My Stroke of Insight: A Brain Scientist's Personal Journey - yimg.com
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015
-
Upload
jason-hong -
Category
Documents
-
view
540 -
download
0
Transcript of Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015
![Page 1: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/1.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
1
Social CybersecurityApplying Social Psychology to Cybersecurity
Jason HongLaura Dabbish
Sauvik DasHyun-Jin Kim
HCICJune 30, 2015
ComputerHumanInteraction:MobilityPrivacySecurity
![Page 2: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/2.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
2
or, A Computer Scientist’s View of HCI and Theory
Jason HongLaura Dabbish
Sauvik DasHyun-Jin Kim
HCICJune 30, 2015
ComputerHumanInteraction:MobilityPrivacySecurity
![Page 3: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/3.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
3
Introduction
• This is the most unusual talk I’ve ever given
• Got lots of funny looks from people
You’re going to talk about theory??
You’re going to talk about theory??
You’re going to talk about theory??
Ed Chi Leila Takayama James Landay
![Page 4: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/4.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
4Who am I? What am I doing here?
![Page 5: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/5.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
5
Most of My Work is Athereotical
• I do work in privacy, cybersecurity, ubicomp
• But little of it grounded in theory
![Page 6: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/6.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
6
But It’s Not Just Me
Technical HCI work doesn’t seem to build a lot on top of each other’s work. There doesn’t seem to be a lot of theory either.*
*not an exact quote
Bob Kraut (Jedi Master, CMU)
![Page 7: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/7.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
7
Examples of Tech HCI
![Page 8: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/8.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
8
Why Little Theory Building in Tech HCI?
• Is it because it’s engineering?– I would say no– Civil Eng has traffic modeling, materials– MechE has heat transfer, mass transfer– EE has AC theory, circuit models, signal
![Page 9: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/9.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
9
Why Little Theory Building in Tech HCI?
• Science of the artificial– Outside of speed of light, few limits
to computing– We make a lot of the rules, and mostly
limited by our imagination and market
• Compare to natural science– Only one way DNA works– Only one way brain circuit works– (And only one research team can win)
![Page 10: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/10.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
10
Why Little Theory Building in Tech HCI?
• No clear natural objective function• Instead, goal of Tech HCI is to:
– Expand frontiers of what’s possible (expand our imagination)
– Sweep parameter space to understand principles and tradeoffs
• And while Tech HCI doesn’t build theory, it will occasionally use it
![Page 11: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/11.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
11
Themes in This Talk
• Role of theory for Tech HCI?• Kinds of theories useful for Tech HCI?
– Some theories more useful than others
• Will describe our work on cybersec– Social Psych / Diffusion of Innovations
• My perspectives:– Tech HCI research– (Successful?) startup– Helped run Master’s of HCI program
![Page 12: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/12.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
12
Cybersecurity Research Today
• Most research focused on computers– Protocols, detection, static analysis
• Some research on individuals– Mostly usability of tools
• But cybersec faces deep problems– How do people learn cybersecurity?– How can we fix misconceptions?– How to change people’s behaviors?
![Page 13: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/13.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
13
A True Story
Did you hear what happened to Moe? He slipped on ice and damaged his laptop. Now he can’t get his data.
![Page 14: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/14.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
14
A True Story
Did you hear what happened to Moe? He slipped on ice and damaged his laptop. Now he can’t get his data.
I’m going to back up my data right now!
![Page 15: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/15.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
15
Light Bulb Moment
• Hung around behavioral scientists for many years– Learned about basics of social psych
thru osmosis
• Realized that this simple interaction led to desirable action
![Page 16: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/16.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
16
How can we use social influences to help improve cybersecurity?
![Page 17: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/17.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
17
Social Proof
![Page 18: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/18.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
18
• Baseline effectiveness is 35%
![Page 19: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/19.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
19
![Page 20: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/20.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
20
• “showing each user pictures of friends who said they had already voted, generated 340,000 additional votes nationwide”
• “they also discovered that about 4 percent of those who claimed they had voted were not telling the truth”
![Page 21: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/21.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
21
Energy Consumption
![Page 22: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/22.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
22
Energy Consumption
![Page 23: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/23.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
23
Social Cybersecurity
• Focus on usability has gotten us far, but security features rarely adopted
• Pop Quiz: How many of you have heard of / use these features?– Two-factor authentication– Login notifications on Facebook– Trusted contacts on Facebook
![Page 24: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/24.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
24
Social Cybersecurity
• Adoption rate typically single digits [Das et al 2015]
• Why develop new tools if we can’t get people to adopt existing ones?
![Page 25: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/25.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
25
Reflection 1Good Theory Can Offer Inspiration
• Cybersecurity research somewhat stuck in its approaches
• Diminishing returns after exploring, need new ideas and perspectives– See Lakhani08 paper on Innocentive
![Page 26: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/26.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
26
Social CybersecurityOur Team’s Work to Date
• Interviews about why people changed behaviors and what they talk about with others [SOUPS 2014]
• Study w/ Facebook evaluating social interventions [CCS 2014]
• Analysis of who does and doesn’t adopt features [CSCW 2015]
![Page 27: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/27.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
27
Semi-Structured Interviews
• Interviewed 19 people– Mobile authentication– App installation / uninstallation– Online privacy settings
• What caused the change?• Hear about incident thru a friend?• Talk to others about the change?
Das, S., H.J. Kim, L. Dabbish, and J.I. Hong. The Effect of Social Influence on Security Sensitivity. SOUPS 2014.
![Page 28: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/28.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
28
Cybersec Behavior Changes
• 114 behavior changes coded• 48 had social influences (42%)
– Observing friends (14 of 48)– Social sensemaking (9 of 48)– Pranks and demonstrations (8)– Experiencing security breach (6)– Sharing access (3)
![Page 29: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/29.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
29
Insight #1 - Observability
• One person stopped in coffee shop and asked about the Android 9-dot:
“We were just sitting in a coffee shop and I wanted to show somebody something and [they said], ‘My phone does not have that,’ and I was like, ‘I believe it probably does.’”
![Page 30: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/30.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
30
Diffusion of Innovations
• Five major factorsfor successful innovations:– Relative Advantage– Trialability– Complexity– Compatibility– Observability
![Page 31: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/31.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
31
Most Cybersecurity not very Observable
• How strong are Gary’s passwords?• What privacy settings does Leysia
have for Facebook?• What does Jofish look for to avoid
phishing attacks?
• Low observability -> hard to diffuse
![Page 32: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/32.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
32
Reflection 2Good Theory Offers Vocabulary
• If we weren’t aware of Diffusion of Innovations, might have overlooked the comments about Observability
• Act of having a name focuses
![Page 33: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/33.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
33
Insight #2 – Social Factors Might Work Against Adoption
• A lot of early adopters tend to be:– Security experts– People with clear reason (e.g. job)– Viewed as “Nutty” or paranoid [Gaw et al 06]
• Brand disenfranchisement– Illusory correlation between something
(use of security tools) and attributes of users
![Page 34: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/34.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
34
Who Uses What Computer?
• “These people aren’t like me”– (Regardless of whether true or not)
![Page 35: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/35.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
35
What are Professors Like?
![Page 36: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/36.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
36
Social Proof + Make Cybersecurity Observable
• Variants– Control– Over # / %– Only # / %– Raw # / %– Some
Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014.
![Page 37: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/37.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
37
Method
• Controlled, randomized study with 50k active Facebook users– 8 conditions, so N=6250
• Part of annual security awareness campaign Facebook was going to run anyway
![Page 38: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/38.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
38
Results of Experiment
![Page 39: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/39.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
39
Social Influences on Adoption
• Analyzed 1.5M people on Facebook– No interventions, existing behaviors– More adopters a person can see,
more likely to adopt (but J-curve)– More social circles, stronger effects– More observable and social feature
(trusted contacts), stronger effects
Das, S., A.D.I. Kramer, L. Dabbish, J.I.Hong. The Role of Social Influence In Security Feature Adoption. CSCW 2015.
![Page 40: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/40.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
40
Ongoing Work
• Are there other ways to make security more observable (+ safe)?– Note that this is counter to
conventional wisdom of security
• Other social techniques to influence people’s awareness, knowledge, motivation?
![Page 41: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/41.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
41
Reflection 3Good Theory Should Offer Guidance
• We could have done mass A/B tests of interventions without theory– (This is essentially what industry does)– Instead, Social psych and Diffusion of
Innovations gave us direction
• Blind searches unsatisfying– Dan Russell’s talk at HCIC 2009– Eric Brill’s talk at HCIC 2013
![Page 42: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/42.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
42
42
Dan Russell’s HCIC 2009 Slides
![Page 43: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/43.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
43
43
Dan Russell’s HCIC 2009 Slides
![Page 44: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/44.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
44
44
Dan Russell’s HCIC 2009 Slides
![Page 45: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/45.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
45
What to Name Buttons?
Dan Russell’s HCIC 2009 Slides
![Page 46: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/46.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
46
Why Unsatisfying?
• What’s generalizable?• What did we as a community learn?
![Page 47: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/47.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
47
Reflection 4Good Theory Should Offer Insight
![Page 48: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/48.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
48
Reflection 4Good Theory Should Offer Insight
“For instance, when Appel and Haken completed a proof of the 4-color map theorem using a massive automatic computation, it evoked much controversy. I interpret the controversy as having little to do with doubt people had as to the veracity of the theorem or the correctness of the proof. Rather, it reflected a continuing desire for human understanding of a proof, in addition to knowledge that the theorem is true.” - William Thurston, On Proof and Progress in Mathematics
![Page 49: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/49.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
49
Reflection 4Good Theory Should Offer Insight
• Alternative formulation by Tim Gowers The Two Cultures of Mathematics– (i) The point of solving problems is to
understand mathematics better.– (ii) The point of understanding mathematics is to
become better able to solve problems.– Mathematicians lie on spectrum
![Page 50: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/50.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
50
Pasteur’s QuadrantGood Science + Good Applications
![Page 51: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/51.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
51
• Situated Action• Activity Theory• Distributed Cognition• Embodied Interaction• Ethnography
• Fitts’ Law• Learning science• Visual Perception• Social Psych• Motivation
Advice for Theory BuildersConsider Insight + Guidance
Guidance (What to Build / How to Build it Better)
Insi
ght
• Heuristic Evaluation• Contextual Inquiry• 41 Shades of Blue (A/B)• Iterative Design• Agile / Lean
![Page 52: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/52.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
52
• Situated Action• Activity Theory• Distributed Cognition• Embodied Interaction• Ethnography
• Fitts’ Law• Learning science• Visual Perception• Social Psych• Motivation
Advice for Theory BuildersConsider Repackaging Too
Guidance (What to Build / How to Build it Better)
Insi
ght
• Heuristic Evaluation• Contextual Inquiry• 41 Shades of Blue• Iterative Design• Agile / Lean
![Page 53: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/53.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
53
Wishlist for Tech HCI and for Master’s Students
• Design Theory– Service design– Engagement, stickiness
• Emotional Attachment• Innovation Theory
– What’s more likely to have impact?– Product lifecycles– Feature / Product / Business
![Page 54: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/54.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
54
Example for InnovationChristensen’s Disruption Model
![Page 55: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/55.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
55
Lifecycle of Product
![Page 56: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/56.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
56• New product starts out with
lots of chaos• Eventually dominant design
appears, right combination of existing features / ideas
![Page 57: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/57.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
57• Less innovation in features,
few changes to dominant design
• More innovation in process of production
• Dominant design only obvious in retrospect too
![Page 58: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/58.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
58
• Extreme focus on cost, volume, capacity
• Very little innovation
![Page 59: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/59.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
59• Cycle starts anew
• But winner of last cycle rarely winner of next
• Formed network, doesn’t want to anger them
![Page 60: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/60.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
60
Conjecture: These Can Help Tech HCI Research
• Can focus research on the phase your company is in– More useful to help industry research
for connecting research to product– A/B tests only useful in later phases
• Can look forward to next fluid phase– We already do this– More useful for academic
![Page 61: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/61.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
61
Other Advice For Theory Builders
• Five major factors:– Relative Advantage– Trialability– Complexity– Compatibility– Observability
• How might you applythese to your work?
![Page 62: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/62.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
62
Summary
• Reflections: Good Theory…– Can Offer Inspiration– Offers Vocabulary– Should Offer Guidance– Should Offer Insight
• For theory builders: Consider…– Insight + Building Apps– Diffusion of Innovations
![Page 63: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/63.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
63
![Page 64: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/64.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
64
Reflection NBe Prepared to Invest a lot of Time
• This work only came about b/c of hanging around behavioral folks
• And because cross-trained students• Big open question: how to train PhD
students, given breadth of HCI?
![Page 65: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015](https://reader038.fdocuments.net/reader038/viewer/2022110200/55c34a97bb61eb941f8b475c/html5/thumbnails/65.jpg)
©2
01
5 C
arn
egie
Mello
n U
niv
ers
ity :
65
Technical HCI Rarely Uses or Builds Theory
• Mostly uses low-level perception and interaction– Ex. Fitts’ law, psychoacoustics,
visual perception, reaction times– (Often built into toolkits)