ORCID Profile
0000-0002-1485-4723
Current Organisations
University Of Strathclyde
,
University of Dundee
,
Edinburgh Napier University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: ACM
Date: 23-10-2016
Publisher: ACM
Date: 02-05-2017
Publisher: School of Advanced Study
Date: 25-01-2014
Publisher: Association for Research in Vision and Ophthalmology (ARVO)
Date: 15-09-2016
DOI: 10.1167/TVST.5.5.6
Publisher: IGI Global
Date: 2011
DOI: 10.4018/978-1-60960-866-8.CH012
Abstract: In this chapter, we describe in detail the opportunities e-health can offer in the context of digital inclusion by reducing social exclusion and enhancing quality of life through thoughtful technology intervention. We highlight the problems that may emerge or persist if the design of e-health systems does not fully take into account the challenges of user access and adoption. We show how principles of user-centred and inclusive design can be used as a basis on which successful e-health systems can be developed and implemented and offer suggestions for how these principles can best influence design of future systems.
Publisher: Berghahn Books
Date: 2015
Publisher: Association for Computing Machinery (ACM)
Date: 23-04-2019
DOI: 10.1145/3320505
Publisher: Apollo - University of Cambridge Repository
Date: 2016
DOI: 10.17863/CAM.32078
Publisher: Palgrave Macmillan UK
Date: 2016
Publisher: IEEE
Date: 06-2008
DOI: 10.1109/CBMS.2008.36
Publisher: Design Research Society
Date: 25-06-2016
Publisher: ACM
Date: 05-04-2008
Publisher: BCS Learning & Development
Date: 2010
Publisher: Informa UK Limited
Date: 17-11-2016
Publisher: Routledge
Date: 09-03-2022
Publisher: ACM
Date: 04-04-2009
Publisher: ACM
Date: 21-06-2014
Publisher: ACM
Date: 23-10-2016
Publisher: Loughborough University
Date: 2019
Publisher: Unpublished
Date: 2015
Publisher: Informa UK Limited
Date: 11-03-2014
Publisher: ACM
Date: 06-07-2022
Publisher: ACM
Date: 10-06-2017
Publisher: ACM
Date: 28-04-2007
Publisher: Association for Computing Machinery (ACM)
Date: 07-11-2022
DOI: 10.1145/3555214
Abstract: When pieces from an in idual's personal information available online are connected over time and across multiple platforms, this more complete digital trace can give unintended insights into their life and opinions. In a data narrative interview study with 26 currently employed participants, we examined risks and harms to in iduals and employers when others joined the dots between their online information. We discuss the themes of visibility and self-disclosure, unintentional information leakage and digital privacy literacies constructed from our analysis. We contribute insights not only into people's difficulties in recalling and conceptualising their digital traces but of subsequently envisioning how their online information may be combined, or (re)identified across their traces and address a current gap in research by showing that awareness is lacking around the potential for personal information to be correlated by and made coherent to/by others, posing risks to in iduals, employers, and even the state. We touch on inequalities of privacy, freedom and legitimacy that exist for different groups with regard to what they make (or feel compelled to make) available online and we contribute to current methodological work on the use of sketching to support visual sense making in data narrative interviews. We conclude by discussing the need for interventions that support personal reflection on the potential visibility of combined digital traces to spotlight hidden vulnerabilities, and promote more proactive action about what is shared and not shared online.
Publisher: ACM
Date: 07-05-2016
Publisher: SAGE Publications
Date: 06-2012
DOI: 10.2190/OM.64.4.A
Abstract: The article outlines the issues that the internet presents to death studies. Part 1 describes a range of online practices that may affect dying, the funeral, grief and memorialization, inheritance and archaeology it also summarizes the kinds of research that have been done in these fields. Part 2 argues that these new online practices have implications for, and may be illuminated by, key concepts in death studies: the sequestration (or separation from everyday life) of death and dying, disenfranchisement of grief, private grief, social death, illness and grief narratives, continuing bonds with the dead, and the presence of the dead in society. In particular, social network sites can bring dying and grieving out of both the private and public realms and into the everyday life of social networks beyond the immediate family, and provide an audience for once private communications with the dead.
Publisher: ACM
Date: 02-05-2019
Publisher: ACM
Date: 02-05-2019
Publisher: Elsevier BV
Date: 07-2023
Publisher: Informa UK Limited
Date: 02-10-2017
Publisher: ACM
Date: 27-04-2013
Publisher: Weblaw
Date: 2022
Publisher: ACM
Date: 27-04-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: ACM
Date: 07-05-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2010
Publisher: Informa UK Limited
Date: 02-01-2022
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-4053-3.CH007
Abstract: Across many online contexts, internet users are required to make judgments of trustworthiness in the systems or other users that they are connecting with. But how can a user know that the interactions they engage in are legitimate? In cases where trust is manipulated, there can be severe consequences for the user both economically and psychologically. In this chapter, the authors outline key psychological literature to date that has addressed the question of how trust develops in online environments. Specifically, three use cases in which trust relationships emerge are discussed: crowdfunding, online health forums, and online dating. By including ex les of different types of online interaction, the authors aim to demonstrate the need for advanced security measures that ensure valid trust judgments and minimise the risk of fraud victimisation.
Publisher: ACM
Date: 25-07-2020
Publisher: ACM
Date: 09-11-2019
Publisher: ACM
Date: 27-02-2016
Publisher: Elsevier BV
Date: 2020
DOI: 10.1016/J.DRUGPO.2019.102621
Abstract: This systematic review attempts to understand how people keep secrets online, and in particular how people use the internet when engaging in covert behaviours and activities regarding the procurement and supply of illicit drugs. With the Internet and social media being part of everyday life for most people in western and non-western countries, there are ever-growing opportunities for in iduals to engage in covert behaviours and activities online that may be considered illegal or unethical. A search strategy using Medical Subject Headings terms and relevant key words was developed. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Additional studies were identified from reference lists of previous studies and (systematic) reviews that had similar objectives as this search, and were included if they fulfilled our inclusion criteria. Two researchers independently screened abstracts and full-texts for study eligibility and evaluated the quality of included studies. Disagreements were resolved by a consensus procedure. The systematic review includes 33 qualitative studies and one cross-sectional study, published between 2006 and 2018. Five covert behaviours were identified: the use of communication channels anonymity visibility reduction limited posts in public following forum rules and recommendations. The same technologies that provide in iduals with easy access to information, such as social networking sites and forums, digital devices, digital tools and services, also increase the prevalence of inaccurate information, loss of privacy, identity theft and disinhibited communication. This review takes a rigorous interdisciplinary approach to synthesising knowledge on the strategies adopted by people in keeping secrets online. Whilst the focus is on the procurement and supply of illicit drugs, this knowledge is transferrable to a range of contexts where people keep secrets online. It has particular significance for those who design online/social media applications, and for law enforcement and security agencies.
Publisher: Association for Computing Machinery (ACM)
Date: 08-02-2020
DOI: 10.1145/3373148
Abstract: We report on two studies undertaken to establish the factors that affect funders’ trust and likelihood to invest in crowdfunding c aigns online. Findings from an initial small-scale qualitative study are reported and subsequently triangulated in a larger quantitative survey. Across these studies, we demonstrate the importance of social information within the peer economy, with a strong reliance on other users across the course of the investment decision-making process. Decision making on whether to invest is informed not only by the content of the crowdfunding c aign page but also by social influence factors that are present (e.g., liking of the c aigner, reciprocity). It is further shaped by due diligence checks focused on the progression of the prototype for which funding is sought, and by assurances from outside the c aign page—namely on social media. Such assurances center around the importance of social proof, garnered through opinions of previous customers or other funders. The risk here is that much of this information is content that can be faked, and as such a reliance on this may leave potential funders vulnerable. Meanwhile, a genuine lack of prior experience and customer base means that some legitimate c aigners struggle to gain trust from potential investors who are reliant on such social information. Our findings present an empirical grounding to develop future security solutions that (1) protect existing funders and (2) increase potential funders’ level of trust, to encourage their engagement with legitimate crowdfunding c aigns.
Publisher: Informa UK Limited
Date: 04-2019
Publisher: MIT Press - Journals
Date: 2018
DOI: 10.1162/DESI_E_00472
Publisher: IGI Global
Date: 2013
DOI: 10.4018/978-1-4666-2770-3.CH011
Abstract: In this chapter, we describe in detail the opportunities e-health can offer in the context of digital inclusion by reducing social exclusion and enhancing quality of life through thoughtful technology intervention. We highlight the problems that may emerge or persist if the design of e-health systems does not fully take into account the challenges of user access and adoption. We show how principles of user-centred and inclusive design can be used as a basis on which successful e-health systems can be developed and implemented and offer suggestions for how these principles can best influence design of future systems.
Publisher: ACM
Date: 20-04-2018
Publisher: Elsevier BV
Date: 10-2016
Publisher: Elsevier BV
Date: 05-2018
Publisher: SAGE Publications
Date: 15-09-2020
Abstract: This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate in iduals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) published between 2004 and 2017. Four covert behaviors linked to covert online strategies around IPV were identified: presence online, granular control, use of digital support tools and services, and stalking and surveillance. The same technology that provides in iduals with easy access to information and supportive services related to IPV, such as digital devices, tools, and services, also enables perpetrators to monitor or harass their partners. This review takes a rigorous interdisciplinary approach to synthesizing knowledge on the covert strategies adopted by people in relation to IPV. It has particular relevance to practitioners who support survivors in increasing awareness of the role of digital technologies in IPV, to law enforcement agencies in identifying new forms of evidence of abuse, and in enabling designers of online/social media applications to take the needs and vulnerabilities of IPV survivors into account.
Publisher: ACM
Date: 05-05-2012
Location: United Kingdom of Great Britain and Northern Ireland
Location: United Kingdom of Great Britain and Northern Ireland
Location: United Kingdom of Great Britain and Northern Ireland
Location: United Kingdom of Great Britain and Northern Ireland
Start Date: 2022
End Date: 2025
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2019
End Date: 2022
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2011
End Date: 2014
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2013
End Date: 2016
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2020
End Date: 2022
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2016
End Date: 2020
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2017
End Date: 2020
Funder: Engineering and Physical Sciences Research Council
View Funded ActivityStart Date: 2016
End Date: 2019
Funder: Microsoft Research
View Funded Activity