2016 conference held in Krakow, Poland. The full paper can be found in Open Praxis from May 2016 via http://dx.doi.org/10.5944/openpraxis.8.2.291
Personal online reputations: Managing what you can’t controlFrances Ryan
This talk for the 5th annual Discover Academic Research, Training, and Support (DARTS) conference discusses the role of online information in the building, management, and evaluation of personal reputation. It considers the existing literature surrounding reputation and social media use, as well as some early findings from Frances’ information science doctoral investigation on the same topics. A short interactive element encourages participants to think about their own social media use, online information behaviours, and digital footprints—as well as some practical advice on managing a reputation that you can’t fully control.
Introduction to organisational research and case studiesHazel Hall
Presentation on organisational research and case studies delivered to research students at the ESRC Scottish Doctoral Training Centre Information Science Pathway Training day, Glasgow, on 25th June 2014. ** An updated version of this presentation from 2016 is available at http://www.slideshare.net/HazelHall/introduction-to-organisational-research-and-case-studies-60657001 **
Six Studies on Changing Research Practices. Summaries and selected quotes.aesposito
This presentation summarizes main large-scale studies being utilized to ground my MRes dissertation on changing research practices in an higher education context.
Ethical research in the era of Digital Studies : the French point of view JCDomenget
the cultural influence of research approaches and paradigms in the context of the ethics of research. Results of a survey conducted among French social scientists about their consideration of ethical issues into the research process.
Learning Analytics – Ethical questions and dilemmasTore Hoel
Workshop presentation using the Potter Box model of ethical reasoning to discuss concerns and dilemmas of Learning analytics - Open Discovery Space and Learning Analytics Community Exchange projects #laceproject #ods_eu
News Ways to be Heard? Potenziale und Barrieren medialer Teilhabe am Beispiel...Nele Heise
"News Ways to be Heard? Potenziale und Barrieren medialer Teilhabe am Beispiel von Audio-Podcasts" - Vortrag im Rahmen der Ringvorlesung "Bildung in Zeiten der Digitalisierung" am 10. Januar 2019 an der Otto-von-Guericke-Universität Magdeburg
Neue Räume - neue Regeln? Ethische Herausforderungen des Forschens im NetzNele Heise
Eingeladener Vortrag zu ethischen Fragen und Herausforderungen netzbasierter Forschung (und Methoden) am 8. Juni 2018 im Rahmen der Tagung "Digitale Agenda der Sprachbildung im Kontext von Mehrsprachigkeit" (Universität Hamburg/KoMBI)
Vom Archiv in die Kopfhörer. Der Einsatz von Podcasts zur Wissensvermittlung Nele Heise
Vortrag (23. April 2018) am Institut für Ethnologie und Afrikastudien der Universität Mainz über die Nutzung von Podcasts zur Vermittlung von Wissen/Wissenschaft, Forschung und Bildungsthemen.
In der Lehrveranstaltung soll ein Podcast-Format für das "Archiv für die Musik Afrikas" entwickelt werden - die entsprechenden Folien zur Konzeptarbeit gebe ich gerne auf Anfrage weiter. Kontakt: nele dot heise at googlemail dot com.
Digital Media Participation: Blogging and PodcastingNele Heise
Guest lecture at the University of Hamburg (with Dag Elgesem), December 13, 2016.
To view the slides of Prof. Elgesem, please contact him directly (e.g. via his website: http://www.uib.no/en/persons/Dag.Elgesem)
Shape it - or be shaped! Von der Notwendigkeit digitale Umgebungen geschlecht...Nele Heise
Vortrag auf dem 33. Forum Kommunikationskultur der Gesellschaft für Medienpädagogik und Kommunikationskultur (GMK) am 19. November 2016 an der BTU Cottbus
[Stimm]Vielfalt im Netz. Repräsentation und Teilhabe erforschenNele Heise
Vortrag am 9. Dezember 2015 im MA-Seminar "Heterogeneity and Representation in the Media" von Dr. Sarah McGonagle an der Universität Hamburg.
[für eine bessere Auflösung bitte die .pdf-Datei herunterladen]
Wissen to Go - Podcasting und WissenschaftskommunikationNele Heise
Mein Vortrag am 19. November 2015 zum Thema Wissenschaftspodcasts am Karlsruher Institut für Technologie (KIT), Studiengang "Wissenschaft - Kommunikation - Medien".
[für eine bessere Auflösung bitte das .pdf herunterladen]
Serial & Co - was das Radio vom Podcast-Hype lernen kann Nele Heise
Talk zu Erfolgsfaktoren von Serial und Podcasting im Allgemeinen am 25. November 2015 im Rahmen der #radio21 Konferenz des Deutschlandradio.Lab in Berlin.
[für eine bessere Auflösung bitte das .pdf herunterladen]
Vortrag zu ethischen Aspekten digitaler Kommunikation im Rahmen der "Consulting-Akademie Unternehmensethik" der Evangelischen Akademie der Pfalz am 21. November 2015 in Karlsruhe.
[für eine bessere Auflösung bitte das .pdf herunterladen]
Was wir über Podcastnutzung wissen #ppw15bNele Heise
Vortrag zum Thema Podcast-Nutzung auf dem 6. Podlove Podcaster Workshop am 15. November 2015 in Berlin.
[für eine bessere Auflösung bitte das .pdf herunterladen]
Workshop "Ethics in Digital Media Research. A process-based approach" at the Summer School "Research Ethics in the Digital Age" (September 7, 2015; TU Dresden)
If you have any questions or need to get access to the literature I used, please don't hesitate to contact me :)
[please download the slides for a better resolution]
An die Mikrofone! Mit Podcasting für mehr Vielfalt in NetzdiskursenNele Heise
Mein Talk auf der Netzkonferenz "nebenan" am 6. Juni 2015 im Betahaus Hamburg. Es geht um die Potenziale von Podcasting für eine größere Vielfalt von Netzdiskursen, die Relevanz von Frauenstimmen im Netz, warum wir aber immer noch nicht da sind, wo wir sein könn(t)en - und was wir alle gemeinsam daran ändern können.
[für eine bessere Auflösung bitte die .pdf herunterladen]
Blogs, Instagram & Co. - ethische Aspekte des Elternseins im NetzNele Heise
Folien zu meinem Vortrag auf der Elternblogger_innen Konferenz "BlogFamilia" am 7. Mai 2015 in Berlin. Es geht in diesem ersten Versuch einer Einordnung um Elternsein im Netz und ethische Fragen.
"It's just not my thing" Why audience members don't use participatory feature...Nele Heise
My presentation at the 4th European Communication Conference, November 15, 2014, Lisbon (shared paper with Julius Reimer, Jan-Hinrik Schmidt and Wiebke Loosen).
"Most print and TV news media also run websites providing a diverse range of features and/or social media profiles that complement traditional feedback channels Previous research suggests that only a minority of committed users regularly engages with these participatory features. But little is known about the reasons and causes for this reluctance and participation barriers from the user perspective. This paper reports findings from 4 case studies on audience participation at German news media."
The "Blue Pages" as promoter of demarginalization & empowerment - An explorat...Nele Heise
This is an updated version of a talk I gave in September 2011 in Bonn (plus some slights from a German presentation in May 2012 in Berlin). The presented research project - an explorative analysis of the web portal and networking site GayRomeo (now: PlanetRomeo) - was carried out in 2009/2010, which is why many of the references might appear outdated. However, some people asked me to publish an English version of the study (thus I also integrated further results and some longer text passages). And here we go :)
Medienforschung auf's Ohr - ein Podcast für den Nachwuchs der Medien- und Kom...Nele Heise
Die Folien zum Workshop Nachwuchspodcast, den ich gemeinsam mit Florian Hohmann auf dem 2. DGPuK Nachwuchstag in Berlin (13. September 2014) veranstaltete. Die weiteren Schritte werden über verschiedene Online-Tools organisiert und koordiniert - wer Interesse daran hat, sich an einem solchen Podcast zu beteiligen, kann sich gerne bei mir melden.
#rp14 "Into the Wild? Nicht mit mir! Warum menschen das Internet nicht nutzen"Nele Heise
Session zum Thema Nicht-Nutzung des Internet auf der re:publica 2014 mit Juliane Kirchner, Cindy Roitsch, Ulrike Roth und Wiebke Loosen (Host: Nele Heise) - zum Video: https://www.youtube.com/watch?v=9ExYv2HRHEQ
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
2. The charms of doing research online
• economical reasons (time, costs) and “convenience”
• web as a „science laboratory“: Comprehensive logging and storage,
easily accessible archive of communication and interaction processes
• Richness of data (“big data”), ease of field access, better conditions for
specific methods e.g. observational analysis
Dilemma: technical feasibility vs. ethical acceptability
Online Research Ethics
Market research: complex regulatory framework (e.g. AGOF)
Academic research: few guidelines (e.g. AoIR), especially in the
German context (e.g. Döring 1999, Dzeyk 2001, Schmidt 2009)
Heise | Online Research Ethics 2
3. Project on Internet Research Ethics (2010-2011)
• Document analysis of a virtual working group (AG Ethik im Social Web) &
qualitative interviews with 17 German (academic) internet researchers
[different methodological and thematic foci, phases of academic career]
• objective: exploration of potential ethical conflicts in online research
• Key findings:
application of ethical standards (e.g. anonymization or obtaining “informed
consent”) not problematic with conventional methods
problems and insecurities occur in regard with innovative online methods (e.g.
avatar-based research), new research objects (e.g. social networks) and/or due
to new practices of usage (e.g. publication vs. conversation in SNS)
:: Background ::
Heise | Online Research Ethics 3
4. One conclusion of the Project
“Many conflicts arise due to breaches of norms
and/or standards of online communication”
Heise | Online Research Ethics 4
5. Preconditions of online based research
5
• (spatial and temporal) de-contextualization
• Disembodiment, virtualization (textuality)
• informational constraints: degree of social presence, anonymity
• Blurring boundaries of publicity and privacy (data, “spaces”)
Heise | Online Research Ethics
Online based research is a form of
computer-mediated communication
6. Researcher role
• ethical standards of research
• technical / methodological requirements of research
• research experience / practices
User role • principles of communication ethics
• rules of media use (e.g. netiquettes)
• individual media literacy/competence
“Hybridity” of online research contexts
• technical & social frames of media practices
• characteristics of online communication
• terms of use, rights of the providers
• individual ethical argumentation
• fidelity & responsibility
hybrid role
6Heise | Online Research Ethics
7. Wolff (2007) Beck (2010)
“Personalität” Comprehensibility
Reciprocity Rightness
Authenticity Thruth
Truthfulness Truthfulness
7Heise | Online Research Ethics
Ethical principles of online communication
8. Wolff (2007) Beck (2010)
“Personalität” Comprehensibility
Reciprocity Rightness
Authenticity Thruth
Truthfulness Truthfulness
8Heise | Online Research Ethics
Ethical principles of online communication
See also: Heise (2013, forthcoming)
9. Truth & Truthfulness
• congruency of saying and reality & obligation to speak the truth;
complete and true information about identity and communication
aims/goals, otherwise: failure of communication
informational constraints for verification (data, user accounts etc.)
and identification/authentication
“visibility” of researchers and disclosure of research (e.g. “fake
profiles”)
9
Ethical Principles & Research Practice
Heise | Online Research Ethics
10. “As a participant I have greater autonomy (…) so I can leave situations
easier that are unpleasant for me. On the other hand, I am cut off of
information. (…) as a participant I have to trust a bit more, because the
setting might be harder to grasp. If I go to an experiment at a university and
the door sign of the person that invited me says ‘Mr./Ms. X’, also I can see in
which department this takes place (…) so, there I have more hints pointing
to the seriousness of the research. On the internet, this is harder to
understand. Also, it is easier to pretend things or to give false facts. (…).
There is a bigger informational insecurity for participants. At the same
time, they have a greater scope for actions and can drop off more easily
than in a f2f-situation.”
[media psychologist, online games research]
10
Ethical Principles & Research Practice
Heise | Online Research Ethics
11. Rightness or “Richtigkeit”
• Appropriateness of communication with regard to the relationship
between two interaction partners
Access to online “spaces”
Recruitment of participants
Ambivalence of methods (data mining, log file analysis, profiling)
11
Ethical Principles & Research Practice
Heise | Online Research Ethics
Authenticity
• to act as you yourself, undisguised and be open-minded, but:
selective authenticity to safeguard privacy
shifting boundaries of privacy & publicity (data, practices) as well as
private and professional life, and “equivalency of context”
12. “At the very moment at which I'm registered, I accept the rules of the
community, and agree that I will follow them. (…) Not I as a researcher
define: what I am doing, what I'm citing or publishing is unproblematic, no
problem. The complete opposite is true: the group sets the boundaries. (…)
I as a researcher have a kind of ‘Holschuld’, a duty to obtain their consent.”
[research assistant, online observational analysis]
“as social scientists, working with media users, we all know that media
usage is not always rational. I cannot assume that (…) it is a conscious
decision if someone is not using his/her privacy settings. (…) You must give
the users some credit, because you cannot take for granted that you can
use it, only because it is not secured.“
[research assistant, online games research]
12
Ethical Principles & Research Practice
Heise | Online Research Ethics
13. “it is not just (…) a technology, an infrastructure, which is simply there.
Instead it is appropriated and it has a specific meaning to us. If you are
going to MySpace you do different things than on Facebook (…) these are
very different spaces or Lebenswelten, with different functions and
meanings. Once you acknowledge that (…) we as researchers have to take a
certain position: not to sniff around and observe everything because it is
easily accessible, but instead to be aware of the fact that these spaces are
made by people for themselves. (…) Although it is easily technically
accessible in principle.”
[doctoral student, qualitative analysis of self-representation in SNS]
13
Ethical Principles & Research Practice
Heise | Online Research Ethics
14. Some final remarks
• “disenchantment“ of online based research
• Ethics of online communication as a chance to carry out ethical
research in a very dynamic field
• importance of online communication ethics due to the ‘hybrid
role’ as researcher/user, e.g. selective authenticity
• Reconsideration of the value of trust and responsibilities
• Prospective reflection of communicative settings and strategies
(as an important part of ethical consideration)
• integration in teaching and methodological discourses
14Heise | Online Research Ethics
15. Thanks for your attention!
Nele Heise, M. A.
Hans Bredow Institute, Hamburg
n.heise@hans-bredow-institut.de
@neleheise
http://de.slideshare.net/garneleh
16. References
Beck, K. (2010). Ethik der Online-Kommunikation. In W. Schweiger & K. Beck (Eds.), Handbuch Online-Kommunikation (pp. 130-155). Wiesbaden: VS-Verlag.
Burgess, J. & Bruns, A. (2012). Twitter Archives and the Challenges of ‘Big Social Data’ for Media and Communication Research. M/C Journal, 15 (5). Retrieved
from: http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/561 (November 22, 2012).
Döring, N. (1999). Sozialpsychologie des Internet: die Bedeutung des Internet für Kommunikationsprozesse, Identitäten, soziale Beziehungen und Gruppen.
Göttingen: Hogrefe.
Dzeyk, W. (2001). Ethische Dimensionen der Online-Forschung. Kölner Psychologische Studien 6(1), 1-30. Retrieved from: http://kups.ub.uni-
koeln.de/volltexte/2008/2424/pdf/ethdimon.pdf (January 21, 2011).
Eynon, R., Schroeder, R. & Fry, J. (2009). New Techniques in Online Research. Challenges for Research Ethics. 21st Century Society 4(2), 187-199.
Fraas, C., Meier, S. & Pentzold, C. (2012). Online-Kommunikation. Grundlagen, Praxisfelder und Methoden. Wien: Oldenbourg Verlag.
Hamilton, R. J. & Bowers, B. J. (2006). Internet Recruitment and E-Mail Interviews in Qualitative Studies. Qualitative Health Research 16(6), 821-835.
Heise, N. (2013, forthcoming). “Doing it for real”. Authentizität als kommunikationsethische Voraussetzung onlinebasierter Forschung. In M. Emmer & I. Stapf
(Eds.), Authentizität in der computervermittelten Kommunikation. Weinheim: Juventa.
Heise, N. & Schmidt, J.-H. (2013, forthcoming): Ethik der Onlineforschung. In M. Welker et al. (Eds.), Handbuch Onlineforschung. Köln: Herbert von Halem.
Markham, A. (2012). Fabrication as ethical practice: Qualitative inquiry in ambiguous internet contexts. Information, Communication & Society, 5 (3), 334-353.
Markham, A. & Buchanan, E. (2012). Ethical Decision Making and Internet Research: Version 2.0. Recommendations from the AoIR Ethics Working Committee. Final
Draft, endorsed by the AoIR Executive Committee. Retrieved from: http://ijire.net/aoirethics/aoirethicsprintablecopy.pdf (November 16, 2012).
McKee, H. & Porter, J. E. (2009). The Ethics of Internet Research. A Rhetorical, Case-Based Process. New York: Peter Lang.
Nentwich, M. & König, R. (2012). Cyberscience 2.0. Research in the Age of Digital Social Networks. Frankfurt/M.: Campus Verlag.
Schmidt, J.-H. (2009). Braucht das Web 2.0 eine eigene Forschungsethik? Zeitschrift für Kommunikationsökologie und Medienethik 11(2), 38-42.
Strohm Kitchener, K. & Kitchener, R. F. (2009): Social Research Ethics. Historical and Philosophical Issues. In D. MMertens,. & Ginsberg, P. E. (Eds.), The Handbook
of Social Research Ethics (pp. 5-22). Thousand Oaks: Sage Publications.
Trevisan, F. & Reilly, P. (2012). Ethical Dilemmas in Researching Social Media Campaigns on Sensitive Personal Issues: Lessons from the Study of British Disability
Dissent Networks. Paper presented at the 4th European Communication Conference, October 24-26, 2012, Istanbul. Retrieved from:
http://dx.doi.org/10.2139/ssrn.2164729 (February 27, 2013).
Welker, M. & Matzat, U. (2009). Online-Forschung: Gegenstände, Entwicklung, Institutionalisierung und Ausdifferenzierung eines neuen Forschungszweiges. In N.
Jackob, H. Schoen & T. Zerback (Eds.), Sozialforschung im Internet: Methodologie und Praxis der Online-Befragung (pp. 33-47). Wiesbaden: VS-Verlag.
Wolff, O. J. (2007). Kommunikationsethik des Internets: eine anthropologisch-theologische Grundlegung. Hamburg: Verlag Dr. Kovač.
Ziegaus, S. (2009). Die Abhängigkeit der Sozialwissenschaften von ihren Medien. Grundlagen einer kommunikativen Sozialforschung. Bielefeld: transcript.
Zimmer, M. (2010). “But the data is already public”: on the ethics of research on Facebook. Ethics and Information Technology, 12 (4), 313-326.
17. Context sensitivity and online research
“There cannot be a blanket, whole cloth approach to Internet Research ethics.
Contextual details matter, including: What, exactly, is the object of analysis of the
study – texts, aggregated bits of information, or the persons themselves? What are
the use expectations of the online site and of the online participants? What is the
sensitivity of the information collected? What are the ages, geo-cultural-political
affiliations, and/or technological expertise of the online participants? In what form
are the researchers collecting data, and in what forms are they re-distributing it? Is
the researcher using real names or real user/avatar names, quoting passages,
taking screenshots, etc.? And where will this material appear and to whom will it
be accessible?”
McKee & Porter (2009: 7f.)
[see also: Heise/Schmidt (forthcoming), Markham/Buchanan 2012]
Consequences for:
Data collection (privacy/publicity, sensivity and accessibilty of data; involved actors)
Publication of Data (anonymization vs. copyright; consent; alternative strategies)
17Heise | Online Research Ethics