Brown Bag Lunch Schedule: Difference between revisions
mNo edit summary |
|||
Line 136: | Line 136: | ||
<br> University of Maryland, College Park | <br> University of Maryland, College Park | ||
| <div class="mw-collapsible mw-collapsed"> | | <div class="mw-collapsible mw-collapsed"> | ||
Understanding User Tradeoffs for Search in Encrypted Communication | |||
<br> | |||
<div class="mw-collapsible-content"> | <div class="mw-collapsible-content"> | ||
Abstract: End-to-end message encryption is the only way to achieve absolute message privacy. However, searching over | |||
end-to-end encrypted messages is complicated. Several popular instant messaging tools (e.g., WhatsApp, iMessage) circumvent this inconvenience by storing the search index locally on the devices. Another approach, called searchable encryption, allows users to search encrypted messages without storing the search index locally. These approaches have inherent tradeoffs between usability and security properties, yet little is known about how general users value these tradeoffs, especially in the context of email rather than instant messaging. In this paper, we systematize these tradeoffs in order to identify key feature differences. We use these differences as the basis for a choice-based conjoint analysis experiment focused on email (n=160), in which participants make a series of choices between email services with competing features. The results allow us to quantify the relative importance of each feature. We find that users indicate high relative importance for increasing privacy and minimizing local storage requirements. While privacy is more important overall, local storage is more important than adding additional marginal privacy after an initial improvement. These results suggest that local indexing, which provides more privacy, may often be appropriate for encrypted email, but that searchable encryption, which limits local storage, may also hold promise for some users. | |||
<br> | <br> | ||
Bio: Wei Bai is a PhD student in the Department of Electrical and Computer Engineering at the University of Maryland, advised by Prof. Michelle L. Mazurek. His research interests include network security and privacy with an emphasis on human factors, and his dissertation is about user perceptions of and attitudes toward encrypted communication. He obtained his MS in electrical and computer engineering from the University of Maryland. Contact him at wbai@umd.edu. | |||
</div></div> | </div></div> | ||
Revision as of 16:31, 14 February 2018
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursday from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Joohee Choi (jchoi27@umd.edu) or Pavithra Ramasamy (pavithra.ramasamy94@gmail.com). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe one of these mailing lists.
Spring 2018 Schedule
Date | Leader | Topic |
---|---|---|
01/25/2018 |
Kickoff to a new Semester! |
Come, network, make introductions, and share what you are working on Please come to our first BBL of the Spring 2018 semester to introduce yourself and share what you're working on in the coming semester. The first BBL will be for us to network with each other and kickoff a great new semester.
|
02/01/2018 |
Bahador Saket
|
Visualization by Demonstration Abstract: A commonly used interaction paradigm in most visualization tools is manual view specification. Tools implementing manual view specification often require users to manually specify visual properties through GUI operations on collections of visual properties and data attributes that are presented visually on control panels. To interact with tools implementing manual view specification users need to understand the potentially complex system parameters being controlled. Additionally, in such tools, users need to constantly shift their attention from the visual features of interest when interacting. In this talk, I present an alternative interaction paradigm for visualization construction and data exploration called visualization by demonstration. This paradigm advocates for a different process of visualization construction. I will also discuss the trade-offs between these interaction paradigms based on the data collected from an empirical study. I will then discuss applications of the "by demonstration’" paradigm in other areas in data visualization.
|
02/08/2018 |
Elissa Redmiles
|
Dancing Pigs or Security? Measuring the Rationality of End-User Security Behavior Abstract: Accurately modeling human decision-making in security is critical to think about when, why, and how to recommend that users adopt certain secure behaviors. We used behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account. We ask participants to make a financially impactful security choice, in the face of transparent risks of account compromise and benefits offered by an optional security behavior (two-factor authentication). We find that more than 50% of our participants made rational (e.g., utility optimal) decisions, and we find that participants are more likely to behave rationally in the face of higher risk. Additionally, we confirm that users are boundedly rational: they make decisions based on some risks and context, but not others, and we can model their behavior well as a function of these factors. Finally, we show that a “one-size-fits-all” emphasis on security can lead to market losses, but that adoption by a subset of users with higher risks or lower costs can lead to market gains.
|
02/15/2018 |
Erin Peters-Burton
|
Building Student Self-Awareness of Learning to Enhance Diversity in the Sciences Abstract: Many students are being left out of pursuing further studies in science because the current system of science education values students who learn via completion in an isolated, rather than collaborative way (Tobias, 1990). The stereotype of students who excel in science tend to be the ones who can conform to the institutional structure where the teacher is the sole source of knowledge (Friere, 2000). Through the idea of “Education as the Practice of Freedom” (hooks, 1994), the presentation will explain investigations that explore tangible ways to break down that stereotype. This research begins with the assumption that if teachers taught the ways science operates as a discipline, then students gain more power to construct their own scientific knowledge because they understand the “rules” of knowledge validation (Duschl, 1990). Learning how scientific knowledge is constructed and being self-aware of one’s own learning in science can help level the playing field so that students can do inquiry well (NRC, 1996; AAAS, 1993) and the science classroom will be a more inclusive, positive environment rather than relying on isolated competition for teaching. In this presentation, I will present an overview of research I have done over the past 10 years that focuses on helping students to become self-aware of their learning in science and how scientific knowledge is constructed. The work involves 8th grade students, undergraduates, graduate students, and professionals. The studies include constructs such as self-efficacy, motivation, metacognition, self-regulated learning, and visualization. Findings of the studies are synthesized into self-awareness priorities and how those constructs will ultimately impact social justice by providing more opportunities to see alternative perspectives and learn the “rules” of knowledge validation in science. As a result, students develop a sense of agency and an identity where anything is possible because they can learn independently in any situation.
|
02/22/2018 |
Norman Su
|
TBD TBD
|
03/01/2018 |
Ya-Wei Li
|
Using Data and Technology to Save Endangered Species. TBD
|
03/08/2018 |
Deok Gun Park
|
TBD TBD
|
03/15/2018 |
Clemens Klokmose
|
TBD TBD
|
03/22/2017 | No Brown Bag, Spring Break. | |
03/29/2018 |
Wei Bai
|
Understanding User Tradeoffs for Search in Encrypted Communication
Abstract: End-to-end message encryption is the only way to achieve absolute message privacy. However, searching over
end-to-end encrypted messages is complicated. Several popular instant messaging tools (e.g., WhatsApp, iMessage) circumvent this inconvenience by storing the search index locally on the devices. Another approach, called searchable encryption, allows users to search encrypted messages without storing the search index locally. These approaches have inherent tradeoffs between usability and security properties, yet little is known about how general users value these tradeoffs, especially in the context of email rather than instant messaging. In this paper, we systematize these tradeoffs in order to identify key feature differences. We use these differences as the basis for a choice-based conjoint analysis experiment focused on email (n=160), in which participants make a series of choices between email services with competing features. The results allow us to quantify the relative importance of each feature. We find that users indicate high relative importance for increasing privacy and minimizing local storage requirements. While privacy is more important overall, local storage is more important than adding additional marginal privacy after an initial improvement. These results suggest that local indexing, which provides more privacy, may often be appropriate for encrypted email, but that searchable encryption, which limits local storage, may also hold promise for some users.
|
04/05/2018 |
Eun-Kyoung Choe
|
TBD TBD
|
04/12/2018 |
CHI practice talks |
TBD TBD
|
04/19/2018 |
Hernisa Kacorri
|
TBD TBD
|
04/26/2018 |
TBA |
TBD TBD
|
05/03/2018 |
Amanda Lazar
|
TBD TBD
|
05/10/2018 |
Joel Chan
|
TBD TBD
|
05/17/2018 |
TBA |
TBD TBD
|
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.