Skip to content

Research at St Andrews

Tristan Henderson

Person

  1. 2019
  2. Published

    Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. 2018
  5. Published

    Automating Data Rights

    Veale, M., Edwards, L., Eyers, D., Henderson, T., Millard, C. & Lerner, B. S., 2018, Towards Accountable Systems. Eyers, D., Millard, C., Seltzer, M. & Singh, J. (eds.). Vol. 8. p. 149-156 8 p. (Daghstuhl Reports).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    How portable is portable? Exercising the GDPR's Right to Data Portability

    Wong, J. & Henderson, T., 8 Oct 2018, Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers . ACM, p. 911-920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Responsible research on social networks: dilemmas and solutions

    Crowcroft, J., Haddadi, H. & Henderson, T., May 2018, Oxford Handbook of Networked Communication. Foucault-Welles, B. & González-Bailón, S. (eds.). Oxford, UK: Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  8. Published

    Towards reproducibility in online social network research

    Hutton, L. & Henderson, T., Mar 2018, In : IEEE Transactions on Emerging Topics in Computing. 6, 1, p. 156-167 12 p.

    Research output: Contribution to journalArticle

  9. 2017
  10. Published

    Beyond the EULA: Improving consent for data mining

    Hutton, L. & Henderson, T., 5 Jul 2017, Transparent Data Mining for Big and Small Data. Cerquitelli, T., Quercia, D. & Pasquale, F. (eds.). Springer, p. 147-167 (Studies in Big Data; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Published

    Contextual consent: ethical mining of social media for health research

    Norval, C. & Henderson, T., 26 Jan 2017, Proceedings of the WSDM 2017 Workshop on Mining Online Health Reports. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2016
  13. Published

    A robust reputation-based location-privacy recommender system using opportunistic networks

    Zhao, Y., Ye, J. & Henderson, T., 1 Dec 2016, Proceedings of The 8th EAI International Conference on Mobile Computing, Applications and Services. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Enabling useful data sharing through format identification and text mining

    Akestoridis, D-G. & Henderson, T. N. H., 1 Aug 2016.

    Research output: Contribution to conferencePoster

  15. Published

    Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D., Crowcroft, J. & Crabtree, A., 2016, Encyclopedia of Human-Computer Interaction.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  16. Published

    Predicting consent in online social network health research

    Henderson, T. N. H., 3 Jun 2016.

    Research output: Contribution to conferencePoster

  17. Published

    The effect of privacy concerns on privacy recommenders

    Zhao, Y., Ye, J. & Henderson, T., 7 Mar 2016, IUI '16 Proceedings of the 21st International Conference on Intelligent User Interfaces. New York: ACM, p. 218-227 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. 2015
  19. Published

    "I didn't sign up for this!": Informed consent in social network research

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). p. 178-187 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., Jan 2015, In : D-Lib Magazine. 21, 1/2

    Research output: Contribution to journalArticle

  21. Published

    Making social media research reproducible

    Hutton, L. & Henderson, T., 26 May 2015, Proceedings of the ICWSM Workshop on Standards and Practices in Large-Scale Social Media Research. Association for the Advancement of Artificial Intelligence, p. 2-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Some challenges for ethics in social network research

    Hutton, L. & Henderson, T., 21 Aug 2015, Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research. ACM, p. 13-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. 2014
  24. Published

    "Here I am, now pay me!": privacy concerns in incentivised location-sharing systems

    Hutton, L., Henderson, T. & Kapadia, A., 23 Jul 2014, Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). ACM, p. 81 86 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    CRAWDAD: A Wireless Network Data Archive for WiSec Researchers

    Henderson, T. & Kotz, D., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  26. Published

    Data citation practices in the CRAWDAD wireless network data archive

    Henderson, T. & Kotz, D., 12 Sep 2014, Proceedings of the Second Workshop on Linking and Contextualizing Publications and Datasets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Friend or Flood? Social prevention of flooding attacks in opportunistic networks

    Parris, I. & Henderson, T., 30 Jun 2014, Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on . IEEE, p. 16-21 6 p. (Distributed Computing Systems Workshops (ICDCSW)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    PFClust: an optimised implementation of a parameter-free clustering algorithm

    Musayeva, K., Henderson, T., Mitchell, J. B. O. & Mavridis, L., Feb 2014, In : Source Code for Biology and Medicine. 9, 5

    Research output: Contribution to journalArticle

  29. Published

    Privacy-Aware Location Privacy Preference Recommendations

    Zhao, Y., Ye, J. & Henderson, T., 2 Dec 2014, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous). p. 120-129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Recommending Location Privacy Preferences in Ubiquitous Computing

    Zhao, Y., Ye, J. & Henderson, T., 23 Jul 2014.

    Research output: Contribution to conferencePoster

  31. Published

    Review: Ethical research standards in a world of big data

    Henderson, T., 6 Mar 2014, F1000Research.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  32. 2013
  33. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., Apr 2013, In : ACM SIGMETRICS Performance Evaluation Review. 40, 4, p. 90-95

    Research output: Contribution to journalArticle

  34. Published

    Challenges & Opportunities in Human-Data Interaction

    Mortier, R., Haddadi, H., Henderson, T., McAuley, D. & Crowcroft, J., 4 Nov 2013, Proceedings of DE2013: Open Digital - The Fourth Annual Digital Economy All Hands Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Editorial

    Vasalou, A., Henderson, T. & Joinson, A., Dec 2013, In : International Journal of Human-Computer Studies. 71, 12, p. 1124-1125

    Research output: Contribution to journalEditorial

  36. Published

    Incentive-aware opportunistic network routing

    Bigwood, G. & Henderson, T., 2013, Routing in Opportunistic Networks. Woungang, I., Kumar Dhurandher, S., Anpalagan, A. & Vasilakos, A. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  37. Published

    MobOCloud: Extending Cloud Computing with Mobile Opportunistic Networks

    Pal, S. & Henderson, T., 30 Sep 2013, Proceedings of ACM CHANTS 2013. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Understanding ethical concerns in social media privacy studies

    McNeilly, S., Hutton, L. & Henderson, T., 23 Feb 2013, Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy: Qualitative & Quantitative Approaches. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. 2012
  40. Published

    An architecture for ethical and privacy-sensitive social network experiments

    Hutton, L. & Henderson, T., 15 Jun 2012, Proceedings of the ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Ethics and online social network research - developing best practices

    Henderson, T., Hutton, L. & McNeilly, S., 11 Sep 2012, BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations. BCS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

    Parris, I. S., Ben Abdesslem, F. & Henderson, T., 2012, In : Ad Hoc Networks. 15 p.

    Research output: Contribution to journalArticle

  43. Published

    Predicting location-sharing privacy preferences in social network applications

    Bigwood, G., Abdesslem, F. B. & Henderson, T., 19 Jun 2012, Proceedings of the First Workshop on recent advances in behavior prediction and pro-active pervasive computing (AwareCast).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Privacy-enhanced social-network routing

    Parris, I. S. & Henderson, T., 1 Jan 2012, In : Computer Communications. 35, 1, p. 62-74 9 p.

    Research output: Contribution to journalArticle

  45. Published

    Reliable online social network data collection

    Abdesslem, F. B., Parris, I. & Henderson, T., 2012, Computational Social Networks: Mining and Visualization. Abraham, A. (ed.). London, UK: Springer-Verlag, p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. 2011
  47. Published

    Bootstrapping opportunistic networks using social roles

    Bigwood, G. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Context-based personalised settings for mobile location sharing

    Abdesslem, F. B., Henderson, T., Brostoff, S. & Sasse, M. A., 27 Oct 2011. 4 p.

    Research output: Contribution to conferencePaper

  49. Published

    IRONMAN: Using social networks to add incentives and reputation to opportunistic networks

    Bigwood, G. J. & Henderson, T., 9 Oct 2011, p. 65-72. 8 p.

    Research output: Contribution to conferencePaper

  50. Published

    Practical privacy-aware opportunistic networking

    Parris, I. & Henderson, T., 5 Jul 2011. 5 p.

    Research output: Contribution to conferencePaper

  51. Published

    Targeted advertising on the handset: Privacy and security challenges

    Haddadi, H., Hui, P., Henderson, T. & Brown, I., 2011, Pervasive Advertising. Müller, J., Alt, F. & Michelis, D. (eds.). Heidelberg, Germany: Springer, p. 119-137 (Human-Computer Interaction Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  52. Published

    The impact of location privacy on opportunistic networks

    Parris, I. & Henderson, T., 23 Jun 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. 2010
  54. Published

    Facebook or Fakebook? The effect of simulation on location privacy user studies

    Parris, I., Abdesslem, F. B. & Henderson, T. N. H., 6 Sep 2010. 2 p.

    Research output: Contribution to conferencePaper

  55. Published

    Mobile experience sampling: Reaching the parts of Facebook other methods cannot reach

    Abdesslem, F. B., Parris, I. & Henderson, T. N. H., 6 Sep 2010. 8 p.

    Research output: Contribution to conferencePaper

  56. Published

    Planet-scale human mobility measurement

    Hui, P., Mortier, R., Piorkowski, M., Henderson, T. N. H. & Crowcroft, J., 10 Jun 2010, Proceedings of the Second ACM International Workshop on Hot Topics in Planet-Scale Measurement (HotPlanet). New York: ACM, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Privacy-enhanced social network routing in opportunistic networks

    Parris, I. S., Bigwood, G. J. & Henderson, T. N. H., Mar 2010, Proceedings of the 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops): IEEE International Workshop on Security and Social Networking (SESOC 2010). IEEE Computer Society, p. 624-629

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    The ambient loo - caught short when nature calls?

    Haddadi, H., Henderson, T. & Crowcroft, J., Apr 2010, In : ACM Computer Communication Review. 40, 2, p. 78-78 1 p.

    Research output: Contribution to journalArticle

  59. Published

    Understanding mobile social behaviour using smartphones

    Abdesslem, F. B. & Henderson, T. N. H., 17 Oct 2010. 4 p.

    Research output: Contribution to conferencePaper

  60. Published

    Usable data-driven privacy research: should we be afraid of the Big (Bad?) Data Wolf?

    Henderson, T., Nov 2010. 2 p.

    Research output: Contribution to conferencePaper

Previous 1 2 Next
Top