The document discusses human factors engineering approaches to optimize human performance and minimize failures when interacting with distributed energy resources (DERs) such as home solar and electric vehicles. It describes studying how people interact with technologies, processes, environments, and other people. The goal is to narrow "gulfs of evaluation and execution" by understanding cognitive limitations and biases, and designing intuitive interfaces. It also stresses expecting human errors and designing to prevent or mitigate them, for example through redundancy, checklists, and training. The key is changing the conditions people operate in, not changing human nature itself.
User Interface Design: Definitions, Processes and PrinciplesMoodLabs
An introduction to User Interface Design, often called UX / UI. Presented by David Little, User Interface Designer, DDH from King's College London Digital Humanities program.
User Interface Design: Definitions, Processes and PrinciplesMoodLabs
An introduction to User Interface Design, often called UX / UI. Presented by David Little, User Interface Designer, DDH from King's College London Digital Humanities program.
Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...Rosenfeld Media
Christian Rohrer: "Insight Types That Influence Enterprise Decision Makers"
Enterprise UX 2015 • May 13, 2015 • San Antonio, TX, USA
http://enterpriseux.net
Segmented risk identification questions to assist leaders in facilitation of risk identification discussions. This presentation, created by Christopher Gentry, PMP, was for an ITT Technical Institute Project Management class risk overview discussion.
Kevin Sullivan from the University of Virginia presented: "Cyber-Social Learning Systems: Take-Aways from First Community Computing Consortium Workshop on Cyber-Social Learning Systems" as part of the Cognitive Systems Institute Speaker Series.
Requirements Engineering for the HumanitiesShawn Day
This workshop explores how requirements engineering can be employed by digital and non-digital humanities scholars (and others) to conceptualise and communicate a research project.
requirementsEngineeringAs the field of digital humanities has evolved, one of the biggest challenges has been getting the marrying technical expertise with humanities scholarly practice to successfully deliver sustainable and sound digital projects. At its core this is a communications exercise. However, to communicate effectively demands an ability to effectively translate, define and find clarity in your own mind.
Ensuring the end product is inclusive can be a challenge, but so can also be the process that was used to design it. How do we make sure that design is just and that people and communities are not inadvertently harmed, on the basis of aspects such as age, background, gender, and race, in the design process by the choices we make as designers? How do we do this especially for new innovative technologies, which we might not know much about? In this session, the speaker will review the common pitfalls of typical design research and development. Then, the speaker will walk through a framework for better design work that is more inclusive and minimizes potential social harm.
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden InsightsUXPA International
Users do not always accurately describe what they mean or feel. There are many reasons for this, ranging from politeness to poor introspection, to lack of sufficient technical vocabulary. Fortunately, UX researchers have tools in their trade to deduce what was really meant. We call this UX Fracking, a mixed methods approach that is optimized for extracting hidden user insights. We will illustrate the dangers of inadequate, superficial research, and how this may lead to outcomes incapable of addressing the users’ core issues. We will explore ways to avoid these pitfalls by leveraging mixed research methods to test hypotheses about the users’ intent and needs. This starts with a thorough understanding of who the user is, their goals, and how they work today, to an approach that combines surveys, interviews, and comment analysis with behavioral observation, and finally, validating the newly discovered user insights with the users themselves.
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptxISSIP
20240103 HICSS Panel
Ethical and legal implications raised by Generative AI and Augmented Reality in the workplace.
Souren Paul - https://www.linkedin.com/in/souren-paul-a3bbaa5/
Event: https://kmeducationhub.de/hawaii-international-conference-on-system-sciences-hicss/
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life.
Insight Types That Influence Enterprise Decision Makers (Christian Rohrer a...Rosenfeld Media
Christian Rohrer: "Insight Types That Influence Enterprise Decision Makers"
Enterprise UX 2015 • May 13, 2015 • San Antonio, TX, USA
http://enterpriseux.net
Segmented risk identification questions to assist leaders in facilitation of risk identification discussions. This presentation, created by Christopher Gentry, PMP, was for an ITT Technical Institute Project Management class risk overview discussion.
Kevin Sullivan from the University of Virginia presented: "Cyber-Social Learning Systems: Take-Aways from First Community Computing Consortium Workshop on Cyber-Social Learning Systems" as part of the Cognitive Systems Institute Speaker Series.
Requirements Engineering for the HumanitiesShawn Day
This workshop explores how requirements engineering can be employed by digital and non-digital humanities scholars (and others) to conceptualise and communicate a research project.
requirementsEngineeringAs the field of digital humanities has evolved, one of the biggest challenges has been getting the marrying technical expertise with humanities scholarly practice to successfully deliver sustainable and sound digital projects. At its core this is a communications exercise. However, to communicate effectively demands an ability to effectively translate, define and find clarity in your own mind.
Ensuring the end product is inclusive can be a challenge, but so can also be the process that was used to design it. How do we make sure that design is just and that people and communities are not inadvertently harmed, on the basis of aspects such as age, background, gender, and race, in the design process by the choices we make as designers? How do we do this especially for new innovative technologies, which we might not know much about? In this session, the speaker will review the common pitfalls of typical design research and development. Then, the speaker will walk through a framework for better design work that is more inclusive and minimizes potential social harm.
UXPA 2023: UX Fracking: Using Mixed Methods to Extract Hidden InsightsUXPA International
Users do not always accurately describe what they mean or feel. There are many reasons for this, ranging from politeness to poor introspection, to lack of sufficient technical vocabulary. Fortunately, UX researchers have tools in their trade to deduce what was really meant. We call this UX Fracking, a mixed methods approach that is optimized for extracting hidden user insights. We will illustrate the dangers of inadequate, superficial research, and how this may lead to outcomes incapable of addressing the users’ core issues. We will explore ways to avoid these pitfalls by leveraging mixed research methods to test hypotheses about the users’ intent and needs. This starts with a thorough understanding of who the user is, their goals, and how they work today, to an approach that combines surveys, interviews, and comment analysis with behavioral observation, and finally, validating the newly discovered user insights with the users themselves.
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptxISSIP
20240103 HICSS Panel
Ethical and legal implications raised by Generative AI and Augmented Reality in the workplace.
Souren Paul - https://www.linkedin.com/in/souren-paul-a3bbaa5/
Event: https://kmeducationhub.de/hawaii-international-conference-on-system-sciences-hicss/
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life.
Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.
Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.
(2) Social influences can be used to motivate security behaviors.
Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University.
In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.
We present SA-6, a six-item psychometric scale for assessing people’s security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing people’s attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA.
Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University.
Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships.
Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach “wicked problems” of organizational security that are not “tame” or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action.
Slides for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University's Human Computer Interaction Institute in the School of Computer Science.
You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career.
This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about – or in the process of – pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future.
Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute – a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan.
Presentation prepared by Cori Faklaris of the Viégas et al. 2006 paper on the "Themail" email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI's School of Informatics and Computing.
Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis.
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
It's exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I'm leaving my full-time job. I detail five methods I'm focusing on to make my finances work.
Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website.
Plus de University of North Carolina at Charlotte (18)
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
1. Human Factors
at the Grid Edge
Dr. Cori Faklaris, UNC Charlotte
CAPER Fall Meeting, Nov. 6, 2023, Clemson, SC
2. Cori
Faklaris
@Heycori@hci.social
https://corifaklaris.com
● Assistant Professor and Director of the
Security and Privacy Experiences (SPEX)
research group, Dept. of Software and Information
Systems, College of Computing and Informatics
○ Ph.D., Human-Computer Interaction, School of
Computer Science, Carnegie Mellon University
● Past career in news + design, mainly at
Indianapolis Star / IndyStar.com / Gannett
○ Engagement Producer, News Designer, Systems
Analyst, Software Trainer, Copy Editor, Reporter,
“Doer of Things No One Else Wants to Do” (IT, UX)
● Past Social Media Editor and Consultant
2
cfaklari@charlotte.edu Page 2
3. My interests lie in social UX, security + privacy
3
Empowering social
and delightful user
experiences
Understanding
attitudes toward
risk + adoption
of protections Exploring
near-future
technologies
4. My interests lie in social UX, security + privacy
4
Empowering social
and delightful user
experiences
Understanding
attitudes toward
risk + adoption
of protections Exploring
near-future
technologies
Identifying and mitigating phishing in
Distributed Energy Resources (DERs)
(with Dr. Meera Sridhar, Matthew De
La Rosa, et al.)
5. My interests lie in social UX, security + privacy
5
Empowering social
and delightful user
experiences
Understanding
attitudes toward
risk + adoption
of protections Exploring
near-future
technologies
Human Factors at the Grid Edge
(wherever people interact with DERs
e.g. home solar, EVs, aggregators)
Identifying and mitigating phishing in
Distributed Energy Resources (DERs)
(with Dr. Meera Sridhar, Matthew De
La Rosa, et al.)
6. Key takeaways from this talk
6
• We can’t change humans, but we can change the conditions in
which humans operate
• Follow best practices for Human Factors designs to address human
failures and optimize performance
7. One-slide overview of Human Factors engineering
7
• Origin in post-WWII aviation studies, spread throughout industries
• SHELL
• Goals to (1) Optimize human performance and (2) Minimize
failures (can never eliminate; failures are normal and expected)
• Draws from multiple disciplines to study:
• People and Technologies
• People and Processes
• People and Environments
• People and People
8. One-slide overview of Human Factors engineering
8
• Origin in post-WWII aviation studies, spread throughout industries
• SHELL
• Goals to (1) Optimize human performance and (2) Minimize
failures (can never eliminate; normal and expected)
• Draws from multiple disciplines to study:
• People and Technologies
• People and Processes
• People and Environments
• People and People
We can’t change humans*,
but we can change the conditions
in which humans operate
*successful behavior-change techniques meet
humans where they are
9. One-slide overview of Human Factors engineering
9
• Origin in post-WWII aviation studies, spread throughout industries
• SHELL
• Goals to (1) Optimize human performance and (2) Minimize
failures (can never eliminate; normal and expected)
• Draws from multiple disciplines to study:
• People and Technologies
• People and Processes
• People and Environments
• People and People
Boeing Corp. 2023. Statistical Summary of Commercial Jet Airplane Accidents: Worldwide Operations, 1959-2022. Retrieved from
https://www.boeing.com/resources/boeingdotcom/company/about_bca/pdf/statsum.pdf
10. How do we change the conditions for operation?
Socio-Cognitive Factors
• Cognitive Factors
• Information-processing limits
- e.g. recognition vs. recall
• Cogn. bias, tech acceptance
• Interpersonal/Group Factors
• Social norms and influences
• Relationship needs - e.g.
coworkers, roommates, family
Technical/Environmental Factors
• Interface Factors
• Usability, aesthetics, back-end
requirements, etc.
• Task and Context Factors
• Usage goals, job demands,
distractions, etc.
• Workplace, home, public
street, social media, etc.
10
11. Norman’s Gulfs of Evaluation and Execution
11
“Mismatch between our
internal goals on the one side,
and, on the other side, the
expectations and the
availability of information
specifying the state of the
world (or an artifact) and how
we may change it.”
https://www.interaction-design.org/literature/book/the-glossary-of-human-computer-interaction/gulf-of-evaluation-and-gulf-of-execution https://medium.com/@gazdgabr/the-
gulf-of-execution-and-evaluation-890fca716bb7
12. Narrowing the Gulfs of Evaluation and Execution
Socio-Cognitive Factors
• Cognitive Factors
• Information-processing limits
- e.g. recognition vs. recall
• Cogn. bias, tech acceptance
• Interpersonal/Group Factors
• Social norms and influences
• Relationship needs - e.g.
couples, roommates, family
Technical/Environmental Factors
• Interface Factors
• Usability, aesthetics, back-end
requirements, etc.
• Task and Context Factors
• Usage goals, job demands,
distractions, etc.
• Workplace, home, public
street, social media, etc.
12
In HCI/UX, we study humans and
their tasks, using methods from the
social sciences and design, to
empathize with people and define
their needs and preferences.
13. Example method: ‘Why? Why? Why? Why? Why?’
13
The “5 Whys” technique
helps us get to the root
causes of technical
problems.
2012. The 5 Whys. Harvard Business Review. Retrieved October 23, 2023
from https://hbr.org/2012/02/the-5-whys
https://hbr.org/2012/02
/the-5-whys.html
14. Narrowing the Gulfs of Evaluation and Execution
Socio-Cognitive Factors
• Cognitive Factors
• Information-processing limits
- e.g. recognition vs. recall
• Cogn. bias, tech acceptance
• Interpersonal/Group Factors
• Social norms and influences
• Relationship needs - e.g.
couples, roommates, family
Technical/Environmental Factors
• Interface Factors
• Usability, aesthetics, back-end
requirements, etc.
• Task and Context Factors
• Usage goals, job demands,
distractions, etc.
• Workplace, home, public
street, social media, etc.
14
Then, we design new or better
interfaces - and evaluate them
within tasks and contexts for:
● Efficiency (e.g. high-speed time
on task, low waste of effort)
● Effectiveness (e.g. task
completions, low error rate)…
15. Narrowing the Gulfs of Evaluation and Execution
Socio-Cognitive Factors
• Cognitive Factors
• Information-processing limits
- e.g. recognition vs. recall
• Cogn. bias, tech acceptance
• Interpersonal/Group Factors
• Social norms and influences
• Relationship needs - e.g.
couples, roommates, family
Technical/Environmental Factors
• Interface Factors
• Usability, aesthetics, back-end
requirements, etc.
• Task and Context Factors
• Usage goals, job demands,
distractions, etc.
• Workplace, home, public
street, social media, etc.
15
And increasingly care about …
● Satisfaction (e.g. is the user
delighted, do they continue
using it, do they promote it)
● Additional properties -
accessibility, learnability,
inclusiveness, etc.
16. How do we change the conditions for operation?
Socio-Cognitive Factors
• Cognitive Factors
• Information-processing limits
- e.g. recognition vs. recall
• Cogn. bias, tech acceptance
• Interpersonal/Group Factors
• Social norms and influences
• Relationship needs - e.g.
couples, roommates, family
Technical/Environmental Factors
• Interface Factors
• Usability, aesthetics, back-end
requirements, etc.
• Task and Context Factors
• Usage goals, job demands,
distractions, etc.
• Workplace, home, public
street, social media, etc.
16
And increasingly care about …
● Satisfaction (e.g. is the user
delighted, do they continue
using it, do they promote it)
● Additional properties -
accessibility, learnability,
inclusiveness, etc.
Jill Sheridan. 2021. Former Blue Indy sites will support city’s move toward a greener transportation network. Retrieved October 23, 2023 from
https://www.wfyi.org/news/articles/former-blue-indy-sites-will-support-citys-move-toward-a-greener-transportation-network
17. Should also narrow ‘Gulfs of Trust and Safety’*
Socio-Cognitive Factors
• Social Engineering attacks
• Coordination, cooperation,
and/or conflict among
multiple users/groups
• Mis/Disinformation
• IP and fair-use concerns
Technical/Environmental Factors
• Privacy, information security
• Physical and psychological
safety, public health
• Offline + online/VR/hybrid/AR
• Ergonomics
17
*This is my coinage
18. Expect humans to fail and design to prevent/mitigate
18
• Errors (Inadvertent)
• Slips
• Lapses
• Mistakes (rule-based and knowledge-based)
• Non-Compliance (Deliberate)
• Routine
• Situational
• Exceptional
19. Expect humans to fail and design to prevent/mitigate
19
• Errors (Inadvertent)
• Slips
• Lapses
• Mistakes (rule-based and knowledge-based)
• Non-Compliance (Deliberate)
• Routine
• Situational
• Exceptional
Follow best practices for Human Factors
designs to address human failures and
optimize performance
20. Three-prong approach to minimizing human failures
20
1. Remove humans from
the loop (where
possible)
2. Offer better interfaces
(affordances, mappings,
mental models, etc)
3. Train users (where
necessary)
21. 21
Characteristics Type Examples How to Address
Associated with familiar
tasks that require little
conscious attention.
Occur when attention is
diverted, even for a
moment.
Slip
(Commission)
-move a switch up rather than down
(wrong action on right object)
-take reading from wrong instrument
(right action on wrong object)
-transpose digits during data input
-use well-known design patterns
(consistency e.g. up always means off;
intuitive layout of controls and
instrumentation; level of automation etc.)
-checklists and reminders;
-independent cross-check of tasks
-removal of distractions and
interruptions
-sufficient time to complete task
-warnings + alarms to help detect errors
Additional training will not help!!
Resulting action is not
intended: ‘not doing
what you meant to do’.
Common during
maintenance and repair
activities.
Lapse
(Omission)
-forget turn signal at an intersection
-medical implement left in patient
after surgery
-drive car away from charging
station while plug is connected
Action Errors (Not-as-planned occurrences)
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
22. 22
Characteristics Type Examples How to Address
Associated with familiar
tasks that require little
conscious attention.
Occur when attention is
diverted, even for a
moment.
Slip
(Commission)
-move a switch up rather than down
(wrong action on right object)
-take reading from wrong instrument
(right action on wrong object)
-transpose digits during data input
-use well-known design patterns
(consistency e.g. up always means off;
intuitive layout of controls and
instrumentation; level of automation etc.)
-checklists and reminders;
-independent cross-check of tasks
-removal of distractions and
interruptions
-sufficient time to complete task
-warnings + alarms to help detect errors
Additional training will not help!!
Resulting action is not
intended: ‘not doing
what you meant to do’.
Common during
maintenance and repair
activities.
Lapse
(Omission)
-forget turn signal at an intersection
-medical implement left in patient
after surgery
-drive car away from charging
station while plug is connected
Action Errors (Not-as-planned occurrences) bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
23. 23
Characteristics Type Examples How to Address
Associated with familiar
tasks that require little
conscious attention.
Occur when attention is
diverted, even for a
moment.
Slip
(Commission)
-move a switch up rather than down
(wrong action on right object)
-take reading from wrong instrument
(right action on wrong object)
-transpose digits during data input
-use well-known design patterns
(consistency e.g. up always means off;
intuitive layout of controls and
instrumentation; level of automation etc.)
-checklists and reminders;
-independent cross-check of tasks
-removal of distractions and
interruptions
-sufficient time to complete task
-warnings + alarms to help detect errors
Additional training will not help!!
Resulting action is not
intended: ‘not doing
what you meant to do’.
Common during
maintenance and repair
activities.
Lapse
(Omission)
-forget turn signal at an intersection
-medical implement left in patient
after surgery
-drive car away from charging
station while plug is connected
Action Errors (Not-as-planned occurrences) bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
24. 24
Characteristics Type Examples How to Address
Decision-making
failures; errors of
judgment (involve
cognitive processes
linked to planning; info.
gathering;
communication etc.)
Rule-based
Mistake
-mis-application of a good rule
-application of a bad rule
-misjudge situation
-cost out purchase but fail to
account for rising prices
-ignore alarm in emergency, after
nothing happens times before that
-plan for all relevant ‘what ifs’ (abnormal
and emergency scenarios)
-regular drills/exercises for
upsets/emergencies
-clear overview / mental model
(visualizations; system feedback; shift
handover etc.)
-diagnostic tools, decision-making
aids (indicators, tooltips, qr code link to
manuals, etc.)
-competence (knowledge and
understanding of system; training in
decision-making techniques)
-organizational learning (capture and
share experiences of unusual events)
Action is carried out, as
planned, using
conscious thought
processes, but wrong
course of action is
taken: ‘do the incorrect
thing believing it to be
correct’
Knowledge-based
Mistake
-no rules or routines available to
handle unusual situation
-fallback to first principles and
experience to solve problem
-rely on out-of-date map to plan
unfamiliar route
-misdiagnose problem cause and
take inappropriate corrective action
Thinking Errors (Planned occurrences)
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
25. 25
Characteristics Type Examples How to Address
Decision-making
failures; errors of
judgment (involve
cognitive processes
linked to planning; info.
gathering;
communication etc.)
Rule-based
Mistake
-mis-application of a good rule
-application of a bad rule
-misjudge situation
-cost out purchase but fail to
account for rising prices
-ignore alarm in emergency, after
nothing happens times before that
-plan for all relevant ‘what ifs’ (abnormal
and emergency scenarios)
-regular drills/exercises for
upsets/emergencies
-clear overview / mental model
(visualizations; system feedback; shift
handover etc.)
-diagnostic tools, decision-making
aids (indicators, tooltips, qr code link to
manuals, etc.)
-competence (knowledge and
understanding of system; training in
decision-making techniques)
-organizational learning (capture and
share experiences of unusual events)
Action is carried out, as
planned, using
conscious thought
processes, but wrong
course of action is
taken: ‘do the incorrect
thing believing it to be
correct’
Knowledge-based
Mistake
-no rules or routines available to
handle unusual situation
-fallback to first principles and
experience to solve problem
-rely on out-of-date map to plan
unfamiliar route
-misdiagnose problem cause and
take inappropriate corrective action
Thinking Errors (Planned occurrences) bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
26. 26
Characteristics Type Examples How to Address
Decision-making
failures; errors of
judgment (involve
cognitive processes
linked to planning; info.
gathering;
communication etc.)
Rule-based
Mistake
-mis-application of a good rule
-application of a bad rule
-misjudge situation
-cost out purchase but fail to
account for rising prices
-ignore alarm in emergency, after
nothing happens times before that
-plan for all relevant ‘what ifs’ (abnormal
and emergency scenarios)
-regular drills/exercises for
upsets/emergencies
-clear overview / mental model
(visualizations; system feedback; shift
handover etc.)
-diagnostic tools, decision-making
aids (indicators, tooltips, qr code link to
manuals, etc.)
-competence (knowledge and
understanding of system; training in
decision-making techniques)
-organizational learning (capture and
share experiences of unusual events)
Action is carried out, as
planned, using
conscious thought
processes, but wrong
course of action is
taken: ‘do the incorrect
thing believing it to be
correct’
Knowledge-based
Mistake
-no rules or routines available to
handle unusual situation
-fallback to first principles and
experience to solve problem
-rely on out-of-date map to plan
unfamiliar route
-misdiagnose problem cause and
take inappropriate corrective action
Thinking Errors (Planned occurrences) bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
27. Characteristics Type Examples How to Address
Deliberate
deviations from
rules, policies, etc.
AKA ‘violations’
Routine
-becomes the ‘norm’; characterized by a
lack of meaningful enforcement
-high proportion of motorists drive at
80mph on the road
-improve risk perception; promote
understanding and raise awareness of
‘whys’ & consequences (e.g. warnings
embedded within procedures)
-increase likelihood of getting caught
-effective supervision
-eliminate reasons to cut corners
(poor design; inconvenient
requirements; unnecessary rules;
unrealistic workload or procedures;
adverse environment)
-improve attitudes / organizational
culture (workforce engagement;
encourage reporting violations; make
non-compliance ‘socially’
unacceptable e.g. drink-driving)
Knowingly take short
cuts, or fail
to follow policies, to
save time or effort.
Situational
-dictated by situation-specific factors
(deadline; workload; unsuitable tools &
equipment; weather)
-van driver has no option but to speed to
complete day’s deliveries
Usually well-
meaning, but
misguided (often
authority says to ‘get
the job done’).
Exceptional
- person attempts to solve problem in
highly unusual circumstances (e.g.
something went wrong); takes a calculated
risk in breaking rules
- speed excessively to ensure not late for
meeting
27
Non-Compliance
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
28. Characteristics Type Examples How to Address
Deliberate
deviations from
rules, policies, etc.
AKA ‘violations’
Routine
-becomes the ‘norm’; characterized by a
lack of meaningful enforcement
-high proportion of motorists drive at
80mph on the road
-improve risk perception; promote
understanding and raise awareness of
‘whys’ & consequences (e.g. warnings
embedded within procedures)
-increase likelihood of getting caught
-effective supervision
-eliminate reasons to cut corners
(poor design; inconvenient
requirements; unnecessary rules;
unrealistic workload or procedures;
adverse environment)
-improve attitudes / organizational
culture (workforce engagement;
encourage reporting violations; make
non-compliance ‘socially’
unacceptable e.g. drunk-driving)
Knowingly take short
cuts, or fail
to follow policies, to
save time or effort.
Situational
-dictated by situation-specific factors
(deadline; workload; unsuitable tools &
equipment; weather)
-van driver has no option but to speed to
complete day’s deliveries
Usually well-
meaning, but
misguided (often
authority says to ‘get
the job done’).
Exceptional
- person attempts to solve problem in
highly unusual circumstances (e.g.
something went wrong); takes a calculated
risk in breaking rules
- speed excessively to ensure not late for
meeting
28
Non-Compliance bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
29. Characteristics Type Examples How to Address
Deliberate
deviations from
rules, policies, etc.
AKA ‘violations’
Routine
-becomes the ‘norm’; characterized by a
lack of meaningful enforcement
-high proportion of motorists drive at
80mph on the road
-improve risk perception; promote
understanding and raise awareness of
‘whys’ & consequences (e.g. warnings
embedded within procedures)
-increase likelihood of getting caught
-effective supervision
-eliminate reasons to cut corners
(poor design; inconvenient
requirements; unnecessary rules;
unrealistic workload or procedures;
adverse environment)
-improve attitudes / organizational
culture (workforce engagement;
encourage reporting violations; make
non-compliance ‘socially’
unacceptable e.g. drunk-driving)
Knowingly take short
cuts, or fail
to follow policies, to
save time or effort.
Situational
-dictated by situation-specific factors
(deadline; workload; unsuitable tools &
equipment; weather)
-van driver has no option but to speed to
complete day’s deliveries
Usually well-
meaning, but
misguided (often
authority says to ‘get
the job done’).
Exceptional
- person attempts to solve problem in
highly unusual circumstances (e.g.
something went wrong); takes a calculated
risk in breaking rules
- speed excessively to ensure not late for
meeting
29
Non-Compliance bold/highlight is priority for Grid Edge
UK Health and Safety Executive. Human Failure Types - PDF. Human factors and ergonomics. Retrieved October 20, 2023 from
https://www.hse.gov.uk/humanfactors/assets/docs/types.pdf
30. Recap of key takeaways from this talk
30
• We can’t change humans, but we can change the conditions in
which humans operate
• Follow best practices for Human Factors designs to address human
failures and optimize performance
31. What are your questions?
• We can’t change humans, but we can change the
conditions in which humans operate
• Follow best practices for Human Factors designs
to address human failures and optimize
performance
cfaklari
@charlotte.edu