Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare
Offered By: YouTube
Course Description
Overview
Explore user-centered design techniques for enhancing human perception in cyber warfare through this 41-minute conference talk from BSides Huntsville Alabama 2015. Delve into topics such as identifying the user, real-world examples, tree maps, visualization, and the importance of actionable value in cybersecurity. Learn about extreme users, small data interfaces, and cognitive barriers. Discover how gamification principles from World of Warcraft can be applied to cybersecurity solutions. Examine user personas, workflows, and DARPA's initial approach to addressing these challenges. Gain insights into innovative strategies for improving human-computer interaction in the context of cyber warfare and security operations.
Syllabus
Introduction
Cyber Security
Who is the User
Real World Examples
Tree Maps
Visualization
Right Time
Wrong Data
Actionable Value
Why does cybersecurity need usercentered design
Extreme users
Small data interfaces
Solution
Cognitive Barriers
Gamification
World of Warcraft
User Persona
User Workflow
DARPA Initial Approach
The Tree
Related Courses
Introduction to Network Security and DefenceCoventry University via FutureLearn Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
The Great Courses Plus Russian Invasion of Ukraine Teach-Out
University of Michigan via Coursera Digital Politics: Digital Activism and Cyber Warfare
Manchester Metropolitan University via FutureLearn Weekly Cyber Security News Roundup - ESP32 S3, QR Code Exploits, and More
SecurityFWD via YouTube