Nigel Shadbolt’s research while affiliated with University of Oxford and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (595)


Figure 2: A Typical ML Workflow Represented by MG Analyzer. Dashed arrows with different colors indicate properties related to three types of dependencies: compositional, definition, and rights-using dependencies.
Figure 4: Example Workflow: Combine Models, Then Publish.
List of Notices, Warnings, and Errors Reported by MG Analyzer. The triggered work is denoted as ?work.
"They've Stolen My GPL-Licensed Model!": Toward Standardized and Transparent Model Licensing
  • Preprint
  • File available

December 2024

·

5 Reads

·

·

·

[...]

·

Bingsheng He

As model parameter sizes reach the billion-level range and their training consumes zettaFLOPs of computation, components reuse and collaborative development are become increasingly prevalent in the Machine Learning (ML) community. These components, including models, software, and datasets, may originate from various sources and be published under different licenses, which govern the use and distribution of licensed works and their derivatives. However, commonly chosen licenses, such as GPL and Apache, are software-specific and are not clearly defined or bounded in the context of model publishing. Meanwhile, the reused components may also have free-content licenses and model licenses, which pose a potential risk of license noncompliance and rights infringement within the model production workflow. In this paper, we propose addressing the above challenges along two lines: 1) For license analysis, we have developed a new vocabulary for ML workflow management and encoded license rules to enable ontological reasoning for analyzing rights granting and compliance issues. 2) For standardized model publishing, we have drafted a set of model licenses that provide flexible options to meet the diverse needs of model publishing. Our analysis tool is built on Turtle language and Notation3 reasoning engine, envisioned as a first step toward Linked Open Model Production Data. We have also encoded our proposed model licenses into rules and demonstrated the effects of GPL and other commonly used licenses in model publishing, along with the flexibility advantages of our licenses, through comparisons and experiments.

Download

Trouble in Paradise? Understanding Mastodon Admin's Motivations, Experiences, and Challenges Running Decentralised Social Media

November 2024

·

20 Reads

·

1 Citation

Proceedings of the ACM on Human-Computer Interaction

Decentralised social media platforms are increasingly being recognised as viable alternatives to their centralised counterparts. Among these, Mastodon stands out as a popular alternative, offering a citizen-powered option distinct from larger and centralised platforms like Twitter/X. However, the future path of Mastodon remains uncertain, particularly in terms of its challenges and the long-term viability of a more citizen-powered internet. In this paper, following a pre-study survey, we conducted semi-structured interviews with 16 Mastodon instance administrators, including those who host instances to support marginalised and stigmatised communities, to understand their motivations and lived experiences of running decentralised social media. Our research indicates that while decentralised social media offers significant potential in supporting the safety, identity and privacy needs of marginalised and stigmatised communities, they also face considerable challenges in content moderation, community building and governance. We emphasise the importance of considering the community's values and diversity when designing future support mechanisms.



"Diversity is Having the Diversity": Unpacking and Designing for Diversity in Applicant Selection

October 2024

·

41 Reads

When selecting applicants for scholarships, universities, or jobs, practitioners often aim for a diverse cohort of qualified recipients. However, differing articulations, constructs, and notions of diversity prevents decision-makers from operationalising and progressing towards the diversity they all agree is needed. To understand this challenge of translation from values, to requirements, to decision support tools (DSTs), we conducted participatory design studies exploring professionals' varied perceptions of diversity and how to build for them. Our results suggest three definitions of diversity: bringing together different perspectives; ensuring representativeness of a base population; and contextualising applications, which we use to create the Diversity Triangle. We experience-prototyped DSTs reflecting each angle of the Diversity Triangle to enhance decision-making around diversity. We find that notions of diversity are highly diverse; efforts to design DSTs for diversity should start by working with organisations to distil 'diversity' into definitions and design requirements.








Citations (55)


... There is a considerable effect on individuals' behaviors and attitudes toward the latest technologies, [45]. It is important to recognize that cultural norms, religious beliefs, and societal perceptions can initially hinder the widespread acceptance of DHS within its domain, [46]. However, it is important to acknowledge that the perceived importance of cultural and ideological barriers may diminish when individuals have a high level of confidence in the security procedures implemented to safeguard their data. ...

Reference:

Perception towards the Acceptance of Digital Health Services among the People of Bangladesh
“If Someone Walks In On Us Talking, Pretend to be My Friend, Not My Therapist": Challenges and Opportunities for Digital Mental Health Support in Saudi Arabia
  • Citing Conference Paper
  • May 2024

... While temporary abstinence is just one way of moderating use, a 2024 workshop examined multiple self-regulatory interventions for reducing screen time and screen distractions in Oxford University students. These interventions, which included time-limiting apps and other motivational techniques to voluntarily place restrictions on screen time, led most stu-dents in the study to continue to benefit from controlling their digital device use after the workshop was completed [34]. ...

“I finally felt I had the tools to control these urges”: Empowering Students to Achieve Their Device Use Goals With the Reduce Digital Distraction Workshop
  • Citing Conference Paper
  • May 2024

... Previous work has explored safeguarding children from the harms of technology, focusing on various aspects, such as risks involved in the adoption of online services [55], privacy and security challenges with educational technologies [56], children's AI systems [57], parental concerns around social Virtual Reality [58] and much more. However, shoulder surfing is another concern associated with the use of technology for children, which has not yet been investigated. ...

KOALA Hero Toolkit: A New Approach to Inform Families of Mobile Datafication Risks
  • Citing Conference Paper
  • May 2024

... Recognizing these challenges, there has been a growing discourse on research and policies that have been developed for algorithmic accountability, including seminal works and guidelines from various authorities; however, new challenges arise in the translation of these principles into practice, including proven methods available as well as lack of robust legal and professional codes [37]. ...

Challenges and opportunities in translating ethical AI principles into practice for children

Nature Machine Intelligence

... Recently, scholars identified worker-led data-sharing as a crucial step towards empowering the gig worker collective and advancing related policy [50,63,88]. Calacci advocated for Digital Workerism (worker-led data-driven research and design of governance tools to shift power back to the worker) [13], Zhang et. ...

‘You are you and the app. There’s nobody else.’: Building Worker-Designed Data Institutions within Platform Hegemony

... Prior works have also developed tools to both protect user privacy and increase transparency, such as privacy protections for mobile apps [8,27], smart toys [92] and facial recognition technologies [3,78], as well as design insights for privacy labels and warnings [48,66]. The research community has also studied barriers faced by developers in designing applications for children [5,20] and has proposed design guidelines for children's privacy [28,29,59,81]. ...

12 Ways to Empower: Designing for Children’s Digital Autonomy

... Prior research has consistently shown the pivotal role of transparency as a key factor influencing user trust development (Kizilcec, 2016;Schmidt et al., 2020). While our young participants exhibited a heightened awareness of datafication practices, it is essential to recognize that they are not consistently provided with transparent information about how these technologies operate Wang et al. (2023). This lack of transparency, coupled with a lack of support for empowerment, poses significant challenges to their informed decision-making and raises concerns about the actual capability of trust development by young people in the digital landscape. ...

‘Treat me as your friend, not a number in your database’: Co-designing with Children to Cope with Datafication Online
  • Citing Conference Paper
  • April 2023

... Priority 6: Evolve 'legacy' legislation and provide support for research Much research efforts have been devoted to analysing privacy in mobile apps. Such research remains challenging, as the creation of the necessary data is associated with high investments of time and scarce technical expertise [34]. The fact that analysing privacy issues in apps and in other software products is so difficult has an impact not only on my research but also on the work of other researchers and data protection authorities aiming to protect fundamental rights in digital systems [34]. ...

Ready for the EU Digital Services Act? How Decisions by Apple and by Google Impede App Privacy
  • Citing Article
  • January 2023

SSRN Electronic Journal

... Big data literacy (D'Ignazio and Bhargava 2015; François, Monteiro, and Allo 2020) is one of many concepts -such as critical data literacy (Buzato 2017;Hautea, Dasgupta, and Hill 2017;Tygel and Kirsch 2016), critical data education (Pangrazio and Selwyn 2020) or critical algorithmic literacy (Wang et al. 2022) -suggested to refer to this educational process. This emerging field of research gathers little consensus in terms of conceptualization and lacks studies dedicated to the creation of uniform indicators of big data literacy or instruments able to evaluate it (Kubrusly, Batista, and Marôpo, forthcoming). ...

'Don't make assumptions about me!': Understanding Children's Perception of Datafication Online

Proceedings of the ACM on Human-Computer Interaction