YoVDO

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Offered By: YouTube

Tags

User-Centered Design Courses Cybersecurity Courses Gamification Courses User Personas Courses Cyber Warfare Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore user-centered design techniques for enhancing human perception in cyber warfare through this 41-minute conference talk from BSides Huntsville Alabama 2015. Delve into topics such as identifying the user, real-world examples, tree maps, visualization, and the importance of actionable value in cybersecurity. Learn about extreme users, small data interfaces, and cognitive barriers. Discover how gamification principles from World of Warcraft can be applied to cybersecurity solutions. Examine user personas, workflows, and DARPA's initial approach to addressing these challenges. Gain insights into innovative strategies for improving human-computer interaction in the context of cyber warfare and security operations.

Syllabus

Introduction
Cyber Security
Who is the User
Real World Examples
Tree Maps
Visualization
Right Time
Wrong Data
Actionable Value
Why does cybersecurity need usercentered design
Extreme users
Small data interfaces
Solution
Cognitive Barriers
Gamification
World of Warcraft
User Persona
User Workflow
DARPA Initial Approach
The Tree


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network