Nigel Shadbolt

ORCID: 0000-0002-5085-9724
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Semantic Web and Ontologies
  • Service-Oriented Architecture and Web Services
  • Privacy, Security, and Data Protection
  • Scientific Computing and Data Management
  • Advanced Database Systems and Queries
  • Biomedical Text Mining and Ontologies
  • Complex Network Analysis Techniques
  • AI-based Problem Solving and Planning
  • Multi-Agent Systems and Negotiation
  • Natural Language Processing Techniques
  • Wikis in Education and Collaboration
  • Advanced Malware Detection Techniques
  • Innovative Human-Technology Interaction
  • Web Data Mining and Analysis
  • Mobile Crowdsensing and Crowdsourcing
  • Distributed and Parallel Computing Systems
  • Impact of Technology on Adolescents
  • Logic, Reasoning, and Knowledge
  • Data Quality and Management
  • Child Development and Digital Technology
  • Big Data and Business Intelligence
  • Topic Modeling
  • Privacy-Preserving Technologies in Data
  • Business Process Modeling and Analysis
  • Ethics and Social Impacts of AI

University of Oxford
2016-2025

University of Leeds
2024

Turing Institute
2024

The Alan Turing Institute
2024

TU Wien
2024

Open Data Institute
2015-2023

University of Southampton
2008-2017

Nottingham Trent University
2013

IBM (United States)
2008

Rensselaer Polytechnic Institute
2008

The article included many scenarios in which intelligent agents and bots undertook tasks on behalf of their human or corporate owners. Of course, shopbots auction abound the Web, but these are essentially handcrafted for particular tasks: they have little ability to interact with heterogeneous data information types. Because we haven't yet delivered large-scale, agent-based mediation, some commentators argue that semantic Web has failed deliver. We can only flourish when standards well...

10.1109/mis.2006.62 article EN IEEE Intelligent Systems 2006-05-01

Data-driven decision-making consequential to individuals raises important questions of accountability and justice. Indeed, European law provides limited rights 'meaningful information about the logic' behind significant, autonomous decisions such as loan approvals, insurance quotes, CV filtering. We undertake three experimental studies examining people's perceptions justice in algorithmic under different scenarios explanation styles. Dimensions previously observed response human appear...

10.1145/3173574.3173951 preprint EN 2018-04-20

The Web must be studied as an entity in its own right to ensure it keeps flourishing and prevent unanticipated social effects.

10.1145/1364782.1364798 article EN Communications of the ACM 2008-06-24

A project to extract value from open government data contributes the population of linked Web with high-value good provenance.

10.1109/mis.2012.23 article EN IEEE Intelligent Systems 2012-03-19

The Critical Decision Method (CDM) is an approach to cognitive task analysis. method involves multiple-pass event retrospection guided by probe questions. CDM has been used in the elicitation of expert knowledge diverse domains and for applications including system development instructional design. research illustrates sorts representation products that can arise from analysis (e.g., Situation Assessment Records, time lines, decision requirements). also shows how one methodological issues...

10.1518/001872098779480442 article EN Human Factors The Journal of the Human Factors and Ergonomics Society 1998-06-01

269182MetricsTotal Downloads269Last 6 Months38Last 12 Months82Total Citations182Last Months0Last Months0View all metrics

10.1126/science.1126902 article EN Science 2006-08-10

The growth of information acquisition, storage and retrieval capacity has led to the development practice lifelogging, undiscriminating collection concerning one's life behaviour. There are potential problems in this practice, but equally it could be empowering for individual, provide a new locus construction an online identity. In paper we look at technological possibilities constraints lifelogging tools, set out some most important privacy, identity empowerment-related issues. We argue...

10.1007/s12394-009-0008-4 article EN cc-by-nc Identity in the Information Society 2009-02-19

Many people struggle to control their use of digital devices. However, our understanding the design mechanisms that support user self-control remains limited. In this paper, we make two contributions HCI research in space: first, analyse 367 apps and browser extensions from Google Play, Chrome Web, Apple App stores identify common core features intervention strategies afforded by current tools for self-control. Second, adapt apply an integrative dual systems model self-regulation as a...

10.1145/3290605.3300361 preprint EN 2019-04-29

At the beginning of twenty-first century, before power online social networking became apparent, several studies speculated about likely structure organised cybercrime. In light new data on cybercriminal organisations, this paper sets out to revisit their claims. This examines cybercrime by analysing from underground markets previously in operation over Internet. order understand various structures which have manifested, theories are drawn psychology, crime and transaction cost economics...

10.1080/10439463.2013.780227 article EN Policing & Society 2013-04-08

Most users of smartphone apps remain unaware what data about them is being collected, by whom, and how these are used. In this mixed methods investigation, we examine the question whether revealing key collection practices may help people make more informed privacy-related decisions. To investigate question, designed prototyped a new class privacy indicators, called Data Controller Indicators (DCIs), that expose previously hidden information flows out apps. Our lab study DCIs suggests such...

10.1145/3025453.3025556 article EN 2017-05-02

Patient-generated data, such as data from wearable fitness trackers and smartphone apps, are viewed a valuable information source towards personalised healthcare. However, studies in specific clinical settings have revealed diverse barriers to their effective use. In this paper, we address the following question: there prevalent across distinct workflows using patient-generated data? We conducted two-part investigation: literature review of identifying barriers; interviews with specialists...

10.1145/3173574.3174058 article EN 2018-04-20

Children under 11 are often regarded as too young to comprehend the implications of online privacy. Perhaps a result, little research has focused on younger kids' risk recognition and coping. Such knowledge is, however, critical for designing efficient safeguarding mechanisms this age group. Through 12 focus group studies with 29 children aged 6-10 from UK schools, we examined how described privacy risks related their use tablet computers what information was used by them identify threats....

10.1145/3290605.3300336 preprint EN 2019-04-29

Tracking is a highly privacy-invasive data collection practice that has been ubiquitous in mobile apps for many years due to its role supporting advertising-based revenue models. In response, Apple introduced two significant changes with iOS 14: App Transparency (ATT), mandatory opt-in system enabling tracking on iOS, and Privacy Nutrition Labels, which disclose what kinds of each app processes. So far, the impact these individual privacy control not well understood. This paper addresses...

10.1145/3531146.3533116 article EN 2022 ACM Conference on Fairness, Accountability, and Transparency 2022-06-20

Abstract While many studies have looked at privacy properties of the Android and Google Play app ecosystem, comparatively much less is known about iOS Apple App Store, most widely used ecosystem in US. At same time, there increasing competition around between these smartphone operating system providers. In this paper, we present a study 24k apps from 2020 along several dimensions relating to user privacy. We find that third-party tracking sharing unique identifiers was widespread both...

10.2478/popets-2022-0033 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2022-03-03

10.1006/ijhc.1999.0278 article EN International Journal of Human-Computer Studies 1999-09-01
Coming Soon ...