Главная
Study mode:
on
1
Introduction
2
Cyber Security
3
Who is the User
4
Real World Examples
5
Tree Maps
6
Visualization
7
Right Time
8
Wrong Data
9
Actionable Value
10
Why does cybersecurity need usercentered design
11
Extreme users
12
Small data interfaces
13
Solution
14
Cognitive Barriers
15
Gamification
16
World of Warcraft
17
User Persona
18
User Workflow
19
DARPA Initial Approach
20
The Tree
Description:
Explore user-centered design techniques for enhancing human perception in cyber warfare through this 41-minute conference talk from BSides Huntsville Alabama 2015. Delve into topics such as identifying the user, real-world examples, tree maps, visualization, and the importance of actionable value in cybersecurity. Learn about extreme users, small data interfaces, and cognitive barriers. Discover how gamification principles from World of Warcraft can be applied to cybersecurity solutions. Examine user personas, workflows, and DARPA's initial approach to addressing these challenges. Gain insights into innovative strategies for improving human-computer interaction in the context of cyber warfare and security operations.

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Add to list