Brown Bag Lunch Schedule: Difference between revisions
No edit summary |
|||
Line 95: | Line 95: | ||
How Hackers Think | How Hackers Think | ||
<div class="mw-collapsible-content"> | <div class="mw-collapsible-content"> | ||
'''Abstract''' Hackers account for enormous costs associated with computer intrusion in a world increasingly reliant on computer and Internet-based technologies. In the general sense, a hacker is a technologist with a love for technology and a hack is an inventive solution executed through non-obvious means. They speak the language of code which propels the evolution of our information technology. This makes hackers the solvers of our largest, most complex issues. They seek out weaknesses in computers and networks that can be used to steal data or impact the functionality of the entire Internet. In consequence, they are experts at solving poorly understood and challenging problems in a variety of settings requiring deep understanding of technical details and imagination. Hacking is an activity that requires exceptional cognitive abilities. Through explanatory, sequential mixed methods research completed over three empirical studies, I discover how the mental models and the cognitive skills and traits of skilled hackers affect the way they learn and perform forward thinking. Proficient hackers construct mental representations of complex systems and their components. As they learn and interact with the system, their mental models evolve and become more reliable. This research reveals that hackers use these continuously evolving cognitive structures to conceive of future results through speculative forecasting. These models are instrumental in setting the hacker’s expectations about effects of actions, planning of actions, and ways of interpreting feedback. This research makes theoretical and empirical contributions to the literature on the mental models and the cognitive faculties of hackers and practice through the development of evidence-based and research-informed strategies for improving the cognitive mechanisms necessary for hacking. The findings are useful for leaders and managers in private, government, and nonprofit sectors with an interest in the advanced thinking required for cybersecurity and innovation. Additionally, this research contributes to the development of strategies for developing and managing effective hackers and improving talent identification and recruitment performance. It can serve as the foundation for the development of a training and education that improve the cognitive abilities necessary for effective hacking. | |||
<br><br> | |||
'''Bio''': Dr. Timothy C. Summers is a member of the esteemed faculty and the Director of Innovation, Entrepreneurship and Engagement within the iSchool (School of Information Studies) at the University of Maryland, College Park. Timothy is also President of Summers & Company, a cyber strategy & risk management consulting firm that helps clients understand cyber-related sensitivities of their organizations. At the age of eleven, Dr. Summers wrote his first computer program, and shortly thereafter he began hacking phone systems. By 14, he had hacked into [REDACTED] corporation. In 2007, he designed systems and processes at the U.S. Dept. of Defense (DoD), enabling the government, military and autonomous systems to withstand and recover quickly from adversarial interruptions. In 2009, he became an Executive Advisor and Cyber Strategist at Booz Allen Hamilton, a multinational strategic consulting firm. He was instrumental in increasing revenue through innovative and forward-thinking programs, resulting in over $3 billion in business value for the firm. He designed and exploited complex systems, both technical and human. Dr. Summers has been a consultant to Fortune 500 companies worldwide, such as Bank of America, Google, and Booz Allen Hamilton. In addition to being a regular guest and panelist on CNBC, BNN, CCTV and FOX, Timothy is also a regularly invited guest speaker at prestigious academic institutions and conferences. Additionally, he is a contributor to many print and online media platforms including Barron’s, MarketWatch, Modern Trader, TownHall.com, and various national newspapers. In 2015, he received a PhD from the Weatherhead School of Management at Case Western Reserve University, under the tutelage of Dr. Kalle Lyytinen, where he was selected Innovation and Design Fellow, and his disciplinary focus was on How Hackers Think. Having been involved with innovation at many levels, Dr. Summers has designed exploration and open-space design thinking concepts for Fortune 500 companies, with the last innovation project generating over $100 million in revenue for the company involved. He received an M.S. in Information Security Policy and Management from the Heinz College at Carnegie Mellon University, and completed his undergraduate studies at the historic Elizabeth City State University in Elizabeth City, NC. Today Dr. Summers lives in Odenton, MD, and is currently designing a Raspberry Pi supercomputer, seeks opportunities to help others, enjoys kite surfing, playing chess, and spending time with family. | |||
<br> | <br> | ||
</div></div> | </div></div> |
Revision as of 18:41, 5 March 2016
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursdays from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together with free food every week. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Austin Beck (austinbb@umd.edu) or Leyla Norooz (leylan@umd.edu). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe one of these mailing lists.
We thank YAHOO for its sponsorship of the HCIL Brown Bag Lunches .
Spring 2016 Schedule
Date | Leader | Topic |
---|---|---|
01/28/2016 | Kickoff to a new Semester! |
Come network, make introductions, share what each of us is working on, and learn about the new HCIL website Please come to our first BBL of the spring and introduce yourself, and share what you're working on in the coming semester. We'll also cover our new HCIL website and ask our community to help us tweak and improve it (so bring your laptops if you can). The first BBL will be for us to network with each other and kickoff a great new semester.
|
02/04/2016 |
Tom Yeh Assistant Professor, University of Colorado CS (link). Host: Jon Froehlich |
Printing Pictures in 3D
|
02/11/2016 | Cliff Lampe Associate Professor, University of Michigan iSchool (link) Host: Jessica Vitak |
Citizen Interaction Design and its Implications for HCI
|
02/18/2016 | Thomas Haigh Associate Professor of Information Studies, University of Wisconsin-Milwaukee (link) Host: ??? |
Working on ENIAC: The Lost Labors of the Information Age
|
02/25/2016 | Adil Yalcin PhD Candidate in Computer Science at UMD (link) |
Keshif: Data Exploration using Aggregate Summaries and Multi-Mode Linked Selections
|
03/03/2016 | Eytan Adar. Assoc Prof, School of Information, Univ. of Michigan (link). Host: Ben Shneiderman |
All the Data Fit to Print: Newsroom Tools for Generating Personalized, Contextually-Relevant Visualizations (Campus Visualizations Partnership lecture) Abstract Visualizations can enhance news article content by presenting complex facts clearly and providing contextually-relevant visualizations. By using novel natural language and text mining approaches, our systems define "queries" that encode the article's topic (e.g., "unemployment in CA in March," "global average temperatures in 2012") and the comparisons that are made in the article's text (e.g., differences between states or over time) to guide the visualization generation. Compelling visualizations are relevant and 'interesting'-concepts that are very hard measure, but we address these challenges in the Contextifier, NewsViews, and PersaLog systems, which are meant to help journalists tell their stories more effectively (joint work with Brent Hecht, Jessica Hullman, Tong Gao, Carolyn Gearig, Josh Ford, and Nick Diakopoulos).
|
03/10/2016 | Tim Summers Director of Innovation, Entrepreneurship, and Engagement at UMD iSchool (link) |
How Hackers Think Abstract Hackers account for enormous costs associated with computer intrusion in a world increasingly reliant on computer and Internet-based technologies. In the general sense, a hacker is a technologist with a love for technology and a hack is an inventive solution executed through non-obvious means. They speak the language of code which propels the evolution of our information technology. This makes hackers the solvers of our largest, most complex issues. They seek out weaknesses in computers and networks that can be used to steal data or impact the functionality of the entire Internet. In consequence, they are experts at solving poorly understood and challenging problems in a variety of settings requiring deep understanding of technical details and imagination. Hacking is an activity that requires exceptional cognitive abilities. Through explanatory, sequential mixed methods research completed over three empirical studies, I discover how the mental models and the cognitive skills and traits of skilled hackers affect the way they learn and perform forward thinking. Proficient hackers construct mental representations of complex systems and their components. As they learn and interact with the system, their mental models evolve and become more reliable. This research reveals that hackers use these continuously evolving cognitive structures to conceive of future results through speculative forecasting. These models are instrumental in setting the hacker’s expectations about effects of actions, planning of actions, and ways of interpreting feedback. This research makes theoretical and empirical contributions to the literature on the mental models and the cognitive faculties of hackers and practice through the development of evidence-based and research-informed strategies for improving the cognitive mechanisms necessary for hacking. The findings are useful for leaders and managers in private, government, and nonprofit sectors with an interest in the advanced thinking required for cybersecurity and innovation. Additionally, this research contributes to the development of strategies for developing and managing effective hackers and improving talent identification and recruitment performance. It can serve as the foundation for the development of a training and education that improve the cognitive abilities necessary for effective hacking.
|
03/17/2016 | No Brown Bag for Spring Break. | |
03/24/2016 | Daniel Robbins (link) |
|
03/31/2016 | Greg Walsh Assistant Professor at U. of Baltimore, Division of Science, Information Arts and Technologies (link) |
Abstract: TBD
|
04/07/2016 | Andrea Wiggins Assistant Professor, University of Maryland iSchool (link) |
Abstract: TBD
|
04/14/2016 | CHI Practice Talks Kotaro Hara & TBD |
Abstract: TBD
|
04/21/2016 | CHI Practice Talks Brenna McNally & TBD |
Abstract: TBD
|
04/28/2016 | Tamara Clegg Assistant Professor, University of Maryland iSchool & Education (link) |
ScienceEverywhere Abstract: TBD
|
05/05/2016 | Chris Preist Reader in Sustainability and Computer Systems at Bristol University (link) Host: Jon Froehlich |
Abstract: TBD
|
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.