David De Roure

David De Roure
University of Oxford | OX · Oxford e-Research Centre

About

536
Publications
62,529
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,581
Citations

Publications

Publications (536)
Article
Full-text available
This article advances the knowledge on teaching and training new artificial intelligence algorithms, for securing, preparing, and adapting the healthcare system to cope with future pandemics. The core objective is to develop a concept healthcare system supported by autonomous artificial intelligence that can use edge health devices with real-time d...
Article
Full-text available
With the increased digitalisation of our society, new and emerging forms of data present new values and opportunities for improved data driven multimedia services, or even new solutions for managing future global pandemics (i.e., Disease X). This article conducts a literature review and bibliometric analysis of existing research records on new and...
Article
Full-text available
In this article, we conduct data mining and statistical analysis on the most effective countries, universities, and companies, based on their output (e.g., produced or collaborated) on COVID-19 during the first wave of the pandemic. Hence, the focus of this article is on the first wave of the pandemic. While in later stages of the pandemic, US and...
Article
Full-text available
This article presents a new design for autonomous artificial intelligence (AI), based on the state-of-the-art algorithms, and describes a new autonomous AI system called ‘AutoAI’. The methodology is used to assemble the design founded on self-improved algorithms that use new and emerging sources of data (NEFD). The objective of the article is to co...
Article
Full-text available
This article investigates cybersecurity (and risk) in the context of ‘technological singularity’ from artificial intelligence. The investigation constructs multiple risk forecasts that are synthesised in a new framework for counteracting risks from artificial intelligence (AI) itself. In other words, the research in this article is not just concern...
Article
Full-text available
This paper presents a summary of mechanisms for the evolution of artificial intelligence in ‘internet of things’ networks. Firstly, the paper investigates how the use of new technologies in industrial systems improves organisational resilience supporting both a technical and human level. Secondly, the paper reports empirical results that correlate...
Article
The field of artificial intelligence has gained a significant attention in the media. Some counties claim to be the leaders in the field, other countries claim to be winning in the race for leadership in artificial intelligence. This article conducts a statistical (i.e., bibliometric) analysis of research data records on artificial intelligence by...
Article
Full-text available
Artificial intelligence and edge devices have been used at an increased rate in managing the COVID-19 pandemic. In this article we review the lessons learned from COVID-19 to postulate possible solutions for a Disease X event. The overall purpose of the study and the research problems investigated is the integration of artificial intelligence funct...
Article
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Article
Full-text available
Identify and review alternative (home-based) therapies for prolonged lockdowns. Interdisciplinary study using multi-method approach – case study, action research, grounded theory. Only secondary data has been used in this study. Epistemological framework based on a set of digital humanities tools. The set of tools are based on publicly available, o...
Article
Full-text available
The focus in this paper is placed on shared responsibility and ethics in health policy, specific to Internet of Things (IoT) devices in healthcare systems. The article assesses how the introduction of IoT brings risks to the security of medical systems. The justification for this research emerges from the opportunities emerging from digital technol...
Article
Full-text available
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessmen...
Article
Full-text available
This article addresses the topic of shared responsibilities in supply chains, with a specific focus on the application of the Internet of Things (IoT) in e-health environments, and Industry 4.0 issues—concerning data security, privacy, reliability and management, data mining and knowledge exchange as well as health prevention. In this article, we c...
Article
Full-text available
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results...
Article
Full-text available
The aim of the article is to conceptualise a more compact and efficient version of algorithms for artificial intelligence (AI). The core objective is to construct the design for a self-optimising and self-adapting autonomous artificial intelligence (AutoAI) that can be applied for edge analytics using real-time data. The methodology is based on syn...
Preprint
Full-text available
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industr...
Article
Full-text available
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industr...
Article
Full-text available
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in t...
Article
Full-text available
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in connected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide r...
Article
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
This review paper investigates the integration of predictive, preventive and personalised interoperable digital healthcare systems. The second point of interest is the use of new mass surveillance technologies to feed personal data from health professionals to governments, without any comprehensive studies that determine if such new technologies an...
Preprint
Full-text available
In this study, we investigate the scientific research response from the early stages of the pandemic, and we review key findings on how the early warning systems developed in previous epidemics responded to contain the virus. The data records are analysed with commutable statistical methods, including R Studio, Bibliometrix package, and the Web of...
Preprint
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Preprint
Full-text available
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a...
Article
Full-text available
Objectives Review, compare and critically assess digital technology responses to the COVID-19 pandemic around the world. The specific point of interest in this research is on predictive, preventive and personalized interoperable digital healthcare solutions. This point is supported by failures from the past, where the separate design of digital hea...
Article
Full-text available
Background and aims Covid-19 is a global pandemic that requires a global and integrated response of all national medical and healthcare systems. Covid-19 exposed the need for timely response and data sharing on fast spreading global pandemics. In this study, we investigate the scientific research response from the early stages of the pandemic, and...
Article
Full-text available
Background This study concerns the perception of musical segmentation during listening to live contemporary classical music. Little is known about how listeners form judgments of musical segments, particularly when typical section markers, such as cadences and fermatas, are absent [e.g., Sears et al. (2014)] or when the music is non-tonal (e.g., in...
Preprint
Full-text available
What makes cyber risks arising from connected systems challenging during the management of a pandemic? Assuming that a variety of cyber-physical systems are already operational-collecting, analyzing, and acting on data autonomously-what risks might arise in their application to pandemic management? We already have these systems operational, collect...
Preprint
Full-text available
In this article, we conduct data mining to discover the countries, universities and companies, produced or collaborated the most research on Covid-19 since the pandemic started. We present some interesting findings, but despite analysing all available records on COVID-19 from the Web of Science Core Collection, we failed to reach any significant co...
Preprint
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathemat...
Preprint
Full-text available
In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for...
Conference Paper
We present an ongoing project using Joshua Steele's symbolic notation to represent prosody in Eighteenth Century dramatic performances. We discuss the sonification of the original notation to simulate the work and how it can be used to support other experiments. Drawing on two experimental models and their different methodologies, we consider how t...
Conference Paper
When people interact through technical infrastructure such as that of organisations or the World Wide Web, this infrastructure will change and in some cases new identifiable structures or even eco-systems may emerge. Examples of such emergent socio-technical systems on the Web include some social machines and phenomena such as echo chambers. To mod...
Conference Paper
The concept of Social Machines has become an established lens to describe the sociotechnical systems of Web Science, and has been applied to some archetypical cyberphysical systems. In this paper we apply this lens to a larger system, the location based online augmented reality game Pokémon Go!. The contributions are an illustrative application of...
Preprint
Full-text available
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspective. First, literature published between 2010 and 2021 is reviewed, and compared with the results...
Preprint
Full-text available
The Internet-of-Things (IoT) enables enterprises to obtain profits from data but triggers data protection questions and new types of cyber risk. Cyber risk regulations for the IoT however do not exist. The IoT risk is not included in the cyber security assessment standards, hence, often not visible to cyber security experts. This is concerning, bec...
Chapter
This opening chapter introduces the idea of social machines. The metaphor of a machine is introduced, and it is explained how it applies to social groups connected through digitally networked technologies, ubiquitous devices and large quantities of data. Social machines enable mechanistic explanations of social phenomena, without the reductionist c...
Chapter
This chapter looks at the issues that social machines raise about privacy, trust and ethics. The chapter begins by surveying the ethical significance of the various roles that are created by social machines, including the individual participant and the designer, and looks at the rights and duties that the occupants of these roles have. Social machi...
Chapter
This chapter considers the theory of social machines, from three perspectives. First, it looks at social machines as social; second, as machines; third, it takes the perspective of the data that fuels the machines. Looking at the sociality of social machines, the chapter considers various approaches to developing meaningful narratives around the op...
Chapter
The final chapter looks to the future of social machines under the conditions of digital modernity, when they will have to coexist and even compete with technologies such as artificial intelligence. They will no doubt require or acquire new forms, new functions, new methods of study and new infrastructure. Examples are given of each of these four....
Chapter
This chapter examines how social machines work in practice, and how researchers can understand them and intervene them when appropriate. It begins with a discussion of how to gather the evidence about social machines, and introduces the idea of a distributed Web Observatory, looking at the specific example of the Southampton University Web Observat...
Book
Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing so...
Conference Paper
Full-text available
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 (I4.0) sector. We report the results of a qualitative empirical study that correlates academic literature with 14 - I4.0 frameworks and initiatives.
Conference Paper
Full-text available
Many existing music ontologies have focused on expressing meta-data related to performances or recordings, aiding with recommendations of songs or artists, and studying the psychological affects of music. These music ontologies provide a foundation for describing many practical aspects related to music. We believe further primitives are needed in o...
Conference Paper
We describe the design and implementation of a semantic music system which illustrates the assembly of a music composition using semantically annotated music fragments. The system, which we call SOFA (SOFA Ontological Fragment Assembler), demonstrates architectural design principles which may have more general applicability in the semantic music do...
Preprint
Full-text available
The concept of social machines is increasingly being used to characterise various socio-cognitive spaces on the Web. Social machines are human collectives using networked digital technology which initiate real-world processes and activities including human communication, interactions and knowledge creation. As such, they continuously emerge and fad...
Conference Paper
We describe a series of informal exercises in which we have put algorithms in the hands of human performers in order to encourage a human creative response to mathematical and algorithmic input. These 'interventions' include a web-based app, experiments in physical space using Arduinos, and algorithmic augmentation of a keyboard.
Conference Paper
This paper outlines some of the issues that we will be discussing in the workshop “The Design of Future Music Technologies: ‘Sounding Out’ AI, Immersive Experiences & Brain Controlled Interfaces.” Musical creation, performance and consumption is at a crossroads, how will future technologies be affected by exciting and innovative new developments in...
Chapter
This paper presents the initial research insights of an ongoing research project that focuses upon understanding the role of landscape, its use as a resource for designing interfaces for musical expression, and as a tool for leveraging ethnographic understandings about space, place, design and musical expression. We briefly discuss the emerging res...
Article
Reliably building and maintaining systems across environments is a continuing problem. A project or experiment may run for years. Software and hardware may change as can the operating system. Containerisation is a technology that is used in a variety of companies, such as Google, Amazon and IBM, and scientific projects to rapidly deploy a set of se...
Conference Paper
Full-text available
Security risk assessment methods have served us well over the last two decades. As the complexity, pervasiveness and automation of technology systems increases, particularly with the Internet of Things (IoT), there is a convincing argument that we will need new approaches to assess risk and build system trust. In this article, we report on a series...
Article
Full-text available
We investigate the emerging meanings of “value” associated with the Internet of Things. Given the current political economy, we argue that the multiple meanings of “value” cannot be reduced to a single domain or discipline, but rather they are invariably articulated at the juxtaposition of three domains: social, economic, and technical. We analyse...
Technical Report
Full-text available
IoT is a technology that has been promising for more than a decade now to transform economies and advance ideas of public good and social well-being. This report highlights the efforts that have been done in this respect and identifies the main directions for IoT advancements and the main barriers to IoT adoption. The report focuses on the economic...
Conference Paper
This poster describes a compositional technique that used crowd-sourced midi clips in order to develop a piece of music, which was later performed. This work in progress highlighted some of the issues facing the designers of systems that enable the ‘crowd’ to compose. INTRODUCTION Can the crowd get creative? And what sort of tools might be used to...
Conference Paper
We present initial work that explores the use of sonification to represent Joshua Steele’s symbolic notation. This provides a manner of overhearing a previous performance and testing the method’s reproducibility and uncertainties within it.
Conference Paper
Human-Like Computing technologies are intelligent systems that interact with people in human-like way. By bringing together the disciplines of Artificial Intelligence, Ethnography and Interaction Design, and applying them in a real world context we are able to understand some of the ways that such technologies can be applied. This work in progress...
Article
Full-text available
ABSTRACT Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design and understanding of audio-based mobile systems are...