SlideShare a Scribd company logo
1 of 80
©2015CarnegieMellonUniversity:1
Making Sense of
Cyberspace
Cyber Intel Research Consortium
May 5, 2015
Jason Hong
Computer
Human
Interaction:
Mobility
Privacy
Security
©2015CarnegieMellonUniversity:2
•Bandwidth
Time
Computing Trends
©2015CarnegieMellonUniversity:3
•Bandwidth
•Storage
Time
Computing Trends
©2015CarnegieMellonUniversity:4
Time
Computing Trends
•Bandwidth
•Storage
•Computing Power
©2015CarnegieMellonUniversity:5
Time
Computing Trends
•Bandwidth
•Storage
•Computing Power
•Information
©2015CarnegieMellonUniversity:6
©2015CarnegieMellonUniversity:7
Time
Human Capabilities
Cognitive Processing
©2015CarnegieMellonUniversity:8
Cognitive Processing
Visual acuity
Communication bandwidth
Attention
…
Time
Human Capabilities
©2015CarnegieMellonUniversity:9
7  2
©2015CarnegieMellonUniversity:10
Evidence suggests it’s more like 4
©2015CarnegieMellonUniversity:11
How to Scale Up Our Ability to
Understand and Analyze?
• Research in mobility, privacy, security
– Anti-phishing
– Smartphone apps, Internet of Things
• Key themes today
– Information visualization
– Machine learning
– Wisdom of crowds
©2015CarnegieMellonUniversity:12
©2015CarnegieMellonUniversity:13
©2015CarnegieMellonUniversity:14
•Which state has highest income?
•Is there a relationship between
income and education?
•Are there any outliers?
©2015CarnegieMellonUniversity:15
Visualization for Eliciting
Knowledge from Data
©2015CarnegieMellonUniversity:16
How You Represent Info Matters
• What is VIII x XCI = ???
• Another example:
– Game with two players
– Alternately choose numbers between 1-15
– First to get three numbers to 15 wins
– Each number can be taken only once
©2015CarnegieMellonUniversity:17
How You Represent Info Matters
• It’s actually Tic-Tac-Toe
– Trivial in this representation
8 1 6
3 5 7
4 9 2
©2015CarnegieMellonUniversity:18
Other Design Principles?
1. Start out going Southwest on ELLSWORTH AVE
Towards BROADWAY by turning right.
2: Turn RIGHT onto BROADWAY.
3. Turn RIGHT onto QUINCY ST.
4. Turn LEFT onto CAMBRIDGE ST.
5. Turn SLIGHT RIGHT onto MASSACHUSETTS AVE.
6. Turn RIGHT onto RUSSELL ST.
©2015CarnegieMellonUniversity:19
©2015CarnegieMellonUniversity:20
©2015CarnegieMellonUniversity:21
Some Lessons
1. How you represent info matters
2. InfoViz is what you do show as well
as what you don’t
©2015CarnegieMellonUniversity:22
Focus + Context
• More pixels to stuff that matters,
fewer pixels to supporting context
©2015CarnegieMellonUniversity:23
Focus + Context
©2015CarnegieMellonUniversity:24
Appropriate Use of Color
©2015CarnegieMellonUniversity:25
Appropriate Use of Color
©2015CarnegieMellonUniversity:26
Some Lessons
1. How you represent info matters
2. InfoViz is what you do show as well
as what you don’t
3. Focus + Context
4. Appropriate use of colors (perception)
©2015CarnegieMellonUniversity:27
US Election 2004
©2015CarnegieMellonUniversity:28
InfoViz’s Can Show and Hide
Info
©2015CarnegieMellonUniversity:29
All Viz’s Show and Hide Info
©2015CarnegieMellonUniversity:30
InfoViz’s Can Show and Hide
Info
©2015CarnegieMellonUniversity:31
All Viz’s Show and Hide Info
©2015CarnegieMellonUniversity:32
Some Lessons
1. How you represent info matters
2. InfoViz is what you do show as well
as what you don’t
3. Focus + Context
4. Appropriate use of colors (perception)
5. All visualizations have inherent biases
©2015CarnegieMellonUniversity:33
©2015CarnegieMellonUniversity:34
Visualizations Don’t Have to
Be Complex to be Effective
©2015CarnegieMellonUniversity:35
Example from Jeff Heer
©2015CarnegieMellonUniversity:36
©2015CarnegieMellonUniversity:37
©2015CarnegieMellonUniversity:38
Work by Jeff Heer
©2015CarnegieMellonUniversity:39
©2015CarnegieMellonUniversity:40
Collaborative Analysis
• Many Eyes (by IBM)
©2015CarnegieMellonUniversity:41
©2015CarnegieMellonUniversity:42
©2015CarnegieMellonUniversity:43
Can We Have Crowds of
People Help Analyze Data?
• What are better ways of getting
groups of people working together?
• One approach is to use lots of crowd
workers to improve accuracy and time
– Common structure in your problem?
– Can you break it down into small tasks?
©2015CarnegieMellonUniversity:44
©2015CarnegieMellonUniversity:45
©2015CarnegieMellonUniversity:46
©2015CarnegieMellonUniversity:47
Wisdom of Crowds Approach
• Mechanics of PhishTank
– Submissions require at least 4 votes
and 70% agreement
– Some votes weighted more
• Total stats (Oct2006 – Feb2011)
– 1.1M URL submissions from volunteers
– 4.3M votes
– resulting in about 646k identified phish
• Why so many votes for only 646k phish?
©2015CarnegieMellonUniversity:48
PhishTank Statistics
Jan 2011
Submissions 16019
Total Votes 69648
Valid Phish 12789
Invalid Phish 549
Median Time 2hrs 23min
• 69648 votes  max of 17412 labels
– But only 12789 phish and 549 legitimate identified
– 2681 URLs not identified at all
• Median delay of 2+ hours still has room
for improvement (Jan 2015 is 14+ hours)
©2015CarnegieMellonUniversity:49
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2015CarnegieMellonUniversity:50
Clustering Phish
• Motivations
– Most phish are generated by toolkits
and thus similar
– Labeling single sites as phish can be
hard, easier if multiple examples
– Reduce labor by labeling suspicious
sites in bulk
©2015CarnegieMellonUniversity:51
Clustering Phish
• Motivations
– Most phish are generated by toolkits
and thus similar
– Labeling single sites as phish can be
hard, easier if multiple examples
– Reduce labor by labeling suspicious
sites in bulk
©2015CarnegieMellonUniversity:52
Most Phish Can be Clustered
• With all data over two weeks, 3180 of
3973 web pages can be grouped (80%)
– Used shingling and DBSCAN (see paper)
– 392 clusters, size from 2 to 153 URLs
©2015CarnegieMellonUniversity:53
Comparing Coverage and Time
©2015CarnegieMellonUniversity:54
CrowdVerify
• This is the New York Times Privacy Policy
• Can we use crowd to help summarize?
Flag surprises?
• Can we build predictive language models?
©2015CarnegieMellonUniversity:55
©2015CarnegieMellonUniversity:56
©2015CarnegieMellonUniversity:57
©2015CarnegieMellonUniversity:58
©2015CarnegieMellonUniversity:59
©2015CarnegieMellonUniversity:60
Which statement is more important?
Privacy and Security
CrowdVerify
We receive data whenever
you visit a game,
application, or website that
uses Facebook Platform …
When you sign up for
Facebook, you are required
to provide information such
as your name, email
address, birthday, and
gender.
A B
©2015CarnegieMellonUniversity:61
Privacy and Security
CrowdVerify on Google’s Policies
0
10
20
30
40
50
60
70
80
90
100
110
120
130
140
Scores
Statement ID
Frequency Experiment Sum of Scores
Google 08
Google 13
Google 07
Google 30
Google 10
Google 12
Google 04
Google 16
Google 03
Google 11
Google 05
Google 09
Google 28
Google 02
Google 06
Google 23
Google 14
©2015CarnegieMellonUniversity:62
Top Statement - Google
• Google 08: When you use our services
or view content provided by Google, we
may automatically collect and store
certain information in server logs. This
may include: telephony log information
like your phone number, calling-party
number, forwarding numbers, time
and date of calls, duration of calls, SMS
routing information and types of calls.
©2015CarnegieMellonUniversity:63
Bottom 3 Statements - Google
• Google 29: Whenever you use our services,
we aim to provide you with access to your
personal information.
• Google 26: For example, you can: Take
information out of many of our services.
• Google 24: People have different privacy
concerns. Our goal is to be clear about what
information we collect, so that you can make
meaningful choices about how it is used.
©2015CarnegieMellonUniversity:64
Designing Crowd Systems
• Motivation for contributing?
– Money, altruism, fun?
• Quality control?
– How to ensure good quality? Prevent bozos?
• How is crowd wisdom aggregated?
– How are people and computers organized?
– How are decisions made?
• Skill level required?
– Novice, intermediate, expert?
©2015CarnegieMellonUniversity:65
One Real-World Success
Clickworkers
• 100k+ volunteers identified 2M Mars
craters from space photographs (14k
hours of free work!!)
• Aggregate results “virtually
indistinguishable” from experts
©2015CarnegieMellonUniversity:66
Another Real-World Success
Galaxy Zoo
• Problem: you are an astronomer looking
at the Sloan Digital Sky survey, which has
images of over 1M galaxies. You want to
classify these by galaxy type.
©2015CarnegieMellonUniversity:67
DARPA Red Balloon
• 2009 challenge to find 10 red weather
balloons at unknown locations in the USA
• Winner gets $40k
• Surprise: top team wins
in < 9 hours
– Other teams did well too
– 9 balloons in 9 hours (1)
– 8 balloons (2 teams)
– 7 balloons (5 teams)
©2015CarnegieMellonUniversity:68
DARPA Red Balloon
©2015CarnegieMellonUniversity:69
DARPA Red Balloon
• MIT Team (10 balloons in less than 9 hours)
• Overall team strategy
– Get as many people as possible (over 5k people)
– Use multiple approaches to verify
• How people were organized
– Core team / recruit / spotters
• “Social engineering”
– Recursive financial structure to get more people
– Incentivizes people who might not be able to help
• Technologies used
– Surprisingly little, one centralized web site + google maps
©2015CarnegieMellonUniversity:70
MIT Reward Structure
©2015CarnegieMellonUniversity:71
Not Quite as Successful
Search for Steve Fossett
©2015CarnegieMellonUniversity:72
DARPA Network Challenge
©2015CarnegieMellonUniversity:73
Summary
• Collecting info is easy,
understanding it is hard
• How to scale?
– Information visualization
– Machine learning
– Wisdom of crowds
©2015CarnegieMellonUniversity:74
More Resources
• A Tour through the Visualization Zoo
– https://queue.acm.org/detail.cfm?id=1805128
• Interactive Dynamics for Visual Analysis
– https://queue.acm.org/detail.cfm?id=2146416
• Tableau Software
– http://www.tableau.com/
• Many Eyes
– http://www-01.ibm.com/software/analytics/many-eyes/
•
©2015CarnegieMellonUniversity:75
More Resources
• DARPA Red Balloon Challenge
– http://cacm.acm.org/magazines/2011/4/106587-reflecting-
on-the-darpa-red-balloon-challenge/fulltext
• Pirolli and Card, The Sensemaking Process
and Leverage Points for Analyst Technology
as Identified Through Cognitive Task Analysis
• Apolo, combining data mining with infoviz
– https://www.youtube.com/watch?v=EFxYVWkj1aE
©2015CarnegieMellonUniversity:76
©2015CarnegieMellonUniversity:77
Patterns in Crowd Analysis
Unit of Work
Unit of Work
Unit
Unit
Unit
…
Final
Voting
(Ex. PhishTank)
MapReduce
(Ex. CrowdVerify)
Unit of Work
Funnel
Unit of Work
Unit of WorkDecision
©2015CarnegieMellonUniversity:78
Visualization of the Internet
©2015CarnegieMellonUniversity:79
Combine Data Mining + Viz
User can specify exemplars of a group
Belief Propagation to find more nodes
©2015CarnegieMellonUniversity:80

More Related Content

Viewers also liked

Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013
Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013
Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013Jason Hong
 
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...Jason Hong
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleJason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
CASA: Context-Aware Scalable Authentication, at SOUPS 2013
CASA: Context-Aware Scalable Authentication, at SOUPS 2013CASA: Context-Aware Scalable Authentication, at SOUPS 2013
CASA: Context-Aware Scalable Authentication, at SOUPS 2013Jason Hong
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
 

Viewers also liked (10)

Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013
Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013
Investigating Collaborative Mobile Search Behaviors, at Mobile HCI 2013
 
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a...
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
CASA: Context-Aware Scalable Authentication, at SOUPS 2013
CASA: Context-Aware Scalable Authentication, at SOUPS 2013CASA: Context-Aware Scalable Authentication, at SOUPS 2013
CASA: Context-Aware Scalable Authentication, at SOUPS 2013
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
 

Similar to Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber Intelligence Tradecraft, May 2015

PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
 
Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Cynthia Clay
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
Making the case for digital. Digital transformation conference, 21 May 2015
Making the case for digital. Digital transformation conference, 21 May 2015Making the case for digital. Digital transformation conference, 21 May 2015
Making the case for digital. Digital transformation conference, 21 May 2015CharityComms
 
Citizen Maths for partners
Citizen Maths for partnersCitizen Maths for partners
Citizen Maths for partnersCitizen Maths
 
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"UX Antwerp Meetup
 
Supporting innovation in insurance with randomized experimentation
Supporting innovation in insurance with randomized experimentationSupporting innovation in insurance with randomized experimentation
Supporting innovation in insurance with randomized experimentationDomino Data Lab
 
ACMP 2015: Learn, Lead, Support Change at a Distance.
ACMP 2015: Learn, Lead, Support Change at a Distance.  ACMP 2015: Learn, Lead, Support Change at a Distance.
ACMP 2015: Learn, Lead, Support Change at a Distance. ExperiencePoint
 
ACMP2015 Presentation - Learn, Lead & Support Change at a Distance
ACMP2015 Presentation - Learn, Lead & Support Change at a DistanceACMP2015 Presentation - Learn, Lead & Support Change at a Distance
ACMP2015 Presentation - Learn, Lead & Support Change at a DistanceJames Chisholm
 
Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Cynthia Clay
 
Online communication trends
Online communication trendsOnline communication trends
Online communication trendsDavid Phillips
 
NACDEP 2015 - Are we entrepreneurs?
NACDEP 2015  - Are we entrepreneurs?NACDEP 2015  - Are we entrepreneurs?
NACDEP 2015 - Are we entrepreneurs?Glenn Muske
 
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Flipping 419 Cybercrime Scams: Targeting the Weak and the VulnerableFlipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Flipping 419 Cybercrime Scams: Targeting the Weak and the VulnerableJeremiah Onaolapo
 

Similar to Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber Intelligence Tradecraft, May 2015 (20)

PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
 
Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Making the case for digital. Digital transformation conference, 21 May 2015
Making the case for digital. Digital transformation conference, 21 May 2015Making the case for digital. Digital transformation conference, 21 May 2015
Making the case for digital. Digital transformation conference, 21 May 2015
 
Citizen Maths for partners
Citizen Maths for partnersCitizen Maths for partners
Citizen Maths for partners
 
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"
UX Antwerp Meetup January 2019 "User Centricity in a Corporate Environment"
 
Supporting innovation in insurance with randomized experimentation
Supporting innovation in insurance with randomized experimentationSupporting innovation in insurance with randomized experimentation
Supporting innovation in insurance with randomized experimentation
 
ACMP 2015: Learn, Lead, Support Change at a Distance.
ACMP 2015: Learn, Lead, Support Change at a Distance.  ACMP 2015: Learn, Lead, Support Change at a Distance.
ACMP 2015: Learn, Lead, Support Change at a Distance.
 
ACMP2015 Presentation - Learn, Lead & Support Change at a Distance
ACMP2015 Presentation - Learn, Lead & Support Change at a DistanceACMP2015 Presentation - Learn, Lead & Support Change at a Distance
ACMP2015 Presentation - Learn, Lead & Support Change at a Distance
 
Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace Leveraging the Benefits of the Hybrid Workplace
Leveraging the Benefits of the Hybrid Workplace
 
Online communication trends
Online communication trendsOnline communication trends
Online communication trends
 
NACDEP 2015 - Are we entrepreneurs?
NACDEP 2015  - Are we entrepreneurs?NACDEP 2015  - Are we entrepreneurs?
NACDEP 2015 - Are we entrepreneurs?
 
Natural Experiments at Scale
Natural Experiments at ScaleNatural Experiments at Scale
Natural Experiments at Scale
 
The Do's and Don’ts of Digital Marketing to Prospective Grad Students
The Do's and Don’ts of Digital Marketing to Prospective Grad StudentsThe Do's and Don’ts of Digital Marketing to Prospective Grad Students
The Do's and Don’ts of Digital Marketing to Prospective Grad Students
 
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Flipping 419 Cybercrime Scams: Targeting the Weak and the VulnerableFlipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber Intelligence Tradecraft, May 2015