Brown Bag Lunch Schedule
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursdays from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Deokgun Park (intuinno@umd.edu) or Rebecca Stone (rstone1@umd.edu). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe one of these mailing lists.
We thank YAHOO for its past sponsorship of the HCIL Brown Bag Lunches
.
Spring 2017 Schedule
Date | Leader | Topic |
---|---|---|
02/02/2017 |
Kickoff to a new Semester! |
Come network, make introductions, and share what each of us is working on Please come to our first BBL of the spring 2017 semester to introduce yourself and share what you're working on in the coming semester. The first BBL will be for us to network with each other and kickoff a great new semester.
|
02/09/2017 |
Bilge Mutlu, |
Human-Centered Principles and Methods for Designing Robotic Technologies Abstract: The increasing emergence of robotic technologies that serve as automated tools, assistants, and collaborators promises tremendous benefits in everyday settings from the home to manufacturing facilities. While these technologies promise interactions that can be highly complex and beneficial, their successful integration into the human environment ultimately requires these interactions to also be natural and intuitive. To achieve complex but intuitive interactions, designers and developers must simultaneously understand and address human and computational challenges. In this talk, I will present my group’s work on building human-centered guidelines, methods, and tools to address these challenges in order to facilitate the design of robotic technologies that are more effective, intuitive, acceptable, and even enjoyable through successful integration into the human environment. The first part of the talk will review a series of projects that will demonstrate how the marrying of knowledge about people and computational methods through a systematic design process can enable effective user interactions with social, assistive, and telepresence robots. The second part of the talk will cover ongoing work that provides designers and developers with tools to apply these guidelines to the development of real-world robotic technologies and that utilizes partnerships with domain experts and end users to ensure the successful integration of these technologies into everyday settings. The talk will conclude with a discussion of high-level design guidelines that can be drawn from this body of work.
|
02/16/2017 |
Susan Winter, |
Designing for Diversity: HCI and the Support of Scientific Research Abstract: Understanding user needs and designing new technologies to meet those needs has long been a focus of HCI research. HCI has been embedded within a sociotechnical systems approach often considering user needs within a work context where an employing organization designs the work, chooses the technologies, and hires and trains the employees. This organizational “container” has been eroding, which raises interesting questions about the relationships among people, innovative technologies, work, and the role of HCI in this new hyper-diverse environment.
|
02/23/2017 |
Virginia Byrne and Joohee Choi, |
Research design review & CSCW Practice Talk Research Design Review Title: Characteristics of Collaboration in the Emerging Practice of Open Data Analysis |
03/02/2017 |
Diversity in Tech Discussion |
To continue our discussions surrounding diversity in tech please come to Thursday's BBL prepared to talk about two current diversity topics: 1. Diversity and the LGBTQ Community http://fortune.com/2015/03/12/lesbians-in-tech/ 2. Sexism in Tech https://www.susanjfowler.com/blog/2017/2/19/reflecting-on-one-very-strange-year-at-uber http://www.inc.com/kimberly-weisul/totally-unacceptable-environment-women-tech.html
|
03/09/2017 |
Tim Summers & Sanjna Srivatsa, |
Using Business Intelligence and Machine Learning in financial decision making in Cybersecurity sector Abstract: Cybersecurity is a complex and multifaceted challenge that is continuously growing in importance. It is a concern that not only affects banks and government agencies, as it constantly revealed through the media, but its implications expand beyond. It comes as no surprise that Wall Street would push efforts to cash in on the opportunity that is cybersecurity. In fact, cybercrime is fueling a worldwide cybersecurity market which is expected to grow from $75 billion presently to $170 billion by 2020. Hundreds of billions of dollars are being spent by consumers, businesses, governments, and the rest of the world to secure our ever-changing catalog of technology including, PCs, personal and corporate networks, the Internet of Things (IoT), and mobile devices. Despite a tumultuous stock market and poor venture capital returns, cybersecurity companies are raising large rounds of financing from investors. Due to the nascent nature of this field, the highly data-driven investment methodologies of old are not effective in guiding investment decisions. Investors complain that these methods are not agile and fall short when keeping up with current trends in the cybersecurity market. Our research utilizes principles of business intelligence and the latest research in hacker cognitive psychology to present a comprehensive, informative and easily digestible indicator for investors that is agile and self-optimizing. We present a model that considers blogosphere sentiment, relevant news, trend data, and real-time cyber-attack tools, techniques, and procedures to produce an investment indicator that will assist investors in their decision making. |
03/16/2017 |
Raja Kushalnagar, |
Multimedia for Deaf Eyes: How do we make multimedia accessible for deaf and hard of hearing people? Abstract: TBA |
03/23/2017 | No Brown Bag, Spring Break. | |
03/30/2017 |
Dion Goh, |
Gaming the System: How Useful are Game-based Approaches for Crowdsourcing Content? Abstract: Crowdsourcing has become a major way of getting work done through an online community. In addition to employing volunteers or paid human experts, computer games are a possible means to attract participants for crowdsourcing projects. Such games are seen as a promising approach to crowdsourcing because they capitalize on people's desire for entertainment. In other words, they make crowdsourcing fun and engaging, fostering participation in the process. This talk will introduce game-based approaches for crowdsourcing. The talk will illustrate these ideas in a specific context of crowdsourcing content, and in particular, mobile media. By blending games with crowdsourcing of mobile media, such applications provide entertainment and content is created as a result of gameplay. Nevertheless, there are challenges associated with game-based approaches for crowdsourcing since they have to meet the twin goals of entertaining users and producing quality output. Through various studies that will be presented, issues in creating these games as well as design lessons are discussed.
|
04/06/2017 |
Allison Druin
|
An Information Activist, National Parks, and a Digital Future TBD
|
04/13/2017 |
Daniel Votipka
|
Understanding and Supporting Vulnerability Discovery: Comparing White-Hat Hackers and Software Testers TBD |
04/20/2017 |
Rebecca Stone
|
Keeping Culture SAFe - DrupalCon Practice Talk Bio: This talk explores how consideration of culture and the target user(s) can dramatically shift the direction of a project, value stream or business. It also covers how this influences the vision and UX design within a portfolio. It will cover the cost of refactoring legacy code that did not consider target demographics when initially conceived, as well as some of the UX Research methods, such as ethnography, that can be used to build cultural consideration within your business model. It will help people focus on a larger picture than just a team, project, program or portfolio approach to the end user... that end users themselves function as a system of systems that needs to be considered. The talk is primarily aimed at intermediate practitioners: ScrumMasters/Developers/UX Content Strategists/Product Owners/CEOs/Biz Dev/UX Researchers/UX Designers/SAFe Practitioners This session will be of interest to those with intermediate experience who work in UX, Agile, Business or Portfolio Vision/Management and who have an interest in how culture can be considered in SAFe and other Scaled Agile approaches. |
04/27/2017 |
Fan Du
|
CHI Practice Talk
People often seek examples of similar individuals to guide
their own life choices. For example, students making academic
plans refer to friends; patients refer to acquaintances with
similar conditions, physicians mention past cases seen in their
practice. How would they want to search for similar people in
databases? We discuss the challenge of finding similar people
to guide life choices and report on a need analysis based on
13 interviews. Our PeerFinder prototype enables users to find
records that are similar to a seed record, using both record
attributes and temporal events found in the records. A user
study with 18 participants and four experts shows that users
are more engaged and more confident about the value of the
results to provide useful evidence to guide life choices when
provided with more control over the search process and more
context for the results, even at the cost of added complexity.
TBD |
05/04/2017 |
TBD |
CHI Practice Talk TBD |
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.