>
News > Seventy Sixth Newsletter
HCI International News, Number 76, March 2016
***********************
To unsubscribe from HCI International NEWS:
https://email.hci.international/lists/?p=unsubscribe
***********************
IMPORTANT NOTE:
You are kindly requested to update your subscription details:
https://email.hci.international/lists/?p=subscribe
***********************
HCII 2016 HIGHLIGHTS
OTHER HIGHLIGHTS
***********************
JOIN US ON TWITTER
http://twitter.com/#!/hciinews
***********************
HCII 2016: Important Deadlines
- Register to attend with the reduced Regular rate until 16 May 2016
http://2016.hci.international/registration
- Book your accommodation with special rates, limited rooms available until 15 June 2016
http://2016.hci.international/accommodation
- Poster proposals submission: still open
Poster sessions will accommodate the presentation of late-breaking scientific and professional news or work in progress. The submission of poster proposals is still open for the Conference. Any proposals received by 1 June 2016, following a peer–review process, will be considered for interactive presentation during the conference. However, these accepted posters will not be included in the Conference Proceedings
http://2016.hci.international/submissions
Table of Contents | Top of Page
HCII 2016: Tutorials’ Program
21 Half Day Tutorials, listed below, will run from Sunday 17 to Tuesday 19 July 2016. Full day tutorials will not be offered this year. For more information please visit:
http://2016.hci.international/tutorials
Sunday, 17 July 2016, 09:00 - 12:30
T01 Extreme Innovation: Lean UX for Mobile & Wearables (Greg Nudelman)
T02 Mobile Persuasion Design+UX: How can Information Design plus Persuasion Design Change Behavior? (Aaron Marcus)
T03 Artificial intelligence and user interaction (Martin Maguire)
Sunday, 17 July 2016, 14:00 - 17:30
T04 Authoring Adaptive Instruction Using the Generalized Intelligent Framework for Tutoring (GIFT) (Robert Sottilare, Anne Sinatra, Benjamin S. Goldberg)
T05 Cross-Cultural HCI/User-Experience Design: What are the Differences and Similarities of User Preferences, including China? (Aaron Marcus)
T06 Speech-based Interaction: Myths, Challenges, and Opportunities (Gerald Penn, Cosmin Munteanu)
Monday, 18 July 2016, 09:00 - 12:30
T07 Standardized Usability Questionnaires (James Lewis)
T08 HCI/UX in Science-Fiction Movies/TV: What can We Learn from the Past 100 Years of the Future? (Aaron Marcus)
T09 Modern heuristic design evaluation (Everett McKay)
Monday, 18 July 2016, 14:00 - 17:30
T10 Beyond Significance Testing: Confidence Intervals and Sample Size Estimation for User Research (James Lewis)
T11 Creating Successful Learning and Training Programs using Multiple Modalities of Technologies (Eileen Smith, Cali M. Fidopiastis, Michael Carney, Ronald Tarr)
T12 Research Methods for Eye Tracking in User Experience Design (Jennifer Romano Bergstrom, Andrew Schall)
T13 Human Computer Interaction and Cyber-Security (Abbas Moallem)
Tuesday, 19 July 2016, 09:00 - 12:30
T14 How to Create User Requirements for Software (Anna Wichansky)
T15 Mobile HCI/User-Experience Design: What Trends are Emerging Worldwide, including China? (Aaron Marcus)
T16 Using Kansei Engineering to design a better user experience (Nigel Bevan)
T17 Communication and Leadership for Effective HCI Teams (Lil Blume)
Tuesday, 19 July 2016, 14:00 - 17:30
T18 How to Test Software with Users (Anna Wichansky)
T19 How to: Designing Experiments, Working with Metrics and Human Participants (Gisela Susanne Bahr)
T20 Brain neural computer interfaces and novel medical applications (Günter Edlinger, Brendan Allison)
T21 IBM Design Thinking Workshop (Kevin L. Schultz, Camillo Sassano)
Table of Contents | Top of Page
HCII 2016: Accommodation
A number of rooms have been reserved to be allocated on a first-come-first-served basis, while reduced rates have been agreed with The Westin Harbour Castle Hotel (conference venue), which is recommended as the main hotel of the Conference. For more information about accommodation, please visit: http://2016.hci.international/accommodation
Table of Contents | Top of Page
HCII 2016: Exhibition
You are invited to exhibit at the HCI International 2016 exhibition. The HCI International Conference is an ideal opportunity to exhibit your products and services to an international audience of over 2000 researchers, academics, professionals and users in the field of HCI. List of Exhibitors registered so far:
Information about the previous years’ exhibition, including pictures and exhibitors, are available in HCII News Facebook page. For more Information about the HCII 2016 exhibition visit: http://2016.hci.international/exhibition
Table of Contents | Top of Page
HCII 2016 Sponsorship
Sponsorship in the context of HCI International 2016 is the ideal opportunity to expose your organization to an international audience of about 2000 researchers, professionals and users in the field of HCI. Sponsorship is not limited to financial support, and can also take the form of material and service provision. If you are interested in contributing to this international event as a sponsor or simply wish to receive more information contact: [email protected]
Table of Contents | Top of Page
Cyber Security and Human Factors in HCI Educational Programs
Human society has been transformed through the expansion of digital technology and the rate of this change continues to accelerate dramatically.
- Residential units will continue to be equipped with more smart devices such as surveillance cameras, temperature controls, and medical tracking devices.
- Human communication largely occurs through mobile devices and social networking.
- Financial transactions, from banking to purchasing, are mainly being performed online.
- Organizations, both public and private enterprises, are being fully digitized. From entering a building to communication with customers, clients and coworkers, as well as the design and creation of new products, everything is managed, recorded, and tracked within the digital realm. Even 'in-person' meetings are recorded or done via video conferencing.
- Countries rich and poor are being fully managed through digital information. The management of citizen information and requests along with citizen monitoring and surveillance are just a few examples.
- Countries worldwide are competing as to who can get their hands on information first. Information on defense, commercial industry, and technology that could give a country an advantage over others.
All this is happening within the old frameworks of human society. The rules are still very basic and have not matured to handle the new paradigm; individuals, organizations or countries that have financial control in the world heavily influence the rules. Cyber wars among countries, organizations and people will soon become a common event. Consequently, cyber security is becoming one of top issues that every human must confront.
According to Gartner, global spending on IT security reached $77 billion in 2015, with an increase of 4.7% over 2014. The estimate on information security spending for 2018 is $101 billion. [1]
The Wall Street Journal reports that the demand for cyber security experts is growing 12 times faster than the overall job market, making it one of the most highly sought after in the country. [2]
Forbes reports that more than 200,000 U.S. cyber security jobs are unfilled. The cyber security workforce shortage is expected to reach 1.5 million unfilled positions by 2019. [3](Forbes.com)
Thus it is urgent that society gets ready to handle these new security issues and educates people to manage their way through the cyber world of today and tomorrow. Many higher education institutions are seeing the need to provide programs addressing the developing field of cyber security. Several institutions have created graduate programs to educate future specialist in cyber security. [4]
The "human agent" is at the center of all security systems. According to IBM, 95 percent of all security incidents involve human error. [5] One can assume that human factors should be one of the main areas utilized to educate future security experts. Developing an understanding of human behavior must become a focal area for future experts from both a human computer interaction point of view and a pure human factors perspective.
A quick look at 25 educational programs [6] (Table 1) in the cyber security area reveals that the educational programs are only offered to postgraduates in the U.S. Most of the offered programs are within the Eastern U.S.
Looking at the courses offered in this area reveals no base standard for the content of programs. Among 70 topics identified, only the following are offered by multiple institutions: Forensics (12), Cryptography (8), Information Assurance (9), Information Security (10), Information Technology (6), Network Security (10) and Security Management (4). (Table 1)
It is interesting to observe that among these entire programs only one institution offers a course on "Human Factors and Managing Risk" (Norwich University Online). Even this course is still not a full human factors course.
Many private enterprises seem to hire their security analysts from fields like psychology and the social sciences due to a lack of resources invested in the study of cyber security. This only emphasizes a crucial need for courses in human factors and cyber security not only to be offered more widely as graduate programs, but also to be offered within undergraduate programs.
Abbas Moallem
Table 1: Institutions Offering a Cyber Security Program
- (Pittsburgh, PA) Robert Morris University
- Boston University (Boston, MA) Boston University
- Brandeis University, Graduate Professional Studies (Waltham, MA)
- Capitol College (Laurel, MD)
- Colorado Technical University (Colorado Springs, CO)
- Dakota State University (Madison, SD)
- Davenport University (Grand Rapids, MI)
- DePaul University, College of Computing and Digital Media (Chicago, IL)
- Florida Institute of Technology, Harris Institute for Assured Information (Melbourne, FL) Florida Tech
- Iowa State University, Department of Electrical and Computer Engineering (Ames, IA) Iowa State University
- Lewis University (Romeoville, IL)
- Liberty University Online (Lynchburg, VA)
- National University (San Diego, CA)
- Northeastern University (Boston, MA)
- Northwestern University, School of Professional Studies (Evanston, IL)
- Norwich University Online (Northfield, VT)
- Nova Southeastern University, Graduate School of Computer and Information Sciences (Fort Lauderdale, FL)
- Our Lady of the Lake University (San Antonio, TX)Our Lady of the Lake University
- Penn State World Campus (State College, PA)
- Regis University (Denver, CO)
- Robert Morris University, School of Communications and Information Systems
- University of Alabama at Birmingham Online, UAB Collat School of Business (Birmingham, AL)
- University of Denver (Denver, CO)
- University of Maryland University College (Adelphi, MD)
- Western Governors University (Salt Lake City, UT)
- Wilmington University (New Castle, DE)
References
[1] Retrieved December 24, 2015 from "Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware"
http://www.gartner.com/newsroom/id/2828722
[2] Retrieved December 24, 2015 from "The Role of Human Error in Successful Security Attacks"
https://securityintelligence.com/the-role-of-human-error-in-successful-security-attacks/
[3] Retrieved December 24, 2015 from "Demand for Cyber Security Jobs Is Soaring"
http://blogs.wsj.com/cio/2013/03/04/demand-for-cyber-security-jobs-is-soaring, Accessed on December 24, 2015
[4] Retrieved December 24, 2015 from "The Business of Cybersecurity: 2015 Market Size, Cyber Crime, Employment, and Industry Statistics"
http://www.forbes.com/sites/stevemorgan/2015/10/16/the-business-of-cybersecurity-2015-market-size-cyber-crime-employment-and-industry-statistics/3/
[5] Goda B.S. & Friedma R., Designing a Masters Program in Cybersecurity and Leadership, SIGITE'12, October 11–13, 2012, Calgary, Alberta, Canada. Copyright 2012 ACM 978-1-4503-1464-0
[6] Retrieved December 24, 2015, "The 25 Best Online Master of Information Assurance and Security Degree Programs"
http://www.thebestschools.org/rankings/25-best-online-master-information-assurance-security-degree-programs/
Table of Contents | Top of Page
Recent News and Articles
- "Judge Says Apple Doesn't Have to Unlock iPhone in Case Similar to San Bernardino", Wired, Feb. 29, 2016.
- "The Apple-FBI Fight Isn't About Privacy vs. Security. Don't Be Misled", Wired, Feb. 24, 2016.
- "The Promise of Artificial Intelligence Unfolds in Small Steps", New York Times, Feb. 28, 2016.
- "How One Intelligent Machine Learned to Recognize Human Emotions", Technology Review, Jan. 23, 2016.
- "Japan Road Tests Self-Driving Cars to Keep Aging Motorists Mobile", The Wall Street Journal, Jan. 21, 2016.
- "U.S. Military Wants to Create Cyborg Soldiers", Computerworld, Jan. 21, 2016.
- "British Voice Encryption Protocol Has Massive Weakness, Researcher Says", Network World, Jan. 19, 2016.
- "Shrinking the Haystack", Economist, Jan. 16, 2016.
- "Hacking Team's Leak Helped Researchers Hunt Down a Zero-Day", Wired, Jan.13, 2016.
- "U.S. Proposes Spending $4 Billion on Self-Driving Cars", The New York Times, Jan.14, 2016.
- "Yahoo! Releases a Ton of Anonymized User Data to Help Machine-Learning Scientists", IDG News Service, Jan.14, 2016.
- "Microsoft Neural Net Shows Deep Learning Can Get Way Deeper", Wired, Jan.14, 2016.
- "Google Opens Up About When Its Self-Driving Cars Have Nearly Crashed", The Washington Post, Jan.12, 2016.
- "Intelligence Agency Wants Computer Scientists to Develop Brain-Like Computers", Network World, Jan.8, 2016.
- "The Father of Online Anonymity Has a Plan to End the Crypto War", Wired, Jan.6, 2016.
- "Erica, the 'Most Beautiful and Intelligent' Android, Leads Japan's Robot Revolution", The Guardian, December, 31, 2015.
- "The Machine Knows How You Feel: How AI Can Detect Emotion", TechRepublic, Jan.4, 2016.
- "The Unsung Heroes of Scientific Software", Nature, Jan.4, 2016.
- "What Happens When Virtual Reality Gets Too Real", The Wall Street Journal, Jan.3, 2016.
- "App Differentiates a Baby's Crying Sounds", Reuters, December, 30, 2015
Table of Contents | Top of Page
Announcements
Special issue in the Universal Access in the Information Society Journal, Entitled: Information Society Skills. Is knowledge accessible for all? More info.
August 23-25, 2016: 4th International Conference on User Science and Engineering 2016 (i-USEr 2016), Melaka, Malaysia
http://fskm.uitm.edu.my/iuser2016/
Call for Papers: May 30 - June 3, 2016: WSCG 2016, Int. Conf. on Computer Graphics, Visualization and Computer Vision, Pilsen City, Prague
http://www.wscg.eu
22-24 Sept, 2016: IEEE ICEMIS 2016, Agadir, Morocco
www.iares.net
Call for papers, OCTOBER 24 – 26, 2016: the ASSETS 2016 Conference, Atlantis Casino Resort Spa - Reno, Nevada
http://assets16.sigaccess.org
Table of Contents | Top of Page
About HCI International NEWS
The HCI International NEWS is a newsletter that contains information about the HCI International 2015 Conference, book reviews, news from the field of HCI, as well as links to interesting articles and conferences. If you have any questions or comments, or if you would like to make a contribution, please contact the Editor, Dr. Abbas Moallem. The opinions that are expressed in this Newsletter are the sole responsibility of its authors and do not represent any institution or company.
Table of Contents | Top of Page
How to Contribute
We welcome your contribution to the HCI International News. Please send to us interesting news, short articles, interesting websites, etc. We will consider your comments and contributions for upcoming issues. Please send your contribution to the Editor, Dr.Abbas Moallem.
Table of Contents | Top of Page
Previous Issues
All previous issues of HCI International NEWS are available online.
www.hci.international/news
Table of Contents | Top of Page
Your subscription
In order to subscribe to HCI International News please visit:
https://email.hci.international/lists/?p=subscribe
In order to unsubscribe from HCI International News please visit:
https://email.hci.international/lists/?p=unsubscribe
Table of Contents | Top of Page
Links
HCI International 2016 Conference website:
http://2016.hci.international/
HCI International Conference series website:
www.hci.international
Table of Contents | Top of Page