This document proposes a visual system of icons to indicate aspects of personal data trails to users. It begins by presenting four conceptual interface designs - frosted screen, rainbow heatmap, hungry app zombie, and data current - to visualize data trails. It then focuses on elements that characterize personal data trails, such as surveillance, commodification, and preferences. Finally, it defines a classification system and corresponding icons to communicate the risk level, conscious vs unconscious use, and potential uses/abuses of personal data associated with apps. The goal is to design signifiers that raise awareness of how personal data is produced, used and can affect user integrity.
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users
of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has
become an important concern in online social networks. Users are unaware of the privacy risks involved
when they share their sensitive information in the network.[1] One of the fundamental challenging issues is
measurement of privacy .It is hard for social networking sites and users to make and adjust privacy settings
to protect privacy without practical and effective way to quantify , measure and evaluate privacy. In this
paper, we discussed Privacy Index (PIDX) which is used to measure a user’s privacy exposure in a social
network. We have also described and calculated the Privacy Quotient (PQ) i.e. a metric to measure the
privacy of the user’s profile using the naive approach. [2] The users should be aware of their privacy
quotient and should know where they stand in the privacy measuring scale. At last we have proposed a
model that will ensure privacy in the unstructured data. It will utilize the Item Response Theory model to
measure the privacy leaks in the messages and text that is being posted by the users of the online social
networking sites.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
From a workshop conducted by Steve Nelson of AP42 in December, 2011, this paper explores the use of social media in healthcare marketing. Three megatrends are presented that are shaping the healthcare social media landscape. The current state of social media in healthcare is discussed. Practical advice is given for jumping in and participating int he social milieu.
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users
of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has
become an important concern in online social networks. Users are unaware of the privacy risks involved
when they share their sensitive information in the network.[1] One of the fundamental challenging issues is
measurement of privacy .It is hard for social networking sites and users to make and adjust privacy settings
to protect privacy without practical and effective way to quantify , measure and evaluate privacy. In this
paper, we discussed Privacy Index (PIDX) which is used to measure a user’s privacy exposure in a social
network. We have also described and calculated the Privacy Quotient (PQ) i.e. a metric to measure the
privacy of the user’s profile using the naive approach. [2] The users should be aware of their privacy
quotient and should know where they stand in the privacy measuring scale. At last we have proposed a
model that will ensure privacy in the unstructured data. It will utilize the Item Response Theory model to
measure the privacy leaks in the messages and text that is being posted by the users of the online social
networking sites.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
From a workshop conducted by Steve Nelson of AP42 in December, 2011, this paper explores the use of social media in healthcare marketing. Three megatrends are presented that are shaping the healthcare social media landscape. The current state of social media in healthcare is discussed. Practical advice is given for jumping in and participating int he social milieu.
Cyber Security : An attempt to assimilate and technically understand itanupriti
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
Cloud computing is a way of delivery any or all information technology from computing power to
computing infrastructure, application, business processes and personal collaboration to an user as a
service wherever and whenever they need it. The cloud in cloud computing is set of hardware, network,
software, storage, service and interfaces that combine to deliver aspects of computing as a service. Shared
resource, software and information are providing to computers and other devices on demand basis. It
allows people to do things, they want to on a computer without the need for them to build an IT
infrastructure or to understand the underline technology. Cloud computing refers to application and
services that run on distributed network using virtualized resources and access by common internet
protocols and network standards. It is a moving computing and storage from the user desktop or laptop to
remote location where as huge collection of server storage system and network equipment from a seamless
infrastructure for an application and storage. Online file storage, social networking sites, webmail and
online business application are the example of cloud services. Now a day many people are connected to
internet and Social networking sites. Social network have become a powerful platform for sharing and
communication that focus on real world relationships. Social networking plays a major role in everyday
lives of many people. Facebook is one of the best examples of Social networking sites where more than 400
million active users are connected. Thus Social cloud is a scalable computing model where in virtualized
resource provided by users dynamically. In this paper we used concept of MapReduce with Multithreading.
MapReduce is a paradigm that allows for massive scalability across hundreds or thousands of servers in a
cluster. MapReduce job usually split the input data into independent chunks which are processed by the
map tasks in completely parallel manner. It sorts the output of the map which are than input to the reduce
task. Using mapping techniques is to find out a good performance in terms of cost and time.
Millions of active users all around the world are using online social network such as Facebook, Twitter, Tumblr and
LinkedIn. Most of the social networks have weak user to user authentication method, which is based on some basic information like
name, images etc. These weaknesses make it easier to misuse user’s information and do identity cloning attack to form fake profile.
This paper presents a classification and analysis of a detection mechanisms of clone attacks on social network, based on attribute
similarity, friend network similarity, and profile analysis for a time interval and record of Internet Protocol sequences. In this project we
have proposed discrete wavelet transform algorithm for data hiding. For watermarking technique Java static watermarking systems and
algorithms is been used.
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
In recent years, the use of various information terminals such as smartphones and personal computers have become widespread, and situations where information terminals are used have become diverse. With increased opportunities to use information terminals outdoors and during travel, some users have been using peep-prevention filters, or software with an equivalent function, on their displays, in order to protect their privacy. However, such filters have problems with regards their effectiveness, ease of use, and the user being able recognize when they are vulnerable to peeping. Decrease in display visibility, unprotected angles, and the fact that it is difficult for users to notice when others are watching their screen, are some examples of such problems. Also, recently, many information terminals recently distributed have built-in cameras. In this paper, in order to solve the aforementioned problems, we propose to detect motion, video analyze , and transparentize part of the user interface (UI) in real time by using a laptop’s built-in camera. This method is enabled with low-load and can be applied to various terminals. Further, in order to verify the effectiveness of the method, we implemented a prototype, and carried out an evaluation experiment on experimental subjects. Results from the experiment confirmed that real-time UI transparentization is a very effective method for protecting privacy of information terminals.
Thesis' paper from the Master in Information Design. Universidad de las Américas Puebla.
Omar Sosa Tzec.
(Thesis presented on Dec of 2006).
The information design, regarded as the act of creating usable messages, has a direct application on designing graphic user interfaces. In this regard, it is possible to consider schematic visualization as an option for users to unload cognitively through more stress on the visual characteristics of the interface. This represents a way to apply the Calm Technology paradigm proposed by Mark Weiser. By considering the level of iconicity conveyed into an interface of this nature, the understanding of how schematics works on the interface should be evaluated under a different approach rather than a traditional usability evaluation, for example by doing a communicability test (from the Semiotic Engineering theory). Thus, this paper describes the overall process to design and evaluation of an instant messaging client under these considerations and it also introduces a standpoint for interface design based on the three rhetorical appealing modes.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
The Next Generation Social Media Experienceupheavalio
Upheaval is the next-generation social media experience and ecosystem. Upheaval transforms how we interact with others, and with the world around us. Users will be able to detect objects in the real world with their devices, then automatically post about them on Upheaval and other social media outlets. Upheaval categorizes, analyzes, and inventories the universe of objects, creates feeds for each, then tailors the online experience to build new and deeper connections among users and their shared interests. All while ensuring user data is protected and appropriately private. Using a visual detection experience, patent-pending AI, and new high-performance patent-pending blockchain technology, Upheaval puts the universe at your fingertips.
Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...Omar Sosa-Tzec
Presentation at the SSA 2022: The 46th Annual Conference of the Semiotic Society of America.
Abstract:
The detrimental effects caused by uncontrolled technology usage and screen time have motivated designers in academia and industry to explore solutions that promote digital well-being. This paper draws on the social semiotic approach to multimodality to examine the semiotic resources applied in designing and presenting one case study concerning such solutions—Little Signals, six artifacts commissioned by Google. An analysis was performed on the project’s website’s content, paying careful attention to an introductory video and artifact gallery. Proximity, distance, focus, and analogy appear as distinctive video storytelling choices. These convey unobtrusiveness, invisibility, ephemerality, intimacy, control, and familiarity. The resources of size, shape, material, color, and motion applied to define the artifacts’ appearance, behavior, and data presentation also help reinforce it. Besides examining the relationship between these meaning potentials, resources, and digital well-being artifacts, this paper also discusses the apparent attempt to give smart-home devices a benign character.
Delight in the User Experience: Form and PlaceOmar Sosa-Tzec
This paper elaborates on delight in UX by drawing on existing knowledge and theory on emotion and experience. The multiple formulations and discussions of delight in UX demonstrate its significance for the UX design community. However, it appears unclear what delight specifically is and how it particularly differs from pleasure, which designers use interchangeably with delight. This paper argues that pleasure and delight are distinct, and posits delight as the combination of joy with surprise or captivation, which leads the user to experience a wow! or yay! moment, respectively. The paper also posits that a designer’s intended delight—how she envisions the product causing delight—may differ from the user’s experienced delight—the wow! and yay! moments—during the UX as such delight is assimilated by the user and affects her expectations concerning the delightfulness of using interactive products. Nevertheless, this same assimilated delight encourages continuous use of such products.
More Related Content
Similar to Visualizing Data Trails: Metaphors and a Symbolic Language for Interfaces
Cyber Security : An attempt to assimilate and technically understand itanupriti
his presentation is a simple take on with respect to the statistics and maths involved behind the IT giants.It discusses the strange patents of likes of FB and then concludes its way through certain small cyber hygiene measures.
Cloud computing is a way of delivery any or all information technology from computing power to
computing infrastructure, application, business processes and personal collaboration to an user as a
service wherever and whenever they need it. The cloud in cloud computing is set of hardware, network,
software, storage, service and interfaces that combine to deliver aspects of computing as a service. Shared
resource, software and information are providing to computers and other devices on demand basis. It
allows people to do things, they want to on a computer without the need for them to build an IT
infrastructure or to understand the underline technology. Cloud computing refers to application and
services that run on distributed network using virtualized resources and access by common internet
protocols and network standards. It is a moving computing and storage from the user desktop or laptop to
remote location where as huge collection of server storage system and network equipment from a seamless
infrastructure for an application and storage. Online file storage, social networking sites, webmail and
online business application are the example of cloud services. Now a day many people are connected to
internet and Social networking sites. Social network have become a powerful platform for sharing and
communication that focus on real world relationships. Social networking plays a major role in everyday
lives of many people. Facebook is one of the best examples of Social networking sites where more than 400
million active users are connected. Thus Social cloud is a scalable computing model where in virtualized
resource provided by users dynamically. In this paper we used concept of MapReduce with Multithreading.
MapReduce is a paradigm that allows for massive scalability across hundreds or thousands of servers in a
cluster. MapReduce job usually split the input data into independent chunks which are processed by the
map tasks in completely parallel manner. It sorts the output of the map which are than input to the reduce
task. Using mapping techniques is to find out a good performance in terms of cost and time.
Millions of active users all around the world are using online social network such as Facebook, Twitter, Tumblr and
LinkedIn. Most of the social networks have weak user to user authentication method, which is based on some basic information like
name, images etc. These weaknesses make it easier to misuse user’s information and do identity cloning attack to form fake profile.
This paper presents a classification and analysis of a detection mechanisms of clone attacks on social network, based on attribute
similarity, friend network similarity, and profile analysis for a time interval and record of Internet Protocol sequences. In this project we
have proposed discrete wavelet transform algorithm for data hiding. For watermarking technique Java static watermarking systems and
algorithms is been used.
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
In recent years, the use of various information terminals such as smartphones and personal computers have become widespread, and situations where information terminals are used have become diverse. With increased opportunities to use information terminals outdoors and during travel, some users have been using peep-prevention filters, or software with an equivalent function, on their displays, in order to protect their privacy. However, such filters have problems with regards their effectiveness, ease of use, and the user being able recognize when they are vulnerable to peeping. Decrease in display visibility, unprotected angles, and the fact that it is difficult for users to notice when others are watching their screen, are some examples of such problems. Also, recently, many information terminals recently distributed have built-in cameras. In this paper, in order to solve the aforementioned problems, we propose to detect motion, video analyze , and transparentize part of the user interface (UI) in real time by using a laptop’s built-in camera. This method is enabled with low-load and can be applied to various terminals. Further, in order to verify the effectiveness of the method, we implemented a prototype, and carried out an evaluation experiment on experimental subjects. Results from the experiment confirmed that real-time UI transparentization is a very effective method for protecting privacy of information terminals.
Thesis' paper from the Master in Information Design. Universidad de las Américas Puebla.
Omar Sosa Tzec.
(Thesis presented on Dec of 2006).
The information design, regarded as the act of creating usable messages, has a direct application on designing graphic user interfaces. In this regard, it is possible to consider schematic visualization as an option for users to unload cognitively through more stress on the visual characteristics of the interface. This represents a way to apply the Calm Technology paradigm proposed by Mark Weiser. By considering the level of iconicity conveyed into an interface of this nature, the understanding of how schematics works on the interface should be evaluated under a different approach rather than a traditional usability evaluation, for example by doing a communicability test (from the Semiotic Engineering theory). Thus, this paper describes the overall process to design and evaluation of an instant messaging client under these considerations and it also introduces a standpoint for interface design based on the three rhetorical appealing modes.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
The Next Generation Social Media Experienceupheavalio
Upheaval is the next-generation social media experience and ecosystem. Upheaval transforms how we interact with others, and with the world around us. Users will be able to detect objects in the real world with their devices, then automatically post about them on Upheaval and other social media outlets. Upheaval categorizes, analyzes, and inventories the universe of objects, creates feeds for each, then tailors the online experience to build new and deeper connections among users and their shared interests. All while ensuring user data is protected and appropriately private. Using a visual detection experience, patent-pending AI, and new high-performance patent-pending blockchain technology, Upheaval puts the universe at your fingertips.
Digital Wellbeing Technology through a Social Semiotic Multimodal Lens: A Cas...Omar Sosa-Tzec
Presentation at the SSA 2022: The 46th Annual Conference of the Semiotic Society of America.
Abstract:
The detrimental effects caused by uncontrolled technology usage and screen time have motivated designers in academia and industry to explore solutions that promote digital well-being. This paper draws on the social semiotic approach to multimodality to examine the semiotic resources applied in designing and presenting one case study concerning such solutions—Little Signals, six artifacts commissioned by Google. An analysis was performed on the project’s website’s content, paying careful attention to an introductory video and artifact gallery. Proximity, distance, focus, and analogy appear as distinctive video storytelling choices. These convey unobtrusiveness, invisibility, ephemerality, intimacy, control, and familiarity. The resources of size, shape, material, color, and motion applied to define the artifacts’ appearance, behavior, and data presentation also help reinforce it. Besides examining the relationship between these meaning potentials, resources, and digital well-being artifacts, this paper also discusses the apparent attempt to give smart-home devices a benign character.
Delight in the User Experience: Form and PlaceOmar Sosa-Tzec
This paper elaborates on delight in UX by drawing on existing knowledge and theory on emotion and experience. The multiple formulations and discussions of delight in UX demonstrate its significance for the UX design community. However, it appears unclear what delight specifically is and how it particularly differs from pleasure, which designers use interchangeably with delight. This paper argues that pleasure and delight are distinct, and posits delight as the combination of joy with surprise or captivation, which leads the user to experience a wow! or yay! moment, respectively. The paper also posits that a designer’s intended delight—how she envisions the product causing delight—may differ from the user’s experienced delight—the wow! and yay! moments—during the UX as such delight is assimilated by the user and affects her expectations concerning the delightfulness of using interactive products. Nevertheless, this same assimilated delight encourages continuous use of such products.
Delight by Motion: Investigating the Role of Animation in MicrointeractionsOmar Sosa-Tzec
This paper focuses on the role of animation in making microinteractions delightful. We first draw on customer experience literature to propose that a microinteraction is delightful when it surprises, captivates, and communicates need fulfillment. Following this notion and drawing on social semiotics, we analyze a collection of examples of microinteractions posted on dribbble.com. Observations derived from this analysis show that animation contributes to a microinteraction’s delightfulness by contextualizing, clarifying, metaphorizing, and creating a micro-narrative around its purpose, development, or outcome. A microinteraction’s animation has the power to produce “aha! moments,” in which the user notices something meaningful concerning her goals, actions, and expectations, and about the context of use. As microinteractions seriously influence the user experience, it becomes imperative to promote motion design literacy, including identifying strategies and tropes for user interface animation, among UI/UX designers.
Paper presented in MoDE 21 Motion Design Education Summit (online conference) on June 11, 2021
Critical Design Research and Constructive Research Outcomes as ArgumentsOmar Sosa-Tzec
Presentation for the workshop "Let’s Get Divorced: Constructing Knowledge Outcomes for Critical Design and Constructive Design Research” at DIS 2018, the ACM Conference on Designing Interactive Systems. Hong Kong. June 9, 2018
Creative Data and Information Visualization: Reflections on Two Pedagogical A...Omar Sosa-Tzec
Presentation of case study on teaching creative representations of data and information at the SIGDOC 2019 The ACM conference on Communication Design. October 5, 2019. Portland, OR.
Student work by BA/BFA in Art and Design, and MDes in Integrative Design at the University of Michigan, Ann Arbor.
Teaching Design, Information, and Interaction: Reflections, Foundations, and ...Omar Sosa-Tzec
Presentation as a discussant in the panel "Teaching Design in an Age of Interaction" organized by Brandon Waybright. CAA 2020 Annual Conference. February 14, 2020. Chicago, IL.
Communicating design-related intellectual influence: towards visual referencesOmar Sosa-Tzec
Prototype-driven design research often involves collecting and analyzing designed artifacts in annotated portfolios and design workbooks. These collections constitute important sources of intellectual influence for researchers, yet communicating this influence presents unique challenges, such as the difficulty of translating the aesthetic, material, or interactive qualities of a designed artifact into written text. Building on discourses of visual thinking and visual imagery in science communication and HCI research, this paper introduces, and elaborates, a novel research communication design concept called "visual references," which combine bibliographic information with photographic images, textual annotations, and diagrammatic annotations in order to communicate design-related intellectual influence.
Design tensions: Interaction Criticism on Instagram’s Mobile InterfaceOmar Sosa-Tzec
User interfaces are continually evolving. Contemporary interfaces, particularly mobile interfaces, have developed their own design language as they have discarded skeuomorphs and metaphorical representations to support their design and introduced features not available before in desktop interfaces. Despite the pervasiveness of mobile interfaces, researchers have neglected the development of theory that accounts for how they still connect with or deviate from early interface design constructs. This paper adapts the notion of metaphorical tension to formulate and explore a new construct, design tension, which scopes an exercise of interaction criticism on Instagram's interface. As a result, this paper argues that design tension is useful to account for how interface components introduce features that are discordant to interface standards and best practices, things from the real world, and the user's belief system. It also suggests that both the method and construct can be applied to other communication design artifacts distinct from interfaces to produce intermediate-level knowledge.
Interacciones Encantadoras: Interfaces de Usuario desde una Perspectiva Semió...Omar Sosa-Tzec
Presentación de la charla para Contraste Colectivo (Congreso de Diseño Gráfico de la FADU AUT en México) acerca de mi investigación en interfaces encantadoras (delightful interfaces) desde una perspectiva teórica basada en semiótica y retórica.
My fascination with the visual: meaning, persuasion, and delightOmar Sosa-Tzec
Presentation for a "Wonderful Wednesday" at Stamps School of Art and Design, University of Michigan. It includes some of my visual work and and overview of my research on the application of rhetoric to human-computer interaction.
Visual Design for Interface and Experience DesignOmar Sosa-Tzec
Three key concepts that apply to UI/UX design: contrast, visual hierarchy, and connotation and denotation. Presentation slides of a talk as guest lecturer for the Fall 2015 course INFO-I 300 Human-Computer Interaction/Interaction Design at Indiana University Bloomington, School of Informatics and Computing. Instructor of record: Gopinaath Kannabiran.
Affordances, Constraints, and Feedback in User Experience DesignOmar Sosa-Tzec
Lecture slides on the connection between affordances, constraints, and feedback (audible, tactile, and visual) for the design of interfaces and interactions. Fall 2016 course INFO-I 300: Human-Computer Interaction/Interaction Design. Instructor of record: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design). Indiana University Bloomington, School of Informatics and Computing.
User Experience Design, Navigation, and Interaction FlowsOmar Sosa-Tzec
Relation between interaction flows and the three basic questions of information architecture -- Where am I? What can I do here? Where can I go from here? Lecture slides for Fall 2016 course INFO-I 300: Human-Computer Interaction/Interaction Design at Indiana University Bloomington, School of Informatics and Computing. Instructor of record: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design).
Introduction to Human-Computer Interaction and Interaction DesignOmar Sosa-Tzec
Introductory lecture slides for the course INFO-I 300 Human-Computer Interaction/Interaction Design at Indiana University School of Informatics and Computing. Instructor of record: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design).
Takeaways from the course Visual Design for User ExperienceOmar Sosa-Tzec
Closing lecture slides of the summer 2016 course INFO-I 400: Special Topics in Informatics (Visual Design for UX) at Indiana University School of Informatics and Computing. Instructor of record and course developer: Omar Sosa-Tzec, PhD Candidate in Informatics (HCI Design) at Indiana University.
Introduction to Visual Design for User ExperienceOmar Sosa-Tzec
Lecture slides (teaser) for the summer 2016 class INFO-I 400: Special Topics in Informatics (Visual Design for UX) at Indiana University Bloomington, School of Informatics and Computing.
Presentation for the Indiana University's Graphic Design Club 2016 Speakers Series. A quick review of my journey to become a designer, work experiences, graphic passions, and current research at IU Bloomington (Human-Computer Interaction).
Indiana University Bloomington. April 23, 2016.
Principios de Diseño Visual para Interacción Humano-ComputadoraOmar Sosa-Tzec
Borrador del capítulo para el libro “La Interacción Humano-Computadora en México”
Referencia en formato APA:
Sosa-Tzec, O., & Siegel, M.A. (2014). Principios de Diseño Visual para IHC. Muñoz Arteaga, J., González Calleros, J.M., & Sánchez Huitrón, A. (Eds.) La Interacción Humano-Computadora en México. México: Pearson.
Advances of research on Interaction Design Rhetoric - HCI Rhetoric - UX Rhetoric.
INFO I609: Advanced Seminar I in Informatics. Indiana University Bloomington. School of Informatics and Computing. Fall 2015.
Exploration of Rhetorical Appeals, Operations and Figures in UI/UX DesignOmar Sosa-Tzec
Conference Paper presented in LearnxDesign 2015, the 3rd International Conference for Design Education Researchers
Abstract.
In this paper, we introduce a first pass of a rhetorical handbook intended for UI/UX designers. This handbook is based on an earlier version for graphic designers, introduced by Ehses & Lupton in 1988, in which diverse rhetorical concepts are illustrated through graphic work. For the UI/UX version, we examined desktop, web and mobile interfaces in order to illustrate the same concepts. In this first pass, we observe that the three modes of appeal (i.e., pathos, ethos and logos) fluctuate throughout the user experience. Additionally, we learned that rhetorical operations aid describing the adjustments made on an interface to work in different platforms. Further, the rhetorical figures (tropes and schemes) help to describe conceptually the interface’s composition and interactions. The concepts presented in the handbook provide a framework to examine and critique user interfaces, through which the disciplines of user experience and rhetoric connect.
7 Alternatives to Bullet Points in PowerPointAlvis Oh
So you tried all the ways to beautify your bullet points on your pitch deck but it just got way uglier. These points are supposed to be memorable and leave a lasting impression on your audience. With these tips, you'll no longer have to spend so much time thinking how you should present your pointers.
Expert Accessory Dwelling Unit (ADU) Drafting ServicesResDraft
Whether you’re looking to create a guest house, a rental unit, or a private retreat, our experienced team will design a space that complements your existing home and maximizes your investment. We provide personalized, comprehensive expert accessory dwelling unit (ADU)drafting solutions tailored to your needs, ensuring a seamless process from concept to completion.
Dive into the innovative world of smart garages with our insightful presentation, "Exploring the Future of Smart Garages." This comprehensive guide covers the latest advancements in garage technology, including automated systems, smart security features, energy efficiency solutions, and seamless integration with smart home ecosystems. Learn how these technologies are transforming traditional garages into high-tech, efficient spaces that enhance convenience, safety, and sustainability.
Ideal for homeowners, tech enthusiasts, and industry professionals, this presentation provides valuable insights into the trends, benefits, and future developments in smart garage technology. Stay ahead of the curve with our expert analysis and practical tips on implementing smart garage solutions.
Unleash Your Inner Demon with the "Let's Summon Demons" T-Shirt. Calling all fans of dark humor and edgy fashion! The "Let's Summon Demons" t-shirt is a unique way to express yourself and turn heads.
https://dribbble.com/shots/24253051-Let-s-Summon-Demons-Shirt
Transforming Brand Perception and Boosting Profitabilityaaryangarg12
In today's digital era, the dynamics of brand perception, consumer behavior, and profitability have been profoundly reshaped by the synergy of branding, social media, and website design. This research paper investigates the transformative power of these elements in influencing how individuals perceive brands and products and how this transformation can be harnessed to drive sales and profitability for businesses.
Through an exploration of brand psychology and consumer behavior, this study sheds light on the intricate ways in which effective branding strategies, strategic social media engagement, and user-centric website design contribute to altering consumers' perceptions. We delve into the principles that underlie successful brand transformations, examining how visual identity, messaging, and storytelling can captivate and resonate with target audiences.
Methodologically, this research employs a comprehensive approach, combining qualitative and quantitative analyses. Real-world case studies illustrate the impact of branding, social media campaigns, and website redesigns on consumer perception, sales figures, and profitability. We assess the various metrics, including brand awareness, customer engagement, conversion rates, and revenue growth, to measure the effectiveness of these strategies.
The results underscore the pivotal role of cohesive branding, social media influence, and website usability in shaping positive brand perceptions, influencing consumer decisions, and ultimately bolstering sales and profitability. This paper provides actionable insights and strategic recommendations for businesses seeking to leverage branding, social media, and website design as potent tools to enhance their market position and financial success.
White wonder, Work developed by Eva TschoppMansi Shah
White Wonder by Eva Tschopp
A tale about our culture around the use of fertilizers and pesticides visiting small farms around Ahmedabad in Matar and Shilaj.
vernacular architecture in response to climate.pdf
Visualizing Data Trails: Metaphors and a Symbolic Language for Interfaces
1. Visualizing Data Trails: Metaphors and
a Symbolic Language for Interfaces
Omar Sosa-Tzec
University of Michigan
Penny W. Stamps School of
Art and Deisgn
Ann Arbor, MI 48105, USA
omarsosa@umich.edu
Abstract
This paper starts by presenting four mobile interface
design concepts to make personal data trails visible.
Frosted screen, rainbow heatmap, hungry zombie, and
data current are the labels given to these concepts.
After reflecting on these concepts, the paper focuses on
some elements of personal data trails, and explores a
visual system of icons to indicate the user the possible
use and abuse of the data they produce during the UX.
The elements proposed by this paper are surveillance,
commodification, data aggregation, data input, affect
and arousal, preferences, and community.
Author Keywords
Personal Data Trail; Communication Design;
Information Design; Visual System
CSS Concepts
• Human-centered computing~Interaction
design~Interaction design theory, concepts and
paradigms
Speculative Designs for Emergent Personal Data Trails: Signs,
Signals and Signifiers
Workshop at CHI 2020 that took place online on April 22nd
, 2020
(in response to Covid-19)
Website: https://www.emergentdatatrails.com/
Workshop summary on the ACM DL:
https://doi.org/10.1145/3334480.3375173
2. User Interface Metaphors for Visualizing
Personal Data Trails
My first response to the workshop’s call was to
conceptualize appearance and behavior that help the
user become aware of the overall amount of data they
produce and disperse among the apps they use daily.
Four proposals emerged from this exercise (Fig. 1). The
first design concept centers on the idea of a frosted
screen (Fig. 1A). The degree of frostiness indicates the
amount of data in circulation and used by third parties.
For those times in which the phone activates
automatically and the screen lights up, the degree of
frostiness will warn the user about how much data is
being stored in the phone and deployed over the
Internet for others to use. If the user decides to use
their phone anyway, the frostiness still shows to remind
the user about this situation. The frostiness drastically
changes as the user changes of app. Each app thus
involves a particular degree of frostiness while the lock
and home screen show the aggregated use and abuse
of personal data. Such a change allows the user to note
which app might be compromising their privacy.
The second concept is a rainbow plasma cloud (Fig.
1B). Instead of showing a degree of risk as the frosting
screen concept does, the plasma cloud concept
visualizes several elements that characterize a personal
data trail. One of these elements could be identity. For
this element, the plasma cloud would visualize
variables related to what defines the presence and
behaviors of the user in the Internet. For example, the
plasma cloud would visualize how much data related to
cultural affinity, physical activity, or community
engagement the user has produced as a result of using
different apps during the day, week, or month.
Moreover, the plasma cloud would visualize the degree
of mobility of the user based on the different places
they have been lately. Further, the plasma that
represents mobility would visualize predictions of how
mobile the user might become soon. The plasma cloud
would visualize the degree of commodification applied
to the user as well. This represents how valuable the
user’s data currently is for third parties, which have a
business relationship with the company that created
the app. This plasma would show both the current and
predicted value of the user regarded as a commodity.
The plasma cloud would be also able to visualize the
degree of arousal in the user based on their phone
usage during a certain period. Further, this plasma
would visualize the potential degree of arousal in a near
future.
The rainbow plasmas cloud appears as a dynamic layer
on the screen of the phone (Fig. 1B). When the user
performs an action, the interface components involved
in it will define the area wherein more multicolor
plasma will emerge. Immediately, the plasma will
divide and each portion will join the mass having its
same color. The extent of each color thus indicates the
amount of or significance of a particular data kind, such
as identity, mobility, commodification, and arousal (see
legend with different color swatches on Fig 1.B).
3. Figure 1: Interface metaphors for visualizing personal data trails: (A) frosted screen, (B) rainbown heatmap, (C) hungry app zombie,
and (D) personal data current.
4. The third concept that came to my mind is regarding
product (app) as a zombie (Fig. 1C). Each zombie
feeds on data, increasing its size in function of how
much data it eats. The data that works as food is the
data that an app produces. The more data the app
produces, the bigger and chubbier the app’s icon
becomes. As it increases, the icon starts occupying
space on the screen, occluding the other icons. The
visualization deforms each icon to make the user
become aware of the degree of monstrosity that an app
entails when it comes to the production and store of
personal data. This visualization, however, does not
show the data connections between an app and others.
To emphasize these connections, I came up with the
concept of data as current (Fig. 1D). This visualization
still regards each product (app) as a creature,
somehow similar to slug or octopus. The personal data
produced by each app makes the icon of the app
develop tentacles which, by suction, connect with the
icons of the apps that use and benefit from the data.
Once the connection has been established, the user can
notice how the data flows. The data appears as bright
little dots—a visualization that is similar to the one
offered by those USB cables with LEDs within that show
a flow of light dots going from the outlet to the device
to indicate the presence electric current. The frequency
and velocity of dots sent from one app to another
indicates the amount, sensitivity, or significance of the
data being produced and shared between products.
Communicating the different kinds of
personal data trails through symbols
After completing the ideation exercise, I reflected upon
how these design concepts can help me give a response
that is closer to the workshop call, which I understand
it is more interested in concrete signifiers to indicate
aspects of personal data trails. The first thing I noted is
that personal data trails need to be characterized. In
my first exercise, I focused not only on the production
but also the use and abuse of user data by the different
products that a user has on their phone. During and
after completing the exercise above, I realized that, for
me, an approach to designing signifiers to raise
awareness in users requires the definition of elements
that (might) constitute a personal data trail.
As I am concerned with the production, use, and abuse
of personal data, I considered for my next exercise to
focus on how the use of a product entails a risk for
the user based on the kind of personal data trail
the use generates. Hence, I propose to consider two
states of use: (a) when the user is not using the
product (at least not consciously), and (b) when the
user is (consciously) using the product. I considered
that a user would easily recognize the level of risk
entailed by the generation, use, and abuse of their data
by referring to three simple levels of risk: (a) null or
low, (b) moderate, and (c) high. The null/low level
implies that a product produces and stores temporary
data. The use of this data is quite local and is likely to
be irrelevant for other products. The moderate level
indicates that a noteworthy personal data trails is or
will be generated as a consequence of using the
product or one of its features. The data generated as a
result of using the product implies a potential negative
effect on the user’s integrity—an exposition and
manipulation on who the user is and can become, what
the user does and wants, why the user behaves in a
certain way. This level indicates that the user’s data
trail can benefit other products, and third parties in
general. If the data produced and shared can have a
5. direct effect on the user’s integrity, then one talks
about a high level of risk. The data produced, stored,
and shared by the product put together, can be useful
to influence in the user’s political perceptions, good
consumption, social benefits, personal aspirations,
mood, and other personal and sociocultural aspects
that define the user as an individual of both the real
world and the Internet.
Based on this classification, I created different signifiers
to communicate the relation between the risk entailed
by the production, use, and abuse of personal data,
and whether the this situation involves a conscious use
of the product (Fig. 2).
Figure 2: Representation of the risk as the density of a user’s
personal data trail, which may be a result of actively using the
product or not (inactive).
The density of the trail depicted in these signifiers
makes reference to the idea of data current introduced
above (Fig. 1D). Certainly, the product may not
generate too much data and yet there is a chance that
the use and abuse of such data can affect the user
considerable. For simplification purposes, I use the
density of the trail to indicate that regardless of the
amount of data, data can flow quickly beyond the
user’s awareness.
Mostly inspired in the rainbow plasma cloud (Fig. 1B)
and how it aims at visualizing different elements of a
personal data trail—its potential use and abuse; what
to do with it. I define a classification, including its
signifiers, for the use and abuse of the data constituting
a trail (Fig. 3). This classification comprises
surveillance, commodification, data aggregation, data
input, affect and arousal, preferences, and community.
Figure 3: Classification of the potential use and abuse of data
constituting a personal data trail.
6. The signifier of surveillance indicates that the product
and its business partners purposefully enquire into the
data produced, stored, and shared as a result of using
the product. The signifier of commodification indicates
the user that the product and its business partners
obtain a financial benefit from such data. The signifier
of data aggregation is for the user to know that all the
data produced will be aggregated to larger data bases.
This category suggests that a certain level of anonymity
is involved in the process of sharing and using the data
by the product and its business partners. The signifier
of data input is to tell the user that all the data
produced, stored, and shared is used in machine
learning algorithms, not necessarily related to the
product’s functionality. In other words, this category is
to remind the user that the data is being used to feed
algorithms whose aim is to discover a pattern that
benefits the company of the product and its business
partners.
The signifier of affect and arousal indicates the user
that the data produced, stored, and shared can help in
determining its current and expected emotional state,
and that knowing such state is beneficial for the
objectives of the product and its business partners. The
little star of the signifier for preferences reminds the
user that all the data produced, stored, and shared can
affect content and consumption preferences. Finally,
the signifier of community tells the user that their data
is used to identify, characterize, or even define who
they are as an individual in both the real world and the
Internet. This category is concerned with how the user
data is used to position them in certain demographics,
which in consequence, will involve a particular set of
opportunities and limitations at the personal and social
levels.
With this visual elements defined, I created and
propose a visual system to indicate whether the
personal data trail is a consequence of a conscious use
of the app, the level of risk that the production, use,
and share of data entails, and the use and potential
abuse of the data (Fig. 4). This system provides a
series of interface icons that a designer can be used to
Figure 4: Subset of the visual system proposed. This subset shows the combination of the two signifiers indicating a high level of
data risk with the signifiers showing the potential use and abuse for the data produced by a trail.
7. demonstrate an ethical commitment to safeguarding
the integrity of the user and the data they product
while they use the product. The designer can integrate
these icons to the section of terms and condition. The
user can also integrate them in pop-up windows or
messages from time to time to remind the user about
the implications of using the product.
Discussion
In this paper, I showed my response to the workshop
call, which is twofold. The first part of my response
involved the ideation of some design concepts in which
personal data trails can become visible and disruptive. I
would say that these concepts are motivated by need of
making people aware of the production, use, and abuse
of the data derived from interactions with apps and
other forms of technology. We cannot judge what we
cannot see. These four metaphorical implementation
seek to delightful and critical at the same time.
One point that I want to emphasize is the use of
sketching as an ideation tool/skill. I consider that for us
to come up with interesting signifiers, we need proper
ideation tools and skills. Starting my exploration with
sketching allowed me to be imaginative without the
pressure of coming up with a right solution; especially,
because I am not sure if my understanding of personal
data trails is the same the facilitators of the workshop
have. However, sketching allows to produce material to
discuss ideas and, in this particular case, to reflect
about the constituents of a personal data trail.
Once I concluded my sketches, I felt I have my eureka
moment when, from my perspective, I found that can
articulate the ideas from these four design concepts as
a list of elements and characteristics of a personal data
trail. Sketching was again a significant activity.
However, in this case, I carried out my sketching
directly on the computer because I considered
important to think how the interface icons would look
like as part of a user interface. During the whole
process I had in my mind the creative commons icons
as the visual reference—based on one email sent by
one of the facilitators to the PhD email list. I think that
having such a reference was important for this second
part of my response. My aim was not only finding an
appropriate signifier but also shaping it in such a way it
appears clear and neat, so it can look serious,
somehow authoritative, and universal.
My main takeaway is that, in order to generate a visual
system of signifiers, we need to identify or define what
we want the user to be aware of, and later, to identify
universal symbols that many users can understand.
Another interesting thing that guided my design intent
is frame the visual system through a subtle lens of
criticality, not to say fatality. I found interesting and
relevant that designers involved in the creation of this
kind of signifiers raise awareness and emphasize how
delicate and harmful the abuse of personal data trails
can be.