SlideShare a Scribd company logo
Computational Cybersecurity in
Compromised Environments (C3E )
Jan 14, 2014

Computer
Human
Interaction:
Mobility
Privacy
Security

©2009 Carnegie Mellon University : 1

Making Sense of
Navigating Cyberspace

Jason Hong
•

Bandwidth

Time

©2014 Carnegie Mellon University : 2

Computing Trends
Bandwidth

•

Storage

•

Time

©2014 Carnegie Mellon University : 3

Computing Trends
Bandwidth

•

Storage

•

Computing Power

•

Time

©2014 Carnegie Mellon University : 4

Computing Trends
Bandwidth

•

Storage

•

Computing Power

•

Information

•

Time

©2014 Carnegie Mellon University : 5

Computing Trends
©2014 Carnegie Mellon University : 6
Cognitive Processing

•

Time

©2014 Carnegie Mellon University : 7

Human Capabilities
Cognitive Processing

•

Visual acuity

•

Time

©2014 Carnegie Mellon University : 8

Human Capabilities
Cognitive Processing

•

Visual acuity

•

Human bandwidth
…
•

Time

©2014 Carnegie Mellon University : 9

Human Capabilities
7
2
©2014 Carnegie Mellon University : 10
Evidence suggests it’s more like 4
©2014 Carnegie Mellon University : 11
©2014 Carnegie Mellon University : 12
1. Start out going Southwest on ELLSWORTH AVE
Towards BROADWAY by turning right.
2: Turn RIGHT onto BROADWAY.
3. Turn RIGHT onto QUINCY ST.
4. Turn LEFT onto CAMBRIDGE ST.
5. Turn SLIGHT RIGHT onto MASSACHUSETTS AVE.
6. Turn RIGHT onto RUSSELL ST.

©2014 Carnegie Mellon University : 13

The Power of Visualization
©2014 Carnegie Mellon University : 14
©2014 Carnegie Mellon University : 15

The Power of Visualization
1. Aesthetics and color really matter
2. Study what people are trying to do
3. InfoViz is also what you don’t show

©2014 Carnegie Mellon University : 16

Some Lessons
©2014 Carnegie Mellon University : 17

US Election 2004
©2014 Carnegie Mellon University : 18

InfoViz’s Can Show and Hide
Info
©2014 Carnegie Mellon University : 19

All Viz’s Show and Hide Info
©2014 Carnegie Mellon University : 20

InfoViz’s Can Show and Hide
Info
©2014 Carnegie Mellon University : 21

All Viz’s Show and Hide Info
1.
2.
3.
4.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases

©2014 Carnegie Mellon University : 22

Some Lessons
©2014 Carnegie Mellon University : 23

London Underground Map 1990s
©2014 Carnegie Mellon University : 24

Visualization of DNA

by Ben Fry
©2014 Carnegie Mellon University : 25

Visualization of the Internet
©2014 Carnegie Mellon University : 26

Earlier Conceptions of the Net
©2014 Carnegie Mellon University : 27
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models

©2014 Carnegie Mellon University : 28

Some Lessons
Example from Jeff Heer

©2014 Carnegie Mellon University : 29
©2014 Carnegie Mellon University : 30
©2014 Carnegie Mellon University : 31
Work by Jeff Heer
©2014 Carnegie Mellon University : 32
©2014 Carnegie Mellon University : 33

About 85 per cent of my
"thinking" time was spent
getting into a position to
think, to make a decision…
Much more time went into
finding or obtaining
information than into
digesting it… When the
graphs were finished, the
relations were obvious at
once, but the plotting had to
be done in order to make
them so.
- J.C.R. Licklider, 1960
©2014 Carnegie Mellon University : 34
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models
6. Viz just one part of toolchain

©2014 Carnegie Mellon University : 35

Some Lessons
• Many Eyes (by IBM)

©2014 Carnegie Mellon University : 36

Collaborative Analysis?
©2014 Carnegie Mellon University : 37
©2014 Carnegie Mellon University : 38
• Pay Mturkers to
help find potential
problems with
smartphone apps

©2014 Carnegie Mellon University : 39

CrowdScanner

95% users were surprised this app
sent their approximate location
to mobile ads providers.

95% users were surprised this app
sent their phone’s unique ID to
mobile ads providers.
90% users were surprised this app
sent their precise location to
mobile ads providers.
0% users were surprised this app
can control camera flashlight.
User can specify exemplars of a group
Belief Propagation to find more nodes

©2014 Carnegie Mellon University : 40

Combine Data Mining + Viz
• Mixed-initiative: Human + Machine

I feel like I have a
“partnership with the machine”
• Builds a highly personalized landscape
(unlike automatic methods)

©2014 Carnegie Mellon University : 41

Apolo’s Key Contributions
• Considering visualizations
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models
6. Viz just one part of toolchain

• Ongoing research
– Collaborative analysis
– Machine learning + infoviz

©2014 Carnegie Mellon University : 42

Summary

More Related Content

Similar to C3E talk on Navigating Cyberspace, January 2014

How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Jason Hong
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Jason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
Jason Hong
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleJason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Jason Hong
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Jason Hong
 
Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011
KGS Global
 
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeQueuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Dave Norton
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Jason Hong
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Jason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Jason Hong
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
Kitt Tientanopajai
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
Jason Hong
 
Using AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute TradeoffsUsing AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute Tradeoffs
Neil Ernst
 
Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project
Isabella Rega
 
CHI 2014
CHI 2014CHI 2014
CHI 2014
Nurun
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Jason Hong
 

Similar to C3E talk on Navigating Cyberspace, January 2014 (20)

How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
 
Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011
 
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeQueuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
 
Using AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute TradeoffsUsing AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute Tradeoffs
 
Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project
 
CHI 2014
CHI 2014CHI 2014
CHI 2014
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

C3E talk on Navigating Cyberspace, January 2014

Editor's Notes

  1. This was a 15 minute talk at the C3E workshop on navigating cyberspace. I give a brief overview of what works and what doesn’t for visualization. I also talk a bit at the end about ways of scaling things up (in particular, collaboration, crowdsourcing, and machine learning). Some slides in this talk borrowed from Chris Harrison and Jeff Heer
  2. Qmeeinfographic on amount of information
  3. Yeah, we’re more like this
  4. Wonderful book, with a wonderful title that really summarizes the essence of infoviz: using vision to think
  5. Here’s an example of infoviz. Can have text instructions. Can also have a map. Note that this map is good in that it shows relationships, distances, etc. However, this map also has a lot of clutter, in terms of too many unimportant streets, text running into each other, and color makes it hard to differentiate between what’s important and what’s not.
  6. Compare to Google Maps, they de-emphasize certain roads, emphasize others more, and are better at layout of text labels.
  7. Another case study. If you squint, entire map looks red.
  8. Compare to this one, shows that America is actually more purple than red. Same data, different representation.
  9. Divide things up by county. Can immediately see missing data, as well as distribution of who votes for whom.
  10. Distortion view, shows state sizes based on electoral votes.
  11. This is by population size, can see that major population areas tend to vote blue.
  12. All visualizations have biases. Need fast alternatives to help understand things (so you don’t fool yourself), and you need to realize this when dealing with data.
  13. One of the most beautiful visualizations. Note that it’s roughly geographic, but also relational, showing stops relative to each other. Note that the river Thames does not turn at 90 degrees, and it doesn’t show exact distances. The task of a person in the Tube is not about distances, but just relative distances and relative spaces.
  14. Some data sets don’t have a natural visualization though. This is an art piece by Ben Fry of processing fame, and while it’s very cool, note that it doesn’t really use “vision to think”, things don’t pop out here.
  15. And if there’s too much data, sometimes all you get is a big fat blob
  16. This notion of navigating cyberspace probably won’t be successful, because it doesn’t have the same characteristics of a space that we normally think of
  17. But just because there might not be a good natural metaphor doesn’t preclude us from trying to build good conceptual models. If you physically open a computer, you won’t find icons, folders, windows, etc, but it’s still a fantastic conceptual model for helping us make use of the power of a computer. (Despite the fact that it’s 40 years old)
  18. Slide from Jeff Heer
  19. Slide from Jeff Heer
  20. Slide from Jeff HeerData is messy (missing in this case), a common problem
  21. Slide also from Jeff HeerAlso see Licklider’s quote in Man-Machine Symbiosis, he says something similar
  22. http://groups.csail.mit.edu/medg/people/psz/Licklider.html
  23. Slide also from Jeff HeerToolchain of work (sort of similar to Clang and LLVM toolchain)
  24. Maybe crowdsourcing can help too, this is based on our work on analyzing smartphone apps, to find unusual behaviors
  25. Polo Chau, Christos Faloutsos, Jason Hong, NikiKitturA bottom-up approach for understanding graphs with hundreds of thousands of nodes and edgesUses a bottom-up approach, where you start with exemplars, and then uses machine learning algorithms to expand and cluster the graph