Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

via YouTube

Overview

Explore user-centered design techniques for enhancing human perception in cyber warfare through this 41-minute conference talk from BSides Huntsville Alabama 2015. Delve into topics such as identifying the user, real-world examples, tree maps, visualization, and the importance of actionable value in cybersecurity. Learn about extreme users, small data interfaces, and cognitive barriers. Discover how gamification principles from World of Warcraft can be applied to cybersecurity solutions. Examine user personas, workflows, and DARPA's initial approach to addressing these challenges. Gain insights into innovative strategies for improving human-computer interaction in the context of cyber warfare and security operations.

Syllabus

Introduction
Cyber Security
Who is the User
Real World Examples
Tree Maps
Visualization
Right Time
Wrong Data
Actionable Value
Why does cybersecurity need usercentered design
Extreme users
Small data interfaces
Solution
Cognitive Barriers
Gamification
World of Warcraft
User Persona
User Workflow
DARPA Initial Approach
The Tree

Reviews

Start your review of Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.