Difference between revisions of "Brown Bag Lunch Schedule"
|Line 18:||Line 18:|
| <div class="mw-collapsible mw-collapsed">
| <div class="mw-collapsible mw-collapsed">
be an internal HCIL-students-only townhall meeting instead
|Line 29:||Line 29:|
<br> BBL student co-coordinators
<br> BBL student co-coordinators
| <div class="mw-collapsible mw-collapsed">
| <div class="mw-collapsible mw-collapsed">
<b>1st BBL of the semester
<b>1st BBL of the semester1) yourself and say sentence about what you working on in the and 2) listen to students who went on internship this summer their internship. </b>
Revision as of 17:06, 3 August 2018
The HCIL has an open, semi-organized weekly "brown bag lunch (BBL)" every Thursday from 12:30-1:30pm in HCIL (2105 Hornbake, South Wing). The topics range from someone's work, current interests in the HCIL, software demos/reviews, study design, proposed research topics, introductions to new people, etc. The BBL is the one hour a week where we all come together--thus, it’s a unique time for HCIL members with unique opportunities to help build collaborations, increase awareness of each other’s activities, and generally just have a bit of fun together. There is no RSVP; simply show up!
If you would like to give or suggest a talk, presentation, workshop, etc., send an email to BBL student co-coordinators Joohee Choi (email@example.com) or Pavithra Ramasamy (firstname.lastname@example.org). In the email, briefly describe the topic and preferred dates.
To be notified about upcoming events, please subscribe to one of these mailing lists.
Fall 2018 Schedule
NO BBL: there will be an internal HCIL-students-only townhall meeting instead
1st BBL of the semester. Come network and kickoff the new semester. You will 1) Introduce yourself and say ONE short sentence about what you will be working on in the fall and 2) listen to students who went on internship this summer describe their internship.
Spring 2018 Schedule
Kickoff to a new Semester!
Come, network, make introductions, and share what you are working on
Please come to our first BBL of the Spring 2018 semester to introduce yourself and share what you're working on in the coming semester. The first BBL will be for us to network with each other and kickoff a great new semester.
Visualization by Demonstration
Abstract: A commonly used interaction paradigm in most visualization tools is manual view specification. Tools implementing manual view specification often require users to manually specify visual properties through GUI operations on collections of visual properties and data attributes that are presented visually on control panels. To interact with tools implementing manual view specification users need to understand the potentially complex system parameters being controlled. Additionally, in such tools, users need to constantly shift their attention from the visual features of interest when interacting.
In this talk, I present an alternative interaction paradigm for visualization construction and data exploration called visualization by demonstration. This paradigm advocates for a different process of visualization construction. I will also discuss the trade-offs between these interaction paradigms based on the data collected from an empirical study. I will then discuss applications of the "by demonstration’" paradigm in other areas in data visualization.
Dancing Pigs or Security? Measuring the Rationality of End-User Security Behavior
Abstract: Accurately modeling human decision-making in security is critical to think about when, why, and how to recommend that users adopt certain secure behaviors. We used behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account. We ask participants to make a financially impactful security choice, in the face of transparent risks of account compromise and benefits offered by an optional security behavior (two-factor authentication). We find that more than 50% of our participants made rational (e.g., utility optimal) decisions, and we find that participants are more likely to behave rationally in the face of higher risk. Additionally, we confirm that users are boundedly rational: they make decisions based on some risks and context, but not others, and we can model their behavior well as a function of these factors. Finally, we show that a “one-size-fits-all” emphasis on security can lead to market losses, but that adoption by a subset of users with higher risks or lower costs can lead to market gains.
Building Student Self-Awareness of Learning to Enhance Diversity in the Sciences
Abstract: Many students are being left out of pursuing further studies in science because the current system of science education values students who learn via completion in an isolated, rather than collaborative way (Tobias, 1990). The stereotype of students who excel in science tend to be the ones who can conform to the institutional structure where the teacher is the sole source of knowledge (Friere, 2000). Through the idea of “Education as the Practice of Freedom” (hooks, 1994), the presentation will explain investigations that explore tangible ways to break down that stereotype. This research begins with the assumption that if teachers taught the ways science operates as a discipline, then students gain more power to construct their own scientific knowledge because they understand the “rules” of knowledge validation (Duschl, 1990). Learning how scientific knowledge is constructed and being self-aware of one’s own learning in science can help level the playing field so that students can do inquiry well (NRC, 1996; AAAS, 1993) and the science classroom will be a more inclusive, positive environment rather than relying on isolated competition for teaching. In this presentation, I will present an overview of research I have done over the past 10 years that focuses on helping students to become self-aware of their learning in science and how scientific knowledge is constructed. The work involves 8th grade students, undergraduates, graduate students, and professionals. The studies include constructs such as self-efficacy, motivation, metacognition, self-regulated learning, and visualization. Findings of the studies are synthesized into self-awareness priorities and how those constructs will ultimately impact social justice by providing more opportunities to see alternative perspectives and learn the “rules” of knowledge validation in science. As a result, students develop a sense of agency and an identity where anything is possible because they can learn independently in any situation.
The Problem of Designing for Subcultures
Abstract: Members of subcultures speak about and act with pervasive technologies in service to their distinct traditions. I will describe how outwardly subcultures maintain a unified front, yet inwardly are rich sites for compromise and confrontation over technology. I will highlight findings from work we have done with subcultures and, in particular, my own fieldwork with Irish traditional musicians. I will close by describing new design opportunities for technologies that acknowledge the remarkable solidarity and discord of subcultures.
Using Data and Technology to Save Endangered Species.
Abstract: We will discuss how Defenders of Wildlife, a nonprofit wildlife conservation organization, is expanding its use of technology and data analytics to conserve endangered species. We will summarize our projects involving remote-sensing data to monitor wildlife habitat and compliance with conservation agreements; data mining of federal government decisions to build the largest public repository of text-searchable documents on the U.S. Endangered Species Act; natural language processing of those documents to improve public understanding of how our government conserves endangered species; use of data visualization tools to reveal patterns in large datasets; and other initiatives. We invite the audience to actively engage with us about how we can improve our work and offer ideas for future projects and potential collaborations.
Deok Gun Park
Thinking, Autism and AGI
Shareable Dynamic Media: A revisit of the fundamentals of interactive computing
Abstract: Developing interactive systems that support collaboration between people, distribution across heterogeneous devices and user appropriation is notoriously difficult. Today’s software rests on a foundation built for personal computing, and to properly support the aforementioned qualities we need to revisit this foundation. In this talk, I will present you with a vision called Shareable Dynamic Media, inspired by Alan Kay’s seminal vision of Personal Dynamic Media. I will present a prototype implementation of the vision called Webstrates, and demonstrate how it enables the development of software where distribution across devices, collaboration between people, and malleability and reprogrammability are the norm rather than the exception. I will show our latest project, Codestrates, that combines Webstrates with the literate computing approach of interactive notebooks.
|03/22/2017||No Brown Bag, Spring Break.|
Understanding User Tradeoffs for Search in Encrypted Communication
Abstract: End-to-end message encryption is the only way to achieve absolute message privacy. However, searching over
end-to-end encrypted messages is complicated. Several popular instant messaging tools (e.g., WhatsApp, iMessage) circumvent this inconvenience by storing the search index locally on the devices. Another approach, called searchable encryption, allows users to search encrypted messages without storing the search index locally. These approaches have inherent tradeoffs between usability and security properties, yet little is known about how general users value these tradeoffs, especially in the context of email rather than instant messaging. In this paper, we systematize these tradeoffs in order to identify key feature differences. We use these differences as the basis for a choice-based conjoint analysis experiment focused on email (n=160), in which participants make a series of choices between email services with competing features. The results allow us to quantify the relative importance of each feature. We find that users indicate high relative importance for increasing privacy and minimizing local storage requirements. While privacy is more important overall, local storage is more important than adding additional marginal privacy after an initial improvement. These results suggest that local indexing, which provides more privacy, may often be appropriate for encrypted email, but that searchable encryption, which limits local storage, may also hold promise for some users.
Designing A Flexible Personal Data Tracking Tool
Abstract: We now see an increasing number of self-tracking apps and wearable devices. Despite the vast number of available tools, however, it is still challenging for self-trackers to find apps that suit their unique tracking needs, preferences, and commitments. In this talk, I will present OmniTrack, a mobile self-tracking system, which enables self-trackers to construct their own trackers and customize tracking items to meet their individual tracking needs. OmniTrack leverages a semi-automated tracking approach that combines manual and automated tracking methods. From a deployment study, we showed how participants used OmniTrack to create, revise, and appropriate trackers—ranging from a simple mood tracker to a sophisticated daily activity tracker. I will discuss how to further improve OmniTrack by incorporating multimodal interactions, providing more appropriate visualizations on a mobile device, and supporting researchers' unique data collection needs.
CHI practice talks
Combining smartwatches with large displays for visual data exploration by Karthik Badam and Tom Horak
Accessibility and Assistive Technologies at the Intersection of Users and Data
Abstract: Advances in artificial intelligence enable us to address key social issues. However, to see the benefit of this technology in many real-world applications, an integrative approach is necessary; effective solutions consist of a pipeline of processes or tasks involving both humans and machines. My research has integrated human computer interaction (HCI) techniques and data-driven methods applied to human data to steer technological innovations for people with visual impairments and for people who are deaf or hard-of-hearing. In this talk, I will provide an overview of my research program, and I will demonstrate the effectiveness of integrating machine learning and HCI methodologies with two concrete examples: i) teachable object recognizers trained by blind users, and ii) facial expression synthesis in sign language animations.
Small Worlds in a Distant Land: International Newcomer Students' Local Information Behavior in Unfamiliar Environments
Abstract: International students are a rapidly growing sub-population of students, and the United States, as a top destination, has hosted students from 218 different countries. However, as with other international newcomers, these students face various types of challenges in a new country. Studies have reported the challenges this population faces in regard to cultures, academic systems, and general adjustments, but research is less clear about the challenges they face in terms of information behaviors during adjustment to a new country. This study addresses the information behaviors of international newcomer students in the context of adjustment to new local environments; that is, their local information behavior (LIB). Specifically, drawing on prior work and theories, this research conceptualizes the idea of "socio-national context," the degree to which there are individuals from the same country available in one's local environment, as a factor influencing international newcomer students’ information behavior. Through the findings from this longitudinal mixed-method study of international and U.S. graduate students in different socio-national contexts, it is argued that information behavior theories and models need to account for people's socio-national contexts if they are to inform research involving international newcomer students and provide insights on designing systems and services for all international newcomer students, especially those from countries that tend to be less well-represented among international students in a host country.
Rethinking technology for dementia
Abstract: As the population ages, research is increasingly focused on conditions associated with growing older, such as cognitive and physical impairment. Technology is often presented as a solution for managing or treating these changes. This framing can position health conditions as problems to address through design and can neglect the complexity and positive aspects of older adulthood. In this talk, I draw on critical perspectives from Human-Computer Interaction and Gerontology. I describe ways in which technology can help us understand and challenge stereotypes around aging as well as cognitive impairment, and my ongoing and future work in this area. I will argue for a view of aging that takes into account the ways that technologies position older individuals and, in turn, the way that this view can inform the design of new technologies to enrich the experience of growing older.
Back to the Future: How people construct new creative ideas from old knowledge, and how technology can help
Abstract: Where do good ideas come from? One answer is that they come from prior knowledge: for example, Thomas Edison leveraged his knowledge of phonographs to “do for the eye what the phonograph does for the ear”. Yet, much research on human creativity demonstrates that prior knowledge often constrains creativity. How do people construct new creative ideas from old knowledge? And (how) can technology help? In the first part of my talk, I will summarize empirical work I have done that advances theories of the conditions under which people successfully construct new creative ideas from prior knowledge. This empirical work shows that prior knowledge can inspire creativity when it is analogically related to the current problem. This insight informs the ongoing work I will discuss in the second part of my talk: developing information technologies that combine human and machine intelligence to more effectively support analogical reasoning over prior knowledge.
WILDLABS.NET: the conservation technology network
Abstract: WILDLABS.NET: the conservation technology network is a collaboration across organizations that provides online infrastructure to connect wildlife conservationists directly to technologists to support the informed integration of technology tools in conservation practice. Since 2015, WILDLABS has evolved into a thriving online community of over 2,300 experts around the globe who crowd-source ideas and information, share case studies and co-develop solutions to pressing conservation and research challenges. WILDLABS community members range from academics to tech sector professionals, NGO staff, field-based practitioners and makers. On our platform, ideas are shared in over 25 technology and conservation challenge-specific groups with over 450 active discussion threads. The community is also a hub for posting grant and job opportunities to enhance the uptake of technical expertise into wildlife conservation initiatives. In this talk, we’ll explore the latest happenings on WILDLABS and empower those with engineering and related expertise to share their abilities to help save species.
Past Brown Bags
View the Past Brown Bag Lunch Schedules to learn more about prior talks.