Skip to main content

REF 2014: Picking through the results

REF 2014 Computing and Informatics Results, ordered by 4*/3* outputs and scaled by staff numbers

For the past two years, academics in UK universities have been preparing and then waiting for the results of the Research Excellence Framework (REF 2014), a quality audit of selected academic research undertaken during the period 2008-2013.  The results were finally published during the very early hours of 18 December, and there has been a flurry of activity as each university and department figures out how to interpret them in a way that reflects best on their performance.

At the OU, the Centre for Research in Computing was returned under the "Computer Science & Informatics" unit of assessment (UoA).  The research was produced by academics in the Department of Computing and Communications and the Knowledge Media Institute.  The REF 2014 panel's assessment was that 75% of our research outputs were 4* (world-leading) or 3* (internationally-excellent).  This is a good result, considering that our equivalent performance in the last assessment exercise, the RAE 2008, was to have just 70% of research outputs rated at 4*/3*.  As noted in the official announcement on the CRC website, the improvement in the OU's computing research outputs was accompanied by "an excellent research environment (100% rated world-leading or internationally-excellent), and a 30% larger submission (31 FTE, up from 24 in 2008)".  Despite this improved performance, other departments have done even better and as a result our position in the basic rankings has moved down to 31st (compared to joint 16th in 2008).

The chart above shows an alternative ranking based on 4*/3* outputs and scaled by staff numbers, and on this criteria OU Computing research moves into the top 20!  While this ranking is unlikely to get much acceptance, it does demonstrate the effect of different strategies for returning staff on the outcome. The chart was generated using the REF visualisation tool produced by Prof. Jo Wood from City University.  A more in depth analysis of the overall REF results was published by Research Fortnight (Hat tip to Anthony Finkelstein - @profserious - for sharing the link to this).

On a lighter note, Times Higher Education has set up a Twitter hashtag #REFrhymes, which has attracted a some funny contributions.  I particularly liked the following limerick:

Note: The opinions and conclusions in this article are entirely my own and do not represent the views of The Open University.  You can find complete coverage of the REF results from The Open University on the university website:
Post a Comment

Popular posts from this blog

Visual programming for 'wiring' the Internet of Things

There is a proliferation of devices being developed to form the building blocks of the Internet of Things (IoT), from Internet-connected power sockets and light bulbs to kettles, toasters and washing machines. However, to realise the full potential of the IoT, it will be necessary to allow these devices to interconnect and share data with each other to deliver the functionalities required by end-users. In recent research on end-user programming for the IoT, my colleagues Pierre Akiki, Yijun Yu and myself have proposed the notion of Visual Simple Transformations (ViSiT), that provides a visual programming paradigm for users to wire together IoT devices. The video above shows a demonstration of the ViSiT solution and full details of the approach will appear in an upcoming special issue of the ACM Transactions on Computer-Human Interaction (ToCHI).

This work is highlighted in a recent IEEE Software Blog: Empowering Users to Build IoT Software with a Puzzle-like Environment and full deta…

Privacy-by-Design Framework for Internet of Things Systems

IOT-2016 7-9 September, 2016, Stuttgart, Germany from Charith Perera
Recent DDoS attacks on key internet services, like the attack that affected the Dyn domain name service, highlighted the security challenges associated with the proliferation of insecure Internet of Things (IoT) systems.  This attack exploited common vulnerabilities like the use of default administration passwords on IoT devices such as internet-enabled CCTV cameras, internet-enabled appliances and smart home devices, to recruit over hundreds of thousands of nodes into a botnet.   This capability highlights the cyber security threats associated with the IoT and brings into sharp relief the importance of considering both security and privacy when designing these systems.

In recent work, presented at the Internet of Things Conference, we describe a privacy-by-design framework for assessing the privacy capabilities of IoT applications and platforms.  Building on more general design strategies for privacy in informaiton …

Are we losing the Internet Security battle?

I was recently invited by Heimdal Security to take part in an expert roundup, with the theme of "Is Internet Security a Losing Battle?".  The main thrust of my answer was to question our use of analogies of conflict in the context of Internet Security or cyber security.  As I said in my response:
"... in this context the metaphors of conflict, such as ‘war’ and ‘battle’ are unhelpful because they suggest that internet security is the responsibility of the technologists who act our defensive force against attackers.   Instead, as has been argued by technology activists like Cory Doctorow and others we might have more success by thinking of cyber security using the analogy of public health and communicable diseases.   By using this analogy, we make cyber security issues more relevant to people and spur them to gain a better understanding that, like diseases, any of us can be afflicted by a cyber security attack.  We can also adopt an analogous approach for handling cyber …