Slides presented by Byron Lowens -- PhD candidate at Clemson University, describing privacy concerns from wearable users. Paper published at The Fifth IEEE International Conference on Healthcare Informatics
Data/AI driven product development: from video streaming to telehealthXavier Amatriain
Healthcare is different from any other application domain, or is it not? While it is true that there are specific aspects, such as high stakes decisions and a complex regulatory framework, that make healthcare somewhat different, it is also the case that many of the lessons learned from building data-driven products in other domains translate remarcably well into healthcare. This is particularly so because healthcare is also a user facing domain, where users can be both patients or healthcare professionals. Given that data has shown to improve user experience while ensuring quality and scalability, few would argue that healthcare cannot benefit from being much more data-driven than it has traditionally been.
In this talk, I described how this experience building impactful data and AI solutions into user facing products for decades can be leveraged to revolutionize telehealth. At Curai, we combine approaches such as state-of-the-art large language models with expert systems in areas such as NLP, vision, and automated diagnosis to augment and scale doctors, and to improve user experience and healthcare outcomes. We will see some of those applications while analyzing the role of data and ML algorithms in making them possible.
In the literature on sensing and monitoring, missing data is often treated as a nuisance. Statisticians have investigated many ways of filling gaps in a data set, depending on whether the data is missing completely randomly, whether the patterns of missing data can be predicted from other variables in the data set, or whether the patterns of missing data are regular, but hard to predict from existing data.
In this talk, I argue that missing data is evidence for how people engage with sensors and devices. I outline the processes that result in the absence of data, and discuss how this contextual understanding can be used to improve interpretation and analytics.
This talk is based on joint work with the Help4Mood team (http://help4mood.info) and Henry Potts, UCL, and Katarzyna Stawarz, Bristol, during an Alan Turing Institute Summer Programme Small Group.
Data/AI driven product development: from video streaming to telehealthXavier Amatriain
Healthcare is different from any other application domain, or is it not? While it is true that there are specific aspects, such as high stakes decisions and a complex regulatory framework, that make healthcare somewhat different, it is also the case that many of the lessons learned from building data-driven products in other domains translate remarcably well into healthcare. This is particularly so because healthcare is also a user facing domain, where users can be both patients or healthcare professionals. Given that data has shown to improve user experience while ensuring quality and scalability, few would argue that healthcare cannot benefit from being much more data-driven than it has traditionally been.
In this talk, I described how this experience building impactful data and AI solutions into user facing products for decades can be leveraged to revolutionize telehealth. At Curai, we combine approaches such as state-of-the-art large language models with expert systems in areas such as NLP, vision, and automated diagnosis to augment and scale doctors, and to improve user experience and healthcare outcomes. We will see some of those applications while analyzing the role of data and ML algorithms in making them possible.
In the literature on sensing and monitoring, missing data is often treated as a nuisance. Statisticians have investigated many ways of filling gaps in a data set, depending on whether the data is missing completely randomly, whether the patterns of missing data can be predicted from other variables in the data set, or whether the patterns of missing data are regular, but hard to predict from existing data.
In this talk, I argue that missing data is evidence for how people engage with sensors and devices. I outline the processes that result in the absence of data, and discuss how this contextual understanding can be used to improve interpretation and analytics.
This talk is based on joint work with the Help4Mood team (http://help4mood.info) and Henry Potts, UCL, and Katarzyna Stawarz, Bristol, during an Alan Turing Institute Summer Programme Small Group.
This document discusses privacy, security, and ethics in data science. It covers topics such as anonymizing data and computations, seeking security for personal data, and the unethical surprises that can occur in data science work. It also discusses how to respect privacy by securely storing data, adding layers of protection like encryption, and using techniques like distributed computing and differential privacy to better protect sensitive information. The document cautions that biases in data can propagate biases in models, and highlights the importance of addressing issues like social bias, redaction of sensitive info, and debiasing models to help ensure ethical practices in this field.
These are the slides for the Faculty Fellow short talk on October 27, 2016, at the Alan Turing Institute. In this talk, I summarise my approach to missing data analysis, and explain how my work fits into an interdisciplinary context. I will add a link to the YouTube recording once it has been uploaded.
Internet as place: Policy, practice, and research in e-mental health for Scot...Diane Rasmussen Pennington
This document summarizes a presentation on place-based approaches to e-mental health in Scotland. It discusses how geographic context is important in policy and practice. Place-based policies that involve local and higher-level groups working together can help address social exclusion and underutilization of potential in different areas. The document also reviews Scotland's national strategies and plans for improving digital health, including increasing access to online cognitive behavioral therapy, developing self-help resources, and ensuring technologies support independent living for those with dementia.
Shorter Version of BbWorld 09 Forensics PresentationSteve Feldman
The document discusses performance forensics for investigating issues in computer systems and software. It describes performance forensics as similar to other forensic processes, beginning with collecting evidence. Evidence can include data collected from tools as well as interviews. When data is not available, simulated data collection can help recreate incidents. Modeling and visualizing problems is important for getting to the root cause. Diagnosis bias and value attribution from interviews must be avoided. The process may start before any major issues occur through proactive capacity planning.
Utilization Based Evaluation In Mental HealthPaul Frankel
The document discusses intended uses of evaluation findings and stakeholder engagement in the evaluation process. It notes that different stakeholders may have different information needs, and that stakeholder commitment is important. It emphasizes that evaluations should be useful and actually used by intended users in order to make decisions and improve programs. The document also discusses challenges in evaluation implementation and getting stakeholders to use findings.
This document outlines a research project conducted by a group of students at the university. The research project examines the impact of social media on consumer buying behavior. It includes an introduction that provides background on the topic and outlines the problem statement, research objectives, questions, limitations and significance of the study. It also includes a review of related literature and methodology section that describes the research design, data collection process, sampling technique, hypotheses and research model.
The document discusses setting up a project to respond to disinformation and malign influence. It covers establishing safety protocols to avoid harming targets, responders, or other stakeholders. It also discusses organizing resources like people, evidence collection, tools, and analysis. The document recommends planning the project using a lifecycle model to identify threats and establish processes for monitoring, detection, response, recovery and learning from lessons. It provides examples like the NIST cybersecurity framework and WHO Europe's full lifecycle risk model.
Digital Communication Power Tools: Speakers Notes versionMarilyn Herie
This Keynote presentation at the 2012 Ontario Association of Social Work annual conference outlines the "digital communication power tools" for social workers and other practitioners. Speakers' notes can be toggled on or off. This file provides the Speakers Notes that accompany the slides.
This book discusses how analyzing large amounts of internet search data and digital traces can provide insights into human behavior and psyche. It explains that people will confess private things to Google searches that they wouldn't tell others. The data gives a view into trends of what people want from text, images, and videos. While surveys often receive dishonest answers, digital data may be closer to what people really want or feel as they search for information online.
Algorithmic bias is a complex, ill-defined concept with many facets. It refers broadly to unjust outcomes from algorithms that aim to predict outcomes based on historical data, but the term is unclear and conflates different types, sources, and impacts of biases. Algorithmic bias arises from multiple factors, including the data used to train models (which reflects societal biases), how data is collected and organized over time in complex data pipelines (forgettance), and how predictions are interpreted and used. Understanding algorithmic bias requires examining algorithms as social and epistemological constructs that reflect and can exacerbate existing inequalities in how knowledge is defined and groups are differentiated through probabilistic analysis.
The document discusses risk measurement in the context of disinformation and malign influence training. It begins by outlining why and what organizations aim to measure, such as the effectiveness and value of cognitive security programs. Existing monitoring and evaluation approaches are examined, including logframes commonly used to track outputs and outcomes. The document then reviews existing cognitive security measures like the UK government's RESIST framework and UNICEF's infodemic metrics. It concludes by providing suggestions for different types of performance and effectiveness metrics that can be used, as well as tools for gathering metrics like data analysis, surveys and chatbots.
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...Shalin Hai-Jew
In a research context, artificially increasing image resolution through interpolation of additional pixels would generally not be considered appropriate, as it introduces artificial data that was not present in the original image. Minor sharpening could potentially be acceptable to improve clarity, but adding whole new pixels risks misleading viewers about what is actually depicted in the original data. The best approach is to capture images at a sufficiently high resolution during data collection.
The document discusses new trends in big data and social media in 2013, including increased use of geo-location data and greater transparency online. It emphasizes the need to develop the right frameworks and taxonomies to make data useful, such as deciding how public or private to be, how much metadata to include, and how much social connectedness is needed. The key is learning new vocabularies, processing information meaningfully before making decisions, and encoding information in a personal way that also speaks universal symbols.
This document discusses inclusion and making user experiences (UX) more innovative. It defines inclusion and discusses how inclusion is about living full lives and sharing abilities. The document then discusses various aspects of inclusive design like the social model of disability, designing for neurodiversity, adapting research methods to different audiences, and building trust with stakeholders. It encourages thinking about inclusion as a user experience for all and not just about rules or demographics. The document concludes by asking attendees to think about how a more inclusive approach could change their work and sharing stories in breakout groups.
Wearable technologies have shown a large potential to amplify human abilities. Thanks to their close contact to the human body, their miniaturized dimensions and continuous data collection, wearable technologies are versatile, meeting system requirements across domains. Wearable technologies have grown in quantity and quality over the past decades, gaining widespread adoption. Still, ensuring that wearables properly meet users’ needs remains an open challenge. Through illustrative examples of diverse applications, in this talk I provide an overview of wearable computing. I discuss the challenges and opportunities in the design of user interfaces for wearable interaction, and conclude with a roadmap for next-generation wearables.
The document discusses privacy issues related to emerging technologies like wearables and smart home devices. It begins with an outline of topics to be covered, including contextualizing privacy, theoretical definitions versus real-world practices, privacy studies on online reviews, and open questions. The rest of the document delves into these topics, finding that privacy is a multidimensional concept that varies by context and individual. User studies of online reviews reveal different perspectives on privacy concerns for technologies. Imagery analysis identifies common metaphors and mental models around privacy concepts. Open questions remain around simplifying privacy and developing effective user-centric solutions.
More Related Content
Similar to Wearable privacy skeletons in the data closet
This document discusses privacy, security, and ethics in data science. It covers topics such as anonymizing data and computations, seeking security for personal data, and the unethical surprises that can occur in data science work. It also discusses how to respect privacy by securely storing data, adding layers of protection like encryption, and using techniques like distributed computing and differential privacy to better protect sensitive information. The document cautions that biases in data can propagate biases in models, and highlights the importance of addressing issues like social bias, redaction of sensitive info, and debiasing models to help ensure ethical practices in this field.
These are the slides for the Faculty Fellow short talk on October 27, 2016, at the Alan Turing Institute. In this talk, I summarise my approach to missing data analysis, and explain how my work fits into an interdisciplinary context. I will add a link to the YouTube recording once it has been uploaded.
Internet as place: Policy, practice, and research in e-mental health for Scot...Diane Rasmussen Pennington
This document summarizes a presentation on place-based approaches to e-mental health in Scotland. It discusses how geographic context is important in policy and practice. Place-based policies that involve local and higher-level groups working together can help address social exclusion and underutilization of potential in different areas. The document also reviews Scotland's national strategies and plans for improving digital health, including increasing access to online cognitive behavioral therapy, developing self-help resources, and ensuring technologies support independent living for those with dementia.
Shorter Version of BbWorld 09 Forensics PresentationSteve Feldman
The document discusses performance forensics for investigating issues in computer systems and software. It describes performance forensics as similar to other forensic processes, beginning with collecting evidence. Evidence can include data collected from tools as well as interviews. When data is not available, simulated data collection can help recreate incidents. Modeling and visualizing problems is important for getting to the root cause. Diagnosis bias and value attribution from interviews must be avoided. The process may start before any major issues occur through proactive capacity planning.
Utilization Based Evaluation In Mental HealthPaul Frankel
The document discusses intended uses of evaluation findings and stakeholder engagement in the evaluation process. It notes that different stakeholders may have different information needs, and that stakeholder commitment is important. It emphasizes that evaluations should be useful and actually used by intended users in order to make decisions and improve programs. The document also discusses challenges in evaluation implementation and getting stakeholders to use findings.
This document outlines a research project conducted by a group of students at the university. The research project examines the impact of social media on consumer buying behavior. It includes an introduction that provides background on the topic and outlines the problem statement, research objectives, questions, limitations and significance of the study. It also includes a review of related literature and methodology section that describes the research design, data collection process, sampling technique, hypotheses and research model.
The document discusses setting up a project to respond to disinformation and malign influence. It covers establishing safety protocols to avoid harming targets, responders, or other stakeholders. It also discusses organizing resources like people, evidence collection, tools, and analysis. The document recommends planning the project using a lifecycle model to identify threats and establish processes for monitoring, detection, response, recovery and learning from lessons. It provides examples like the NIST cybersecurity framework and WHO Europe's full lifecycle risk model.
Digital Communication Power Tools: Speakers Notes versionMarilyn Herie
This Keynote presentation at the 2012 Ontario Association of Social Work annual conference outlines the "digital communication power tools" for social workers and other practitioners. Speakers' notes can be toggled on or off. This file provides the Speakers Notes that accompany the slides.
This book discusses how analyzing large amounts of internet search data and digital traces can provide insights into human behavior and psyche. It explains that people will confess private things to Google searches that they wouldn't tell others. The data gives a view into trends of what people want from text, images, and videos. While surveys often receive dishonest answers, digital data may be closer to what people really want or feel as they search for information online.
Algorithmic bias is a complex, ill-defined concept with many facets. It refers broadly to unjust outcomes from algorithms that aim to predict outcomes based on historical data, but the term is unclear and conflates different types, sources, and impacts of biases. Algorithmic bias arises from multiple factors, including the data used to train models (which reflects societal biases), how data is collected and organized over time in complex data pipelines (forgettance), and how predictions are interpreted and used. Understanding algorithmic bias requires examining algorithms as social and epistemological constructs that reflect and can exacerbate existing inequalities in how knowledge is defined and groups are differentiated through probabilistic analysis.
The document discusses risk measurement in the context of disinformation and malign influence training. It begins by outlining why and what organizations aim to measure, such as the effectiveness and value of cognitive security programs. Existing monitoring and evaluation approaches are examined, including logframes commonly used to track outputs and outcomes. The document then reviews existing cognitive security measures like the UK government's RESIST framework and UNICEF's infodemic metrics. It concludes by providing suggestions for different types of performance and effectiveness metrics that can be used, as well as tools for gathering metrics like data analysis, surveys and chatbots.
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...Shalin Hai-Jew
In a research context, artificially increasing image resolution through interpolation of additional pixels would generally not be considered appropriate, as it introduces artificial data that was not present in the original image. Minor sharpening could potentially be acceptable to improve clarity, but adding whole new pixels risks misleading viewers about what is actually depicted in the original data. The best approach is to capture images at a sufficiently high resolution during data collection.
The document discusses new trends in big data and social media in 2013, including increased use of geo-location data and greater transparency online. It emphasizes the need to develop the right frameworks and taxonomies to make data useful, such as deciding how public or private to be, how much metadata to include, and how much social connectedness is needed. The key is learning new vocabularies, processing information meaningfully before making decisions, and encoding information in a personal way that also speaks universal symbols.
This document discusses inclusion and making user experiences (UX) more innovative. It defines inclusion and discusses how inclusion is about living full lives and sharing abilities. The document then discusses various aspects of inclusive design like the social model of disability, designing for neurodiversity, adapting research methods to different audiences, and building trust with stakeholders. It encourages thinking about inclusion as a user experience for all and not just about rules or demographics. The document concludes by asking attendees to think about how a more inclusive approach could change their work and sharing stories in breakout groups.
Similar to Wearable privacy skeletons in the data closet (20)
Wearable technologies have shown a large potential to amplify human abilities. Thanks to their close contact to the human body, their miniaturized dimensions and continuous data collection, wearable technologies are versatile, meeting system requirements across domains. Wearable technologies have grown in quantity and quality over the past decades, gaining widespread adoption. Still, ensuring that wearables properly meet users’ needs remains an open challenge. Through illustrative examples of diverse applications, in this talk I provide an overview of wearable computing. I discuss the challenges and opportunities in the design of user interfaces for wearable interaction, and conclude with a roadmap for next-generation wearables.
The document discusses privacy issues related to emerging technologies like wearables and smart home devices. It begins with an outline of topics to be covered, including contextualizing privacy, theoretical definitions versus real-world practices, privacy studies on online reviews, and open questions. The rest of the document delves into these topics, finding that privacy is a multidimensional concept that varies by context and individual. User studies of online reviews reveal different perspectives on privacy concerns for technologies. Imagery analysis identifies common metaphors and mental models around privacy concepts. Open questions remain around simplifying privacy and developing effective user-centric solutions.
Smartwatch Applications as Assistive TechnologiesVivian Motti
This document discusses using smartwatches as assistive technologies to help neurodiverse students in inclusive education settings. It outlines research on developing a smartwatch app called Wearable Life (WELI) to discreetly provide interventions to students in class from assistants. Through user-centered design including requirements gathering, prototyping, and field studies, WELI features like focus, participation, and rewards notifications were well received. The research found promise for assistive smartwatches to enhance inclusion while allowing for personalized, context-aware assistance over time.
This document discusses wearable technologies and their applications in healthcare. It covers various form factors of wearables including wrist-worn devices, head-mounted devices, and on-skin interfaces. Sensors that can be integrated into wearables to collect physiological and environmental data are also outlined. While wearables show promise in areas like remote patient monitoring and behavior change, challenges remain around user interfaces, validation of sensor data, and privacy/security risks that must be addressed for wearables to become widely adopted in healthcare.
Cards - Users with Disabilities - Course MaterialVivian Motti
The accessibility cards is a set of 16 personas illustrating users with diverse disabilities. The personas include users described in the book "A web for everyone: Designing accessible user experiences" authored by Horton and Quesenbery (2014) and presented in W3C user stories (at: https://www.w3.org/WAI/people-use-web/user-stories/). The contents are shared with creative commons license with attribution. The cards have been developed thanks to the financial support of Teach Access. About Teach Access: Teach Access is a unique collaboration among members of higher education, the technology industry and advocates for accessibility, with a shared goal of making technology broadly accessible by infusing accessibility into higher education, with enhanced training and collaborations with people with disabilities. Teach Access includes members from leading tech companies, academic institutions and disability advocacy organizations and other non-profit institutions. Teach Access operates as a fiscal sponsorship fund at the Silicon Valley Community Foundation (SVCF). To learn more visit teachaccess.org or email info@teachaccess.org.
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Vivian Motti
This document discusses a smartwatch application called WELI that was designed to assist students with intellectual and developmental disabilities in inclusive classrooms. WELI allows users to regulate their executive functions and emotional states by receiving prompts and interventions during daily activities. It combines automated prompts with semi-automated interventions from an assistant to support daily planning, mood regulation, self-assessment, and personalized interventions. The stakeholders who benefit from this solution include healthcare practitioners, therapists, instructors, and students. Assistive wearables like WELI have the potential to monitor users, deliver personalized assistance, and provide real-time support to improve outcomes for people with disabilities.
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Vivian Motti
Poster: Assisting Students with Intellectual Disabilities in Inclusive Education with a Smartwatch Application.
Presented at: Computing Community Consortium (CCC) Early Career Researcher Symposium, 2018. Washington, DC, USA.
https://youtu.be/CC6jvVQW1Fk
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Vivian Motti
Smartwatches have a large potential to support everyday activities. However, their potential as assistive technologies in inclusive academic environments is unclear. To investigate how smartwatches can support students with intellectual and developmental disabilities (IDDs) to perform activities that require emotional and behavioral skills and involve communication, collaboration and planning, we implemented WELI. WELI (Wearable Life) is a wearable application designed to assist young adults with IDDs attending a postsecondary education program. This paper reports on the user-centric design process adopted in the development of WELI, and describes how smartwatches can assist students with IDDs in special education. The results reported are drawn from 8 user studies with 58 participants in total. WELI features include behavioral intervention, mood regulation, reminders, checklists, surveys and rewards. Results indicate that several considerations must be taken into account when designing for students with IDD, and that overall the students are enthusiastic about adopting an innovative smartwatch application in class, as they reacted positively about the technology and features provided.
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...Vivian Motti
This document discusses the development of an mHealth application to support caregivers of babies with Congenital Zika Virus Syndrome. The app aims to provide psychosocial support and access to validated information and resources. It will track child development milestones and connect caregivers to early intervention and pediatric services. The benefits of the app include being low-cost, culturally tailored, scalable, and developed through a user-centered design approach to meet the specific needs of patients.
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...Vivian Motti
This document analyzes user perspectives on 10 smartwatch applications for mental health. It identifies applications that offer multimodal interventions combining audio, images and vibration. Users found these apps effective for interventions and customizable features. However, the most common complaints were about costs and unstable implementations with crashes and bugs. The analysis identified benefits like customizable sounds and drawbacks like limited settings. There is still room for improving efficacy, privacy and mitigating risks as healthcare shifts to patient-centric solutions using digital technologies.
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationVivian Motti
This document describes research into developing a wearable application to assist students with intellectual and developmental disabilities in a post-secondary education program. The researchers conducted a needs assessment including interviews and focus groups with students and staff. Based on their findings, they designed a smartwatch and mobile application that provides students with reminders, checklists, flashcards, and behavior monitoring to help them in class. An initial prototype was tested and found to be well-received by users, though further refinement is needed to balance notification usefulness with unobtrusiveness and battery life. The system demonstrates the potential for wearable technologies to support students with special needs in educational activities.
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...Vivian Motti
The large range of applications for wearable devices provides numerous opportunities for these technologies in diverse domains. However, the dynamic changes in the context of use during the user interaction, summed with the heterogeneity of users’ profiles, challenges the design of effective interfaces and interactive solutions for wearable technologies. In addition to that, wearables often have limited resources: their computational power, processing capabilities, screen dimensions and modalities are often constrained. Finally, the novelty in this market is characterized by limited guidance to effectively aid developers and designers to ensure high usability levels and to promote a great user experience in the design of the wearable interaction. To provide a high quality user experience, the context of use where the user interaction takes place needs to be thoroughly investigated and understood, accommodating its dynamic changes, as well as the specific needs and requirements of diverse users’ profiles in the design of interfaces and interaction. In this talk, you will learn about how context impacts the design of wearables, especially concerning wrist-worn devices, such as fitness trackers and smartwatches. More specifically, you will gain knowledge about: (1) a set of contextual factors that impact the wrist-worn interaction, ranging from environment, to platform and user profile, and (2) how those factors must be considered in the design of the user interaction for wearables, benefiting multimodal interactive solutions as well as multidisciplinary application domains.
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...Vivian Motti
Wrist-worn smartwatches have potential to assist students with intellectual and developmental disabilities in class by helping with interpersonal collaboration, attention, and behavior. The authors developed a wearable application to explore this potential and conducted user research with students and staff through interviews and focus groups. Based on feedback, they will continue refining the application's design and functions to further support students in class and beyond.
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...Vivian Motti
Slides presented at SigDoc 2016, on September 24th. This study highlights the problems users face in the interaction with wrist-worn wearables especially concerning contextual factors and severity ratings.
Toward a Visual Vocabulary for Privacy ConceptsVivian Motti
This document discusses the development of a visual vocabulary for privacy concepts. It notes that privacy is a multi-disciplinary concept without universal definitions. Existing privacy solutions like terms and conditions are often too technical, long and complex. The document then presents research analyzing users' mental models of privacy through imagery themes of who, how, why and where. It develops a taxonomy of privacy codes organized by action, object, organization, people and concepts. The most frequent codes related to real-world actions and physical objects. The document concludes that a user-centric approach matching familiar concepts to UI design could help create more usable privacy solutions.
Human Centered Solutions of On Body Technologies to Improve Healthcare
Presented at the CCC symposium on national priorities and societal needs, MAy 9th, 2016, Washington DC
Wearable Computing: Healthcare, Human Factors and PrivacyVivian Motti
Lecture presented at the Catholic University of Arequipa in Peru on March 28th, 2016. 'Avances de la Ingeniería Biomedical y las ciencias de las tecnologias de información en el desarrollo de dispositivos "wearables".
Micro interactions and multi dimensional graphical user interfaces in the des...Vivian Motti
Wearables have a large potential to support diverse applications. However designing their interfaces is challenging. Limited resources, dynamic constraints and situational impairments add more challenges to the UI design for wearable devices. To support stakeholders in this activity, in this presentation we discuss two design paradigms for wrist worn devices: micro interactions and multi dimensional UIs. Slides presented at the HFES Annual Meeting in 2015.
Wrist-Worn Interaction: Design Challenges and OpportunitiesVivian Motti
Poster presented at the Georgia Tech Symposium on Design and Wearable Technologies, on May 9th.
This work focuses on the importance of considering context information while designing the interfaces for wearable computers, especially regarding wrist-worn devices.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
1. Wearable Privacy: Skeletons In The Data
Closet
Byron Lowens M.S.
blowens@g.clemson.edu
Prof.Vivian Genaro Motti Ph.D.
vmotti@gmu.edu
Prof. Kelly Caine Ph.D.
caine@clemson.edu
IEEE International Conference on
HealthCare Informatics 2017
Park City, Utah
August 26th, 2017
1
2. Overview of Talk
● Acknowledgments
● Introduction and Background
● Introduction to the Problem
● Methods
● Results
● Summary of Work
● Conclusion
● Questions
2
3. Acknowledgements
Support: NSF: 1314342
I’m especially thankful to:
● Kelly Caine
● Vivian Motti
● Bart Knijnenburg
● Jacob Sorber
● David Kotz
● Ryan Halter
● Amulet team
● Hatlab members
port: NSF: 1314342
3
6. Jalaliniya, S., & Pederson, T. (2012, October). A wearable kids' health monitoring system on
smartphone. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making
Sense Through Design(pp. 791-792). ACM.
Wu, J., Tian, Z., Sun, L., Estevez, L., & Jafari, R. (2015, June). Real-time American sign language recognition
using wrist-worn motion and surface EMG sensors. In Wearable and Implantable Body Sensor Networks (BSN),
2015 IEEE 12th International Conference on (pp. 1-6). IEEE.
Van Hoof, C., & Penders, J. (2013, March). Addressing the healthcare cost dilemma by managing health
instead of managing illness: an opportunity for wearable wireless sensors. In Proceedings of the Conference on
Design, Automation and Test in Europe (pp. 1537-1539). EDA Consortium.
Lo, B. P., Ip, H., & Yang, G. Z. (2016). Transforming health care: body
sensor networks, wearables, and the Internet of Things.
6
20. Research Questions
● How do users understand privacy in the context of wearables, specifically
WWDs?
● What are the benefits and concerns related the collection and sharing of
health data collected via WWDs and when do these concerns arise?
● What are common misconceptions users’ share about health related data on
WWDs?
20
23. ● 32 semi-structured interviews with existing users of
wearable devices to identify:
○ Key Benefits
○ Drawbacks
○ Misconceptions
○ Tradeoffs
○ Solutions
Methods
23
24. Methods:Interview Questions
● What are your privacy concerns, if any?
● Would you share your device and/or the data? Why? With Who?
● Do you sync/view data? How?
● How often do you access it?
● Do you access it for healthcare purposes?
24
28. Level of Concern For Privacy Among Wearable Users
60%
25%
15%
28
29. Level of Privacy Concern: Unconcerned (N=12)
“None of the data that I’m logging I think is significant enough to cause any grief.”
(P2)
“As a technology person, I don’t really mind sharing data like this. To me, that
doesn’t really quantify anything about me nor from my private life.”
(P6)
29
30. Level of Concern: Somewhat Concerned (N=5)
● “This is super interesting because right now I don’t have any. But I can see if
this information was somehow accessed by let’s say a health insurance
company or someone else who could use it in order to determine what kind of
care I received. That’s a little big brotherish.” (P23)
30
31. Level of Concern: Highly Concerned (N=3)
“I have more privacy concerns about the fact that there will be some vast analytics
running on it... maybe there are some aspects which could be derived that
somewhere in the future I’ll be sick... I’m more worried about the fact that it can be
used against me.” (P12)
31
32. Type of Privacy Concern
Unintended Use “But, if after the fact someone were to gain this access to this data and use it to prove why I shouldn’t be eligible for
something or exclude from a health program that would be concerning.” (P23)
“If it was collecting,information about like ”oh, he’s feeling sick today” and maybe if there’s a conflict in terms of well
he’s sick, but he’s supposed to be at work.” (P16)
“Oh, you know if I were connected to coworkers or my boss and I called in sick one day and she sees that I am
completing these hikes...that could be an issue. Like I said it’s a hypothetical, potential privacy concern right now.”
(P9)
Control “That I am forgetting it, and it keeps measuring unobtrusively, without me thinking about it. And its uploading data
somewhere. Okay, so the bad thing, maybe also, I don’t own the data yet. They say they’re still working on the data
sharing, so I cannot pull up any data, I can just see them as graphs on the website. So that’s a bad thing still.” (P12)
“I don’t know how practical it is but it seems like a nice thing would be it doesn’t necessarily need to be shared with
anybody or synced online or anything. It just needs to talk directly to...let’s say your cell phone and keep it stored on
your cell phone but it doesn’t need to sync those settings or with anything else.” (P3)
32
33. Benefits
● “The basis watch, I very much like it, I would say I’m even more addicted to see the patterns, to see
also the improvements in me changing some behaviors, and I’ll tell you in a moment what have I
changed. And then, seeing the effect of this.” (P12)
● “Yeah, I had my husband, my boss, we’re all on this together and we always with my coworkers. We
are part of each other’s little social circle and we’ll chat back and forth. look how many calories I
burn, come with me, join me!” (P23)
● “Yeah, it’s funny I actually use in it presentations at work. Because what I do is often talk about
motivation and I’ll use as a real world example to help people understand how I am personally
motivated by data in my own life.” (P23)
33
34. Misconceptions
● “Yeah, there weren’t any passwords or anything like that I put into the device.
And also, that specific device doesn’t have a keyboard, so you can’t type in
any sensitive information.” (P20)
● “Daily activity is not something private... I mean, if people are around you,
they... figure out whether you’re lazy or not.” (P6)
34
35. Solutions
● Authentication
○ “You could only have your biometrics be private to you, they would not be shared with
someone other online account or anything.” (P3)
● Policies
○ “I was not aware of this before, but apparently, now, if you go download an app, these things
need to be clear in there.” (P6)
● Network of Friends:
○ “I haven’t really thought about my privacy concerns, but I do try to limit them by just limiting
how much information I share and how many friends I have.” (P9)
35
36. Privacy Settings
“I like to control it, I wouldn’t want a lot of strange people see it so I would only
share it with my friends.” (P14)
“Yes, I have changed it. I’ve gone into settings to say what kind of information do
you want to report. I’ve actually done that more often” (P9)
36
37. 37
“I may have had to change it.”; “I don’t
think so, no I don’t think I really ever
thought about it that deeply. I don’t really
remember actually... let me just double
check. That’s crazy, I am looking at the
app right now, and I can’t tell” (P24).
38. “
“ Personally I wasn’t too concerned
about it “ P20
“They came private from the get go”
P6
38
39. Tradeoffs
“there’s a price I pay for having it convenient and nice but I’ve kind of accepted that’s, you know, pick your
poison, and that’s just something I run the risk of to use these applications...I don’t trust them but I go
ahead and use their products anyways.” (P12)
39
40. Emerging Concerns
“I don’t care much about if people are looking at my performance as a
runner.....I’m just running for fun, so I feel like... I’m less concerned about my
running tracks than about features about myself, for instance. I have no problem to
make this kind of information public, but of course, nobody’s interested in these
things as well.” (P28)
40
41. “No, I yeah, I of course, it’s
sensitive because you can
figure out where I’ve been, in a
specific, in which city I’m
living.” (P28)
41
42. Key Findings
● There is variety in concern among users
● Users have a partial understanding about privacy;
● The lack of input device led some users to feel that they should not be
concerned about the privacy of the data collected by their WWD;
● Users' concerns in relation to the collection and sharing of their health related
data on WWD were mainly related to Unintended Use and Control over data.
42
44. Design Implications For Wearable Applications
● None (users without concerns and/or public data)
○ the lack of concern occurs either when users have no sharing options, and all the data are
kept private, or when no sensitive information is handled, enabling users to have it publicly
available without any implications.
● Moderated (users with some privacy concerns)
○ the control mechanisms needed to ensure that users select the data they want to be shared,
with who they want to share it, and how. Fine-grained solutions are preferred (allowing a
flexible and detailed control level).
● Extreme (users with high levels of privacy concern)
○ users with high levels of concerns do not want anything to be shared, so the systems need to
either have everything private by default (preferred by users) or enable them to set everything
as private. In both cases, the status of the system needs to be presented in a clear and
reliable format to users seeking to ensure transparency.
44