The document outlines a research study on censorship experienced by Chinese immigrants in Ireland compared to censorship in China. It will use mixed quantitative and qualitative methods, including surveys and interviews of Chinese students, to understand their internet usage in Ireland versus China and whether it influences their views on censorship at home. Limitations include a small sample size, sensitive nature of the topic, and potential bias.
This document discusses aspects of digital literacy and ethical considerations for online research. It provides three examples of past online research projects and notes that informed consent and privacy were not fully addressed. It emphasizes the importance of obtaining informed consent, maintaining participants' anonymity and privacy, securing data, and ensuring equal opportunities for all in research. Researchers must consider digital literacy issues and maintain ethical integrity, for example by clearly communicating the research process and allowing participant autonomy.
This research proposal examines how technology decreases reading habits among students. It aims to identify factors influencing the decline in reading and increase in technology dependence. The study will survey 1500 university students using questionnaires to collect both quantitative and qualitative data on age, gender, and media preferences. The proposal outlines the background of declining reading rates as students spend more time on devices instead of books. The objectives are to study this problem and other influencing variables like education system changes. A literature review discusses experts' views on benefits of reading and concerns about a shift to digital texts. The methodology, ethics, limitations, timeline and bibliography are also provided at a high level.
The document discusses developing research questions for PhD studies. It provides guidance on forming workable research questions, including ensuring they are answerable, interconnected, and substantively relevant. Several approaches to structuring research questions are presented, from broad research areas to more specific general and subsidiary questions. The importance of relating research questions to theoretical frameworks and concepts that determine the type of data collected is also covered.
This document outlines the key concepts from Chapter 2 of the textbook "Asking and Answering Sociological Questions". It discusses how sociology differs from natural sciences in its study of human subjects. The research process in sociology involves 8 stages: defining problems, reviewing evidence, formulating hypotheses, designing studies, collecting data, interpreting results, reporting findings, and repeating the process. Sociologists explore factual, comparative, developmental, and theoretical questions using methods like ethnography, surveys, experiments, and comparative research.
Choosing Open (#GO_GN) - Openness and praxis: Using OEP in HECatherine Cronin
This summary provides the key points from the document in 3 sentences:
The document discusses open educational practices (OEP) in higher education. It explores how academic staff use OEP, their reasons for using or not using OEP, and identifies 4 dimensions shared by academic staff who do use OEP - balancing privacy and openness, developing digital literacies, valuing social learning, and challenging traditional teaching roles. The document concludes that use of OEP is a complex, personal, and contextual issue that higher education institutions should support by building academic staff capacity in digital literacies, navigating privacy and openness, and reflecting on educator roles.
This document outlines a proposed framework for creating a cultural heritage digital library in Morocco to provide access to non-textual information for non-literate people. The author conducted a literature review on digital libraries in developing countries and on the culture of Morocco. An ethnographic study was also performed including informal observation, conversations, and content analysis. The findings from this research could inform the creation of a cooperative digital library between the US and Morocco called CAMEL, which would provide audio-visual cultural heritage documents in a way that is accessible to non-literate users based on the cultural context.
This document discusses aspects of digital literacy and ethical considerations for online research. It provides three examples of past online research projects and notes that informed consent and privacy were not fully addressed. It emphasizes the importance of obtaining informed consent, maintaining participants' anonymity and privacy, securing data, and ensuring equal opportunities for all in research. Researchers must consider digital literacy issues and maintain ethical integrity, for example by clearly communicating the research process and allowing participant autonomy.
This research proposal examines how technology decreases reading habits among students. It aims to identify factors influencing the decline in reading and increase in technology dependence. The study will survey 1500 university students using questionnaires to collect both quantitative and qualitative data on age, gender, and media preferences. The proposal outlines the background of declining reading rates as students spend more time on devices instead of books. The objectives are to study this problem and other influencing variables like education system changes. A literature review discusses experts' views on benefits of reading and concerns about a shift to digital texts. The methodology, ethics, limitations, timeline and bibliography are also provided at a high level.
The document discusses developing research questions for PhD studies. It provides guidance on forming workable research questions, including ensuring they are answerable, interconnected, and substantively relevant. Several approaches to structuring research questions are presented, from broad research areas to more specific general and subsidiary questions. The importance of relating research questions to theoretical frameworks and concepts that determine the type of data collected is also covered.
This document outlines the key concepts from Chapter 2 of the textbook "Asking and Answering Sociological Questions". It discusses how sociology differs from natural sciences in its study of human subjects. The research process in sociology involves 8 stages: defining problems, reviewing evidence, formulating hypotheses, designing studies, collecting data, interpreting results, reporting findings, and repeating the process. Sociologists explore factual, comparative, developmental, and theoretical questions using methods like ethnography, surveys, experiments, and comparative research.
Choosing Open (#GO_GN) - Openness and praxis: Using OEP in HECatherine Cronin
This summary provides the key points from the document in 3 sentences:
The document discusses open educational practices (OEP) in higher education. It explores how academic staff use OEP, their reasons for using or not using OEP, and identifies 4 dimensions shared by academic staff who do use OEP - balancing privacy and openness, developing digital literacies, valuing social learning, and challenging traditional teaching roles. The document concludes that use of OEP is a complex, personal, and contextual issue that higher education institutions should support by building academic staff capacity in digital literacies, navigating privacy and openness, and reflecting on educator roles.
This document outlines a proposed framework for creating a cultural heritage digital library in Morocco to provide access to non-textual information for non-literate people. The author conducted a literature review on digital libraries in developing countries and on the culture of Morocco. An ethnographic study was also performed including informal observation, conversations, and content analysis. The findings from this research could inform the creation of a cooperative digital library between the US and Morocco called CAMEL, which would provide audio-visual cultural heritage documents in a way that is accessible to non-literate users based on the cultural context.
Presentation of my current research interests to 'Scoping Questions of Privacy, Surveillance and Governance in the Digital Society,' Digital Society Network, University of Sheffield, 16 July 2014.
This document discusses how Web 2.0 technologies can facilitate scientific and intellectual movements (SIMs). It defines SIMs as contentious challenges to received wisdom that involve breaks from past practices and coordinated collective action. The document examines how open notebook science, science blogging, and information sharing on FriendFeed can enable SIMs by allowing scientists to openly share data and ideas. The author is conducting ongoing research on how online tools impact scientific roles, collaboration, openness, and communication in the life sciences.
The multidisciplinary team conducted mixed methodology research on safety and security in the greater Clifton community. They collected data through 95 free listing interviews, 94 photovoice photos, and 24 in-depth interviews. The team also analyzed existing safety data and resources from the University of Cincinnati.
The research found key themes in the data: 1) Perceptions of safety were strongly influenced by environment, with off-campus areas seen as less safe. 2) There was a communication disconnect between diverse stakeholders about safety issues. 3) There were differences in awareness and use of safety resources between groups.
The team discussed opportunities to address these issues through education, continued research, and collaborative projects. However, the research had
Presented at Society for the Scientific Study of Sexuality, Eastern/Midcontent Region Joint Conference, "The Business of Sex," June 5-7, St. Petersburg, FL.
Introduction To Critical Enquiry ResearchTerry Flew
This document provides an introduction to approaches and methodologies for critical enquiry research in the creative industries. It discusses key concepts like defining problems, gathering evidence, analyzing evidence, and drawing conclusions. It also outlines various qualitative research techniques like action research, interviews, surveys, case studies, ethnography, and discourse analysis. Finally, it touches on entering the research industry by discussing how to present research, apply for funding, and manage projects and timelines.
Methodology and Proposed Thesis Topics 7/1/13etaurisani
The document outlines Elizabeth Taurisani's research methodology for three thesis topics under the direction of Professor Tom Klinkowstein. It introduces each topic which focuses on ethical consumerism among young adults, interactive media and identity construction among adolescents, and transmedia storytelling among millennials. For each topic, it presents the research question, conceptual significance, and key areas of focus. It then walks through the 10 step research methodology which includes eliminating distractions, identifying resources, collecting data, soliciting input, summarizing findings, developing hypotheses, receiving feedback, and finalizing conclusions.
Methodology: Research & Production / 3 Thesis Subjectsetaurisani
This document outlines a methodology for research and production across three thesis subjects. It provides a 25 step process that involves optimizing work conditions, archiving research, setting a schedule, identifying audiences, asking indirect questions, observing reactions, crowd-sourcing input, taking walks to reflect, developing hypotheses with feedback, and documenting progress. The subjects focus on 1) how communication interfaces shape language and collaboration, 2) interactive and video storytelling's impact on knowledge, and 3) non-linguistic graphical languages to communicate broadly.
English as foreign language learning on social networking site? An action res...Broadreach Services
The document outlines an action research study that explored using Facebook to help 48 English language learners in Taiwan improve their English skills. Over three months, the students participated in an English learning activity on a private Facebook group where they posted and interacted using English. Based on focus group discussions, the study found that factors like audience, feedback, topic preference, and upcoming exams influenced students' engagement and motivation in the Facebook language learning activity.
Public Understanding of Science - Lecture 2 #SciCommLSUPaige Jarreau
The document discusses models of science communication and public understanding of science. It describes the traditional "deficit model" which assumes that public mistrust of science stems from lack of knowledge, and efforts to educate the public often backfire. A better approach promotes dialogue, trust and participation across diverse audiences and platforms. Effective communication acknowledges that people interpret science through existing beliefs and values, not just facts. Framing issues related to personal concerns like health can make science more relevant and engaging.
Transitions of digital practices and development of digital literacy skills a...Mengjie Jiang
The document discusses a study on the transitions of digital practices and development of digital literacy skills among Chinese international postgraduate students in a UK university. It provides background on e-learning development in China and the internationalization of higher education. The study aims to understand students' digital skills upon arrival, factors influencing skill development, and how students can be better supported. Mixed methods are used, including surveys, interviews, and collection of digital artifacts. Preliminary findings indicate students have basic digital skills but development is influenced by transitions between educational contexts and support received.
This document discusses researching digital literacy from a social practice approach. It emphasizes examining people's subjective experiences with digital technology through ethnographic methods like interviews and screen recordings. A key method is the "technobiography" interview, which explores an individual's personal history and evolution of digital practices over time. Understanding digital literacy requires exploring how it is embedded within social contexts like networks, institutions, and historical trends. The goal is to use what we learn about people's existing digital funds of knowledge to better inform pedagogies and understandings of learners.
A study of sixth graders’ critical evaluation of Internet sourcesaj6785
This study was a descriptive, task-based analysis to determine how sixth-grade students approach the cognitive task of critically evaluating Internet sources. Pairs of sixth grade students in an Information Literacy course evaluated four preselected Internet sites to determine their credibility and appropriateness for two specific research scenarios. Data for analysis included written responses, screencasts, and video of students while completing the task. Results suggest that these students tended toward simplistic modes of evaluation in the face of increased cognitive load, though some moved toward a more critical stance and many applied basic metacognitive strategies. The study points to the importance of instructional approaches that teach students to flexibly apply evaluation criteria in ill-structured environments, that teach advanced metacognitive strategies, and that instill habits of mind for critical inquiry. Instruction that empowers students to practice healthy skepticism even in the face of authority is also essential.
Research Methodology & Thesis Topic Proposalsetaurisani
The document outlines Elizabeth Taurisani's directed research methodology and potential thesis topics under her professor Tom Klinkowstein. It describes a 10 step research methodology process including identifying resources, collecting research, identifying patterns, developing hypotheses, and finalizing conclusions. It then presents three potential thesis topics: the effects of ethical advertising on consumer children, motivations for baby boomers participating in gaming, and how multi-platform storytelling can impact documentary experiences among digital natives.
Thesis topic & research methodology (draft 1)Hannah Li
Yue Li is researching how to integrate traditional Chinese shadow play into contemporary advertising using new media. Their methodology includes mind mapping research topics, reviewing literature for inspiration, conducting ethnographic research on relevant cultural groups, finding analogous cases, developing a hypothesis, experiment testing, results interpretation, and practical application refinement. The goal is to help audiences understand how to incorporate traditional folk art with digital platforms and better use new technology to interact with folk art.
The Domestication of the Internet in Germany (1997-2007). Online Access and I...Cocoloris
The document summarizes research on the domestication of the Internet in German households between 1997-2007. It found that Internet adoption initially occurred through professional and educational contexts, but later shifted to everyday domestic life as availability and diversity of users increased. While technical expertise was still required, the technical aspect of the Internet became less dominant as the medium was integrated into social and family contexts at home. Follow-up research examined how the Internet continued to be incorporated into daily life through new mobile devices.
This presentation gives you a short introduction to online ethnography, the history of the methodology and a few tips and tricks about ethics and everyday practises.
Various Types of Qualitative Research.pptxMonojitGope
This document outlines and provides examples of six common types of qualitative research: phenomenological research, grounded theory research, ethnographic research, narrative research, case study research, and participatory action research. For each type, a brief definition is given along with an example study that illustrates the methodology. The types of qualitative research are intended to help researchers choose the appropriate approach to gain insights and address real-world problems.
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...Cindy Regalado
This presentation briefly illustrates the state of citizen science our approach in Extreme Citizen Science. We present two examples under this research group at University College London: Publicly Initiated Scientific Research and the Socio-demographics of Volunteerism
Presentation of my current research interests to 'Scoping Questions of Privacy, Surveillance and Governance in the Digital Society,' Digital Society Network, University of Sheffield, 16 July 2014.
This document discusses how Web 2.0 technologies can facilitate scientific and intellectual movements (SIMs). It defines SIMs as contentious challenges to received wisdom that involve breaks from past practices and coordinated collective action. The document examines how open notebook science, science blogging, and information sharing on FriendFeed can enable SIMs by allowing scientists to openly share data and ideas. The author is conducting ongoing research on how online tools impact scientific roles, collaboration, openness, and communication in the life sciences.
The multidisciplinary team conducted mixed methodology research on safety and security in the greater Clifton community. They collected data through 95 free listing interviews, 94 photovoice photos, and 24 in-depth interviews. The team also analyzed existing safety data and resources from the University of Cincinnati.
The research found key themes in the data: 1) Perceptions of safety were strongly influenced by environment, with off-campus areas seen as less safe. 2) There was a communication disconnect between diverse stakeholders about safety issues. 3) There were differences in awareness and use of safety resources between groups.
The team discussed opportunities to address these issues through education, continued research, and collaborative projects. However, the research had
Presented at Society for the Scientific Study of Sexuality, Eastern/Midcontent Region Joint Conference, "The Business of Sex," June 5-7, St. Petersburg, FL.
Introduction To Critical Enquiry ResearchTerry Flew
This document provides an introduction to approaches and methodologies for critical enquiry research in the creative industries. It discusses key concepts like defining problems, gathering evidence, analyzing evidence, and drawing conclusions. It also outlines various qualitative research techniques like action research, interviews, surveys, case studies, ethnography, and discourse analysis. Finally, it touches on entering the research industry by discussing how to present research, apply for funding, and manage projects and timelines.
Methodology and Proposed Thesis Topics 7/1/13etaurisani
The document outlines Elizabeth Taurisani's research methodology for three thesis topics under the direction of Professor Tom Klinkowstein. It introduces each topic which focuses on ethical consumerism among young adults, interactive media and identity construction among adolescents, and transmedia storytelling among millennials. For each topic, it presents the research question, conceptual significance, and key areas of focus. It then walks through the 10 step research methodology which includes eliminating distractions, identifying resources, collecting data, soliciting input, summarizing findings, developing hypotheses, receiving feedback, and finalizing conclusions.
Methodology: Research & Production / 3 Thesis Subjectsetaurisani
This document outlines a methodology for research and production across three thesis subjects. It provides a 25 step process that involves optimizing work conditions, archiving research, setting a schedule, identifying audiences, asking indirect questions, observing reactions, crowd-sourcing input, taking walks to reflect, developing hypotheses with feedback, and documenting progress. The subjects focus on 1) how communication interfaces shape language and collaboration, 2) interactive and video storytelling's impact on knowledge, and 3) non-linguistic graphical languages to communicate broadly.
English as foreign language learning on social networking site? An action res...Broadreach Services
The document outlines an action research study that explored using Facebook to help 48 English language learners in Taiwan improve their English skills. Over three months, the students participated in an English learning activity on a private Facebook group where they posted and interacted using English. Based on focus group discussions, the study found that factors like audience, feedback, topic preference, and upcoming exams influenced students' engagement and motivation in the Facebook language learning activity.
Public Understanding of Science - Lecture 2 #SciCommLSUPaige Jarreau
The document discusses models of science communication and public understanding of science. It describes the traditional "deficit model" which assumes that public mistrust of science stems from lack of knowledge, and efforts to educate the public often backfire. A better approach promotes dialogue, trust and participation across diverse audiences and platforms. Effective communication acknowledges that people interpret science through existing beliefs and values, not just facts. Framing issues related to personal concerns like health can make science more relevant and engaging.
Transitions of digital practices and development of digital literacy skills a...Mengjie Jiang
The document discusses a study on the transitions of digital practices and development of digital literacy skills among Chinese international postgraduate students in a UK university. It provides background on e-learning development in China and the internationalization of higher education. The study aims to understand students' digital skills upon arrival, factors influencing skill development, and how students can be better supported. Mixed methods are used, including surveys, interviews, and collection of digital artifacts. Preliminary findings indicate students have basic digital skills but development is influenced by transitions between educational contexts and support received.
This document discusses researching digital literacy from a social practice approach. It emphasizes examining people's subjective experiences with digital technology through ethnographic methods like interviews and screen recordings. A key method is the "technobiography" interview, which explores an individual's personal history and evolution of digital practices over time. Understanding digital literacy requires exploring how it is embedded within social contexts like networks, institutions, and historical trends. The goal is to use what we learn about people's existing digital funds of knowledge to better inform pedagogies and understandings of learners.
A study of sixth graders’ critical evaluation of Internet sourcesaj6785
This study was a descriptive, task-based analysis to determine how sixth-grade students approach the cognitive task of critically evaluating Internet sources. Pairs of sixth grade students in an Information Literacy course evaluated four preselected Internet sites to determine their credibility and appropriateness for two specific research scenarios. Data for analysis included written responses, screencasts, and video of students while completing the task. Results suggest that these students tended toward simplistic modes of evaluation in the face of increased cognitive load, though some moved toward a more critical stance and many applied basic metacognitive strategies. The study points to the importance of instructional approaches that teach students to flexibly apply evaluation criteria in ill-structured environments, that teach advanced metacognitive strategies, and that instill habits of mind for critical inquiry. Instruction that empowers students to practice healthy skepticism even in the face of authority is also essential.
Research Methodology & Thesis Topic Proposalsetaurisani
The document outlines Elizabeth Taurisani's directed research methodology and potential thesis topics under her professor Tom Klinkowstein. It describes a 10 step research methodology process including identifying resources, collecting research, identifying patterns, developing hypotheses, and finalizing conclusions. It then presents three potential thesis topics: the effects of ethical advertising on consumer children, motivations for baby boomers participating in gaming, and how multi-platform storytelling can impact documentary experiences among digital natives.
Thesis topic & research methodology (draft 1)Hannah Li
Yue Li is researching how to integrate traditional Chinese shadow play into contemporary advertising using new media. Their methodology includes mind mapping research topics, reviewing literature for inspiration, conducting ethnographic research on relevant cultural groups, finding analogous cases, developing a hypothesis, experiment testing, results interpretation, and practical application refinement. The goal is to help audiences understand how to incorporate traditional folk art with digital platforms and better use new technology to interact with folk art.
The Domestication of the Internet in Germany (1997-2007). Online Access and I...Cocoloris
The document summarizes research on the domestication of the Internet in German households between 1997-2007. It found that Internet adoption initially occurred through professional and educational contexts, but later shifted to everyday domestic life as availability and diversity of users increased. While technical expertise was still required, the technical aspect of the Internet became less dominant as the medium was integrated into social and family contexts at home. Follow-up research examined how the Internet continued to be incorporated into daily life through new mobile devices.
This presentation gives you a short introduction to online ethnography, the history of the methodology and a few tips and tricks about ethics and everyday practises.
Various Types of Qualitative Research.pptxMonojitGope
This document outlines and provides examples of six common types of qualitative research: phenomenological research, grounded theory research, ethnographic research, narrative research, case study research, and participatory action research. For each type, a brief definition is given along with an example study that illustrates the methodology. The types of qualitative research are intended to help researchers choose the appropriate approach to gain insights and address real-world problems.
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...Cindy Regalado
This presentation briefly illustrates the state of citizen science our approach in Extreme Citizen Science. We present two examples under this research group at University College London: Publicly Initiated Scientific Research and the Socio-demographics of Volunteerism
This document summarizes an ethics training day on conducting research with children. It discusses:
1) The importance of involving children in research and obtaining their informed consent while protecting them from harm.
2) Practical challenges like ensuring diversity, working with gatekeepers, and obtaining consent from both children and their parents.
3) Examples of successfully involving "seldom heard" youth and using social media to engage young people in research projects.
The document provides an outline for writing Chapter 1 of a research paper, which includes an introduction, review of related literature, scope and delimitation, significance of the study, and definition of terms. The introduction discusses what the study is about and why it is important. The review of related literature evaluates previous research on the topic. The scope and delimitation provides a summary of what will be examined in the study. The significance discusses who may benefit from the results and possible impacts. Definition of terms defines unfamiliar words used in the study.
The document provides an agenda for a presentation on netnography and social media research. The agenda includes discussing key terms like netnography, characteristics of online research, social media, Kozinets' rules for netnography practice, and the importance of social listening. It also outlines discussing tools for insight aggregation and providing case study examples. The presentation aims to convey why netnography is a valuable research method.
This document summarizes the research questions, methodology, and barriers of a PhD project on open science and scholarly communication. The project will examine UK academic researchers' attitudes toward open science through interviews, surveys, and content analysis. It will compare current attitudes to findings from 2010 to see if they have changed as new researchers have entered the field. The goal is to identify strategies to enhance scholarly communication and the impact of open science, which faces barriers like lack of incentives, rewards, time, and technical challenges.
Emerging trends in librarianship include open access to information and resources on the internet, the rising costs of scholarly journal subscriptions, and the importance of technology in learning. Libraries are shifting from owning collections to providing access to resources and moving from support roles to partnering with educators. Issues for libraries include managing space needs, adopting new technologies, developing expertise to help users discover multidisciplinary information, and ensuring access to India-specific research data. Overall, libraries are adapting to open information sharing and the changing ways users learn through technology.
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant DivideAg4HealthNutrition
This document discusses the benefits and challenges of integrating qualitative and quantitative research methods. It argues that keeping qualitative and quantitative research separate unnecessarily limits understanding of the social world. Both methods have strengths, and using them together can overcome their individual weaknesses. The document outlines differences in qualitative and quantitative research and provides an example study that combined the methods sequentially and concurrently to better understand long-term poverty impacts in Bangladesh.
This chapter discusses the history of media research, current theories and research, and controversies in understanding media effects. It outlines the evolution of media research from early fears and propaganda studies to modern analyses of television effects and new media usage. Current theories examine powerful and minimal effects models as well as flow theories. Research perspectives include diffusion of innovations and cultural studies approaches. Understanding media impact is challenging due to limitations of research and distinguishing correlation from causation.
The Networked Creativity in the Censored Web 2.0Weiai Wayne Xu
This document discusses a study analyzing the Twitter activities of Chinese users discussing and mobilizing around internet censorship. It provides background on China's censorship policies and innovations used to bypass them. The study uses Twitter data from 2014 and network, content, and demographic analyses to understand how users interact, tactics used, and characteristics of central users in the censorship discussion network. The goal is to understand how Web 2.0 platforms facilitate technological and political strategies to crowdsource responses to censorship.
Use of PLEs by security and investigation professionalsTony Ratcliffe
This document discusses a study on how security and investigation professionals use personal learning environments (PLEs) and digital literacies for work-based learning and continuing professional development. The study utilized an online questionnaire that received 67 responses from 17 countries, mostly from Canada, the UK, and US. It also included interviews with 35 participants. The study found that professionals actively consume online content for research, courses, training, and communication. However, their use of PLEs faces challenges like work restrictions on non-business internet use and concerns about security, privacy and credibility of online information. The conclusions note that while professionals are active online learners, participation in learning communities is still low due potential barriers.
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...Rachel deHaan
A look into the historical and current issues around research with indigenous communities in Canada. Potential solutions and guidelines also discussed.
<a rel="license" href="http://creativecommons.org/licenses/by/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by/4.0/88x31.png" /></a><br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.
This is the lecture I delivered on the 'Becoming Social Scientist' undergraduate module at the University of Birmingham, as the part of a whole module with students. This is the first introductory lecture entitled 'Ethnography I: Introduction'. During the lecture, it was continuous, the effort to link ethnography with Social Innovation and Design Thinking applied research perspective of Ethnography in the broader social and business context of Birmingham.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
3. Introduction
• A gap in the study of Chinese immigrants in
Ireland: censorship
• Few countries as thorough in its censorship as
China.
• ‘The Great Firewall’
• Wide range of topics taboo
• Censorship leading to self-censorship
5. Google incident
• Google versus Chinese government earlier this
year over refusal to censor further.
• Principled or trouble-making? Opinions of
Chinese servers differ.
6. Research Question
• Do Chinese in Ireland take advantage of non-
censored internet to access information denied
to them at home?
(a) What kind of sites do they access in Ireland?
(b) Which Internet sources do they find to be more
reliable - Irish or Chinese?
(c) Does their use of Internet in Ireland influence
their attitude towards censorship at home?
7. Target Group
• Chinese students in Ireland, as they would
have experiences with both China and Ireland.
• Chinese community in Ireland since 1950s but
many would have limited contact with China.
10. • OpenNet Initiative. (2009, June 15). Internet
Filtering in China. Retrieved November 14,
2010, from OpenNet:
http://opennet.net/sites/opennet.net/files/O
NI_China_2009.pdf
11. Internet use in China
• 420 million internet users
• 162 million blogs
• 30 million daily Kaixin users
• 583.5 million mobile phone subscribers
16. Chinese Community in Ireland
Wang, Y. Y., & King-O'Riain, R. C. (2006). Chinese
Students in Ireland. National University of
Ireland, Maynooth, Dept. of Sociology. National
Consultative Committee on Racism and
Interculturalism.
18. Co-Ethnic Researcher – Why?
• Relates to target population
• Body Language/Cultural differences
• Communication
• Comprehension
• Participants’ rights
• Recruitment
19. • “Most of the interviewees do not use the Irish
media often. They find the programmes are
quite different from those in China …In the
Chinese community they have their own
media”
(Wang and King-O’Riain, p.49)
21. Mixed Methods Approach
• ‘an approach to inquiry that combines or
associates both qualitative and quantitative
forms. It involves philosophical assumptions,
the use of qualitative and quantitative
approaches and the mixing of both
approaches in a study’
Cresswell, P. 4
22. ‘Mixed Method Approaches involves the use of
both quantitative and qualitative approaches
in tandem so that the overall strength of a
study is greater than either qualitative or
quantitative Research’
Creswell&Plano Clark, 2007
25. • ‘Researchers realize that their own
background shapes their interpretation, and
they position themselves in the research to
acknowledge how their interpretation flows
from their personal, cultural and historical
experiences’
Cresswell, p. 8.
27. 2 Approaches
First Approach
make initial contact with key informants
information rich cases
Pickard, A.J. Research Methods in information, Facet
Publishing, 2007, p. 65
28. Second Approach
an initial participant
interview and observation
characteristics and issues that need further
inquiry
Pickard, A.J. Research Methods in information, Facet
Publishing, 2007, p. 65
29. According to Erlandson et al, 1993,82
“Purposive and directed sampling through
human instrumentation increases the range
of data exposed and maximises the
Researcher’s ability to identify emerging
themes”
35. Interview Questions Examples
• Their opinions on broad issues, e.g. Taiwan,
Tibet, etc
• Opinions on recent incidents, e.g. Google v.s.
Chinese government, 2008 food poisoning
scandal, etc
• Opinions on internet access in Ireland, as
opposed to China?
• Which would they trust more? Why?
37. Limitations
Small sample
Students only (3,000 out of total population of
30,000)
Dr. O’Leary,R., Dr. Li, L.,
“Mainland Chinese Students and Immigrants in Ireland
and their Engagement with Christianity, Churches&
Society”, p. 3.
38. Costs
Phone credit
iPod as questionnaire incentive
Transcription costs
Funding
National Immigration Council of Ireland
Atlantic Philanthropies
Confucius Institute
45. Introduction
• A gap in the study of Chinese immigrants in
Ireland: censorship
• Few countries as thorough in its censorship as
China.
• ‘The Great Firewall’
• Wide range of topics taboo
• Censorship leading to self-censorship
47. Google incident
• Google versus Chinese government earlier this
year over refusal to censor further.
• Principled or trouble-making? Opinions of
Chinese servers differ.
48. Research Question
• Do Chinese in Ireland take advantage of non-
censored internet to access information
denied to them at home?
49. Focus Group
• Chinese students in Ireland, as they would
have experiences with both China and Ireland.
• Chinese community in Ireland since 1950s but
many would have limited contact with China.
50. Research Approach
• Mixed Methods: Qualitative and quantitative
studies, with use of online questionnaires and
interviews with volunteers
51. Interview Questions Examples
• Their opinions on broad issues, e.g. Taiwan,
Tibet, etc
• Opinions on recent incidents, e.g. Google v.s.
Chinese government, 2008 food poisoning
scandal, etc
• Opinions on internet access in Ireland, as
opposed to China?
• Which would they trust more? Why?
55. • OpenNet Initiative. (2009, June 15). Internet
Filtering in China. Retrieved November 14,
2010, from OpenNet:
http://opennet.net/sites/opennet.net/files/O
NI_China_2009.pdf
56. Internet use in China
• 420 million internet users
• 162 million blogs
• 30 million daily Kaixin users
• 583.5 million mobile phone subscribers
61. Chinese Community in Ireland
Wang, Y. Y., & King-O'Riain, R. C. (2006). Chinese
Students in Ireland. National University of
Ireland, Maynooth, Dept. of Sociology. National
Consultative Committee on Racism and
Interculturalism.
63. Co-Ethnic Researcher – Why?
• Relates to target population
• Body Language/Cultural differences
• Communication
• Comprehension
• Participants’ rights
• Recruitment
64. • “Most of the interviewees do not use the Irish
media often. They find the programmes are
quite different from those in China …In the
Chinese community they have their own
media”
(Wang and King-O’Riain, p.49)
66. Mixed Methods Approach
• ‘an approach to inquiry that combines or
associates both qualitative and quantitative
forms. It involves philosophical assumptions,
the use of qualitative and quantitative
approaches and the mixing of both
approaches in a study’
Cresswell, P. 4
67. ‘Mixed Method Approaches involves the use of
both quantitative and qualitative approaches
in tandem so that the overall strength of a
study is greater than either qualitative or
quantitative Research’
Creswell&Plano Clark, 2007
70. • ‘Researchers realize that their own
background shapes their interpretation, and
they position themselves in the research to
acknowledge how their interpretation flows
from their personal, cultural and historical
experiences’
Cresswell, p. 8.
72. 2 Approaches
First Approach
make initial contact with key informants
information rich cases
Pickard, A.J. Research Methods in information, Facet
Publishing, 2007, p. 65
73. Second Approach
an initial participant
interview and observation
characteristics and issues that need further
inquiry
Pickard, A.J. Research Methods in information, Facet
Publishing, 2007, p. 65
74. According to Erlandson et al, 1993,82
“Purposive and directed sampling through
human instrumentation increases the range
of data exposed and maximises the
Researcher’s ability to identify emerging
themes”
80. Limitations
Small sample
Students only (3,000 out of total population of
30,000)
Dr. O’Leary,R., Dr. Li, L.,
“Mainland Chinese Students and Immigrants in Ireland
and their Engagement with Christianity, Churches&
Society”, p. 3.
81. Costs
Phone credit
iPod as questionnaire incentive
Transcription costs
Funding
National Immigration Council of Ireland
Atlantic Philanthropies
Confucius Institute