Brown Bag Lunch Schedule
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursdays from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Sriram Karthik Badam (sbadam@umd.edu) or Pavithra Ramasamy (pavithra.ramasamy94@gmail.com). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe one of these mailing lists.
Fall 2017 Schedule
Date | Leader | Topic |
---|---|---|
08/31/2017 |
Kickoff to a new Semester! |
Come network, make introductions, and share what each of us is working on Please come to our first BBL of the Fall 2017 semester to introduce yourself and share what you're working on in the coming semester. The first BBL will be for us to network with each other and kickoff a great new semester.
|
09/07/2017 |
David Weintrop, University of Maryland, College Park |
To block or not to block: Understanding the effects of programming language representation in high school computer science classrooms. Abstract: In the last few years, Chicago, New York City, and San Francisco have all announced major initiatives to bring computer science classes and computational thinking into every high school in their cities - with countless other smaller school districts following suit. Having made these commitments, attention now shifts towards how best to teach computer science to diverse populations of high school students who grew up in the age of smart phones, iPads, and Facebook. An increasingly popular strategy being employed is the use of graphical, block-based programming environments like Scratch, Blockly, and Alice. While these environments have been found to be effective at broadening participation with younger learners, open questions remain about their suitability in high school contexts. In this talk, I will present findings from a two-year classroom study looking at how the design of introductory programming environments affects learners' emerging understandings of computer science concepts and their perceptions of the field of computer science. I will also discuss the affordances of block-based programming environments relative to more conventional text-based alternatives.
|
09/14/2017 |
Stacy Branham, |
From Independence to Interdependence: A Social Narrative of Assistive Technology Abstract: In the Assistive Technology and greater disabilities community, “independence” has been a core goal and frame for making progress toward equality. This dominant narrative is often interpreted to mean that disabled people can and should live independently without help from others, and that assistive devices exist to displace reliance on helpers. For example, a wearable device that gives a blind person turn-by-turn directions through an airport displaces a sighted human guide. However, my work with people with disabilities in the home, in the workplace, and in public spaces has demonstrated that collaboration is a significant tool and goal of people with disabilities in their everyday lives. Further, social setting and human-human interactions significantly impact whether and how assistive devices are used. In this talk, I will share and unpack stories from people with various abilities to argue that assistive technology design through the lens of “interdependence” provides a more honest, respectful, and empowering alternative for assistive technology design.
|
09/21/2017 |
Cody Buntain, |
Leveraging Large, Online Spaces to Study Communities and Response to Crises TBD
|
09/28/2017 |
Mark Fuge, |
Designing with Data: How machine learning is morphing human, product, and system design Abstract: TBD
|
10/05/2017 |
TBD |
TBD TBD
|
10/12/2017 |
TBD |
TBD TBD
|
10/19/2017 |
TBD |
TBD TBD
|
10/26/2017 |
Janet Walkoe, |
Technologically Mediated Teacher Noticing Abstract: We introduce technology-mediated teacher noticing (TMTN): a vision for the design and use of technology-mediated tools that takes seriously the need for teachers to attend to, interpret, and respond to their students’ thinking. This vision is situated at the intersection of research on teacher noticing, and on technology to support student thinking. We synthesize that work to highlight specific ways that technology-mediated classroom tools can focus and stabilize teachers’ attention on valuable aspects of student thinking emphasized by current reform efforts. We then illustrate TMTN with classroom examples in which technology supported or obstructed teachers' attention to student thinking, and consider implications for research on technology in teacher practice, professional development, and the design of technological tools for K-12 classrooms.
|
11/02/2017 |
Hernisa Kacorri, |
TBD TBD
|
11/09/2017 |
Karen Holtzblatt and Chris Robeck
|
TBD TBD
|
11/16/2017 |
Rock Stevens, |
Battle for New York: A Case Study Using Center of Gravity Theory for Digital Threat Modeling Abstract: Digital security professionals often use threat modeling to assess and improve the security posture of an organization or product. However, most threat modeling techniques have not been systematically evaluated at enterprise scale. This paper details a new digital-threat-modeling framework, Center of Gravity (CoG), based on a well-known military framework for optimizing resource allocation against an adversary. We evaluate the framework in a multi-part case study (n=25) with the New York City Cyber Command. We find that CoG helped participants to develop actionable threat mitigation plans, many of which were adopted at the organizational level within one week. Further, participants found CoG to be useful, and many continued to apply the framework in their daily duties 30 days after training without prompting. Overall, these results suggest that threat modeling with CoG can provide valuable benefits in an enterprise setting.
|
11/23/2017 | No Brown Bag, Thanksgiving recess | |
11/30/2017 |
Georgia Bullen |
TBD TBD
|
12/07/2017 |
Pamela Wisniewski
|
TBD TBD
|
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.