The document discusses problems with digital identity for scientists on the web. It notes that while tools exist for collaboration and sharing, like myExperiment, scientific publishing has traditionally been the main way to formally identify people and attribute their work. This is problematic as it does not adequately attribute increasing digital contributions outside of publications that are important to science. Solutions discussed include using URIs, OpenIDs, and Contributor IDs similar to DOIs to provide unique identifiers for scientists and properly attribute their various works online in order to encourage further digital contributions and collaboration.
A talk I gave for the SOLAR research group. It covers issues in open scholarship, alt metrics & online identity. It was a bit of a catch-all talk, which I'll probably refine over the next few months.
Blogs, Wikis and more: Web 2.0 demystified for information professionalsMarieke Guy
Marieke Guy from UKOLN will help you find out how Web 2.0 applications are being used in libraries and information centres, and what actually works. Blogs, wikis, RSS? Podcasts, Slideshare, Flickr and del.icio.us? Social Networking, Social Bookmarking and Video Sharing are the buzz words.
Presentaiton to the NITLE Reed College Learning Management Systems meeting (http://nitle.org/index.php/nitle/opportunities/fall_2006/learning_management_systems_at_liberal_arts_colleges).
A talk I gave for the SOLAR research group. It covers issues in open scholarship, alt metrics & online identity. It was a bit of a catch-all talk, which I'll probably refine over the next few months.
Blogs, Wikis and more: Web 2.0 demystified for information professionalsMarieke Guy
Marieke Guy from UKOLN will help you find out how Web 2.0 applications are being used in libraries and information centres, and what actually works. Blogs, wikis, RSS? Podcasts, Slideshare, Flickr and del.icio.us? Social Networking, Social Bookmarking and Video Sharing are the buzz words.
Presentaiton to the NITLE Reed College Learning Management Systems meeting (http://nitle.org/index.php/nitle/opportunities/fall_2006/learning_management_systems_at_liberal_arts_colleges).
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
This is the second lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
The internet has revolutionized the manner by which we can represent ourselves online by providing us the ability to expose our data, experiences and skills online via blogs, wikis and other crowdsourcing venues. As a result it is possible to contribute to the community while developing a social profile as a scientist. While research scientists are primarily still measured by their contributions to science using the classical method of citation statistics, a number of freely available online tools are now available for scientists to develop their online profile. This is particularly important at a time when alternative measures of contributions to science are being developed – the so-called world of Alternative Metrics. The concept of “rewards and recognition” for participation will be discussed in terms of how the Royal Society of Chemistry intends to add to the alternative metrics data flow to acknowledge scientists for their contributions. This presentation will provide an overview of the myriad of tools available to you at any stage of your career and will hopefully encourage you to actively manage your profile as a scientist as the resume of the future will likely be summarized by your activities and profiles online. I will highlight how to ensure that your personal social media profiles can be made engaging to potential collaborators and employers, how social media can be utilized to engage people into events and how to drive traffic to your own sites should you choose to set them up. I will review how my own profiles cover my diverse career in chemistry from “lab-rat” to software product manager, to entrepreneur and into the publishing world and my personal efforts to try and popularize science using some of the social media tools.
This is the slideshow for the Growing Your Next Generation of Patrons presentation, by Lexie Robinson and Beth Locy of the Madison Public Library. Presented at the Alabama Library Association Conference, April 18, 2007.
Breaking Down Walls in Enterprise with Social SemanticsJohn Breslin
Keynote Talk at the Workshop on New Trends in Service Oriented Architecture for massive Knowledge processing in Modern Enterprise (SOA-KME 2012) / Palermo, Italy / 6th July 2012
The Year of Blogging Dangerously: Lessons from the "Blogosphere". This talk will describe how to build an institutional repository using free (or cheap) web-based and blogging tools including flickr.com, slideshare.net, citeulike.org, wordpress.com, myexperiment.org and friendfeed.com. We will discuss some strengths and limitations of these tools and what Institutional Repositories can learn from them.
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
This is the second lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
The internet has revolutionized the manner by which we can represent ourselves online by providing us the ability to expose our data, experiences and skills online via blogs, wikis and other crowdsourcing venues. As a result it is possible to contribute to the community while developing a social profile as a scientist. While research scientists are primarily still measured by their contributions to science using the classical method of citation statistics, a number of freely available online tools are now available for scientists to develop their online profile. This is particularly important at a time when alternative measures of contributions to science are being developed – the so-called world of Alternative Metrics. The concept of “rewards and recognition” for participation will be discussed in terms of how the Royal Society of Chemistry intends to add to the alternative metrics data flow to acknowledge scientists for their contributions. This presentation will provide an overview of the myriad of tools available to you at any stage of your career and will hopefully encourage you to actively manage your profile as a scientist as the resume of the future will likely be summarized by your activities and profiles online. I will highlight how to ensure that your personal social media profiles can be made engaging to potential collaborators and employers, how social media can be utilized to engage people into events and how to drive traffic to your own sites should you choose to set them up. I will review how my own profiles cover my diverse career in chemistry from “lab-rat” to software product manager, to entrepreneur and into the publishing world and my personal efforts to try and popularize science using some of the social media tools.
This is the slideshow for the Growing Your Next Generation of Patrons presentation, by Lexie Robinson and Beth Locy of the Madison Public Library. Presented at the Alabama Library Association Conference, April 18, 2007.
Breaking Down Walls in Enterprise with Social SemanticsJohn Breslin
Keynote Talk at the Workshop on New Trends in Service Oriented Architecture for massive Knowledge processing in Modern Enterprise (SOA-KME 2012) / Palermo, Italy / 6th July 2012
The Year of Blogging Dangerously: Lessons from the "Blogosphere". This talk will describe how to build an institutional repository using free (or cheap) web-based and blogging tools including flickr.com, slideshare.net, citeulike.org, wordpress.com, myexperiment.org and friendfeed.com. We will discuss some strengths and limitations of these tools and what Institutional Repositories can learn from them.
Digital Identity is fundamental to collaboration in bioinformatics research and development because it enables attribution, contribution, publication to be recorded and quantified.
However, current models of identity are often obsolete and have problems capturing both small contributions "microattribution" and large contributions "mega-attribution" in Science. Without adequate identity mechanisms, the incentive for collaboration can be reduced, and the utility of collaborative social tools hindered.
Using examples of metabolic pathway analysis with the taverna workbench and myexperiment.org, this talk will illustrate problems and solutions to identifying scientists accurately and effectively in collaborative bioinformatics networks on the Web.
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusDuncan Hull
Abstract: This talk will describe the use of http://www.citeulike.org to manage and share bibliographic references among 1300 scientists and engineers working at the Sanger Institute (http://www.sanger.ac.uk) and European Bioinformatics Insitute (http://www.ebi.ac.uk) based on the Wellcome Trust Genome Campus in Cambridge, UK. Using data from references shared so far, we will illustrate the costs, benefits and adoption of citeulike to create and share bibliographic data on the web.
Presentation from The Influence and Impact of Web 2.0 on Various Applications at the National e-Science Centre, Edinburgh, UK.
Presented at Diana Initiative, Queercon 16, and DEFCON 27 Recon Village 8/9-10, 2019.
When we think of the process for attacking an organization, OSINT comes to the front and center of our minds. This presentation takes a presenter with experience in applying OSINT to effective penetration testing and social engineering and reverse engineers the process to determine what steps can be taken to further complicate their efforts. This is a presentation that talks about online deception, decoy accounts, canary data, encryption, maintaining one’s social media in a secure manner, and protecting one’s identity as much as possible. While nothing is absolute, this is a presentation that will leave attendees more aware of techniques to make it harder for attackers to collect accurate OSINT, either by removal or deception.
The Potential and Challenges of Today's AIBohyun Kim
A preconference presentation given by Bohyun Kim, CTO and Associate Professor, University of Rhode Island Libraries, at the NISO Plus Conference at Baltimore, MD on February 23, 2020.
Slides from the "Author Identity – Creating a new kind of reputation online" session at Science Online London (solo09) with Duncan Hull, Geoffrey Bilder, Michael Habib, Reynold Guida
ResearcherID, Contributor ID, Scopus Author ID, etc. help to connect your scientific record. How do these tools connect to your online identity, and how can OpenID and other tools be integrated? How can we build an online reputation and when should we worry about our privacy?
Forms of Innovation: Collaboration, Attribution, AccessDr Ernesto Priego
I presented this content at the Forms of Innovation: Humanities, Copyright and New Technologies workshop at the University of Durham on Saturday 27 April 2013.
To download this file, please go to http://figshare.com/articles/Forms_of_Innovation_Collaboration_Attribution_Access/693048
This deck of slides is a slightly modified version of the original file I showed that day.
This deck of slides is licensed by Ernesto Priego under a Creative Commons Attribution 3.0 Unported License.
Forms of Innovation: Collaboration, Attribution, Access. Ernesto Priego. figshare.
http://dx.doi.org/10.6084/m9.figshare.693048
Retrieved 13:25, Apr 29, 2013 (GMT)
Digital Humanities is a term that elicits both excitement and scorn in scholarly circles, and there is still a great deal of discussion as to whether it is a field of inquiry, a set of research methods, or simply a new perspective on arts and humanities research. This workshop will provide a brief survey of how the evolving theory and practice of using contemporary technology and technology-assisted research methods are impacting scholarship in the arts and humanities.
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
What is ‘research impact’ in an interconnected world?Danny Kingsley
This talk looks at what researchers need to do to ensure their research is widely disseminated and reaches the largest audience possible. In summary: Publishing a paper is the beginning not the end; Making work open access does not mean it is accessible; Writing in plain language is translating, not dumbing it down; Sharing work involves peer networks and publishing platforms and If you don't take control of your online presence someone/something else will. The presentation was originally given as part of the Cambridge University Alumni Festival on 27 September 2015.
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is an Enterprise Security Consultant at Sword and Shield Enterprise Security in Knoxville, TN. Joe also maintains his own Blog and Podcast called Advanced Persistent Security. In his spare time, Joe enjoys reading news relevant to information security, attending information security conferences, contributing blogs to various outlets, bass fishing, and flying his drone.
Wikipedia at the Royal Society: The Good, the Bad and the UglyDuncan Hull
Wikipedia has a troubled relationship with scientists and their science. Many scientists are wary of editing Wikipedia and reluctant to contribute their knowledge to it, despite its global reach. Consequently, Wikipedia's coverage of Science is very variable with many notable scientists work either completely absent or poorly described.
There are several WikiProjects that are tackling these problems across Science, including in Computational Biology, Medicine, Cell Biology, Physiology and Women Scientists.
This talk will describe how the WikiProject Royal Society has addressed these issues, through its Wikipedian in Residence scheme. We will examine the outcomes of the project as well as the challenges that remain for this ongoing collaboration between the Royal Society and Wikimedia UK.
We will discuss the good, bad and "ugly" aspects of scientists Wiki-biographies (quick biographies in Wikipedia) and draw conclusions about improving coverage of Scientists, and their Science in Wikipedia using the resources of a learned academic society.
Speaker biography: Dr. Duncan Hull is a lecturer in the School of Computer Science at the University of Manchester who started editing Wikipedia in 2004. He helped setup the Wikipedian in Residence scheme at the Royal Society in 2012.
Part of a joint presentation with Midori Harris comparing OWL (Web Ontology Language) and OBO (Open Biomedical Ontologies) as ontology languages, This presentation concentrates on OWL, Midori Harris presented OBO.
Accessing small molecule data using ChEBIDuncan Hull
Presentation on Chemical Entities of Biological Interest (ChEBI) for the Programmatic Access to Biological Databases (Perl) course
22-26 February 2010 @ EBI
Defrosting the Digital Library: A survey of bibliographic tools for the next ...Duncan Hull
After centuries with little change, scientific libraries have recently experienced massive upheaval. From being almost entirely paper-based, most libraries are now almost completely digital. This information revolution has all happened in less than 20 years and has created many novel opportunities and threats for scientists, publishers and libraries.
Today, we are struggling with an embarassing wealth of digital knowledge on the Web. Most scientists access this knowledge through some kind of digital library, however these places can be cold, impersonal, isolated, and inaccessible places. Many libraries are still clinging to obsolete models of identity, attribution, contribution, citation and publication.
Based on a review published in PLoS Computational Biology, http://pubmed.gov/18974831 this talk will discuss the current chilly state of digital libraries for biologists, chemists and informaticians, including PubMed and Google Scholar. We highlight problems and solutions to the coupling and decoupling of publication data and metadata, with a tool called http://www.citeulike.org. This software tool exploits the Web to make digital libraries “warmer”: more personal, sociable, integrated, and accessible places.
Finally issues that will help or hinder the continued warming of libraries in the future, particularly the accurate identity of authors and their publications, are briefly introduced. These are discussed in the context of the BBSRC funded REFINE project, at the National Centre for Text Mining (NaCTeM.ac.uk), which is linking biochemical pathway data with evidence for pathways from the PubMed database.
The Seven Deadly Sins of BioinformaticsDuncan Hull
Keynote talk at Bioinformatics Open Source Conference (BOSC) Special Interest Group at the 15th Annual International Conference on Intelligent Systems for Molecular Biology (ISMB 2007) in Vienna, July 2007 by Carole Goble, University of Manchester.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
The Invisible Scientist
1. The Invisible Scientist
Personal Digital Identity
on the Web:
Problems + Solutions
Duncan Hull
The University of Manchester
Science Foo Camp 2009
The Googleplex
Mountain View, California
2. The Invisible Scientist: Digital Identity
• I am not an identity or security expert but…
• Introduction: Personal Identity historically and currently
• The Problem:
– The way we identify scientists on the Web is inefficient and badly broken
– Which can make much of their work “invisible”
• Some solutions:
– URIs
– OpenIDs
~15 minutes of slides
– Contributor-ID (www.crossref.org) ~45 minutes for discussion
• Conclusions + What might better digital identities allow?
3. Tools for sharing data on the Web < 10 yrs old
All these social software tools are reliant on digital identity of some form
http://tinyurl.com/myscience
These tools are good but…
4. Unfortunately
• Many biomedical scientists don’t use these tools for serious work
– (if at all)
• Why?
• It’s complicated but…
5. Scientific publishing has worked this way for centuries
• Publishing the main (perhaps only) way of formally identifying people and their work
• “Publish or Perish”
7. Identity is different
• http://www.cs.bris.ac.uk/~gough/ on the Web:
• http://en.wikipedia.org/wiki/Julian_Gough We use URI’s to
identify people
• http://twitter.com/SUPERFAMILY
• http://www.juliangough.com/
• http://www.linkedin.com/pub/julian-gough/b/25b/3b3
• http://www.citeulike.org/tag/julian-gough
• http://dblp.uni-trier.de/db/indices/a-tree/g/Gough:Julian.html
• http://pubmed.gov/?Term=Julian+Gough[author]
• http://pubmed.gov/?Term=Gough+J[author] Julian Gough
• http://www.facebook.com/julian.gough
But do all these URI’s identify the same person?
8. Science is increasingly Digital
• Science is increasingly digital
– Not just digital publications in electronic journals…
– wiki edits (e.g. Rfam and Pfam in wikipedia, robert hoffman wikgenes)
– Software development, workflows
– Development of databases and ontologies - “data driven science” + “open data”
– blog posts
• Traditional journal publishing is often inadequate for sharing this kind of data
and attributing it to individual people
– See “Defrosting the Digital Libray” in PLoS Computational Biology for details
– Hull et all (2008) http://pubmed.gov/18974831
• No good incentives to make digital contributions (besides traditional publishing)
• “Micro-attribution” - a large number of small contributions go unrewarded
10. Misattribution (part 2)
• “Forgotten Password”, “Already Registered”, “Please Login”, “Access Denied”
are all recognised as “authors” in Google Scholar
http://tinyurl.com/phantom-user
11. Digital attribution
Attribution would seem to be a simple
process and yet it represents a
major, unsolved problem
for information science.
Neil Smalheiser and Vetle Torvik
Author name disambiguation
Chapter published in Volume 43 (2009) of the
Annual Review of Information Science and Technology (ARIST)
(edited by B. Cronin) which is available from the publisher Information Today, Inc
http://www.hbs.edu/units/tom/seminars/2007/docs/Author%20Name%20Disambiguation.pdf
12. Digital identity is currently a mess
• As well as identifying and attributing with URIs, we also need to:
– Attribution: Julian AuthorOf IncrediblyImportantThing
– Authentication: is Julian is who he says he is? Or a fake?
– Authorisation: is Julian authorised to do stuff?
Currently done through
combination of username-and-password
The average user has
[at least]
18 user accounts
and 3.49 passwords”
Simon Willison
(The Guardian) http://tinyurl.com/too-many-passwords
13. Digital Identity Really Matters
• Digital Identity is a pre-requisite for
– Attribution …
– Contribution…
– Publication … to be recorded and quantified.
• Important decisions made on digital identity
– Hiring, funding, promotion, collaboration
– Selecting appropriate reviewers for grants and publications
– attributing published data in an increasingly web-based world
• This is the environment which social software / Web 2.0 operates in:
– Reliant on accurate and efficient digital identities
14. What is myExperiment? http://www.myexperiment.org
• Facebook for Scientists?
• Collaborative software for sharing and finding experimental protocols on the web
15. Who is involved in
myExperiment?
Carole Goble
• Small team of developers (2-3 full time) David De Roure
• 1500 users have uploaded 560 workflows, 150 files
and 40 packs in 130 groups
18. Open ID is quickly becoming widespread
“42,235 sites are now enabled to accept OpenID logins” source
http://blog.janrain.com/2009/05/relying-party-stats-as-of-may-1-2009.html
19. But there are usability “issues”
einstein@uzh.ch
84%
+
mcsquared
OR
http://einstein.myopenid.com/ 16%
Password handled by third party
OpenID provider
Unless you hide it (e.g. Gmail, wordpress)
20. Crossref solution: DOIs for people
Geoffrey Bilder
• Crossref has solved a similar problem with identifying publications across different
publishers called “Digital Object Identifiers (DOI)”
– DOI:10.1371/journal.pcbi.1000204
– http://dx.doi.org/10.1371/journal.pcbi.1000204
– They are working on something similar for people
• DOI’s for scientists “Contributor ID”
– Watch this space…
21. Conclusions
• Digital Identity is broken (many biomedical scientists don’t realise)
– Important contributions are not properly attributed
– Misattribution can lead to invisibility
– This can discourage scientists from using the web more
• Fixing digital identities could make science more efficient
– Recognise digital contributions
– Motivate people to make non-publication contributions
• Technical problem mostly solved
• Discussion: The Good, The Bad and The Ugly Things identity might allow…
– Over to you!