Hazel Hall's invited paper presented at SLA Eastern Canada Members' Day, McGill University, Montreal, Canada, 29 April 2009. This presentation draws on the project work discussed in the report at: http://drhazelhall.files.wordpress.com/2013/01/soc_comp_proj_rep_public_2008.pdf
Presentation on the draft manuscript 'A systematic literature review of academic cyberbullying- notable research absences in Higher Education contexts' given to the Design Research Activities Workgroup at CPUT
Online Data Preprocessing: A Case Study ApproachIJECEIAES
Besides the Internet search facility and e-mails, social networking is now one of the three best uses of the Internet. A tremendous number of volunteers every day write articles, share photos, videos and links at a scope and scale never imagined before. However, because social network data are huge and come from heterogeneous sources, the data are highly susceptible to inconsistency, redundancy, noise, and loss. For data scientists, preparing the data and getting it into a standard format is critical because the quality of data is going to directly affect the performance of mining algorithms that are going to be applied next. Low-quality data will certainly limit the analysis and lower the quality of mining results. To this end, the goal of this study is to provide an overview of the different phases involved in data preprocessing, with a focus on social network data. As a case study, we will show how we applied preprocessing to the data that we collected for the Malaysian Flight MH370 that disappeared in 2014.
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Poster RDAP13: Data information literacy multiple paths to a single goalASIS&T
Jake Carlson, Jon Jeffryes, Brian Westra and Sarah Wright
Data Information Literacy: Multiple Paths to a Single Goal
Research Data Access & Preservation Summit 2013
Baltimore, MD April 4, 2013 #rdap13
Presentation on the draft manuscript 'A systematic literature review of academic cyberbullying- notable research absences in Higher Education contexts' given to the Design Research Activities Workgroup at CPUT
Online Data Preprocessing: A Case Study ApproachIJECEIAES
Besides the Internet search facility and e-mails, social networking is now one of the three best uses of the Internet. A tremendous number of volunteers every day write articles, share photos, videos and links at a scope and scale never imagined before. However, because social network data are huge and come from heterogeneous sources, the data are highly susceptible to inconsistency, redundancy, noise, and loss. For data scientists, preparing the data and getting it into a standard format is critical because the quality of data is going to directly affect the performance of mining algorithms that are going to be applied next. Low-quality data will certainly limit the analysis and lower the quality of mining results. To this end, the goal of this study is to provide an overview of the different phases involved in data preprocessing, with a focus on social network data. As a case study, we will show how we applied preprocessing to the data that we collected for the Malaysian Flight MH370 that disappeared in 2014.
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Poster RDAP13: Data information literacy multiple paths to a single goalASIS&T
Jake Carlson, Jon Jeffryes, Brian Westra and Sarah Wright
Data Information Literacy: Multiple Paths to a Single Goal
Research Data Access & Preservation Summit 2013
Baltimore, MD April 4, 2013 #rdap13
The goal of the Very Open Data Project is to provide a software-technical foundation for this exchange of data, more specifically to provide an open database platform for data from the raw data coming from experimental measurements or models through intermediate manipulations to finally published results. The sheer expanse of the amount data involved creates some unique software-technical challenges. One of these challenges is addressed in the part of the study presented here, namely to characterize scientific data (with the initial focus being detailed chemistry data from the combustion kinetic community), so that efficient searches can be made. A formalization of this characterization comes in the form of schemas of descriptions of tags and keywords describing data and ontologies describing the relationship between data types and the relationship between the characterizations themselves. These will be translated to meta-data tags connected to the data points within a non-relational data of data for the community.
The focus of the initial work will be on data and its accessibility. As the project progresses, the emphasis will shift on not only having available data accessible for the community, but that the community itself will be able to, with emphasis on minimal effort, will be able contribute their own data. This will involve, for example, the concepts of the ‘electronic lab notebook’ and the existence and availability of extensive concept extraction tools, primarily from the chemical informatics field.
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
Advanced Community Information Systems Group (ACIS) Annual Report 2013Ralf Klamma
Advanced Community Information Systems (ACIS)
Lehrstuhl Informatik 5 – Information Systems
RWTH Aachen University
Ahornstr. 55 | 52056 Aachen | Germany
Deep neural networks for matching online social networking profilesTraian Rebedea
> Proposed a large dataset for matching online social networking profiles
›This allowed us to train a deep neural network for profile matching using both domain-specific features and word embeddings generated from textual descriptions from social profiles
›Experiments showed that the NN surpassed both unsupervised and supervised models, achieving a high precision (P = 0.95) with a good recall rate (R = 0.85)
This presentation presents results from a pilot study exploring automated formal metadata extraction in accessibility evaluation. We demonstrate a prototype created during the FixRep project that aims to support capture, storage and reuse of accessibility information where available, and to approach the problem of reconstructing required data from available sources.
Poster RDAP13: Research Data in eCommons @ Cornell: Present and FutureASIS&T
Wendy A. Kozlowski, Dianne Dietrich, Gail Steinhart and Sarah Wright
Cornell University Library, Ithaca, NY
Research Data in eCommons @ Cornell: Present and Future
Research Data Access & Preservation Summit 2013
Baltimore, MD April 4, 2013 #rdap13
Over the past 10 years, research systems have evolved from systems that focused on how to structure and record information on research, to systems capable of allowing significant insights to be derived based upon years of high quality information. In 2015, the maturity of the information now collected within many Current Research Information Systems, and the insights that this can provide is of equal or greater value than the insights that could be gleaned from established externally provided research metrics platforms alone. The ability to intersect these external and internal worlds provides new levels of strategic insight not previously available. With the addition of platforms that track altmetrics, and their ability to connect university publications data with a constant flow of real time attention level metrics, an image of a dynamic network of systems emerges, connected together by ever turning ‘cogs’ pushing and translating information. Add to this, the success of ORCID as pervasive researcher identifier infrastructure, and CASRAI as the emerging social contract for information exchange, and it becomes possible to extend this network back from the systems that track and record research information, through to the platforms through which research knowledge is created. The ‘Mechanics’ of this network of systems is more than just getting the ‘plumbing’ right. As research information moves through the network, its audience and purpose changes, the requirements for contextual metadata can also change. This presentation will explore the lived experience of Research Data Mechanics at Digital Science though illustrating how connections between Figshare, Altmetric, Symplectic Elements, and Dimensions can both enhance research system capability and reduce the burden on researchers, and research administration.
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Information Professionals Attitudes Influence the Diffusion of Information an...Lin Wu
This study examined the general characteristics and patterns of librarians in connection with their willingness to adopt information and communication technologie.
This tutorial, offered at the 10th International Conference on Web Engineering, presents the peculiarities of advanced Web search applications, describes some tools and techniques that can be exploited, and offers a methodological approach to development. The approach proposed in this tutorial is based on the paradigm of Model Driven Development (MDD), where models are the core artifacts of the application life-cycle and model transformations progressively refine models to achieve an executable version of the system. To cope with the process-intensive nature of the main interactions (i.e., content analysis, query management, etc.), we describe the use of Process Models (e.g., BPMN models). Indeed, search-based applications are considered as process- and content-intensive applications, due to the trends towards exploratory search and search as a process visions.
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
A Task-Centered Framework för Computationally Grounded Science CollaborationsDr. Matheus Hauder
Collaboration is ubiquitous in today’s science, yet there is limited support for coordinating scientific work. The general-purpose tools that are typically used (e.g., email, shared document editing, social coding sites), have still not replaced inperson meetings, phone calls, and extensive emails needed to coordinate and track collaborative activities. Scientists with diverse knowledge and skills around the globe could collaborate by opening scientific processes that expose all tasks and activities publicly to achieve a shared scientific question. This paper describes the Organic Data Science framework to support scientific collaborations that revolve around complex science questions that require significant coordination, entice contributors to remain engaged for extended periods of time, and enable continuous growth to accommodate new contributors as the work evolves over time. We discuss how the design of this framework incorporates principles followed by successful on-line communities. We present initial results to date of several communities that are collaborating using this framework.
The goal of the Very Open Data Project is to provide a software-technical foundation for this exchange of data, more specifically to provide an open database platform for data from the raw data coming from experimental measurements or models through intermediate manipulations to finally published results. The sheer expanse of the amount data involved creates some unique software-technical challenges. One of these challenges is addressed in the part of the study presented here, namely to characterize scientific data (with the initial focus being detailed chemistry data from the combustion kinetic community), so that efficient searches can be made. A formalization of this characterization comes in the form of schemas of descriptions of tags and keywords describing data and ontologies describing the relationship between data types and the relationship between the characterizations themselves. These will be translated to meta-data tags connected to the data points within a non-relational data of data for the community.
The focus of the initial work will be on data and its accessibility. As the project progresses, the emphasis will shift on not only having available data accessible for the community, but that the community itself will be able to, with emphasis on minimal effort, will be able contribute their own data. This will involve, for example, the concepts of the ‘electronic lab notebook’ and the existence and availability of extensive concept extraction tools, primarily from the chemical informatics field.
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
Advanced Community Information Systems Group (ACIS) Annual Report 2013Ralf Klamma
Advanced Community Information Systems (ACIS)
Lehrstuhl Informatik 5 – Information Systems
RWTH Aachen University
Ahornstr. 55 | 52056 Aachen | Germany
Deep neural networks for matching online social networking profilesTraian Rebedea
> Proposed a large dataset for matching online social networking profiles
›This allowed us to train a deep neural network for profile matching using both domain-specific features and word embeddings generated from textual descriptions from social profiles
›Experiments showed that the NN surpassed both unsupervised and supervised models, achieving a high precision (P = 0.95) with a good recall rate (R = 0.85)
This presentation presents results from a pilot study exploring automated formal metadata extraction in accessibility evaluation. We demonstrate a prototype created during the FixRep project that aims to support capture, storage and reuse of accessibility information where available, and to approach the problem of reconstructing required data from available sources.
Poster RDAP13: Research Data in eCommons @ Cornell: Present and FutureASIS&T
Wendy A. Kozlowski, Dianne Dietrich, Gail Steinhart and Sarah Wright
Cornell University Library, Ithaca, NY
Research Data in eCommons @ Cornell: Present and Future
Research Data Access & Preservation Summit 2013
Baltimore, MD April 4, 2013 #rdap13
Over the past 10 years, research systems have evolved from systems that focused on how to structure and record information on research, to systems capable of allowing significant insights to be derived based upon years of high quality information. In 2015, the maturity of the information now collected within many Current Research Information Systems, and the insights that this can provide is of equal or greater value than the insights that could be gleaned from established externally provided research metrics platforms alone. The ability to intersect these external and internal worlds provides new levels of strategic insight not previously available. With the addition of platforms that track altmetrics, and their ability to connect university publications data with a constant flow of real time attention level metrics, an image of a dynamic network of systems emerges, connected together by ever turning ‘cogs’ pushing and translating information. Add to this, the success of ORCID as pervasive researcher identifier infrastructure, and CASRAI as the emerging social contract for information exchange, and it becomes possible to extend this network back from the systems that track and record research information, through to the platforms through which research knowledge is created. The ‘Mechanics’ of this network of systems is more than just getting the ‘plumbing’ right. As research information moves through the network, its audience and purpose changes, the requirements for contextual metadata can also change. This presentation will explore the lived experience of Research Data Mechanics at Digital Science though illustrating how connections between Figshare, Altmetric, Symplectic Elements, and Dimensions can both enhance research system capability and reduce the burden on researchers, and research administration.
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Information Professionals Attitudes Influence the Diffusion of Information an...Lin Wu
This study examined the general characteristics and patterns of librarians in connection with their willingness to adopt information and communication technologie.
This tutorial, offered at the 10th International Conference on Web Engineering, presents the peculiarities of advanced Web search applications, describes some tools and techniques that can be exploited, and offers a methodological approach to development. The approach proposed in this tutorial is based on the paradigm of Model Driven Development (MDD), where models are the core artifacts of the application life-cycle and model transformations progressively refine models to achieve an executable version of the system. To cope with the process-intensive nature of the main interactions (i.e., content analysis, query management, etc.), we describe the use of Process Models (e.g., BPMN models). Indeed, search-based applications are considered as process- and content-intensive applications, due to the trends towards exploratory search and search as a process visions.
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
A Task-Centered Framework för Computationally Grounded Science CollaborationsDr. Matheus Hauder
Collaboration is ubiquitous in today’s science, yet there is limited support for coordinating scientific work. The general-purpose tools that are typically used (e.g., email, shared document editing, social coding sites), have still not replaced inperson meetings, phone calls, and extensive emails needed to coordinate and track collaborative activities. Scientists with diverse knowledge and skills around the globe could collaborate by opening scientific processes that expose all tasks and activities publicly to achieve a shared scientific question. This paper describes the Organic Data Science framework to support scientific collaborations that revolve around complex science questions that require significant coordination, entice contributors to remain engaged for extended periods of time, and enable continuous growth to accommodate new contributors as the work evolves over time. We discuss how the design of this framework incorporates principles followed by successful on-line communities. We present initial results to date of several communities that are collaborating using this framework.
Open Source & Open Data Session report from imaGIne 2014 ConferenceGSDI Association
Session report from the imaGIne 2014 Conference held in Berlin, Germany, in October 2014. Session was chaired by Dr. Gabor Remetey-Fulopp, of HUNAGI, who were co-organisers for Session 8C1.
PATHS state of the art monitoring reportpathsproject
This document provides an update to an Initial State of the Art Monitoring report delivered by the project. The report covers the areas of Educational Informatics, Information Retrieval and Semantic Similarity relatedness.
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
Researching Social Media – Big Data and Social Media Analysis, presentation for the Social Media for Researchers: A Sheffield Universities Social Media Symposium, 23 September 2014
Scholarly social media applications platforms for knowledge sharing and net...tullemich
This short presentation deals with some of the current publishing workflows to platforms for scholarly knowledge sharing and SoMe networking. It is touched upon what kind of implications emerge from operating in these open and networked virtual research environments (VRE) e.g. publishing open access.
Technical Challenges for Realizing Learning AnalyticsRalf Klamma
Technical Challenges for Realizing Learning Analytics
Learntec 2015, January 28, 2015, Karlsruhe, Germany,
Ralf Klamma
Advanced Community Informations Systems (ACIS) Group
RWTH Aachen University
2011.10.10 Multi-Disciplinary Research Themes and TrainingNUI Galway
Dr Diane Payne, Director of the Dynamics Lab, Geary Institute, University College Dublin talked about the Geary Institute in this seminar "Multi-Disciplinary Research Themes and Training" at the Whitaker Institute on 10th October 2011.
Immersive informatics - research data management at Pitt iSchool and Carnegie...Keith Webster
A joint presentation by Liz Lyon and Keith Webster on providing education for librarians engaged in research data management. This was delivered at Library Research Seminar VI, at the University of Illinois Urbana Champaign in September 2014. The presentation looks at a class delivered by Lyon at the University of Pittsburgh's iSchool in 2014, and the related needs for immersive training opportunities amongst experienced practicing librarians, using Carnegie Mellon University's library, led by Webster, as a case study.
This presentation was provided by Chris Erdmann of Library Carpentries and by Judy Ruttenberg of ARL during the NISO virtual conference, Open Data Projects, held on Wednesday, June 13, 2018.
Introduction MA Data, Culture and Society | University of Westminster, UKslejay
Datafication, the transformation of our everyday lives into digital data, poses great risks and opportunities for contemporary societies. This new MA course addresses, explores and researches this transformation. Industries increasingly rely on big data and dataficiation. Students therefore need analytical and practical skills to work with data in various sectors. The interdisciplinary course combines hands-on and applied approaches with theoretical learning. It encourages collaboration, group work and problem-based learning. Students will learn about analytical approaches to big data, algorithms, the Internet of Things, artificial intelligence, blockchain and other cutting-edge technologies. We will discuss and explore what the implications of such technologies for identities, politics, the economy and societies are.
Students will also be introduced to practical skills when it comes to the use, analysis and visualisation of data (such as data/text mining, social network analysis, digital discourse analysis, digital ethnography, sentiment analysis, geospatial analysis). Graduates from this programme will be fully capable and confident to combine these skills during their careers. Students who complete the MA Data, Culture and Society can work in a wide variety of sectors connected to data and the media and creative industries.
More information:
https://www.westminster.ac.uk/computer-science-and-software-engineering-journalism-and-mass-communication-courses/2019-20/september/full-time/data-culture-and-society-ma
This presentation was provided by Daniella Lowenberg of the California Digital Library during the NISO Virtual Conference, Advancing Altmetrics, held on Wednesday, December 13, 2017.
Preparation of the PhD thesis for examinationHazel Hall
Training materials used with doctoral students faced with the challenge of writing up their research and asking themselves 'How do I write up my doctoral study?'
Presentation delivered by Professor Hazel Hall at the RIVAL Reunion event in Edinburgh, 25th May 2023. Further details of the event at https://blogs.napier.ac.uk/social-informatics/2023/05/rival-reunion-event-25-may-2023/
Platform to Platform project lightening talkHazel Hall
Lightning talk on the AHRC/Creative Informatics funded Platform to Platform project to create a podcast series based on Lorna Lloyd's 'Diary of the war', and assess audience engagement with archives in two different digital formats - (1) a Blipfoto journal of text and images, and (2) sound in podcast episodes.
Platform to Platform: initial findings from the empirical studyHazel Hall
Initial findings from the empirical study of the Platform to Platform project are presented. The research centred on the creation of a podcast series based on the war diary of Lorna Lloyd (available at https://rss.com/podcasts/lornalloyd/), and the evaluation of audience engagement with it as compared with engagement with online text and images in a Blipfoto journal at http://blipfoto.com/lornal. The research was funded by the AHRC through the Creative Informatics programme.
Digital options: an assessment of audience engagement with a digitised set of...Hazel Hall
Paper presented at the Archives and Records Management conference, 2nd September 2022 on audience engagement with Lorna Lloyd's Diary of the war as a Blipfoto journal, and as a podcast series.
Using a multi-location, longitudinal focus group method to conduct qualitativ...Hazel Hall
Paper presented at 13th Qualitative and Quantitative Methods in Libraries International Conference (QQML2021) (virtual conference), 25-28 May 2021. Full text available at https://www.napier.ac.uk/~/media/worktribe/output-2755729/using-a-multi-location-longitudinal-focus-group-method-to-conduct-qualitative-research.pdf
Research, impact, value and library and information science (RIVAL): developm...Hazel Hall
The research-practice gap in Library and Information Science (LIS) is well documented, especially in respect of the difficulties of translating research into practice, and resultant lost opportunities. While many researchers attempt to explain this research-practice gap, few suggest strategies to address it. The creation of researcher-practitioner networks, however, is one approach that has been proved empirically to bridge the distance between the two communities. Such a network is currently operating in Scotland, funded by the Royal Society of Edinburgh. Research, Impact, Value and Library and Information Science (RIVAL) is part-way through its implementation based around four knowledge exchange events for a network membership of 32 from a wide variety of LIS sectors. RIVAL’s successful delivery depends in part on the project leads’ experience of undertaking, and evaluating the impact of, a UK Arts and Humanities Research Council funded grant: the Developing Research Excellence and Methods (DREaM) project. Already there are indications that RIVAL is delivering value to network members. There is a strong expectation for this to be enhanced, both in the remainder of the funding period and beyond, offering theoretical contributions to the study of social networks, especially in respect of social capital development to support knowledge exchange.
Collaboration and networking: learning from DREaM and RIVALHazel Hall
Discusses the extent of networking and collaboration amongst library and information science researchers and practitioners who took part in the AHRC-funded Developing Research Excellence and Methods (DREaM) project in 2011/12, and the extent to which learning from this grant has influenced the delivery of the Royal Society of Edinburgh funded Research Impact and Value and Library and Information Science project in 2019/20.
Research into Practice case study 2: Library linked data implementations an...Hazel Hall
The research underlying this presentation explored the role that libraries play in the linked data context. Focusing on European national libraries and Scottish libraries, multiple data gathering methods and constant comparative analysis were applied in the study. Amongst the findings, a general lack of awareness within the library community of the Semantic Web and the implications of linked data was identified. At the same time, there is recognition that linked data augments the discoverability and enhances the interoperability of library data. The presentation will include recommendations for the application of the findings of this research in practice.
Catalysing research into practice from the ground upHazel Hall
David Stewart, CILIP President for 2019 and Regional Director of Health Library and Knowledge Services North, presents on his key presidential theme: the importance of evidence to underpin the difference that library services make. He provides an overview of CILIP’s plans for greater collaboration and co-ordination, and also shares details of work undertaken in NHS England. This includes (a) national research on return on investment, and (b) details of the Catalyst scheme in the North of England, which has been designed to develop librarian research capability and a ground-up, small-scale research programme.
Professor Hazel Hall introduces the second networking event of RIVAL - a collaborative network of Scotland-based Library and Information Science (LIS) researchers and practising library and information professionals interested in maximising the impact and value of library and information science research. The project, which runs in 2019 and 2020, is funded by the Royal Society of Edinburgh.
Research, Impact, Value and LIS = RIVAL.
Scotland's school library strategy: advocacy and impact by Martina McChrystalHazel Hall
Vibrant libraries, thriving schools: a national strategy for school libraries in Scotland 2018-2023 is Scotland’s school library strategy. By showcasing the impact an excellent school library service can deliver, the strategy is intended to be used to influence decision-making in respect of school library provision. Martina's presentation outlines about her involvement in the development of the strategy as Chair of the National School Library Strategy Advisory Group, the strategy’s role in advocacy, and its anticipated impact.
Getting research into action: issues, challenges, solutions by Dr Sarah MortonHazel Hall
Sarah Morton has worked across research, policy and practice for most of her career, and will draw on examples from different settings encountered over this time in her presentation. She is keen to interrogate our learning about effective evidence use from the last 20 years, and review how this can be supported from research and practice perspectives. She will present a vision for the effective use of evidence of all kinds to plan, develop and improve policy, practice, and services. As part of this she will explain some of the ways that she is currently developing tools and support for effective evidence use.
Professor Hazel Hall introduces RIVAL - a collaborative network of Scotland-based Library and Information Science (LIS) researchers and practising library and information professionals interested in maximising the impact and value of library and information science research. The project, which runs in 2019 and 2020, is funded by the Royal Society of Edinburgh. This is the first of the four networking events.
Research, Impact, Value and LIS = RIVAL.
Participatory Budgeting, São Paulo, BrazilHazel Hall
Summarises a research project on participatory budgeting in São Paulo, Brazil undertaken by Edinburgh Napier University researchers Dr Wegene Demeke and Dr Bruce Ryan, and supported by the Global Challenge Research Fund.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Opportunity and risk in social computing environments
1. Opportunity and risk in social computing
environments
Centre for Social Informatics, Edinburgh Napier
University
Dr Hazel Hall, Reader
Shooresh Golzari, Intern
TFPL Ltd, London
Melanie Goody, Director of Consultancy
Belinda Blaswick, Consultant
2. Centre for Social Informatics
Social informatics
Design and use of information and communication technologies
taking into account institutional and cultural contexts
CSI focus
Sociotechnical interaction at different levels of the organisation at
different stages of the system life-cycle
Staffing
8 members based at Edinburgh, plus associates
Home to the International Teledemocracy Centre
Reputation
85% research output international/world class (RAE 2008)
3. Edinburgh Napier University
John Napier
C16th mathematician and philosopher
Decimal point, logarithms
Born 1550 Merchiston Tower
Craiglockhart
1916-1919 military hospital
Meeting of Wilfred Owen and Siegfried
Sassoon 1917
Owen’s Anthem for Doomed Youth and
Dulce et Decorum Est
Today
13,500 students
Research excellence in a number of areas
4. TFPL Ltd, London
Services
Recruitment
Consultancy
Training
Including networks and events
TFPL Connect, SharePoint Summits
Scope
Knowledge management
Information management
Records management
Content management
Library and information services management
5. Edinburgh Napier – TFPL connection
Track record of joint research - TFPL
Royal Academy of Engineering secondment 2006
E-information roles (with Blaswick) – ASIS&T 06
Maximising value from communities consortium
Track record of joint research – Hall & Goody
Outsourcing of research and information services (2005/6
LIRG/Elsevier Research Award)
KPMG as case study for doctoral work
http://www.dcs.napier.ac.uk/~hazelh/esis/hazel_publications.html#phd
6. Room demographics
Who uses what for purposes of collaborative work?
Blogs?
Wikis?
Social networking?
Instant messaging?
Microblogging?
Anyone think this is trivial?
Scottish Falsetto Sock Puppet Theatre
http://www.youtube.com/watch?v=x7RrHXNyONc
7. Purposes of the study
Establish main opportunities and risks of social
computing tools within organisations for collaborative
work purposes, as perceived by information and
knowledge management professionals
Meet general interest of TFPL’s client base
Inform TFPL’s training and consultancy portfolio
Serve as pilot for larger, externally-funded piece of work
Possible repeat study summer 2009
8. Purposes of the study
Establish main opportunities and risks of social
computing tools within organisations for collaborative
work purposes, as perceived by information and
knowledge management professionals
Licensed collaborative work platforms
SharePoint (Microsoft)
Lotus Notes and Quickplace (IBM)
E-rooms (Documentum)
“Mature” social software applications, e.g. instant messaging,
blogs, wikis
Newer Web 2.0 applications, e.g. social networking, microblogging
9. Purposes of the study
Establish main opportunities and risks of social
computing tools within organisations for collaborative
work purposes, as perceived by information and
knowledge management professionals
Focus to date mainly on freely available social software for
personal use
Academic studies treat “older” applications in non-corporate
environments, e.g. educational settings
Few studies on internal social computing environments
Lack of extant literature on newer tools, e.g. social networking and
microblogging applications
10. Purposes of the study
Establish main opportunities and risks of social
computing tools within organisations for collaborative
work purposes, as perceived by information and
knowledge management professionals
Rather than:
Journalists, e.g. concern over vulnerable groups
Educational researchers, e.g. goal of enhancement of classroom
environment
Public relations professionals, e.g. efforts to improve corporate
communications
11. Research focus 1
Scale of implementation
Organisational uptake of social computing
Levels of adoption
Degree of access to tools
In general
By tool
By tool function
Attitudes of IM/KM staff to social computing
In general
By tool
12. Research focus 2
Perceived opportunities: anticipated and actual
Literature review highlighted:
increased collaboration
improved productivity
enhanced IM practice
positive cultural change
13. Research focus 3
Perceived risks: feared and realised
Literature review highlighted:
lowered productivity - time-wasting
erosion of IM practice, e.g. for archiving and accessing exchanges
compromised security
antisocial behaviour
14. Research activities – 12 weeks summer 08
Literature review Weeks 1-2
Design of data collection
Weeks 3-8
tools and data collection
Web-based survey
Focus groups
Telephone interviews
Data analysis Weeks 8-12
Quantitative – Excel
Qualitative – manual
Weeks 10-12
Writing up
15. Data subjects
Population
TFPL contacts
Direct, e.g. clients, attendees at SharePoint Summits
Indirect, e.g. through the Scottish Information Network
Invitation to participate
Face-to-face at TFPL Connect meeting June 2008
Survey and focus groups: by e-mail invitation
Possible to attend focus group, but not complete survey
Interviews: volunteers left contact details on survey
16. Study contributions
Data set Data derived from Number of
contributions
1 Web-based survey 57 Survey majority
from public sector
2 London focus group 13 organisations.
Organisation size =
3 Glasgow focus group 12
median 725
employees.
4 Interviews 14
96*
*It was possible to make more than one contribution to the research, e.g. all
who were interviewed completed the survey (96-14=82); similarly it was
possible to complete the survey anonymously and attend a focus group.
17. Data collected, recorded & analysed
Set Data collected Recording and analysis
1 Tool uptake within Excel for analysis of quantitative data.
organisation; governance of Qualitative data coded up and analysed
tools; attitudes to opportunity manually.
and risk; challenges;
demographic data
2&3 Participant reactions to, and Recorded as Word files and content
discussions of, preliminary integrated into report under main themes
results of web-based survey. as derived from analysis of survey data.
Also posted to TFPL blog, e.g.
http://blog.tfpl.com/tfpl/2008/07/index.htm
l
3 Participant experience of Recorded as Word files and content
implementation: as executed, integrated into report under main themes
planned or not yet undertaken as derived from analysis of survey data.
18. Hazel and Shooresh based at
Focus group held at Napier in Edinburgh
IDOX offices in Glasgow
(31/07/08)
Respondents to web- Melanie and Belinda based at
based survey (07- TFPL in London
14/07/08) and
participants in telephone
interviews (28/07 Focus group held at
-01/08/08) based across IDOX/TFPL offices in London
the UK (23/07/08)
19. Uptake of social computing 1
Range in levels of adoption
From non-provision...
... to sophisticated implementations that integrate “consumer”
applications with licensed systems
Sense that study may have come “too early”
High number of “don’t know” and “neutral” responses to survey
questions
Two thirds of respondents who provided additional free text comments
at end of survey noted impacts on social computing initiatives in their
organisations were yet to be felt
Interviewees cautious in drawing firm conclusions
20. Uptake of social computing 2
Levels of access – survey respondents with access
Higher levels in public sector (yet greater deployment in private)
Licensed plus “consumer” tools: 57.7%
Licensed system only: 31.7%
“Consumer” tools only: 11.5%
Organisations that restrict access: 24%
Encouragement to adopt social computing tools
26.5% “high”
32.4% “moderate” Public sector organisations more
41.2% “low” enthusiastic than private
21. Enthusiasm amongst IM and KM staff 1
Levels of enthusiasm for social computing amongst IM
and KM staff = high
Increases collaboration and improves productivity in general
Facilitates knowledge and information sharing
Connects individuals and groups
Widens communication channels
Enhances IM practice
More obvious and better organisation of resources
Consolidation of material and reduction of silos
24 hour access
Induces positive cultural change (especially social networking)
Widens employee choice retention (social networking)
55% involved in decision making around social computing tools
22. Enthusiasm amongst IM and KM staff 2
“Top” tools
Wikis for information sharing
NB “information”
Blogs for connecting individuals and groups, and widening
information channels
Unite physically separated team members
Provide outlet for promotion of on-going work to a wide audience
Open up conversations
Route to feedback on activities
Social networking
Culture
Employee choice
23. Implementation concerns 1
Low organisational encouragement in the deployment of
tools
41% “low” encouragement
Few efforts in change management and training, even where there
has been heavy investment
24. Implementation concerns 2
Biggest risk
Failure to capitalise on opportunities offered by social computing
tools due to poor implementation management
Respondents familiar with this risk from earlier experiences, e.g.
intranet developments from mid-90s onwards
This risk is not considered in the literature
“Like most things it’s about cultural change. A tool (however clever)
can be used well/badly. Therefore usual considerations apply
around what purpose does it serve, selling it to the business,
understanding business benefits/risks, giving staff skills to use
[it/them] properly, providing standards and guidance around use,
encouraging good practice.”
25. Less prominent risks
IM problems
Information sprawl (but not overload); archiving; means of
accessing archives; (version control and information quality)
Compromised security
(Legal infringement and disrepute theoretically valid, though not
realised in practice); some leakage of confidential information
Lowered productivity
Coping with IM problems; failure to adopt social computing tools
“If employees are going to waste time, they do not need social
computing tools to do it”
(Anti-social behaviour)
26. Top tools for IM and KM professionals
Rank Tool Opportunities Risks posed
1 Wikis Information sharing; IM Information quality in terms
practice; productivity of wiki accuracy; leakage of
confidential data
2 Blogs Connecting individuals & Disrepute; leakage of
groups; widening confidential data
communication channels
3 Social Positive cultural change & Leakage of confidential data
networking widened employee choice
28. Tool availability, usefulness & usage
Availability Usefulness Usage
Wikis Wikis Social networking
Blogging Blogging Instant messaging
Social networking Instant messaging Wikis
Instant messaging Social networking Blogging
Microblogging Microblogging Microblogging
29. Tool availability, usefulness & usage
Availability Usefulness Usage
Wikis Wikis Social networking
Blogging Blogging Instant messaging
Social networking Instant messaging Wikis
Instant messaging Social networking Blogging
Microblogging Microblogging Microblogging
30. Tool availability, usefulness & usage
Availability Usefulness Usage
Wikis Wikis Social networking
Blogging Blogging Instant messaging
Social networking Instant messaging Wikis
Instant messaging Social networking Blogging
Microblogging Microblogging Microblogging
31. Tool availability, usefulness & usage
Availability Usefulness Usage
Wikis Wikis Social networking
Blogging Blogging Instant messaging
Social networking Instant messaging Wikis
Instant messaging Social networking Blogging
Microblogging Microblogging Microblogging
Ready availability of a tool does not guarantee popularity
Under-exploitation of most valuable tools?
“[All of the tools] support [collaboration] in different ways and are
limited mainly because of uptake rather than limitations of the tool
itself”
Microblogging barely on the radar, yet consider its offerings…
32. Microblogging
Elements of social networking
End user determines source of information flow based on “social
network” that he/she builds
Elements of instant messaging
Interactions are brief and to the point, real time, “familiar” format
Elements of wiki
Public nature of conversations encourages collaborative building of
new knowledge
Elements of blogging
Microblog, with easy linking to other resources
33. Microblogging
Elements of social networking
End user determines source of information flow based on “social
network” that he/she builds
Elements of instant messaging
Interactions are brief and to the point, real time, “familiar” format
Elements of wiki
Public nature of conversations encourages collaborative building of
new knowledge
Elements of blogging
Microblog, with easy linking to other resources
Potential to meet needs of IM/KM professional and user
preferences together?
34. 5 stages of Twitter acceptance
http://www.slideshare.net/minxuan/how-twitter-changed-my-life-presentation
1. Denial
“I think Twitter sounds stupid. Why would anyone care what other people are
doing right now?”
2. Presence
“OK, I don’t really get why people love it, but I guess I should at least create an
account.”
3. Dumping
“I’m on Twitter and use it for pasting links to my blog posts and pointing people
to my press releases.”
4. Conversing
“I don’t always post useful stuff, but I do use Twitter to have authentic 1x1
conversations.”
5. Microblogging
“I’m using Twitter to publish useful information that people read, and to
converse 1x1 authentically.”
35. Reminder of context of findings
Findings align to priorities of information management
roles: providing access to resources and information
governance
Wikis as open tools for the capture of knowledge made explicit in
the form of information are rated highest
Collaborative value of social networking applications is less
“visible”
Other groups, other priorities
e.g. in the same organisations Human Resources staff may see
greater evidence of inappropriate use of tools
Timing
Microblogging not mainstream in summer 2008
36. Priorities of information and knowledge
management professionals
Know the value of social computing
Attendance at focus groups to enhance knowledge
Sell message on value to the organisation
Play an active role in implementation planning
Choice of tools
Management of roll-out
Design of governance guidelines
Become mediators in social computing business
environments
Explore microblogging
37. “Discussion” exercise part 1
1. Generate “Tweet fountain” for your table
http://www.ukeig.org.uk/conf2009/index.html
Steps
Individuals need Twitter user names: help invent names for those
who do not already have them (You are one another’s followers)
As individuals write tweets on post-its: one 140 character tweet
(English or French) per post-it, including user name
Observations/thoughts: “Going to check out Zotero after seminar”
News/PR: “My organisation is doing X”
Information delivery (current awareness): “Here’s a great resource…”
Questions: “Does anyone know about Y?”
Arrange tweets on the wall in order of appearance
38. “Discussion” exercise part 2
Steps
If you would like to respond to a tweet generated by one of the
people you “follow” (i.e. same table members), do so with post-its.
Preface them with @username at the top so it’s clear to which
tweet you are responding.
Switch tables (together)
Check what the other tables have been “discussing”
See if there are individuals whose contributions are such that you would
like to “follow” them
If appropriate (and not too chaotic), add responses to the tweet fountains
of the other tables
39. Example
hazelh Learnt quite a bit about Zotero this morning
PB Concerned that life is too short to get involved with
Twitter
Emilie Can anyone recommend a good X for doing Y in a
small commercial library?
Pascal Looking for reference site for Yammer installation
David Anyone at SLA members’ day like to take same bus
home after today’s session?
hazelh @Pascal
Think they use it at one of the big cell phone
companies?
Dawn @David
Can give you a lift if you’re heading north?