Pub Date : 2018-10-01DOI: 10.1109/vlhcc.2018.8506495
We were pleased to welcome delegates to the 2018 IEEE Symposium on Visual Languages and Human Centric Computing, held in Lisbon, Portugal at the Universidade NOVA de Lisboa. The theme of 2018’s conference was Building Human-Adaptive Socio-Technical Systems. These kinds of systems incorporate humans as both developers of and intrinsic parts of the system. We invited three keynote speakers, two from academia and one from industry following this theme. The first, Jason Hong, is a Professor in the Human-Computer Interaction Institute at Carnegie Mellon University. His research focuses on human-computer interaction and privacy and security, a combination that is exposed in new ways in Socio-Technical Systems. His talk focused on understanding and building new tools that address developers’ issues with supporting privacy. The second keynote was given by Geraldine Fitzpatrick who is a Professor of Technology Design and Assessment and leads the Human Computer Interaction Group at TU Wien in Vienna, Austria. Her research explores the intersection of social and computer sciences. Her talk uses the domain of developing supportive technologies for aging people to expose issues around modelling behaviors for systems and the realities of living with those models. The final keynote, from industry, was given by Rodrigo Sousa Coutinho, the co-founder and Strategic Product Manager at OutSystems, a Portugal-based software firm which constructed a platform that transforms visual models into running enterprise-grade applications. His talk focused on the story of bringing their visual language to market, and highlighted how OutSystems collaborated with academia.
{"title":"Foreword VL/HCC 2018","authors":"","doi":"10.1109/vlhcc.2018.8506495","DOIUrl":"https://doi.org/10.1109/vlhcc.2018.8506495","url":null,"abstract":"We were pleased to welcome delegates to the 2018 IEEE Symposium on Visual Languages and Human Centric Computing, held in Lisbon, Portugal at the Universidade NOVA de Lisboa. The theme of 2018’s conference was Building Human-Adaptive Socio-Technical Systems. These kinds of systems incorporate humans as both developers of and intrinsic parts of the system. We invited three keynote speakers, two from academia and one from industry following this theme. The first, Jason Hong, is a Professor in the Human-Computer Interaction Institute at Carnegie Mellon University. His research focuses on human-computer interaction and privacy and security, a combination that is exposed in new ways in Socio-Technical Systems. His talk focused on understanding and building new tools that address developers’ issues with supporting privacy. The second keynote was given by Geraldine Fitzpatrick who is a Professor of Technology Design and Assessment and leads the Human Computer Interaction Group at TU Wien in Vienna, Austria. Her research explores the intersection of social and computer sciences. Her talk uses the domain of developing supportive technologies for aging people to expose issues around modelling behaviors for systems and the realities of living with those models. The final keynote, from industry, was given by Rodrigo Sousa Coutinho, the co-founder and Strategic Product Manager at OutSystems, a Portugal-based software firm which constructed a platform that transforms visual models into running enterprise-grade applications. His talk focused on the story of bringing their visual language to market, and highlighted how OutSystems collaborated with academia.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506516
Rebecca Krosnick, Sang Won Lee, Walter S. Lasecki, Steve Oney
Web developers use responsive web design to create user interfaces that can adapt to many form factors. To define responsive pages, developers must use Cascading Style Sheets (CSs) or libraries and tools built on top of it. CSS provides high customizability, but requires significant experience. As a result, non-programmers and novice programmers generally lack a means of easily building custom responsive web pages. In this paper, we present a new approach that allows users to create custom responsive user interfaces without writing program code. We demonstrate the feasibility and effectiveness of the approach through a new system we built, named Expresso. With Expresso, users define “keyframes” - examples of how their VI should look for particular viewport sizes - by simply directly manipulating elements in a WYSIWYG editor. Expresso uses these keyframes to infer rules about the responsive behavior of elements, and automatically renders the appropriate css for a given viewport size. To allow users to create the desired appearance of their page at all viewport sizes, Expresso lets users define either a “smooth” or “jump” transition between adjacent keyframes. We conduct a user study and show that participants are able to effectively use Expresso to build realistic responsive interfaces.
{"title":"Expresso: Building Responsive Interfaces with Keyframes","authors":"Rebecca Krosnick, Sang Won Lee, Walter S. Lasecki, Steve Oney","doi":"10.1109/VLHCC.2018.8506516","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506516","url":null,"abstract":"Web developers use responsive web design to create user interfaces that can adapt to many form factors. To define responsive pages, developers must use Cascading Style Sheets (CSs) or libraries and tools built on top of it. CSS provides high customizability, but requires significant experience. As a result, non-programmers and novice programmers generally lack a means of easily building custom responsive web pages. In this paper, we present a new approach that allows users to create custom responsive user interfaces without writing program code. We demonstrate the feasibility and effectiveness of the approach through a new system we built, named Expresso. With Expresso, users define “keyframes” - examples of how their VI should look for particular viewport sizes - by simply directly manipulating elements in a WYSIWYG editor. Expresso uses these keyframes to infer rules about the responsive behavior of elements, and automatically renders the appropriate css for a given viewport size. To allow users to create the desired appearance of their page at all viewport sizes, Expresso lets users define either a “smooth” or “jump” transition between adjacent keyframes. We conduct a user study and show that participants are able to effectively use Expresso to build realistic responsive interfaces.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506578
Karl Smeltzer, Martin Erwig
Comparative visualizations and the comparison tasks they support constitute a crucial part of visual data analysis on complex data sets. Existing approaches are ad hoc and often require significant effort to produce comparative visualizations, which is impractical especially in cases where visualizations have to be amended in response to changes in the underlying data. We show that the combination of parameterized visualizations and variations yields an effective model for comparative visualizations. Our approach supports data exploration and automatic visualization updates when the underlying data changes. We provide a prototype implementation and demonstrate that our approach covers most of existing comparative visualizations.
{"title":"Comparative Visualizations through Parameterization and Variability","authors":"Karl Smeltzer, Martin Erwig","doi":"10.1109/VLHCC.2018.8506578","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506578","url":null,"abstract":"Comparative visualizations and the comparison tasks they support constitute a crucial part of visual data analysis on complex data sets. Existing approaches are ad hoc and often require significant effort to produce comparative visualizations, which is impractical especially in cases where visualizations have to be amended in response to changes in the underlying data. We show that the combination of parameterized visualizations and variations yields an effective model for comparative visualizations. Our approach supports data exploration and automatic visualization updates when the underlying data changes. We provide a prototype implementation and demonstrate that our approach covers most of existing comparative visualizations.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506567
Austin Z. Henley, S. Fleming
In this paper, we present CodeDeviant, a novel tool for visual dataflow programming environments that assists programmers by helping them ensure that their code-restructuring changes did not accidentally alter the behavior of the application. CodeDeviant aims to integrate seamlessly into a programmer's workflow, requiring little or no additional effort or planning. Key features of CodeDeviant include transparently recording program execution data, enabling programmers to efficiently compare program outputs, and allowing only apt comparisons between executions. We report a formative qualitative-shadowing study of LabViewprogrammers, which motivated CodeDeviant's design, revealing that the programmers had considerable difficulty determining whether code changes they made resulted in unintended program behavior. To evaluate Code-Deviant, we implemented a prototype CodeDeviant extension for LabViewand used it to conduct a laboratory user study. Key results included that programmers using CodeDeviant discovered behavior-altering changes more accurately and in less time than programmers using standard LabView.
{"title":"CodeDeviant: Helping Programmers Detect Edits That Accidentally Alter Program Behavior","authors":"Austin Z. Henley, S. Fleming","doi":"10.1109/VLHCC.2018.8506567","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506567","url":null,"abstract":"In this paper, we present CodeDeviant, a novel tool for visual dataflow programming environments that assists programmers by helping them ensure that their code-restructuring changes did not accidentally alter the behavior of the application. CodeDeviant aims to integrate seamlessly into a programmer's workflow, requiring little or no additional effort or planning. Key features of CodeDeviant include transparently recording program execution data, enabling programmers to efficiently compare program outputs, and allowing only apt comparisons between executions. We report a formative qualitative-shadowing study of LabViewprogrammers, which motivated CodeDeviant's design, revealing that the programmers had considerable difficulty determining whether code changes they made resulted in unintended program behavior. To evaluate Code-Deviant, we implemented a prototype CodeDeviant extension for LabViewand used it to conduct a laboratory user study. Key results included that programmers using CodeDeviant discovered behavior-altering changes more accurately and in less time than programmers using standard LabView.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124858053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506564
P. Dewan, Blake L. Joyce, Nirav C. Merchant
Programming in the large allows composition of processes executing code written using programming in the small. Traditionally, systems supporting programming in the large have included interpreters of OS command languages, but today, with the emergence of collaborative “big data” science, these systems also include cyberinfrastructures, which allow computations to be carried out on remote machines in the “cloud”. The rationale for these systems, even the traditional command interpreters, is human-centric computing, as they are designed to support quick, interactive development and execution of process workflows. Some cyberinfrastructures extend this human-centricity by also providing manipulation of visualizations of these workflows. To further increase the human-centricity of these systems, we have started a new project on cyber training - instruction in the use of command languages and visual components of cyberinfrastructures. Our objective is to provide scalable remote awareness of trainees' progress and difficulties, as well as collaborative and automatic resolution of their difficulties. Our current plan is to provide awareness based on a subway workflow metaphor, allow a trainer to collaborate with multiple trainees using a single instance of a command interpreter, and combine research in process and interaction workflows to support automatic help. These research directions can be considered an application of the general principle of integrating programming in the small and large
{"title":"Human-Centric Programming in the Large - Command Languages to Scalable Cyber Training","authors":"P. Dewan, Blake L. Joyce, Nirav C. Merchant","doi":"10.1109/VLHCC.2018.8506564","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506564","url":null,"abstract":"Programming in the large allows composition of processes executing code written using programming in the small. Traditionally, systems supporting programming in the large have included interpreters of OS command languages, but today, with the emergence of collaborative “big data” science, these systems also include cyberinfrastructures, which allow computations to be carried out on remote machines in the “cloud”. The rationale for these systems, even the traditional command interpreters, is human-centric computing, as they are designed to support quick, interactive development and execution of process workflows. Some cyberinfrastructures extend this human-centricity by also providing manipulation of visualizations of these workflows. To further increase the human-centricity of these systems, we have started a new project on cyber training - instruction in the use of command languages and visual components of cyberinfrastructures. Our objective is to provide scalable remote awareness of trainees' progress and difficulties, as well as collaborative and automatic resolution of their difficulties. Our current plan is to provide awareness based on a subway workflow metaphor, allow a trainer to collaborate with multiple trainees using a single instance of a command interpreter, and combine research in process and interaction workflows to support automatic help. These research directions can be considered an application of the general principle of integrating programming in the small and large","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506515
Cristiano De Faveri, A. Moreira
Deception-based defense relies on deliberated actions to manipulate the attackers' perception of a system. It requires careful planning and application of multiple techniques to be effective. Therefore, deceptive strategies should be studied in isolation from the traditional security mechanisms. To support this goal, we develop DML, a visual language for deception modeling, offering three complementary views of deception: requirements model, deception tactics feature model, and deception strategy organizational. DML integrates goal-oriented requirements models and threat models to compose a comprehensive model considering the influences of developing deceptive mechanisms and the associated risks. The feasibility of DML is demonstrated via a tool prototype and a set of illustrative scenarios for a web system.
{"title":"Visual Modeling of Cyber Deception","authors":"Cristiano De Faveri, A. Moreira","doi":"10.1109/VLHCC.2018.8506515","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506515","url":null,"abstract":"Deception-based defense relies on deliberated actions to manipulate the attackers' perception of a system. It requires careful planning and application of multiple techniques to be effective. Therefore, deceptive strategies should be studied in isolation from the traditional security mechanisms. To support this goal, we develop DML, a visual language for deception modeling, offering three complementary views of deception: requirements model, deception tactics feature model, and deception strategy organizational. DML integrates goal-oriented requirements models and threat models to compose a comprehensive model considering the influences of developing deceptive mechanisms and the associated risks. The feasibility of DML is demonstrated via a tool prototype and a set of illustrative scenarios for a web system.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506501
G. Costagliola, V. Fuccella, Amedeo Leo, Luigi Lomasto, Simone Romano
We present the design and the evaluation of a soft keyboard aimed at facilitating the input of programming code on mobile devices equipped with touch screens, such as tablets and smartphones. Besides the traditional tap on a key interaction, the keyboard allows the user to draw gestures on top of it. The gestures correspond to shortcuts to enter programming statements/constructs or to activate specific keyboard sub-layouts. The keyboard was compared in a user study to a traditional soft keyboard with a QWERTY layout and to another state-of-art keyboard designed for programming. The results show a significant advantage for our design in terms of speed and gesture per characters.
{"title":"The design and evaluation of a gestural keyboard for entering programming code on mobile devices","authors":"G. Costagliola, V. Fuccella, Amedeo Leo, Luigi Lomasto, Simone Romano","doi":"10.1109/VLHCC.2018.8506501","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506501","url":null,"abstract":"We present the design and the evaluation of a soft keyboard aimed at facilitating the input of programming code on mobile devices equipped with touch screens, such as tablets and smartphones. Besides the traditional tap on a key interaction, the keyboard allows the user to draw gestures on top of it. The gestures correspond to shortcuts to enter programming statements/constructs or to activate specific keyboard sub-layouts. The keyboard was compared in a user study to a traditional soft keyboard with a QWERTY layout and to another state-of-art keyboard designed for programming. The results show a significant advantage for our design in terms of speed and gesture per characters.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506580
Benjamin T. Jones, S. Tanimoto
Artificial intelligence and machine learning work very well for solving problems in domains where the optimal solution can be characterized precisely or in terms of adequate training data. However, when humans perform problem solving, they do not necessarily know how to characterize an optimal solution. We propose a framework for human-AI collaboration that gives humans ultimate control of the results of a problem solving task while playing to the strengths of the AI by persisting an agent's search trees and allowing humans to explore and search this search tree. This allows the use of AI in exploratory problem solving contexts. We demonstrate this framework applied to algebraic problem solving, and show that it enables a unique mode of interaction with symbolic computer algebra through the automatic completion and correction of traditional derivations, both in digital ink and textual keyboard input.
{"title":"Searching Over Search Trees for Human-AI Collaboration in Exploratory Problem Solving: A Case Study in Algebra","authors":"Benjamin T. Jones, S. Tanimoto","doi":"10.1109/VLHCC.2018.8506580","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506580","url":null,"abstract":"Artificial intelligence and machine learning work very well for solving problems in domains where the optimal solution can be characterized precisely or in terms of adequate training data. However, when humans perform problem solving, they do not necessarily know how to characterize an optimal solution. We propose a framework for human-AI collaboration that gives humans ultimate control of the results of a problem solving task while playing to the strengths of the AI by persisting an agent's search trees and allowing humans to explore and search this search tree. This allows the use of AI in exploratory problem solving contexts. We demonstrate this framework applied to algebraic problem solving, and show that it enables a unique mode of interaction with symbolic computer algebra through the automatic completion and correction of traditional derivations, both in digital ink and textual keyboard input.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506510
Nischal Shrestha
Today, there are hundreds of programming languages that are widely used. Programmers at all levels are expected to become proficient in multiple languages. Experienced programmers who have knowledge of at least one language are able to learn a second language much quicker than novices. However, the transfer process can still be difficult when there exists numerous differences from their previous language. Documentation, online courses and tutorials tend to present information geared towards novices. This type of presentation might suffice for beginners, but it doesn't support learning for experienced programmers [1] who would benefit from leveraging their knowledge of previous programming languages.
{"title":"Towards Supporting Knowledge Transfer of Programming Languages","authors":"Nischal Shrestha","doi":"10.1109/VLHCC.2018.8506510","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506510","url":null,"abstract":"Today, there are hundreds of programming languages that are widely used. Programmers at all levels are expected to become proficient in multiple languages. Experienced programmers who have knowledge of at least one language are able to learn a second language much quicker than novices. However, the transfer process can still be difficult when there exists numerous differences from their previous language. Documentation, online courses and tutorials tend to present information geared towards novices. This type of presentation might suffice for beginners, but it doesn't support learning for experienced programmers [1] who would benefit from leveraging their knowledge of previous programming languages.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121320825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/VLHCC.2018.8506496
Jason I. Hong
The widespread adoption of smartphones and social media make it possible to collect sensitive data about people at a scale and fidelity never before possible. While this data can be used to offer richer user experiences, this same data also poses new kinds of privacy challenges for organizations and developers. However, developers often have little or no knowledge about how to design and implement for privacy. In this talk, I discuss our team's research on helping developers with privacy. I will present some results of interviews and surveys with developers, as well as different tools we have developed. A key theme guiding our work is looking for ways of making developers' lives easier, while making privacy a positive side effect.
{"title":"Helping developers with privacy (Invited Keynote)","authors":"Jason I. Hong","doi":"10.1109/VLHCC.2018.8506496","DOIUrl":"https://doi.org/10.1109/VLHCC.2018.8506496","url":null,"abstract":"The widespread adoption of smartphones and social media make it possible to collect sensitive data about people at a scale and fidelity never before possible. While this data can be used to offer richer user experiences, this same data also poses new kinds of privacy challenges for organizations and developers. However, developers often have little or no knowledge about how to design and implement for privacy. In this talk, I discuss our team's research on helping developers with privacy. I will present some results of interviews and surveys with developers, as well as different tools we have developed. A key theme guiding our work is looking for ways of making developers' lives easier, while making privacy a positive side effect.","PeriodicalId":444336,"journal":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}