Security Metrics are often about the performance of information security professionals - traditional ones are centered around vulnerability close rates, timelines, or criticality ratings. But how does one measure if those metrics are the rights ones? How does one measure risk reduction, or how successful your metrics program is at operationalizing that which is necessary to prevent a breach? The data we'll explore defined the 2016 Verizon DBIR Vulnerabilities section.
This talk will borrow concepts from epidemiology, repeated game theory, classical and causal probability theory in order to demonstrate some inventive metrics for evaluating vulnerability management strategies. Not all vulnerabilities are at risk of being breached. Not all people are at risk for catching the flu. By analogy, we are trying to be effective at catching the "disease" of vulnerabilities which are susceptible to breaches, and not all are. How do we determine what is truly critical? How do we determine if we are effective at remediating what is truly critical? Because the incidence of disease is unknown, the absolute risk can not be calculated. This talk will introduce some concepts from other fields for dealing with infosec uncertainty.
Attackers are human too - and currently available data allows us to make some predictions about how they'll behave. And to predict is to prevent.
This document discusses a final year project that aims to use predictive analytics to reduce false alarms in intrusion detection systems. The project will experiment with machine learning algorithms and data mining techniques on the KDD Cup 99 dataset to develop predictive models. It will also develop a software simulation of an intrusion detection system that incorporates these predictive analytic methods. The experiment showed predictive analytics can improve detection accuracy and reduce false positives when applied to intrusion detection. While the developed system did not have real-time capabilities, it provided a proof of concept and future work is proposed to address scalability and real-time detection.
1) The document discusses how machine learning (ML) techniques can be used by red teams to drive offensive cyber operations in a more intelligent and adaptive manner.
2) Specifically, it provides examples of how ML can be used for spear phishing by analyzing past user click data to select the most relevant phishing emails tailored to each individual user's role.
3) The document argues that embedding intelligence into attacks using ML can make attacks more effective while making it more difficult for blue teams to build attackers' tactics, techniques, and procedures (TTPs).
A Fuzzy Approach For Multi-Domain Sentiment AnalysisMauro Dragoni
An emerging field within Sentiment Analysis concerns the investigation about how sentiment polarities towards concepts have to be adapted with respect to the different domains in which they are used. In this paper, we explore the use of fuzzy logic for modeling concept polarities, and the uncertainty associated with them, with respect to different domains. The approach is based on the use of a knowledge graph built by combining two linguistic resources, namely WordNet and SenticNet. Such a knowledge graph is then exploited by a graph-propagation algorithm that propagates sentiment information learned from labeled datasets. The system implementing the proposed approach has been evaluated on the Blitzer dataset by demonstrating its viability in real-world cases.
The document details how the author went from almost being robbed at gunpoint to earning advanced degrees in nanosystems and microsystems engineering. After the traumatic experience, the author identified skills like problem solving and communication. This motivated pursuing nanotechnology education at Louisiana Tech University, where the author excelled in projects applying these skills. The author then earned a master's degree, working on two NASA projects including developing a DNA analysis system and participating in reduced gravity flights.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
Contextual Research of Community Gardens in SavannahPriscila Mendoza
This document provides an overview of research conducted on community garden culture in Savannah, Georgia. The research team conducted secondary research to understand what components make up community gardens and primary research through observations, interviews, and an affinity wall analysis. Key findings from the primary research include: community gardening provides deep personal satisfaction beyond food; gardens require adapting to local circumstances and an unclear definition of "organic"; and gardens are ongoing works in progress. The objective of the research was to understand Savannah's community garden culture and the local community garden initiative.
Coolhunting emotions. Sentiment analysis and AC2ID test of GoToMeeting . View prezi online: http://prezi.com/nyvtmav6if-h/?utm_campaign=share&utm_medium=copy&rc=ex0share
Security Metrics are often about the performance of information security professionals - traditional ones are centered around vulnerability close rates, timelines, or criticality ratings. But how does one measure if those metrics are the rights ones? How does one measure risk reduction, or how successful your metrics program is at operationalizing that which is necessary to prevent a breach? The data we'll explore defined the 2016 Verizon DBIR Vulnerabilities section.
This talk will borrow concepts from epidemiology, repeated game theory, classical and causal probability theory in order to demonstrate some inventive metrics for evaluating vulnerability management strategies. Not all vulnerabilities are at risk of being breached. Not all people are at risk for catching the flu. By analogy, we are trying to be effective at catching the "disease" of vulnerabilities which are susceptible to breaches, and not all are. How do we determine what is truly critical? How do we determine if we are effective at remediating what is truly critical? Because the incidence of disease is unknown, the absolute risk can not be calculated. This talk will introduce some concepts from other fields for dealing with infosec uncertainty.
Attackers are human too - and currently available data allows us to make some predictions about how they'll behave. And to predict is to prevent.
This document discusses a final year project that aims to use predictive analytics to reduce false alarms in intrusion detection systems. The project will experiment with machine learning algorithms and data mining techniques on the KDD Cup 99 dataset to develop predictive models. It will also develop a software simulation of an intrusion detection system that incorporates these predictive analytic methods. The experiment showed predictive analytics can improve detection accuracy and reduce false positives when applied to intrusion detection. While the developed system did not have real-time capabilities, it provided a proof of concept and future work is proposed to address scalability and real-time detection.
1) The document discusses how machine learning (ML) techniques can be used by red teams to drive offensive cyber operations in a more intelligent and adaptive manner.
2) Specifically, it provides examples of how ML can be used for spear phishing by analyzing past user click data to select the most relevant phishing emails tailored to each individual user's role.
3) The document argues that embedding intelligence into attacks using ML can make attacks more effective while making it more difficult for blue teams to build attackers' tactics, techniques, and procedures (TTPs).
A Fuzzy Approach For Multi-Domain Sentiment AnalysisMauro Dragoni
An emerging field within Sentiment Analysis concerns the investigation about how sentiment polarities towards concepts have to be adapted with respect to the different domains in which they are used. In this paper, we explore the use of fuzzy logic for modeling concept polarities, and the uncertainty associated with them, with respect to different domains. The approach is based on the use of a knowledge graph built by combining two linguistic resources, namely WordNet and SenticNet. Such a knowledge graph is then exploited by a graph-propagation algorithm that propagates sentiment information learned from labeled datasets. The system implementing the proposed approach has been evaluated on the Blitzer dataset by demonstrating its viability in real-world cases.
The document details how the author went from almost being robbed at gunpoint to earning advanced degrees in nanosystems and microsystems engineering. After the traumatic experience, the author identified skills like problem solving and communication. This motivated pursuing nanotechnology education at Louisiana Tech University, where the author excelled in projects applying these skills. The author then earned a master's degree, working on two NASA projects including developing a DNA analysis system and participating in reduced gravity flights.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
Contextual Research of Community Gardens in SavannahPriscila Mendoza
This document provides an overview of research conducted on community garden culture in Savannah, Georgia. The research team conducted secondary research to understand what components make up community gardens and primary research through observations, interviews, and an affinity wall analysis. Key findings from the primary research include: community gardening provides deep personal satisfaction beyond food; gardens require adapting to local circumstances and an unclear definition of "organic"; and gardens are ongoing works in progress. The objective of the research was to understand Savannah's community garden culture and the local community garden initiative.
Coolhunting emotions. Sentiment analysis and AC2ID test of GoToMeeting . View prezi online: http://prezi.com/nyvtmav6if-h/?utm_campaign=share&utm_medium=copy&rc=ex0share
This document discusses sustainability and the current environmental situation. It begins by noting that while technological advances have improved life, the natural world is nearing collapse due to issues like climate change, loss of biodiversity, and threats to food and water supplies. This paradoxical situation shows that both the best and worst of times are now. The document then provides definitions of sustainability, noting it aims to meet present needs without compromising the future by balancing society, environment, and economy. A brief history of sustainability milestones from 1986 to 2011 is also presented.
Michael Jayjock's lecture.
Refers to: Morrow, P.E. et al: Chronic Inhalation Study Findings as the basis for Proposing a New Occupational Dust Exposure Limit, International Journal of Toxicology March/April 1991 10: 279-290.
This document summarizes the key innovations that led to the development of aseptic packaging technology by Tetra Pak, the world's largest packaging company. It describes the three main phases of innovation: 1) the original tetrahedron-shaped packaging design in the 1940s for hygiene and efficient material use; 2) the development of a filling and sealing machine in the 1950s that used a coated carton and continuous process; and 3) the creation of aseptic processing and the tetra brick packaging in the 1960s, which eliminated the need for refrigeration. The aseptic packaging technology was considered one of the most important food packaging innovations of the 20th century.
This document discusses key concepts related to sampling means, including that bias can occur if sample proportions or means are skewed from the population values, the central limit theorem states that sample means will follow a normal distribution as sample size increases, and the sampling distribution of sample means from any population will be approximately normal in shape with standard deviation equal to the population standard deviation divided by the square root of the sample size.
This document discusses bias in sampling and surveys. It defines random sampling as giving every population element an equal chance of being selected, making it an unbiased sample. Bias can occur if the sample is not representative, the survey is ambiguous or subjective, or factors influence responses. Types of bias include sampling bias, non-response bias, response bias, household bias, and measurement bias. Examples are given to illustrate each type of bias.
XNN001 Introductory epidemiological concepts - sampling, bias and errorramseyr
1. The document discusses key concepts in epidemiological sampling including different sampling methods such as probability and non-probability sampling.
2. It describes specific sampling techniques like simple random sampling, stratified sampling, cluster sampling, and their advantages and limitations.
3. The document also discusses potential sources of bias and error in epidemiological studies from sampling, data collection and analysis that can influence the validity and reliability of findings.
Bias, confounding and fallacies in epidemiologyTauseef Jawaid
This document discusses three major threats to internal validity in epidemiology: bias, confounding, and fallacies. It focuses on defining and providing examples of bias, specifically selection bias and information bias. Selection bias can occur when comparison groups are not representative of the target populations due to factors like non-random selection or differential loss to follow up. Information bias, also called misclassification bias, results from errors in measuring exposures or outcomes, which can be differential or non-differential. Methods to control for biases like blinding subjects and using multiple questions are also outlined.
This document discusses various types of biases and errors that can occur in epidemiological studies, including random error, systematic error, random misclassification, bias, and confounding. It provides definitions and examples of these terms. Specific types of biases covered include selection bias, information bias, and confounding. Methods for controlling biases discussed include randomization, restriction, matching, stratification, standardization, and blinding.
This document discusses different types of error and bias that can occur in epidemiological studies. It defines random error as occurring due to chance and resulting in imprecise measures, while systematic error or bias results in invalid measures that are not true. Types of bias discussed include selection bias, information bias, and confounding. Selection bias can arise from how cases and controls are selected, while information bias occurs when exposure or disease status is incorrectly classified. The document emphasizes the importance of reducing both random and systematic errors to obtain valid study results.
This document discusses common errors in research and their implications. It begins by outlining the differences between quantitative and qualitative research approaches. Common errors for various research methods like questionnaires, interviews, experiments and observational studies are then described. These errors can lead to wrong business decisions, loss of capital, and market failures if research conclusions are flawed. Finally, steps like conducting a literature review, using statistical tools, double entry of data, pilot testing, and training of researchers are suggested to minimize errors.
This document discusses various sampling methods used for data collection. It defines key terms like population, sample, parameter, and statistic. It describes probability sampling methods like simple random sampling, stratified sampling, cluster sampling, systematic sampling, and multistage sampling. It also discusses non-probability sampling methods such as convenience sampling, purposive sampling, quota sampling, snowball sampling, and self-selection sampling. The document concludes by explaining the different types of sampling errors like sample errors and non-sample errors.
This document provides an overview of mind reading computer technology. It discusses how computational models of mind reading can infer mental states from facial signals using techniques like facial affect detection and emotional classification. The technology works by measuring blood volume and oxygen levels in the brain using functional near-infrared spectroscopy sensors. Current applications include predicting driver drowsiness or anger, controlling animations, and enabling silent web searches. While the technology shows promise, challenges remain in scaling the techniques for conversational speech recognition and addressing privacy and ethical implications.
Emotion Sense: From Design to DeploymentNeal Lathia
This document discusses the development of an app called Emotion Sense that collects sensor data from smartphones to analyze moods, behaviors, and contextual experiences. It describes initial trials with 22 users over 1 month to collect this data alongside experience sampling surveys triggered by sensor states. The work aims to understand how sensor data can help automate and personalize behavioral support. It also discusses challenges in building sensor applications and the tension between using sensors to trigger surveys while also using sensor data to quantify context. Ongoing work includes generalizing the tool and applying it to new domains.
Join us for an enlightening session on AI/ML by Jeevanshi Sharma, an MS graduate from the University of Alberta with accolades from Outreachy'22 and MITACS GRI'21. Delve into cutting-edge advancements, applications, and ethical considerations. Learn basic steps to start your ML journey and explore industry applications, advancements, and associated careers.
The document discusses mind reading computers that can summarize a person's mental state by analyzing facial expressions and head gestures using video cameras and machine learning. It can identify features like facial expressions that indicate emotions, thoughts, and mental workload. The technology works by tracking facial feature points and modeling the relationship between expressions and mental states over time. Potential applications include monitoring human interactions, detecting driver states, and developing assistive technologies like mind-controlled wheelchairs. Issues involve ensuring reliability and addressing ethical concerns around predicting future behaviors.
The document discusses the development of mind reading computers. It describes how these computers use techniques like facial expression analysis and functional near-infrared spectroscopy to infer a person's mental states. The technology has potential applications in helping paralyzed people communicate, assisting those in comas, and aiding the disabled. However, concerns exist around privacy breaches and the risk of the technology being misused if it could accurately predict human behavior.
The document discusses mind reading computers, which use techniques from computer vision, machine learning, and psychology to interpret a person's mental states from their facial expressions and body language in real time. It describes how existing systems work, potential applications like improving human-computer interfaces, and challenges like privacy concerns. Future research may allow mind reading computers to help paralyzed people communicate or monitor brain activity for medical or military purposes if technical and ethical issues can be addressed.
Analysing a Complex Agent-Based Model Using Data-Mining TechniquesBruce Edmonds
A talk given at "Social Simulation 2014" at Barcelona in September.
A complex “Data Integration Model” of voter behaviour is described. However it is very complex and hard to analyse. For such a model “thin” samples of the outcomes using classic parameter sweeps are inadequate. In order to get a more holistic picture of its behaviour data- mining techniques are applied to the data generated by many runs of the model, each with randomised parameter values.
Paper is at: http://cfpm.org/aacabm/analysing a complex model-v3.4.pdf
The document discusses a "mind-reading computer" system being developed that can analyze a person's facial expressions in real time to infer their underlying mental state, such as agreement, interest, or confusion. It works by measuring blood volume and oxygen levels around the brain using functional near-infrared spectroscopy sensors in a headband. Potential applications include predicting bankruptcy, facial recognition, marketing, and assisting paralyzed or disabled people by interpreting their thoughts. Challenges include privacy concerns and ensuring it can accurately read many different people. The research aims to enhance human-computer interaction through empathetic responses.
Influence of time and length size feature selections for human activity seque...ISA Interchange
In this paper, Viterbi algorithm based on a hidden Markov model is applied to recognize activity sequences from observed sensors events. Alternative features selections of time feature values of sensors events and activity length size feature values are tested, respectively, and then the results of activity sequences recognition performances of Viterbi algorithm are evaluated. The results show that the selection of larger time feature values of sensor events and/or smaller activity length size feature values will generate relatively better results on the activity sequences recognition performances.
Conference talk: Understanding Vulnerabilities of Location Privacy Mechanisms...Zohaib Riaz
Slides for our work presented at MobiQuitous 2017 Conference (http://mobiquitous.org/).
Full paper text: ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2017-46/INPROC-2017-46.pdf
This paper focused on revealing weaknesses of existing location obfuscation approaches when an attacker possesses accurate or obfuscated location history information.
This document discusses the development of mind reading computer technology. It begins with an introduction to mind reading and how computer techniques can be used to gather and analyze facial expression and other biological data to infer mental states. It then discusses how existing mind reading systems work using cameras and sensors to track facial features and infer emotions and intentions. Applications are discussed such as using mind reading to enhance human-computer interaction and monitoring drivers for drowsiness or distraction. Both advantages such as helping disabled individuals and disadvantages around privacy are mentioned.
This document discusses sustainability and the current environmental situation. It begins by noting that while technological advances have improved life, the natural world is nearing collapse due to issues like climate change, loss of biodiversity, and threats to food and water supplies. This paradoxical situation shows that both the best and worst of times are now. The document then provides definitions of sustainability, noting it aims to meet present needs without compromising the future by balancing society, environment, and economy. A brief history of sustainability milestones from 1986 to 2011 is also presented.
Michael Jayjock's lecture.
Refers to: Morrow, P.E. et al: Chronic Inhalation Study Findings as the basis for Proposing a New Occupational Dust Exposure Limit, International Journal of Toxicology March/April 1991 10: 279-290.
This document summarizes the key innovations that led to the development of aseptic packaging technology by Tetra Pak, the world's largest packaging company. It describes the three main phases of innovation: 1) the original tetrahedron-shaped packaging design in the 1940s for hygiene and efficient material use; 2) the development of a filling and sealing machine in the 1950s that used a coated carton and continuous process; and 3) the creation of aseptic processing and the tetra brick packaging in the 1960s, which eliminated the need for refrigeration. The aseptic packaging technology was considered one of the most important food packaging innovations of the 20th century.
This document discusses key concepts related to sampling means, including that bias can occur if sample proportions or means are skewed from the population values, the central limit theorem states that sample means will follow a normal distribution as sample size increases, and the sampling distribution of sample means from any population will be approximately normal in shape with standard deviation equal to the population standard deviation divided by the square root of the sample size.
This document discusses bias in sampling and surveys. It defines random sampling as giving every population element an equal chance of being selected, making it an unbiased sample. Bias can occur if the sample is not representative, the survey is ambiguous or subjective, or factors influence responses. Types of bias include sampling bias, non-response bias, response bias, household bias, and measurement bias. Examples are given to illustrate each type of bias.
XNN001 Introductory epidemiological concepts - sampling, bias and errorramseyr
1. The document discusses key concepts in epidemiological sampling including different sampling methods such as probability and non-probability sampling.
2. It describes specific sampling techniques like simple random sampling, stratified sampling, cluster sampling, and their advantages and limitations.
3. The document also discusses potential sources of bias and error in epidemiological studies from sampling, data collection and analysis that can influence the validity and reliability of findings.
Bias, confounding and fallacies in epidemiologyTauseef Jawaid
This document discusses three major threats to internal validity in epidemiology: bias, confounding, and fallacies. It focuses on defining and providing examples of bias, specifically selection bias and information bias. Selection bias can occur when comparison groups are not representative of the target populations due to factors like non-random selection or differential loss to follow up. Information bias, also called misclassification bias, results from errors in measuring exposures or outcomes, which can be differential or non-differential. Methods to control for biases like blinding subjects and using multiple questions are also outlined.
This document discusses various types of biases and errors that can occur in epidemiological studies, including random error, systematic error, random misclassification, bias, and confounding. It provides definitions and examples of these terms. Specific types of biases covered include selection bias, information bias, and confounding. Methods for controlling biases discussed include randomization, restriction, matching, stratification, standardization, and blinding.
This document discusses different types of error and bias that can occur in epidemiological studies. It defines random error as occurring due to chance and resulting in imprecise measures, while systematic error or bias results in invalid measures that are not true. Types of bias discussed include selection bias, information bias, and confounding. Selection bias can arise from how cases and controls are selected, while information bias occurs when exposure or disease status is incorrectly classified. The document emphasizes the importance of reducing both random and systematic errors to obtain valid study results.
This document discusses common errors in research and their implications. It begins by outlining the differences between quantitative and qualitative research approaches. Common errors for various research methods like questionnaires, interviews, experiments and observational studies are then described. These errors can lead to wrong business decisions, loss of capital, and market failures if research conclusions are flawed. Finally, steps like conducting a literature review, using statistical tools, double entry of data, pilot testing, and training of researchers are suggested to minimize errors.
This document discusses various sampling methods used for data collection. It defines key terms like population, sample, parameter, and statistic. It describes probability sampling methods like simple random sampling, stratified sampling, cluster sampling, systematic sampling, and multistage sampling. It also discusses non-probability sampling methods such as convenience sampling, purposive sampling, quota sampling, snowball sampling, and self-selection sampling. The document concludes by explaining the different types of sampling errors like sample errors and non-sample errors.
This document provides an overview of mind reading computer technology. It discusses how computational models of mind reading can infer mental states from facial signals using techniques like facial affect detection and emotional classification. The technology works by measuring blood volume and oxygen levels in the brain using functional near-infrared spectroscopy sensors. Current applications include predicting driver drowsiness or anger, controlling animations, and enabling silent web searches. While the technology shows promise, challenges remain in scaling the techniques for conversational speech recognition and addressing privacy and ethical implications.
Emotion Sense: From Design to DeploymentNeal Lathia
This document discusses the development of an app called Emotion Sense that collects sensor data from smartphones to analyze moods, behaviors, and contextual experiences. It describes initial trials with 22 users over 1 month to collect this data alongside experience sampling surveys triggered by sensor states. The work aims to understand how sensor data can help automate and personalize behavioral support. It also discusses challenges in building sensor applications and the tension between using sensors to trigger surveys while also using sensor data to quantify context. Ongoing work includes generalizing the tool and applying it to new domains.
Join us for an enlightening session on AI/ML by Jeevanshi Sharma, an MS graduate from the University of Alberta with accolades from Outreachy'22 and MITACS GRI'21. Delve into cutting-edge advancements, applications, and ethical considerations. Learn basic steps to start your ML journey and explore industry applications, advancements, and associated careers.
The document discusses mind reading computers that can summarize a person's mental state by analyzing facial expressions and head gestures using video cameras and machine learning. It can identify features like facial expressions that indicate emotions, thoughts, and mental workload. The technology works by tracking facial feature points and modeling the relationship between expressions and mental states over time. Potential applications include monitoring human interactions, detecting driver states, and developing assistive technologies like mind-controlled wheelchairs. Issues involve ensuring reliability and addressing ethical concerns around predicting future behaviors.
The document discusses the development of mind reading computers. It describes how these computers use techniques like facial expression analysis and functional near-infrared spectroscopy to infer a person's mental states. The technology has potential applications in helping paralyzed people communicate, assisting those in comas, and aiding the disabled. However, concerns exist around privacy breaches and the risk of the technology being misused if it could accurately predict human behavior.
The document discusses mind reading computers, which use techniques from computer vision, machine learning, and psychology to interpret a person's mental states from their facial expressions and body language in real time. It describes how existing systems work, potential applications like improving human-computer interfaces, and challenges like privacy concerns. Future research may allow mind reading computers to help paralyzed people communicate or monitor brain activity for medical or military purposes if technical and ethical issues can be addressed.
Analysing a Complex Agent-Based Model Using Data-Mining TechniquesBruce Edmonds
A talk given at "Social Simulation 2014" at Barcelona in September.
A complex “Data Integration Model” of voter behaviour is described. However it is very complex and hard to analyse. For such a model “thin” samples of the outcomes using classic parameter sweeps are inadequate. In order to get a more holistic picture of its behaviour data- mining techniques are applied to the data generated by many runs of the model, each with randomised parameter values.
Paper is at: http://cfpm.org/aacabm/analysing a complex model-v3.4.pdf
The document discusses a "mind-reading computer" system being developed that can analyze a person's facial expressions in real time to infer their underlying mental state, such as agreement, interest, or confusion. It works by measuring blood volume and oxygen levels around the brain using functional near-infrared spectroscopy sensors in a headband. Potential applications include predicting bankruptcy, facial recognition, marketing, and assisting paralyzed or disabled people by interpreting their thoughts. Challenges include privacy concerns and ensuring it can accurately read many different people. The research aims to enhance human-computer interaction through empathetic responses.
Influence of time and length size feature selections for human activity seque...ISA Interchange
In this paper, Viterbi algorithm based on a hidden Markov model is applied to recognize activity sequences from observed sensors events. Alternative features selections of time feature values of sensors events and activity length size feature values are tested, respectively, and then the results of activity sequences recognition performances of Viterbi algorithm are evaluated. The results show that the selection of larger time feature values of sensor events and/or smaller activity length size feature values will generate relatively better results on the activity sequences recognition performances.
Conference talk: Understanding Vulnerabilities of Location Privacy Mechanisms...Zohaib Riaz
Slides for our work presented at MobiQuitous 2017 Conference (http://mobiquitous.org/).
Full paper text: ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2017-46/INPROC-2017-46.pdf
This paper focused on revealing weaknesses of existing location obfuscation approaches when an attacker possesses accurate or obfuscated location history information.
This document discusses the development of mind reading computer technology. It begins with an introduction to mind reading and how computer techniques can be used to gather and analyze facial expression and other biological data to infer mental states. It then discusses how existing mind reading systems work using cameras and sensors to track facial features and infer emotions and intentions. Applications are discussed such as using mind reading to enhance human-computer interaction and monitoring drivers for drowsiness or distraction. Both advantages such as helping disabled individuals and disadvantages around privacy are mentioned.
This paper proposes a system to detect Indian sign language gestures using a Kinect sensor and convert them to text and speech output. The system works by capturing skeletal images of the user's body with the Kinect and extracting the hand gesture. Image processing techniques like segmentation and filtering are used to isolate the hand and detect fingers. Hidden Markov models match the gesture to a database to determine the sign's meaning. An accuracy of 94.5% was achieved on a test set of 50 gestures. The system provides a direct interface for deaf people to communicate via their sign language without requiring complicated setups or technologies. Future work will focus on reducing noise and errors in finger detection.
This document discusses mind reading technology that can analyze a person's facial expressions and infer their mental state in real time using computer vision and machine learning. It works by tracking 24 feature points on the face and modeling the relationship between facial displays and mental states over time. Potential applications include monitoring driver attention and improving human-computer interfaces, but issues around privacy and predicting future behavior need to be addressed. Research is ongoing to develop less intrusive methods like using headbands that detect blood oxygen levels to read thoughts.
International Journal of Engineering Research and DevelopmentIJERD Editor
The document provides a survey of research on sensor association rules for mining behavioral patterns from wireless sensor network data. Sensor association rules aim to discover temporal relationships between sensor nodes by detecting correlated events. Various approaches are discussed, including techniques for distributed in-network mining, handling data streams, reducing redundancy, and applying association rules to applications like missing data estimation. Overall, the survey finds that sensor association rules are an effective knowledge discovery technique for wireless sensor networks.
Cognitive Computing at University OsnabrückSteven Miller
This document discusses cognitive computing from the Institute of Cognitive Science. It describes how cognitive computing uses social media analysis, data science methods, and IBM's Watson AI to better predict disease spread, such as influenza. By fusing real-time social media data with slower but more reliable CDC data, cognitive systems can improve predictions. The institute also researches neuromorphic hardware and reservoir computing techniques inspired by the brain to enable new kinds of fault-tolerant computing.
This document discusses mind reading technology that uses sensors and algorithms to interpret a person's mental states from their facial expressions and brain activity in real time. It can infer emotions, thoughts and levels of concentration. The technology has potential advantages for human-computer interaction and assistive technologies but also raises issues regarding privacy, free will and predicting future behavior.
Using Visualizations in Remote Online Labs - Talk at CyTSEMegan Sauter
1. The document discusses a study that compared the psychological experiences of students doing a science lab remotely versus through a computer simulation. It examined how the type of technology and visualizations used influenced presence, mental models of labs, and learning outcomes.
2. The results showed that remote labs led to a stronger sense of presence and doing a real experiment. Webcams gave more of a sense of reality than photos. Students who did the remote lab were also more likely to want to do it again.
3. Overall, the study found that while learning was robust with both methods, remote labs with more realistic visualizations like webcams led to more authentic lab experiences for students. The technology and visualizations used are
The document summarizes recent research on mind reading computers. It discusses how previous research has shown distinct brainwaves are produced for different words and that facial expressions and gestures can reveal mental states. Current techniques to develop mind reading computers involve measuring blood volume and oxygen levels around the brain using functional near-infrared spectroscopy. Algorithms like LDA, k-NN, HMM, SVM, and ANN are used for classification and pattern recognition. Potential applications include assistive technologies, education, marketing, and military uses, but issues around privacy and accuracy need further research.
Similar to Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods (20)
Everything around the NLP (London.AI Feb 2021)Neal Lathia
The document discusses various natural language processing (NLP) applications used at a company including automated self-service answers, in-chat interactions, conversation analysis, and recommending saved responses. It also outlines the key components needed to implement NLP in production including building labeled datasets, monitoring models, serving models in production, and storing models. The overall system is designed to enable various NLP models to be plugged in and orchestrated with business logic for customer support applications.
Using machine learning for customer service (Data Talks Club)Neal Lathia
Monzo Bank developed a chatbot to help customers with common questions through self-service. Their first iteration involved adding an article search to chat. This showed promise, but still required effort from customers. Their second iteration directly answered questions about predictable topics using classifiers, like card replacements. They tested topics in "shadow mode" and deployed those that predicted accurately. They designed the system as independent classifiers for each topic that were orchestrated, allowing easier collaboration and expansion.
Using language models to supercharge Monzo’s customer supportNeal Lathia
1. Monzo is working on using language models to improve customer support by helping customers find answers to their queries in the app and helping agents swiftly respond to customer queries.
2. They are taking two approaches - using models to recommend relevant search results and help articles, and using classification models to directly answer questions about common topics like changing a PIN number or replacing a card.
3. Their experiments found that fine-tuning a pre-trained BERT model on their chat data improved the self-service rate for customers compared to training a model from scratch. However, noisy and subjective tagging of the training data was an issue, so they achieved better results by re-labeling examples.
The document discusses how the Monzo data team uses Looker to enable better and faster decisions across the company. It describes how the team is structured to be embedded within business areas to provide feedback and support. Around 70% of Looker accounts are active weekly. The team aims to move from responsive analytics to self-service analytics through building wide data models, experiment dashboards, and automating tasks like training and detecting broken charts using neural networks. The overall goal is to continuously improve how the team and others can get the most value from company data.
This document discusses using machine learning to provide personalized experiences on Skyscanner. It describes three examples: 1) Destination recommendation based on unsupervised learning of popular, local, and trending destinations. 2) Itinerary recommendation framed as a supervised learning ranking problem. 3) Contextual support using multi-armed bandits to learn which search tools and messages work best in different contexts without imposing new burdens on users. It also discusses challenges like sparse travel data and the complexity of different search combinations and new ideas. Lessons learned include references on machine learning for product managers and the state of the field.
Opportunities & Challenges in Personalised TravelNeal Lathia
This document discusses opportunities and challenges for personalized travel recommendations. It begins with background on how recommendation systems can help with information overload and complex trip planning when traveling online. It then gives two examples: using mobility data to minimize public transport costs in urban travel, and building machine learning products at Skyscanner to help with challenges like price accuracy and trip inspiration. Finally, it outlines many open challenges for personalized travel recommendations, such as balancing personalization with transparency and dealing with sparse user history.
Bootstrapping a Destination Recommendation EngineNeal Lathia
This document discusses Skyscanner's recommendation engine for suggesting destinations to travelers. It outlines some of the challenges in building such a system, including sparse user data due to the low frequency of travel, and destinations being relative based on where a user is traveling from. The document then describes Skyscanner's approach, which involves defining destinations as popular, local, or trending based on search behaviors. It also provides an overview of the pipeline for the recommendation engine and experiments conducted to test the system.
This document discusses mining smartphone sensor data using Python. It describes how smartphones have various sensors like accelerometers and gyroscopes that can provide data on movement and location. The talk focuses on collecting accelerometer data from a smartphone, examining raw data samples, extracting features from segmented data windows, and using those features to classify activities through machine learning. The goal is to demonstrate how to work with smartphone sensor data and classify activities like walking, running and using stairs.
Happier and Healthier with Smartphone DataNeal Lathia
This document discusses how smartphone data can be used to monitor people's health and well-being over time. Smartphones contain various sensors that can track physical activity, social interactions, environment, and app usage. Two case studies are described where smartphone data was used: 1) to study the relationship between subjective well-being and physical activity levels, and 2) to develop a smoking cessation app that provides tailored support based on a person's location, profile and triggers for craving. The document argues that with people's consent, analyzing diverse smartphone data has potential to gain insights into people's long term health conditions and behaviors.
This document discusses using data science and digital technologies to better understand and influence human behavior change. It explores how collecting smartphone and user data can provide insights into behaviors like smoking cessation. Recommendation systems aim to tailor automated support to individuals, but challenges include a "cold start" period with little initial user data and ensuring interventions are grounded in behavioral theory rather than just predictive accuracy alone. Ongoing evaluation is also needed to test whether technologies truly enhance engagement and drive behavior change as intended.
Analysing Daily Behaviours with Large-Scale Smartphone DataNeal Lathia
This document summarizes research using smartphone sensors and data to analyze daily behaviors and activities. It presents three case studies: (1) using WiFi and GPS data to analyze public transportation routes and times; (2) correlating accelerometer and survey data to understand relationships between physical activity and subjective wellbeing; (3) the potential for behavioral interventions using sensor data. It also discusses challenges in working with large-scale smartphone data and opportunities for multidisciplinary research impact.
This document discusses using data science and machine learning techniques to analyze mobile health sensor data in order to better understand user behaviors and improve health outcomes. It describes how sensors in mobile devices can capture small, momentary behaviors and behaviors can be clustered and visualized using techniques like k-means clustering. Accelerometer data from the Emotion Sense app is analyzed as a case study, with results showing differences in activity patterns between weekdays and weekends. The document concludes that mobile sensors allow unprecedented observation of behaviors that could enable just-in-time interventions to change behaviors.
Tube Star: Crowd-Sourced Experiences on Public Transport Neal Lathia
This document discusses the Tube Star project, which aimed to crowdsource experiences on public transport. It provides background on mining public transportation data and preferences to build personalized transportation systems. The project team designed a mobile application to collect ratings and thematic feedback from users on their London Underground experiences. While 215 ratings were collected from 44 users, limitations included issues with deploying the design and evaluating participation levels and success of different approaches. Questions remained around how specific the approach was to certain cities and how else participation could be encouraged.
Using Smartphones to Research Daily LifeNeal Lathia
This document discusses using smartphones to research daily life through experience sampling methods. It describes the Emotion Sense app, which collects survey responses and sensor data from users to study mood, activities, and context. Key challenges included keeping users engaged in surveys over time. The author also introduces Easy M, a generalized version of Emotion Sense that allows other researchers to easily conduct sensor-enhanced experience sampling studies on their own topics.
This document discusses using mobile phones and social networks for digital behavior change interventions. It aims to investigate how to effectively leverage sensors, notifications, and social features of mobile phones to influence positive behavior change. Several challenges are outlined, such as balancing battery life with collecting valuable sensor data. Open source smartphone libraries have been developed for areas like sensor management, triggers, and data storage to help standardize how sensor and experience sampling data can be collected on smartphones to study behavior and emotions. The document provides an overview of previous work and outlines ongoing research towards developing a framework for designing effective mobile behavior change interventions.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
1. Contextual Dissonance:
Design Bias in Sensor-Enhanced
Experience Sampling Methods
@neal_lathia, k. rachuri, c. mascolo (@cecim), j. rentfrow
computer laboratory, university of cambridge
#ubicomp13
4. You are tasked with researching X (e.g., X = emotions) in
daily life using ubiquitous tech; so you decide to build a
system that will:
● Ask participants for assessments of
the X they experience
● Collect sensor data to 'objectively'
measure participants' contexts and
quantify their behaviour
Research Scenario
5. why would you do this?
● … to explore whether machine learning
approaches could infer people's
subjective responses/complex
behaviours
● … to understand the extent that the
broad set of sensor data reflects self-
reported behaviour
6. “...automated tracing is widely used to
provide insight into what and when;
however, it does not provide the why...”
Froehlich et al.
10. “...researchers are faced with concrete
decisions regarding design [...] studies
have often been classifed into the three
categories of interval-, signal-, and
event-contingent protocols...”
Bolger et. al
ESM design: how should I ask questions?
11. “...sampling to capture data from the
sensors of the phone cannot be
performed continuously, as this will
drain the battery rapidly. However,
conservative sampling leads to the loss
of valuable behavioural data...”
K. Rachuri
sensor design: how should I sample from sensors?
12. Both of these design protocols will
affect the quantity and quality of data
that you receive from participants.
13. ● Shouldn't sense everything all the
time: triggers a survey based on a
particular sensor
● Ask for subjective responses and,
while doing so, sample data from
other sensors to gather behavioural
signals
Research Scenario
14. We built a system like
this. It includes: sensor
data collection, ESM
interfaces, etc., and
remote reconfguration.
15. Open Source Smartphone Libraries for
Computational Social Science
N. Lathia, K. Rachuri, C. Mascolo, G. Roussos. 2nd
ACM
Workshop on Mobile Systems for Computational Social
Science.
as an aside...
16. 22 users; 1-month;
questions about mood
& current context
(location, sociability);
background sensing
from many sensors;
triggers remotely
reconfgured weekly.
18. Your ESM protocol is driven by the
accelerometer's state: questionnaires
will be triggered based on when the
participant is moving.
Example Research Scenario
25. Accelerometer ~ Non-Stationary
10.61% of the data is non-stationary.
When it is, participants are:
95.23% non-silent; 39.24% at home;
14.43% communicating with others.
26. Full Sample vs. Accelerometer Trigger
Non-silent?
37.78% | 95.23%
Communicating with others?
4.60% | 14.43%
27. More Examples?
Microphone ~ Silent/Non-Silent
Accelerometer ~ Moving/Not-Moving
Location ~ Home/Away
Screen ~ Using the device
SMS/Calls ~ Communicating with others
Proximity ~ Near the phone
28. Microphone ~ Non-Silent
37.78% of the data is non-silent.
When it is, participants are:
26.75% non-stationary; 47.12% at
home; 9.48% communicating with
others.
29. Full Sample vs. Microphone Trigger
Moving?
10.61% | 26.75%
Communicating with others?
4.60% | 9.48%
30. Dissonance; a tension or clash
resulting from the combination of two
disharmonious elements
31. Dissonance; between using sensor
states to trigger ESM surveys while
using sensor data to quantify context
and behaviour.
32. Ok; so replace the accelerometer
trigger with sampling uniformly across
time.
Example Research Scenario
34. But the response data I get back from
participants will not be affected by the
choices that I make... right?
Research Scenario
35. 1-month; 4 groups with
random weekly trigger
orders: (a) screen, (b)
communication events,
(c) immediately during
non-silence, (d) some
time after non-silence
36.
37. “4 of the 6 tests found that the negative
affect ratings (and 2 out of 6 for the
positive ratings) were signifcantly
different from one another with at least
90% confdence.”
38. who are you with?
alone 33.33% of the time (screen
trigger) to 60.77% of the time
(microphone trigger)
44. Working with Android sensors?
Try out library!
One of the goals is to enable easy and quick access to
sensor data in 2 lines of code.
https://github.com/nlathia/SensorManager
45. Contextual Dissonance:
Design Bias in Sensor-Enhanced
Experience Sampling Methods
@neal_lathia, k. rachuri, @cecim, j. rentfrow
ACM Ubicomp 2013
46. References
● Smyth and Stone. “Ecological Momentary Assessment Research in
Behavioral Medicine.” Journal of Happiness Studies 2003.
● Froehlich et al. “MyExperience: A System for In Situ Tracing and
Capturing User Feedback on Mobile Phones.” ACM MobiSys 2007.
● Froehlich et al. “UbiGreen: Investigating a Mobile Tool for Tracking and
Supporting Green Transportation Habits” ACM CHI 2009.
● Rachuri. “Smartphones Based Social Sensing: Adaptive Sampling,
Sensing and Computation Offloading.” PhD Thesis 2013.
● Bolger et. al. “Diary Methods: Capturing Life as it is Lived” Ann. Rev.
Psychology 2003.