Friday November 12
8:00 - 9:00a Registration and breakfast
9:00 - 10:30a Welcome
Keynote Speaker: Ted Selker
"Counter Intelligence: Technology and Food"
  • Dr. Ted Selker Is Associate Director of Mobility Research at CMU Silicon Valley. He develops and tests new user experiences. His physical, cognitive and graphical interface research has yielded many breakthrough products such as IBM?s Trackpoint, Merlin OS Adaptive help and a combination computer notebook/projector. He spent 10 years as an associate professor at the MIT media lab, as an adjunct professor at Stanford, was awarded fellow position at IBM and worked at XEROX PARC, and Atari Research.

  • Food is central to culture. The Counter Intelligence research forum has been focused on providing technologies that improve functionality and engage people cognitively and socially through food. We have built prototypes in scenarios to explore how technology might change procurement, storage, preparation and the experiences around food. This talk will give examples of context aware, augmented reality grocery store, kitchen?s and even vending machines. The web and these technologies can be used to make people more interested and knowledgeable about food and food preparation.

    Our work shows that when technology considers the social elements, its considerate responses make more difference than most any other aspect of the design. Our work is now to make a more considerate systems centric technology for every interaction.
10:30 - 11:00a Break
11:00 - 12:30p Research Paper Presentations: Session 1
--People Frames: The Social Construction of Information Systems
  • DB le Roux (Stellenbosch University), GP le Roux (Fourier Consulting)
  • The management of IT involves the thoughtful consideration of the management of stakeholders’ knowledge as information system success depends upon synergy between human and technical systems. In this paper particular attention is paid to the notion of frames, or frames of reference, held by the stakeholders of information systems and their effects on system adoption and use. A qualitative study is performed in the context of an engineering firm’s adoption of a commercial ERP package. Findings suggest that besides frames of technology, the beliefs and perceptions that stakeholders have of each other influence their utilization of technological artifacts and influence the operation of information systems.
--Principles for Applying Social Navigation to Collaborative Systems
  • Min Wu (Oracle Inc.), C. Travis Bowles (UXellence)
  • This paper proposes that social navigation can solve many of the challenges facing user experience in collaborative systems. Three key values of, and three phases of design for social navigation support are identified. The values of social navigation support in collaboration are: discovery of new features; predicting the consequence of certain actions and decisions based on what other people have done previously; and conveying cultural context to meet the expectations of other members of the collaborative space. The phases are: collection of what other people have done; evaluation of consequences about the actions and decisions users can make; and presentation of the appropriate information to help the user with the best decision. The paper outlines how each value can be maximized through design at each phase. Examples are provided to illustrate that social navigation is ready to be integrated into collaboration tools to improve the overall usability.
--Filter-based Access Control Model: Exploring a More Usable Database Management
  • Nachi Ueno (NTT), Ryota Hashimoto (NTT), Hisaharu Ishii (NTT), Hiroyuki Makino (NTT), Yuzuru Kitayama (NTT)
  • In this study, we tested the usability of database management software for end-users. To improve the usability, novel concept FBAC and FBAC UI have been developed. We conducted a user test and analyzed the results. In the test, 40 users tried to solve two tasks: 20 used RBAC UI, and the rest FBAC UI. In the results, almost no RBAC UI users could complete the tasks, but users who used FBAC completed 40%.
12:30p - 2:30p Lunch
2:30 - 3:30p Related Prior Work: Session 2
--Lowering the Barriers to Website Testing with CoTester
  • J. Mahmud, T. Lau
  • Previously published: In Proceeding of the 14th international Conference on intelligent User interfaces (Hong Kong, China, February 07 - 10, 2010). IUI '10. ACM, New York, NY, 169-178. DOI=
  • In this paper, we present CoTester, a system designed to decrease the difficulty of testing web applications. CoTester allows testers to create test scripts that are represented in an easy-to-understand scripting language rather than a complex programming language, which allows tests to be created rapidly and by non-developers. CoTester improves the management of test scripts by grouping sequences of lowlevel actions into subroutines, such as "log in" or "check out shopping cart", which help testers visualize test structure and make bulk modifications. A key innovation in CoTester is its ability to automatically identify these subroutines using a machine learning algorithm. Our algorithm is able to achieve 91% accuracy at recognizing a set of 7 representative subroutines commonly found in test scripts.
--Optimizing a Policy Authoring Framework for Security and Privacy Policies
  • M. Johnson, J. Karat, C. Karat, K. Grueneberg
  • Previously published: In Proceedings of the Sixth Symposium on Usable Privacy and Security (Redmond, Washington, July 14 - 16, 2010). SOUPS '10, vol. 485. ACM, New York, NY, 1-9. DOI=
  • Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and manage such policies is seen as a critical need in IT. This paper describes policy authoring as a key component to usable privacy and security systems, and advances the notions of policy templates in a policy management environment in which different roles with different skill sets are seen as important. We discuss existing guidelines and provide support for the addition of new guidelines for usable policy authoring for security and privacy systems. We describe the relationship between general policy templates and specific policies, and the skills necessary to author each of these in a way that produces high-quality policies. We also report on an experiment in which technical users with limited policy experience authored policy templates using a prototype template authoring user interface we developed.
--Informal Interactions in Nonprofit Networks
  • J. Stoll, W. Edwards, E. Mynatt
  • Previously published: In Proceedings of the 28th international Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA, April 10 - 15, 2010). CHI '10. ACM, New York, NY, 533-536. DOI=
  • Nonprofit organizations often need to excel in coordinating with other organizations and must do so in a variety of contexts and levels from the informal to the formal. Their ability to accomplish their mission can critically depend on their efficacy in managing dependencies on others for tasks, accessing needed resources, raising their profile in the community, and achieving their goals. Although much research has been done to understand systems for supporting formal coordination between organizations, there is a gap in understanding how informal coordination can be supported by systems. As a first step towards addressing this gap, we conducted a field study of a network of nonprofit organizations, focusing specifically on informal interactions among them. Based on this study, we characterize informal coordination between organizations and the context for such interactions. Our findings point to a need to further explore a class of interorganizational interactions that may not be adequately explored or understood by our research community.
3:30 - 4:00p Break
4:00 - 5:30p LISA Closing Speaker: David Blank-Edelman
Look! Up in the Sky! It's a Bird! It's a Plane! It's a Sysadmin!
David N. Blank-Edelman, Northeastern University CCIS
Yes, it's a sysadmin—a somewhat strange visitor who might as well be from another planet, with powers and abilities far beyond those of mortal users. That's you, right? So these powers and abilities—How did you get them? How did you figure out which ones you had? How have you honed them? How have you learned to cope with them and the responsibilities they brought? I don't really believe sysadmins are superheroes just like those in comic books. But I do think that we are different from others in a similar way, complete with, yes, powers and abilities that often exceed those around us. Some of these powers we already have whether we know it or not and some we'll have to strive to develop. But all come with their own set of practical and ethical obligations. For almost eighty years, American comic books have been mulling over just the sorts of questions you and I face each day we live as sysadmins, so why not look at what they have to say on this subject? In this talk we'll explore just what superpowers you really do have or could attain with just a bit of work. We'll also address some of the moral and ethical implications of being "super" you'll need to face as you progress in your sysadmin career. Sure, our time together will be entertaining, but it won't be all "Biff! Pow! Sudo!" If I'm right, you could take away a new sense of yourself as a sysadmin.
6:00p Dinner