Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. 2020
  2. Forthcoming

    Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2019
  4. E-pub ahead of print
  5. Published

    Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print
  8. 2018
  9. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Forthcoming

    Employee surveillance: the road to surveillance is paved with good intentions

    Edwards, L., Martin, L. & Henderson, T., 6 Oct 2018, (Accepted/In press) Amsterdam Privacy Conference. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    How portable is portable? Exercising the GDPR's Right to Data Portability

    Wong, J. & Henderson, T., 8 Oct 2018, Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers . ACM, p. 911-920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Responsible research on social networks: dilemmas and solutions

    Crowcroft, J., Haddadi, H. & Henderson, T., May 2018, Oxford Handbook of Networked Communication. Foucault-Welles, B. & González-Bailón, S. (eds.). Oxford, UK: Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  13. Published

    Towards reproducibility in online social network research

    Hutton, L. & Henderson, T., Mar 2018, In : IEEE Transactions on Emerging Topics in Computing. 6, 1, p. 156-167 12 p.

    Research output: Contribution to journalArticle

  14. 2017
  15. Published

    Beyond the EULA: Improving consent for data mining

    Hutton, L. & Henderson, T., 5 Jul 2017, Transparent Data Mining for Big and Small Data. Cerquitelli, T., Quercia, D. & Pasquale, F. (eds.). Springer, p. 147-167 (Studies in Big Data; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  16. Published

    Contextual consent: ethical mining of social media for health research

    Norval, C. & Henderson, T., 26 Jan 2017, Proceedings of the WSDM 2017 Workshop on Mining Online Health Reports. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. 2016
  18. Published

    A robust reputation-based location-privacy recommender system using opportunistic networks

    Zhao, Y., Ye, J. & Henderson, T., 1 Dec 2016, Proceedings of The 8th EAI International Conference on Mobile Computing, Applications and Services. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Enabling useful data sharing through format identification and text mining

    Akestoridis, D-G. & Henderson, T. N. H., 1 Aug 2016.

    Research output: Contribution to conferencePoster

  20. Published

    Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D., Crowcroft, J. & Crabtree, A., 2016, Encyclopedia of Human-Computer Interaction.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  21. Published

    Predicting consent in online social network health research

    Henderson, T. N. H., 3 Jun 2016.

    Research output: Contribution to conferencePoster

  22. Published

    The effect of privacy concerns on privacy recommenders

    Zhao, Y., Ye, J. & Henderson, T., 7 Mar 2016, IUI '16 Proceedings of the 21st International Conference on Intelligent User Interfaces. New York: ACM, p. 218-227 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. 2015
  24. Published

    "I didn't sign up for this!": Informed consent in social network research

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). p. 178-187 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., Jan 2015, In : D-Lib Magazine. 21, 1/2

    Research output: Contribution to journalArticle

  26. Published

    Making social media research reproducible

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the ICWSM Workshop on Standards and Practices in Large-Scale Social Media Research. Association for the Advancement of Artificial Intelligence, p. 2-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Some challenges for ethics in social network research

    Hutton, L. & Henderson, T., 21 Aug 2015, Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research. ACM, p. 13-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. 2014
  29. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  31. Forthcoming

    Case Studies and Challenges in Reproducibility in the Computational Sciences

    Arabas, S., Bareford, M. R., Gent, I. P., Gorman, B. M., Hajiarabderkani, M., Henderson, T., Hutton, L., Konovalov, A., Kotthoff, L., McCreesh, C., Paul, R. R., Petrie, K. E. J., Razaq, A., Reijsbergen, D. & Takeda, K., 1 Sep 2014, (In preparation) arXiv.

    Research output: Other contribution

  32. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Forthcoming

    Human-Data Interaction: The Human Face of the Data-Driven Society

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 1 Oct 2014, (In preparation).

    Research output: Working paper

  35. Published

    PFClust: an optimised implementation of a parameter-free clustering algorithm

    Musayeva, K., Henderson, T., Mitchell, J. B. O. & Mavridis, L., Feb 2014, In : Source Code for Biology and Medicine. 9, 5

    Research output: Contribution to journalArticle

  36. Published

    Privacy-Aware Location Privacy Preference Recommendations

    Zhao, Y., Ye, J. & Henderson, T., 2 Dec 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous). p. 120-129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Recommending Location Privacy Preferences in Ubiquitous Computing

    Zhao, Y., Ye, J. & Henderson, T., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  38. Published

    Review: Ethical research standards in a world of big data

    Henderson, T., 6 Mar 2014, F1000Research.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  39. 2013
  40. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  41. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In : International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  43. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  44. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Understanding ethical concerns in social media privacy studies

    McNeilly, S., Hutton, L. & Henderson, T., 23 Feb 2013, Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy: Qualitative & Quantitative Approaches. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. 2012
  47. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

    Parris, I. S., Ben Abdesslem, F. & Henderson, T., 2012, In : Ad Hoc Networks. 15 p.

    Research output: Contribution to journalArticle

  50. Published

    Predicting location-sharing privacy preferences in social network applications

    Bigwood, G., Abdesslem, F. B. & Henderson, T., 19 Jun 2012, Proceedings of the First Workshop on recent advances in behavior prediction and pro-active pervasive computing (AwareCast).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Privacy-enhanced social-network routing

    Parris, I. S. & Henderson, T., 1 Jan 2012, In : Computer Communications. 35, 1, p. 62-74 9 p.

    Research output: Contribution to journalArticle

  52. Published

    Reliable online social network data collection

    Abdesslem, F. B., Parris, I. & Henderson, T., 2012, Computational Social Networks: Mining and Visualization. Abraham, A. (ed.). London, UK: Springer-Verlag, p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingChapter

  53. 2011
  54. Published

    Bootstrapping opportunistic networks using social roles

    Bigwood, G. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Context-based personalised settings for mobile location sharing

    Abdesslem, F. B., Henderson, T., Brostoff, S. & Sasse, M. A., 27 Oct 2011. 4 p.

    Research output: Contribution to conferencePaper

  56. Published

    IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

    Bigwood, G. J. & Henderson, T., 9 Oct 2011, p. 65-72. 8 p.

    Research output: Contribution to conferencePaper

  57. Published

    Practical privacy-aware opportunistic networking

    Parris, I. & Henderson, T., 5 Jul 2011. 5 p.

    Research output: Contribution to conferencePaper

  58. Published

    Targeted advertising on the handset: Privacy and security challenges

    Haddadi, H., Hui, P., Henderson, T. & Brown, I., 2011, Pervasive Advertising. Müller, J., Alt, F. & Michelis, D. (eds.). Heidelberg, Germany: Springer, p. 119-137 (Human-Computer Interaction Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    The impact of location privacy on opportunistic networks

    Parris, I. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. 2010
  61. Published

    Facebook or Fakebook? The effect of simulation on location privacy user studies

    Parris, I., Abdesslem, F. B. & Henderson, T. N. H., 6 Sep 2010. 2 p.

    Research output: Contribution to conferencePaper

Previous 1 2 Next
Top