SlideShare une entreprise Scribd logo
1  sur  21
The Invisible Scientist

Personal Digital Identity
on the Web:
Problems + Solutions

Duncan Hull
The University of Manchester
Science Foo Camp 2009
The Googleplex
Mountain View, California
The Invisible Scientist: Digital Identity



•   I am not an identity or security expert but…
•   Introduction: Personal Identity historically and currently
•   The Problem:
     – The way we identify scientists on the Web is inefficient and badly broken
     – Which can make much of their work “invisible”
•   Some solutions:
     – URIs
     – OpenIDs
                                                        ~15 minutes of slides
     – Contributor-ID (www.crossref.org)             ~45 minutes for discussion
•   Conclusions + What might better digital identities allow?
Tools for sharing data on the Web < 10 yrs old
All these social software tools are reliant on digital identity of some form




                                                         http://tinyurl.com/myscience

                                                              These tools are good but…
Unfortunately



•   Many biomedical scientists don’t use these tools for serious work
     –   (if at all)
•   Why?
•   It’s complicated but…
Scientific publishing has worked this way for centuries

•   Publishing the main (perhaps only) way of formally identifying people and their work

• “Publish or Perish”
First published 1687, over 300 years old
Identity is different
•   http://www.cs.bris.ac.uk/~gough/                  on the Web:
•   http://en.wikipedia.org/wiki/Julian_Gough         We use URI’s to
                                                      identify people
•   http://twitter.com/SUPERFAMILY

•   http://www.juliangough.com/

•   http://www.linkedin.com/pub/julian-gough/b/25b/3b3

•   http://www.citeulike.org/tag/julian-gough

•   http://dblp.uni-trier.de/db/indices/a-tree/g/Gough:Julian.html

•   http://pubmed.gov/?Term=Julian+Gough[author]

•   http://pubmed.gov/?Term=Gough+J[author]                          Julian Gough
•   http://www.facebook.com/julian.gough

    But do all these URI’s identify the same person?
Science is increasingly Digital


•   Science is increasingly digital
     – Not just digital publications in electronic journals…
     – wiki edits (e.g. Rfam and Pfam in wikipedia, robert hoffman wikgenes)
     – Software development, workflows
     – Development of databases and ontologies - “data driven science” + “open data”
     – blog posts



•   Traditional journal publishing is often inadequate for sharing this kind of data
    and attributing it to individual people
     – See “Defrosting the Digital Libray” in PLoS Computational Biology for details
     – Hull et all (2008) http://pubmed.gov/18974831


•   No good incentives to make digital contributions (besides traditional publishing)
•   “Micro-attribution” - a large number of small contributions go unrewarded
http://tinyurl.com/mistakenid
Misattribution (part 2)

•   “Forgotten Password”, “Already Registered”, “Please Login”, “Access Denied”
    are all recognised as “authors” in Google Scholar




                                                http://tinyurl.com/phantom-user
Digital attribution
                                     Attribution would seem to be a simple
                                        process and yet it represents a
                                           major, unsolved problem
                                             for information science.




                                                    Neil Smalheiser and Vetle Torvik




Author name disambiguation
Chapter published in Volume 43 (2009) of the
Annual Review of Information Science and Technology (ARIST)
(edited by B. Cronin) which is available from the publisher Information Today, Inc
http://www.hbs.edu/units/tom/seminars/2007/docs/Author%20Name%20Disambiguation.pdf
Digital identity is currently a mess
•    As well as identifying and attributing with URIs, we also need to:
      – Attribution:           Julian AuthorOf        IncrediblyImportantThing
      – Authentication:        is Julian is who he says he is? Or a fake?
      – Authorisation:         is Julian authorised to do stuff?



         Currently done through
         combination of username-and-password


                              The average user has
                                     [at least]
                                18 user accounts
                              and 3.49 passwords”
Simon Willison
(The Guardian)                                    http://tinyurl.com/too-many-passwords
Digital Identity Really Matters


•   Digital Identity is a pre-requisite for
     – Attribution …
     – Contribution…
     – Publication … to be recorded and quantified.


•   Important decisions made on digital identity
     – Hiring, funding, promotion, collaboration
     – Selecting appropriate reviewers for grants and publications
     – attributing published data in an increasingly web-based world


•   This is the environment which social software / Web 2.0 operates in:
     – Reliant on accurate and efficient digital identities
What is myExperiment? http://www.myexperiment.org
•   Facebook for Scientists?

•   Collaborative software for sharing and finding experimental protocols on the web
Who is involved in
myExperiment?
                                                                      Carole Goble
 •   Small team of developers (2-3 full time)        David De Roure
 •   1500 users have uploaded 560 workflows, 150 files
     and 40 packs in 130 groups
myExperiment uses OpenID to tackle Digital Identity and attribution




http://openid.net/
Open ID is quickly becoming widespread




“42,235 sites are now enabled to accept OpenID logins” source
    http://blog.janrain.com/2009/05/relying-party-stats-as-of-may-1-2009.html
But there are usability “issues”




                                   einstein@uzh.ch
                                                                     84%
                                   +
                                   mcsquared

                                            OR

                                   http://einstein.myopenid.com/     16%


                                   Password handled by third party
                                         OpenID provider

                             Unless you hide it (e.g. Gmail, wordpress)
Crossref solution: DOIs for people

                                                                        Geoffrey Bilder
•   Crossref has solved a similar problem with identifying publications across different
    publishers called “Digital Object Identifiers (DOI)”
     – DOI:10.1371/journal.pcbi.1000204
     – http://dx.doi.org/10.1371/journal.pcbi.1000204
     – They are working on something similar for people
•   DOI’s for scientists “Contributor ID”
     – Watch this space…
Conclusions



•   Digital Identity is broken (many biomedical scientists don’t realise)
     – Important contributions are not properly attributed
     – Misattribution can lead to invisibility
     – This can discourage scientists from using the web more
•   Fixing digital identities could make science more efficient
     – Recognise digital contributions
     – Motivate people to make non-publication contributions
•   Technical problem mostly solved
•   Discussion: The Good, The Bad and The Ugly Things identity might allow…
     – Over to you!

Contenu connexe

Tendances

Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overviewBryan Alexander
 
Open Sesame (and other open movements)
Open Sesame (and other open movements)Open Sesame (and other open movements)
Open Sesame (and other open movements)Dorothea Salo
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Bryan Alexander
 
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
 
Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Joyce Seitzinger
 
Social media for researchers
Social media for researchersSocial media for researchers
Social media for researchersHelen Webster
 
Blogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusBlogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusGenealogyMedia.com
 
Social curation slideshare
Social curation slideshareSocial curation slideshare
Social curation slideshareCollabor8now Ltd
 
Why New Media is Dead - Manchester
Why New Media is Dead - ManchesterWhy New Media is Dead - Manchester
Why New Media is Dead - ManchesterIan Forrester
 
Social Media & Online Presence
Social Media & Online PresenceSocial Media & Online Presence
Social Media & Online Presencelibrarianrafia
 
Growing Your Next Generation of Patrons
Growing Your Next Generation of PatronsGrowing Your Next Generation of Patrons
Growing Your Next Generation of PatronsMadPubLib
 
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lora Aroyo
 
Why Care About Coding?
Why Care About Coding?Why Care About Coding?
Why Care About Coding?Bohyun Kim
 
Researching In A Web 2 0 World (for lawyers)
Researching In A Web 2 0 World (for lawyers)Researching In A Web 2 0 World (for lawyers)
Researching In A Web 2 0 World (for lawyers)Emily Allbon
 
LMS meets Web 2.0: mid-2008
LMS meets Web 2.0: mid-2008LMS meets Web 2.0: mid-2008
LMS meets Web 2.0: mid-2008Bryan Alexander
 
Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsJohn Breslin
 
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)Lora Aroyo
 

Tendances (20)

Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overview
 
Open Sesame (and other open movements)
Open Sesame (and other open movements)Open Sesame (and other open movements)
Open Sesame (and other open movements)
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006
 
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
 
Online social networking for the chemical sciences
Online social networking for the chemical sciencesOnline social networking for the chemical sciences
Online social networking for the chemical sciences
 
Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)
 
Social media for researchers
Social media for researchersSocial media for researchers
Social media for researchers
 
Blogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: SyllabusBlogs, Wikis, and Flickr: Oh My!: Syllabus
Blogs, Wikis, and Flickr: Oh My!: Syllabus
 
Social curation slideshare
Social curation slideshareSocial curation slideshare
Social curation slideshare
 
Why New Media is Dead - Manchester
Why New Media is Dead - ManchesterWhy New Media is Dead - Manchester
Why New Media is Dead - Manchester
 
Your Digital Identity
Your Digital IdentityYour Digital Identity
Your Digital Identity
 
Social Media & Online Presence
Social Media & Online PresenceSocial Media & Online Presence
Social Media & Online Presence
 
Growing Your Next Generation of Patrons
Growing Your Next Generation of PatronsGrowing Your Next Generation of Patrons
Growing Your Next Generation of Patrons
 
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
 
Why Care About Coding?
Why Care About Coding?Why Care About Coding?
Why Care About Coding?
 
Researching In A Web 2 0 World (for lawyers)
Researching In A Web 2 0 World (for lawyers)Researching In A Web 2 0 World (for lawyers)
Researching In A Web 2 0 World (for lawyers)
 
LMS meets Web 2.0: mid-2008
LMS meets Web 2.0: mid-2008LMS meets Web 2.0: mid-2008
LMS meets Web 2.0: mid-2008
 
Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social Semantics
 
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)
Lecture3: What is the DATA on the Social Web (VU Amsterdam Social Web Course)
 
Research students-2010.01.18
Research students-2010.01.18Research students-2010.01.18
Research students-2010.01.18
 

En vedette

The Year of Blogging Dangerously
The Year of Blogging DangerouslyThe Year of Blogging Dangerously
The Year of Blogging DangerouslyDuncan Hull
 
Social Aspects of Emotions in Twitter Conversations
Social Aspects of Emotions in Twitter ConversationsSocial Aspects of Emotions in Twitter Conversations
Social Aspects of Emotions in Twitter ConversationsAlice Oh
 
Talk at MIT HCI Seminar
Talk at MIT HCI SeminarTalk at MIT HCI Seminar
Talk at MIT HCI SeminarAlice Oh
 
myExperiment @ Nettab
myExperiment @ NettabmyExperiment @ Nettab
myExperiment @ NettabDuncan Hull
 
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome Campus
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusBibliography 2.0: A citeulike case study from the Wellcome Trust Genome Campus
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusDuncan Hull
 
Hierarchical aspect and sentiment model, Context-dependent conceptualisation
Hierarchical aspect and sentiment model, Context-dependent conceptualisationHierarchical aspect and sentiment model, Context-dependent conceptualisation
Hierarchical aspect and sentiment model, Context-dependent conceptualisationAlice Oh
 

En vedette (7)

The Year of Blogging Dangerously
The Year of Blogging DangerouslyThe Year of Blogging Dangerously
The Year of Blogging Dangerously
 
Social Aspects of Emotions in Twitter Conversations
Social Aspects of Emotions in Twitter ConversationsSocial Aspects of Emotions in Twitter Conversations
Social Aspects of Emotions in Twitter Conversations
 
Talk at MIT HCI Seminar
Talk at MIT HCI SeminarTalk at MIT HCI Seminar
Talk at MIT HCI Seminar
 
myExperiment @ Nettab
myExperiment @ NettabmyExperiment @ Nettab
myExperiment @ Nettab
 
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome Campus
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusBibliography 2.0: A citeulike case study from the Wellcome Trust Genome Campus
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome Campus
 
How to Blog
How to BlogHow to Blog
How to Blog
 
Hierarchical aspect and sentiment model, Context-dependent conceptualisation
Hierarchical aspect and sentiment model, Context-dependent conceptualisationHierarchical aspect and sentiment model, Context-dependent conceptualisation
Hierarchical aspect and sentiment model, Context-dependent conceptualisation
 

Similaire à The Invisible Scientist

Creating & managing your scholarly web presence
Creating & managing your scholarly web presenceCreating & managing your scholarly web presence
Creating & managing your scholarly web presenceRebecca Kate Miller
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Marieke Guy
 
The Potential and Challenges of Today's AI
The Potential and Challenges of Today's AIThe Potential and Challenges of Today's AI
The Potential and Challenges of Today's AIBohyun Kim
 
Authenticating Scientists with OpenID
Authenticating Scientists with OpenIDAuthenticating Scientists with OpenID
Authenticating Scientists with OpenIDDuncan Hull
 
Forms of Innovation: Collaboration, Attribution, Access
 Forms of Innovation: Collaboration, Attribution, Access Forms of Innovation: Collaboration, Attribution, Access
Forms of Innovation: Collaboration, Attribution, AccessDr Ernesto Priego
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presencePhil Bradley
 
Towards policy making 2.0: Rethinking public engagement
Towards policy making 2.0: Rethinking public engagementTowards policy making 2.0: Rethinking public engagement
Towards policy making 2.0: Rethinking public engagementUNDP Eurasia
 
The wider environment of open scholarship – Jisc and CNI conference 10 July ...
The wider environment of open scholarship – Jisc and CNI conference 10 July ...The wider environment of open scholarship – Jisc and CNI conference 10 July ...
The wider environment of open scholarship – Jisc and CNI conference 10 July ...Jisc
 
Sustaining Your Digital Identity
Sustaining Your Digital IdentitySustaining Your Digital Identity
Sustaining Your Digital IdentityRebecca Kate Miller
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
 
What is ‘research impact’ in an interconnected world?
What is ‘research impact’ in an interconnected world?What is ‘research impact’ in an interconnected world?
What is ‘research impact’ in an interconnected world?Danny Kingsley
 
Crowd Based Information Management
Crowd Based Information ManagementCrowd Based Information Management
Crowd Based Information ManagementDokkan
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
AAAS 2014: How the Web Changes Collaboration
AAAS 2014: How the Web Changes CollaborationAAAS 2014: How the Web Changes Collaboration
AAAS 2014: How the Web Changes CollaborationWilliam Gunn
 
Comcient1213-1 Introduction
Comcient1213-1 IntroductionComcient1213-1 Introduction
Comcient1213-1 IntroductionMiquel Duran
 

Similaire à The Invisible Scientist (20)

Creating & managing your scholarly web presence
Creating & managing your scholarly web presenceCreating & managing your scholarly web presence
Creating & managing your scholarly web presence
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
The Potential and Challenges of Today's AI
The Potential and Challenges of Today's AIThe Potential and Challenges of Today's AI
The Potential and Challenges of Today's AI
 
Authenticating Scientists with OpenID
Authenticating Scientists with OpenIDAuthenticating Scientists with OpenID
Authenticating Scientists with OpenID
 
Forms of Innovation: Collaboration, Attribution, Access
 Forms of Innovation: Collaboration, Attribution, Access Forms of Innovation: Collaboration, Attribution, Access
Forms of Innovation: Collaboration, Attribution, Access
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presence
 
Towards policy making 2.0: Rethinking public engagement
Towards policy making 2.0: Rethinking public engagementTowards policy making 2.0: Rethinking public engagement
Towards policy making 2.0: Rethinking public engagement
 
Digital Humanities Workshop
Digital Humanities WorkshopDigital Humanities Workshop
Digital Humanities Workshop
 
The wider environment of open scholarship – Jisc and CNI conference 10 July ...
The wider environment of open scholarship – Jisc and CNI conference 10 July ...The wider environment of open scholarship – Jisc and CNI conference 10 July ...
The wider environment of open scholarship – Jisc and CNI conference 10 July ...
 
Sustaining Your Digital Identity
Sustaining Your Digital IdentitySustaining Your Digital Identity
Sustaining Your Digital Identity
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
What is ‘research impact’ in an interconnected world?
What is ‘research impact’ in an interconnected world?What is ‘research impact’ in an interconnected world?
What is ‘research impact’ in an interconnected world?
 
Storing and sharing
Storing and sharingStoring and sharing
Storing and sharing
 
Crowd Based Information Management
Crowd Based Information ManagementCrowd Based Information Management
Crowd Based Information Management
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
AAAS 2014: How the Web Changes Collaboration
AAAS 2014: How the Web Changes CollaborationAAAS 2014: How the Web Changes Collaboration
AAAS 2014: How the Web Changes Collaboration
 
Shaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic WebShaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic Web
 
Comcient1213-1 Introduction
Comcient1213-1 IntroductionComcient1213-1 Introduction
Comcient1213-1 Introduction
 

Plus de Duncan Hull

Why study plants?
Why study plants?Why study plants?
Why study plants?Duncan Hull
 
Embedding employability in the Computer Science curriculum
Embedding employability in the Computer Science curriculumEmbedding employability in the Computer Science curriculum
Embedding employability in the Computer Science curriculumDuncan Hull
 
Wikipedia at the Royal Society: The Good, the Bad and the Ugly
Wikipedia at the Royal Society: The Good, the Bad and the UglyWikipedia at the Royal Society: The Good, the Bad and the Ugly
Wikipedia at the Royal Society: The Good, the Bad and the UglyDuncan Hull
 
Improving the troubled relationship between Scientists and Wikipedia
Improving the troubled relationship between Scientists and Wikipedia Improving the troubled relationship between Scientists and Wikipedia
Improving the troubled relationship between Scientists and Wikipedia Duncan Hull
 
Accessing small molecule data using ChEBI
Accessing small molecule data using ChEBIAccessing small molecule data using ChEBI
Accessing small molecule data using ChEBIDuncan Hull
 
OWL-XML-Summer-School-09
OWL-XML-Summer-School-09OWL-XML-Summer-School-09
OWL-XML-Summer-School-09Duncan Hull
 
eScience: A Transformed Scientific Method
eScience: A Transformed Scientific MethodeScience: A Transformed Scientific Method
eScience: A Transformed Scientific MethodDuncan Hull
 
Defrosting the Digital Library: A survey of bibliographic tools for the next ...
Defrosting the Digital Library: A survey of bibliographic tools for the next ...Defrosting the Digital Library: A survey of bibliographic tools for the next ...
Defrosting the Digital Library: A survey of bibliographic tools for the next ...Duncan Hull
 
The Future of Research (Science and Technology)
The Future of Research (Science and Technology)The Future of Research (Science and Technology)
The Future of Research (Science and Technology)Duncan Hull
 
Chemical named entity recognition and literature mark-up
Chemical named entity recognition and literature mark-upChemical named entity recognition and literature mark-up
Chemical named entity recognition and literature mark-upDuncan Hull
 
Chemoinformatics and information management
Chemoinformatics and information managementChemoinformatics and information management
Chemoinformatics and information managementDuncan Hull
 
Text mining tools for semantically enriching scientific literature
Text mining tools for semantically enriching scientific literatureText mining tools for semantically enriching scientific literature
Text mining tools for semantically enriching scientific literatureDuncan Hull
 
Issues for metabolomics and
Issues for metabolomics and Issues for metabolomics and
Issues for metabolomics and Duncan Hull
 
Adding Meaning To Your Data
Adding Meaning To Your DataAdding Meaning To Your Data
Adding Meaning To Your DataDuncan Hull
 
Web of Science: REST or SOAP?
Web of Science: REST or SOAP?Web of Science: REST or SOAP?
Web of Science: REST or SOAP?Duncan Hull
 
If Web Services are the Answer, What's The Question
If Web Services are the Answer, What's The QuestionIf Web Services are the Answer, What's The Question
If Web Services are the Answer, What's The QuestionDuncan Hull
 
The Seven Deadly Sins of Bioinformatics
The Seven Deadly Sins of BioinformaticsThe Seven Deadly Sins of Bioinformatics
The Seven Deadly Sins of BioinformaticsDuncan Hull
 

Plus de Duncan Hull (19)

Why study plants?
Why study plants?Why study plants?
Why study plants?
 
Embedding employability in the Computer Science curriculum
Embedding employability in the Computer Science curriculumEmbedding employability in the Computer Science curriculum
Embedding employability in the Computer Science curriculum
 
Wikipedia at the Royal Society: The Good, the Bad and the Ugly
Wikipedia at the Royal Society: The Good, the Bad and the UglyWikipedia at the Royal Society: The Good, the Bad and the Ugly
Wikipedia at the Royal Society: The Good, the Bad and the Ugly
 
Improving the troubled relationship between Scientists and Wikipedia
Improving the troubled relationship between Scientists and Wikipedia Improving the troubled relationship between Scientists and Wikipedia
Improving the troubled relationship between Scientists and Wikipedia
 
OWL and OBO
OWL and OBOOWL and OBO
OWL and OBO
 
Accessing small molecule data using ChEBI
Accessing small molecule data using ChEBIAccessing small molecule data using ChEBI
Accessing small molecule data using ChEBI
 
OWL-XML-Summer-School-09
OWL-XML-Summer-School-09OWL-XML-Summer-School-09
OWL-XML-Summer-School-09
 
eScience: A Transformed Scientific Method
eScience: A Transformed Scientific MethodeScience: A Transformed Scientific Method
eScience: A Transformed Scientific Method
 
Defrosting the Digital Library: A survey of bibliographic tools for the next ...
Defrosting the Digital Library: A survey of bibliographic tools for the next ...Defrosting the Digital Library: A survey of bibliographic tools for the next ...
Defrosting the Digital Library: A survey of bibliographic tools for the next ...
 
The Future of Research (Science and Technology)
The Future of Research (Science and Technology)The Future of Research (Science and Technology)
The Future of Research (Science and Technology)
 
Chemical named entity recognition and literature mark-up
Chemical named entity recognition and literature mark-upChemical named entity recognition and literature mark-up
Chemical named entity recognition and literature mark-up
 
Chemoinformatics and information management
Chemoinformatics and information managementChemoinformatics and information management
Chemoinformatics and information management
 
Text mining tools for semantically enriching scientific literature
Text mining tools for semantically enriching scientific literatureText mining tools for semantically enriching scientific literature
Text mining tools for semantically enriching scientific literature
 
Issues for metabolomics and
Issues for metabolomics and Issues for metabolomics and
Issues for metabolomics and
 
Adding Meaning To Your Data
Adding Meaning To Your DataAdding Meaning To Your Data
Adding Meaning To Your Data
 
Web of Science: REST or SOAP?
Web of Science: REST or SOAP?Web of Science: REST or SOAP?
Web of Science: REST or SOAP?
 
If Web Services are the Answer, What's The Question
If Web Services are the Answer, What's The QuestionIf Web Services are the Answer, What's The Question
If Web Services are the Answer, What's The Question
 
Myexperiment
MyexperimentMyexperiment
Myexperiment
 
The Seven Deadly Sins of Bioinformatics
The Seven Deadly Sins of BioinformaticsThe Seven Deadly Sins of Bioinformatics
The Seven Deadly Sins of Bioinformatics
 

Dernier

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Dernier (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

The Invisible Scientist

  • 1. The Invisible Scientist Personal Digital Identity on the Web: Problems + Solutions Duncan Hull The University of Manchester Science Foo Camp 2009 The Googleplex Mountain View, California
  • 2. The Invisible Scientist: Digital Identity • I am not an identity or security expert but… • Introduction: Personal Identity historically and currently • The Problem: – The way we identify scientists on the Web is inefficient and badly broken – Which can make much of their work “invisible” • Some solutions: – URIs – OpenIDs ~15 minutes of slides – Contributor-ID (www.crossref.org) ~45 minutes for discussion • Conclusions + What might better digital identities allow?
  • 3. Tools for sharing data on the Web < 10 yrs old All these social software tools are reliant on digital identity of some form http://tinyurl.com/myscience These tools are good but…
  • 4. Unfortunately • Many biomedical scientists don’t use these tools for serious work – (if at all) • Why? • It’s complicated but…
  • 5. Scientific publishing has worked this way for centuries • Publishing the main (perhaps only) way of formally identifying people and their work • “Publish or Perish”
  • 6. First published 1687, over 300 years old
  • 7. Identity is different • http://www.cs.bris.ac.uk/~gough/ on the Web: • http://en.wikipedia.org/wiki/Julian_Gough We use URI’s to identify people • http://twitter.com/SUPERFAMILY • http://www.juliangough.com/ • http://www.linkedin.com/pub/julian-gough/b/25b/3b3 • http://www.citeulike.org/tag/julian-gough • http://dblp.uni-trier.de/db/indices/a-tree/g/Gough:Julian.html • http://pubmed.gov/?Term=Julian+Gough[author] • http://pubmed.gov/?Term=Gough+J[author] Julian Gough • http://www.facebook.com/julian.gough But do all these URI’s identify the same person?
  • 8. Science is increasingly Digital • Science is increasingly digital – Not just digital publications in electronic journals… – wiki edits (e.g. Rfam and Pfam in wikipedia, robert hoffman wikgenes) – Software development, workflows – Development of databases and ontologies - “data driven science” + “open data” – blog posts • Traditional journal publishing is often inadequate for sharing this kind of data and attributing it to individual people – See “Defrosting the Digital Libray” in PLoS Computational Biology for details – Hull et all (2008) http://pubmed.gov/18974831 • No good incentives to make digital contributions (besides traditional publishing) • “Micro-attribution” - a large number of small contributions go unrewarded
  • 10. Misattribution (part 2) • “Forgotten Password”, “Already Registered”, “Please Login”, “Access Denied” are all recognised as “authors” in Google Scholar http://tinyurl.com/phantom-user
  • 11. Digital attribution Attribution would seem to be a simple process and yet it represents a major, unsolved problem for information science. Neil Smalheiser and Vetle Torvik Author name disambiguation Chapter published in Volume 43 (2009) of the Annual Review of Information Science and Technology (ARIST) (edited by B. Cronin) which is available from the publisher Information Today, Inc http://www.hbs.edu/units/tom/seminars/2007/docs/Author%20Name%20Disambiguation.pdf
  • 12. Digital identity is currently a mess • As well as identifying and attributing with URIs, we also need to: – Attribution: Julian AuthorOf IncrediblyImportantThing – Authentication: is Julian is who he says he is? Or a fake? – Authorisation: is Julian authorised to do stuff? Currently done through combination of username-and-password The average user has [at least] 18 user accounts and 3.49 passwords” Simon Willison (The Guardian) http://tinyurl.com/too-many-passwords
  • 13. Digital Identity Really Matters • Digital Identity is a pre-requisite for – Attribution … – Contribution… – Publication … to be recorded and quantified. • Important decisions made on digital identity – Hiring, funding, promotion, collaboration – Selecting appropriate reviewers for grants and publications – attributing published data in an increasingly web-based world • This is the environment which social software / Web 2.0 operates in: – Reliant on accurate and efficient digital identities
  • 14. What is myExperiment? http://www.myexperiment.org • Facebook for Scientists? • Collaborative software for sharing and finding experimental protocols on the web
  • 15. Who is involved in myExperiment? Carole Goble • Small team of developers (2-3 full time) David De Roure • 1500 users have uploaded 560 workflows, 150 files and 40 packs in 130 groups
  • 16.
  • 17. myExperiment uses OpenID to tackle Digital Identity and attribution http://openid.net/
  • 18. Open ID is quickly becoming widespread “42,235 sites are now enabled to accept OpenID logins” source http://blog.janrain.com/2009/05/relying-party-stats-as-of-may-1-2009.html
  • 19. But there are usability “issues” einstein@uzh.ch 84% + mcsquared OR http://einstein.myopenid.com/ 16% Password handled by third party OpenID provider Unless you hide it (e.g. Gmail, wordpress)
  • 20. Crossref solution: DOIs for people Geoffrey Bilder • Crossref has solved a similar problem with identifying publications across different publishers called “Digital Object Identifiers (DOI)” – DOI:10.1371/journal.pcbi.1000204 – http://dx.doi.org/10.1371/journal.pcbi.1000204 – They are working on something similar for people • DOI’s for scientists “Contributor ID” – Watch this space…
  • 21. Conclusions • Digital Identity is broken (many biomedical scientists don’t realise) – Important contributions are not properly attributed – Misattribution can lead to invisibility – This can discourage scientists from using the web more • Fixing digital identities could make science more efficient – Recognise digital contributions – Motivate people to make non-publication contributions • Technical problem mostly solved • Discussion: The Good, The Bad and The Ugly Things identity might allow… – Over to you!