David De Roure

David De Roure
University of Oxford | OX · Oxford e-Research Centre

About

550
Publications
76,851
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,420
Citations
Citations since 2017
85 Research Items
3382 Citations
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500

Publications

Publications (550)
Article
Full-text available
Purpose The study critically reassesses existing Metaverse concepts and proposes a novel framework for inclusiveness of physically disabled artists. The purpose is to enable and inspire physically disabled users and content creators to participate in the evolving concept of the Metaverse. The article also highlights the need for standards and regul...
Preprint
Full-text available
Despite the proliferation of Blockchain Metaverse projects, the inclusion of physically disabled individuals in the Metaverse remains distant, with limited standards and regulations in place. However, the article proposes a concept of the Metaverse that leverages emerging technologies, such as Virtual and Augmented Reality, and the Internet of Thin...
Preprint
This article is focused on accessibility and inclusiveness of the new Metaverse(s). We conducted a detailed review of the existing standards and we cannot find anything that would ensure these technologies are inclusive of people with physical disabilities. This is the first step in providing some of the answers, and in this article, we discuss man...
Preprint
Full-text available
One of the most burning topics in cybersecurity in 2023 will undoubtedly be the compliance with the Software Bill of Materials. Since the US president issued the Executive Order 14028 on Improving the Nation’s Cybersecurity, software developers have prepared and bills are transmitted to vendors, customers, and users, but they don’t know what to do...
Article
Full-text available
Objective The objective of this theoretical paper is to identify conceptual solutions for securing, predicting, and improving vaccine production and supply chains. Method The case study, action research, and review method is used with secondary data – publicly available open access data. Results A set of six algorithmic solutions is presented for...
Preprint
Full-text available
A set of six algorithmic solutions is presented for resolving vaccine production and supply chain bottlenecks. A different set of algorithmic solutions is presented for forecasting risks during a Disease X event.
Preprint
Full-text available
The article forecasts emerging cyber-risks from the integration of AI in cybersecurity.
Preprint
Full-text available
To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The new...
Preprint
Full-text available
This article presents a new design for autonomous artificial intelligence (AI), based on the state-of-the-art algorithms, and describes a new autonomous AI system called AutoAI. The methodology is used to assemble the design founded on self-improved algorithms that use new and emerging sources of data (NEFD). The objective of the article is to conc...
Preprint
Full-text available
With the increased digitalisation of our society, new and emerging forms of data present new values and opportunities for improved data driven multimedia services, or even new solutions for managing future global pandemics (i.e., Disease X). The results are somewhat unexpected. Despite the special relationship between the US and the UK, there is no...
Preprint
Full-text available
This article advances the knowledge on teaching and training new artificial intelligence algorithms, for securing, preparing, and adapting the healthcare system to cope with future pandemics. The core objective is to develop a concept healthcare system supported by autonomous artificial intelligence that can use edge health devices with real-time d...
Article
Full-text available
This article advances the knowledge on teaching and training new artificial intelligence algorithms, for securing, preparing, and adapting the healthcare system to cope with future pandemics. The core objective is to develop a concept healthcare system supported by autonomous artificial intelligence that can use edge health devices with real-time d...
Article
Full-text available
With the increased digitalisation of our society, new and emerging forms of data present new values and opportunities for improved data driven multimedia services, or even new solutions for managing future global pandemics (i.e., Disease X). This article conducts a literature review and bibliometric analysis of existing research records on new and...
Article
Full-text available
In this article, we conduct data mining and statistical analysis on the most effective countries, universities, and companies, based on their output (e.g., produced or collaborated) on COVID-19 during the first wave of the pandemic. Hence, the focus of this article is on the first wave of the pandemic. While in later stages of the pandemic, US and...
Article
Full-text available
This article presents a new design for autonomous artificial intelligence (AI), based on the state-of-the-art algorithms, and describes a new autonomous AI system called ‘AutoAI’. The methodology is used to assemble the design founded on self-improved algorithms that use new and emerging sources of data (NEFD). The objective of the article is to co...
Article
Full-text available
Unlabelled: This article investigates cybersecurity (and risk) in the context of 'technological singularity' from artificial intelligence. The investigation constructs multiple risk forecasts that are synthesised in a new framework for counteracting risks from artificial intelligence (AI) itself. In other words, the research in this article is not...
Article
Full-text available
This paper presents a summary of mechanisms for the evolution of artificial intelligence in ‘internet of things’ networks. Firstly, the paper investigates how the use of new technologies in industrial systems improves organisational resilience supporting both a technical and human level. Secondly, the paper reports empirical results that correlate...
Article
Full-text available
The field of artificial intelligence has gained a significant attention in the media. Some counties claim to be the leaders in the field, other countries claim to be winning in the race for leadership in artificial intelligence. This article conducts a statistical (i.e., bibliometric) analysis of research data records on artificial intelligence by...
Article
Full-text available
Artificial intelligence and edge devices have been used at an increased rate in managing the COVID-19 pandemic. In this article we review the lessons learned from COVID-19 to postulate possible solutions for a Disease X event. The overall purpose of the study and the research problems investigated is the integration of artificial intelligence funct...
Preprint
Full-text available
This article investigates cybersecurity (and risk) in the context of ‘technological singularity’ from artificial intelligence. The investigation constructs multiple risk forecasts that are synthesised in a new framework for counteracting risks from AI itself. In other words, the research concern in this article is not just with securing a system, b...
Article
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Article
Full-text available
Identify and review alternative (home-based) therapies for prolonged lockdowns. Interdisciplinary study using multi-method approach – case study, action research, grounded theory. Only secondary data has been used in this study. Epistemological framework based on a set of digital humanities tools. The set of tools are based on publicly available, o...
Article
Full-text available
The focus in this paper is placed on shared responsibility and ethics in health policy, specific to Internet of Things (IoT) devices in healthcare systems. The article assesses how the introduction of IoT brings risks to the security of medical systems. The justification for this research emerges from the opportunities emerging from digital technol...
Article
Full-text available
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessmen...
Article
Full-text available
This article addresses the topic of shared responsibilities in supply chains, with a specific focus on the application of the Internet of Things (IoT) in e-health environments, and Industry 4.0 issues—concerning data security, privacy, reliability and management, data mining and knowledge exchange as well as health prevention. In this article, we c...
Article
Full-text available
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results...
Article
Full-text available
The aim of the article is to conceptualise a more compact and efficient version of algorithms for artificial intelligence (AI). The core objective is to construct the design for a self-optimising and self-adapting autonomous artificial intelligence (AutoAI) that can be applied for edge analytics using real-time data. The methodology is based on syn...
Preprint
Full-text available
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industr...
Article
Full-text available
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industr...
Article
Full-text available
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in t...
Article
Full-text available
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in connected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide r...
Article
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
This review paper investigates the integration of predictive, preventive and personalised interoperable digital healthcare systems. The second point of interest is the use of new mass surveillance technologies to feed personal data from health professionals to governments, without any comprehensive studies that determine if such new technologies an...
Preprint
Full-text available
In this study, we investigate the scientific research response from the early stages of the pandemic, and we review key findings on how the early warning systems developed in previous epidemics responded to contain the virus. The data records are analysed with commutable statistical methods, including R Studio, Bibliometrix package, and the Web of...
Preprint
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Preprint
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Article
Full-text available
Objectives Review, compare and critically assess digital technology responses to the COVID-19 pandemic around the world. The specific point of interest in this research is on predictive, preventive and personalized interoperable digital healthcare solutions. This point is supported by failures from the past, where the separate design of digital hea...
Article
Full-text available
Background and aims Covid-19 is a global pandemic that requires a global and integrated response of all national medical and healthcare systems. Covid-19 exposed the need for timely response and data sharing on fast spreading global pandemics. In this study, we investigate the scientific research response from the early stages of the pandemic, and...
Article
Full-text available
Background This study concerns the perception of musical segmentation during listening to live contemporary classical music. Little is known about how listeners form judgments of musical segments, particularly when typical section markers, such as cadences and fermatas, are absent [e.g., Sears et al. (2014)] or when the music is non-tonal (e.g., in...
Preprint
Full-text available
What makes cyber risks arising from connected systems challenging during the management of a pandemic? Assuming that a variety of cyber-physical systems are already operational-collecting, analyzing, and acting on data autonomously-what risks might arise in their application to pandemic management? We already have these systems operational, collect...
Preprint
Full-text available
In this article, we conduct data mining to discover the countries, universities and companies, produced or collaborated the most research on Covid-19 since the pandemic started. We present some interesting findings, but despite analysing all available records on COVID-19 from the Web of Science Core Collection, we failed to reach any significant co...
Preprint
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for...
Conference Paper
We present an ongoing project using Joshua Steele's symbolic notation to represent prosody in Eighteenth Century dramatic performances. We discuss the sonification of the original notation to simulate the work and how it can be used to support other experiments. Drawing on two experimental models and their different methodologies, we consider how t...
Conference Paper
When people interact through technical infrastructure such as that of organisations or the World Wide Web, this infrastructure will change and in some cases new identifiable structures or even eco-systems may emerge. Examples of such emergent socio-technical systems on the Web include some social machines and phenomena such as echo chambers. To mod...
Conference Paper
The concept of Social Machines has become an established lens to describe the sociotechnical systems of Web Science, and has been applied to some archetypical cyberphysical systems. In this paper we apply this lens to a larger system, the location based online augmented reality game Pokémon Go!. The contributions are an illustrative application of...
Preprint
Full-text available
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results...
Preprint
Full-text available
The Internet-of-Things (IoT) enables enterprises to obtain profits from data but triggers data protection questions and new types of cyber risk. Cyber risk regulations for the IoT however do not exist. The IoT risk is not included in the cyber security assessment standards, hence, often not visible to cyber security experts. This is concerning, bec...
Chapter
This opening chapter introduces the idea of social machines. The metaphor of a machine is introduced, and it is explained how it applies to social groups connected through digitally networked technologies, ubiquitous devices and large quantities of data. Social machines enable mechanistic explanations of social phenomena, without the reductionist c...
Chapter
This chapter considers the theory of social machines, from three perspectives. First, it looks at social machines as social; second, as machines; third, it takes the perspective of the data that fuels the machines. Looking at the sociality of social machines, the chapter considers various approaches to developing meaningful narratives around the op...
Chapter
This chapter examines how social machines work in practice, and how researchers can understand them and intervene them when appropriate. It begins with a discussion of how to gather the evidence about social machines, and introduces the idea of a distributed Web Observatory, looking at the specific example of the Southampton University Web Observat...
Chapter
This chapter looks at the issues that social machines raise about privacy, trust and ethics. The chapter begins by surveying the ethical significance of the various roles that are created by social machines, including the individual participant and the designer, and looks at the rights and duties that the occupants of these roles have. Social machi...
Chapter
The final chapter looks to the future of social machines under the conditions of digital modernity, when they will have to coexist and even compete with technologies such as artificial intelligence. They will no doubt require or acquire new forms, new functions, new methods of study and new infrastructure. Examples are given of each of these four....
Book
Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing so...
Conference Paper
Full-text available
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 (I4.0) sector. We report the results of a qualitative empirical study that correlates academic literature with 14 - I4.0 frameworks and initiatives.
Conference Paper
Full-text available
Many existing music ontologies have focused on expressing meta-data related to performances or recordings, aiding with recommendations of songs or artists, and studying the psychological affects of music. These music ontologies provide a foundation for describing many practical aspects related to music. We believe further primitives are needed in o...
Conference Paper
We describe the design and implementation of a semantic music system which illustrates the assembly of a music composition using semantically annotated music fragments. The system, which we call SOFA (SOFA Ontological Fragment Assembler), demonstrates architectural design principles which may have more general applicability in the semantic music do...
Preprint
Full-text available
The concept of social machines is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fad...
Conference Paper
We describe a series of informal exercises in which we have put algorithms in the hands of human performers in order to encourage a human creative response to mathematical and algorithmic input. These 'interventions' include a web-based app, experiments in physical space using Arduinos, and algorithmic augmentation of a keyboard.
Conference Paper
This paper outlines some of the issues that we will be discussing in the workshop “The Design of Future Music Technologies: ‘Sounding Out’ AI, Immersive Experiences & Brain Controlled Interfaces.” Musical creation, performance and consumption is at a crossroads, how will future technologies be affected by exciting and innovative new developments in...
Chapter
This short paper presents the initial research insights of an ongoing research project that focuses upon understanding the role of landscape, its use as a resource for designing interfaces for musical expression, and as a tool for leveraging ethnographic understandings about space, place, design and musical expression. We briefly discuss the emergi...