際際滷shows by User: CoriFaklaris / http://www.slideshare.net/images/logo.gif 際際滷shows by User: CoriFaklaris / Sun, 21 Jul 2024 16:26:17 GMT 際際滷Share feed for 際際滷shows by User: CoriFaklaris Connecting Attitudes and Social Influences with Designs for Usable Security and Privacy /slideshow/connecting-attitudes-and-social-influences-with-designs-for-usable-security-and-privacy/270381910 cispajuly232024-240721162617-76c63238
Many system designs for cybersecurity and privacy have failed to account for individual and social circumstances, leading people to use workarounds such as password reuse or account sharing that can lead to vulnerabilities. To address the problem, researchers are building new understandings of how individuals attitudes and behaviors are influenced by the people around them and by their relationship needs, so that designers can take these into account. In this talk, I will first share my research to connect peoples security attitudes and social influences with their security and privacy behaviors. As part of this, I will present the Security and Privacy Acceptance Framework (SPAF), which identifies Awareness, Motivation, and Ability as necessary for strengthening peoples acceptance of security and privacy practices. I then will present results from my project to trace where social influences can help overcome obstacles to adoption such as negative attitudes or inability to troubleshoot a password manager. I will conclude by discussing my current work to apply these insights to mitigating phishing in SMS text messages (smishing).]]>

Many system designs for cybersecurity and privacy have failed to account for individual and social circumstances, leading people to use workarounds such as password reuse or account sharing that can lead to vulnerabilities. To address the problem, researchers are building new understandings of how individuals attitudes and behaviors are influenced by the people around them and by their relationship needs, so that designers can take these into account. In this talk, I will first share my research to connect peoples security attitudes and social influences with their security and privacy behaviors. As part of this, I will present the Security and Privacy Acceptance Framework (SPAF), which identifies Awareness, Motivation, and Ability as necessary for strengthening peoples acceptance of security and privacy practices. I then will present results from my project to trace where social influences can help overcome obstacles to adoption such as negative attitudes or inability to troubleshoot a password manager. I will conclude by discussing my current work to apply these insights to mitigating phishing in SMS text messages (smishing).]]>
Sun, 21 Jul 2024 16:26:17 GMT /slideshow/connecting-attitudes-and-social-influences-with-designs-for-usable-security-and-privacy/270381910 CoriFaklaris@slideshare.net(CoriFaklaris) Connecting Attitudes and Social Influences with Designs for Usable Security and Privacy CoriFaklaris Many system designs for cybersecurity and privacy have failed to account for individual and social circumstances, leading people to use workarounds such as password reuse or account sharing that can lead to vulnerabilities. To address the problem, researchers are building new understandings of how individuals attitudes and behaviors are influenced by the people around them and by their relationship needs, so that designers can take these into account. In this talk, I will first share my research to connect peoples security attitudes and social influences with their security and privacy behaviors. As part of this, I will present the Security and Privacy Acceptance Framework (SPAF), which identifies Awareness, Motivation, and Ability as necessary for strengthening peoples acceptance of security and privacy practices. I then will present results from my project to trace where social influences can help overcome obstacles to adoption such as negative attitudes or inability to troubleshoot a password manager. I will conclude by discussing my current work to apply these insights to mitigating phishing in SMS text messages (smishing). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cispajuly232024-240721162617-76c63238-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Many system designs for cybersecurity and privacy have failed to account for individual and social circumstances, leading people to use workarounds such as password reuse or account sharing that can lead to vulnerabilities. To address the problem, researchers are building new understandings of how individuals attitudes and behaviors are influenced by the people around them and by their relationship needs, so that designers can take these into account. In this talk, I will first share my research to connect peoples security attitudes and social influences with their security and privacy behaviors. As part of this, I will present the Security and Privacy Acceptance Framework (SPAF), which identifies Awareness, Motivation, and Ability as necessary for strengthening peoples acceptance of security and privacy practices. I then will present results from my project to trace where social influences can help overcome obstacles to adoption such as negative attitudes or inability to troubleshoot a password manager. I will conclude by discussing my current work to apply these insights to mitigating phishing in SMS text messages (smishing).
Connecting Attitudes and Social Influences with Designs for Usable Security and Privacy from Cori Faklaris
]]>
73 0 https://cdn.slidesharecdn.com/ss_thumbnails/cispajuly232024-240721162617-76c63238-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte /slideshow/a-guide-to-ai-for-smarter-nonprofits-dr-cori-faklaris-unc-charlotte/269561752 faklaris-ai-unitedwayapril2024boardretreatrevised2-240607154109-864dc5e3
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with infinite interns. (2) Give people permission & guardrails to learn what works with these interns and what doesnt. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation. ]]>

Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with infinite interns. (2) Give people permission & guardrails to learn what works with these interns and what doesnt. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation. ]]>
Fri, 07 Jun 2024 15:41:09 GMT /slideshow/a-guide-to-ai-for-smarter-nonprofits-dr-cori-faklaris-unc-charlotte/269561752 CoriFaklaris@slideshare.net(CoriFaklaris) A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte CoriFaklaris Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with infinite interns. (2) Give people permission & guardrails to learn what works with these interns and what doesnt. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-ai-unitedwayapril2024boardretreatrevised2-240607154109-864dc5e3-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with infinite interns. (2) Give people permission &amp; guardrails to learn what works with these interns and what doesnt. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte from Cori Faklaris
]]>
110 0 https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-ai-unitedwayapril2024boardretreatrevised2-240607154109-864dc5e3-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Human Factors at the Grid Edge /slideshow/human-factors-at-the-grid-edge/263161111 faklariscaper110223copy-humanfactorsatgridedge-231107153301-5da10149
In this talk, Dr. Cori Faklaris gives an overview of important concepts in Human Factors engineering. She describes cognitive and social factors, interface factors, and task and environment factors that impact human performance. Importantly, she stresses that failures should be seen as normal and expected, and designers should endeavor to minimize them or prevent them. The two types of human failures - errors (inadvertent) and non-compliance (deliberate) - can be addressed through better interfaces and, sometimes, training. When human failures occur, the root cause usually can be traced to human decisions. This talk was given as a tutorial to the Center for Advanced Power Engineering Fall 2023 meeting, at Clemson University, SC, USA.]]>

In this talk, Dr. Cori Faklaris gives an overview of important concepts in Human Factors engineering. She describes cognitive and social factors, interface factors, and task and environment factors that impact human performance. Importantly, she stresses that failures should be seen as normal and expected, and designers should endeavor to minimize them or prevent them. The two types of human failures - errors (inadvertent) and non-compliance (deliberate) - can be addressed through better interfaces and, sometimes, training. When human failures occur, the root cause usually can be traced to human decisions. This talk was given as a tutorial to the Center for Advanced Power Engineering Fall 2023 meeting, at Clemson University, SC, USA.]]>
Tue, 07 Nov 2023 15:33:01 GMT /slideshow/human-factors-at-the-grid-edge/263161111 CoriFaklaris@slideshare.net(CoriFaklaris) Human Factors at the Grid Edge CoriFaklaris In this talk, Dr. Cori Faklaris gives an overview of important concepts in Human Factors engineering. She describes cognitive and social factors, interface factors, and task and environment factors that impact human performance. Importantly, she stresses that failures should be seen as normal and expected, and designers should endeavor to minimize them or prevent them. The two types of human failures - errors (inadvertent) and non-compliance (deliberate) - can be addressed through better interfaces and, sometimes, training. When human failures occur, the root cause usually can be traced to human decisions. This talk was given as a tutorial to the Center for Advanced Power Engineering Fall 2023 meeting, at Clemson University, SC, USA. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklariscaper110223copy-humanfactorsatgridedge-231107153301-5da10149-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk, Dr. Cori Faklaris gives an overview of important concepts in Human Factors engineering. She describes cognitive and social factors, interface factors, and task and environment factors that impact human performance. Importantly, she stresses that failures should be seen as normal and expected, and designers should endeavor to minimize them or prevent them. The two types of human failures - errors (inadvertent) and non-compliance (deliberate) - can be addressed through better interfaces and, sometimes, training. When human failures occur, the root cause usually can be traced to human decisions. This talk was given as a tutorial to the Center for Advanced Power Engineering Fall 2023 meeting, at Clemson University, SC, USA.
Human Factors at the Grid Edge from Cori Faklaris
]]>
44 0 https://cdn.slidesharecdn.com/ss_thumbnails/faklariscaper110223copy-humanfactorsatgridedge-231107153301-5da10149-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Introduction to Generative AI /slideshow/an-introduction-to-generative-ai/257887318 anintroductiontogenerativeai-230517185242-95acc358
For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life. ]]>

For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life. ]]>
Wed, 17 May 2023 18:52:42 GMT /slideshow/an-introduction-to-generative-ai/257887318 CoriFaklaris@slideshare.net(CoriFaklaris) An Introduction to Generative AI CoriFaklaris For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontogenerativeai-230517185242-95acc358-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> For this plenary talk at the Charlotte AI Institute for Smarter Learning, Dr. Cori Faklaris introduces her fellow college educators to the exciting world of generative AI tools. She gives a high-level overview of the generative AI landscape and how these tools use machine learning algorithms to generate creative content such as music, art, and text. She then shares some examples of generative AI tools and demonstrate how she has used some of these tools to enhance teaching and learning in the classroom and to boost her productivity in other areas of academic life.
An Introduction to Generative AI from Cori Faklaris
]]>
32241 0 https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontogenerativeai-230517185242-95acc358-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Components of a Model of Cybersecurity Behavior Adoption /slideshow/components-of-a-model-of-cybersecurity-behavior-adoption/249942180 wsiw-componentsofasecuritybehaviorchangemodel-210808170335
Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.]]>

Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.]]>
Sun, 08 Aug 2021 17:03:35 GMT /slideshow/components-of-a-model-of-cybersecurity-behavior-adoption/249942180 CoriFaklaris@slideshare.net(CoriFaklaris) Components of a Model of Cybersecurity Behavior Adoption CoriFaklaris Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wsiw-componentsofasecuritybehaviorchangemodel-210808170335-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Our research focuses on understanding how attitudes and social influences act on end users in the process of cybersecurity behavior adoption (or non-adoption). This talk discusses three expectancy-value models and two stage models that have been applied successfully in social psychology, marketing, and public health. We first introduce our project, then give an overview of these existing models. We then present the progress of our empirical mixed-methods research to craft a model specific to cybersecurity adoption that identifies the relevant (1) attitudes and (2) social influences acting at each step, along with (3) tech characteristics that are associated with sustained adoption. We conclude with remarks on how our work can be of use to cybersecurity teams tasked with boosting awareness and/or adoption.
Components of a Model of Cybersecurity Behavior Adoption from Cori Faklaris
]]>
318 0 https://cdn.slidesharecdn.com/ss_thumbnails/wsiw-componentsofasecuritybehaviorchangemodel-210808170335-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Behavior Change Using Social Influences /slideshow/behavior-change-using-social-influences/238624203 forcylab-faklaris-socialcybersecurity-fall2020-200923192658
Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. (2) Social influences can be used to motivate security behaviors.]]>

Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. (2) Social influences can be used to motivate security behaviors.]]>
Wed, 23 Sep 2020 19:26:58 GMT /slideshow/behavior-change-using-social-influences/238624203 CoriFaklaris@slideshare.net(CoriFaklaris) Behavior Change Using Social Influences CoriFaklaris Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. (2) Social influences can be used to motivate security behaviors. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forcylab-faklaris-socialcybersecurity-fall2020-200923192658-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. (2) Social influences can be used to motivate security behaviors.
Behavior Change Using Social Influences from Cori Faklaris
]]>
67 0 https://cdn.slidesharecdn.com/ss_thumbnails/forcylab-faklaris-socialcybersecurity-fall2020-200923192658-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Designing for Usable Security and Privacy /slideshow/designing-for-usable-security-and-privacy/232318503 faklaris-designingforsecurityprivacy-puisp2020-200420171234
Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University. ]]>

Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University. ]]>
Mon, 20 Apr 2020 17:12:34 GMT /slideshow/designing-for-usable-security-and-privacy/232318503 CoriFaklaris@slideshare.net(CoriFaklaris) Designing for Usable Security and Privacy CoriFaklaris Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-designingforsecurityprivacy-puisp2020-200420171234-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overview of key concepts in usable security and privacy for UX designers, chiefly: Threat modeling; Fair Information Practices; 3-pronged approach to usable security + privacy; Learning science principles; Communication-Human Information Processing model for warnings. Guest lecture in Programming Usable Interfaces, Spring 2020, Carnegie Mellon University.
Designing for Usable Security and Privacy from Cori Faklaris
]]>
194 1 https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-designingforsecurityprivacy-puisp2020-200420171234-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for cybersecurity /slideshow/how-can-we-boost-cyber-health-psychometrics-social-appeals-and-tools-for-cybersecurity/187721865 forosu-faklaris-socialcybersecurity-osu-fall2019-191028112711
In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.]]>

In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.]]>
Mon, 28 Oct 2019 11:27:11 GMT /slideshow/how-can-we-boost-cyber-health-psychometrics-social-appeals-and-tools-for-cybersecurity/187721865 CoriFaklaris@slideshare.net(CoriFaklaris) How can we boost 'cyber health' ? Psychometrics, social appeals and tools for cybersecurity CoriFaklaris In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forosu-faklaris-socialcybersecurity-osu-fall2019-191028112711-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk for Cybersecurity Days at Ohio State University, I first discuss the urgent need for new solutions in the human side of cybersecurity, shown by the doubled increase in social attacks from 2013 to 2018 in the most recent Verizon data breach investigations report. I draw an analogy between health/wellness and cybersecurity, using the example of messaging around flu shots this time of year to point out individual and social factors that experts can leverage for awareness and behavior change. I then discuss our research at Carnegie Mellon to develop the SA-6 psychometric scale to measure security attitude and give examples of how to use it. I finish by outlining our research into cybersecurity in the workplace, in romantic relationships, and in the context of general social influence using consumer tools and apps. See our website at https://socialcybersecurity.org for more information about our research.
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for cybersecurity from Cori Faklaris
]]>
216 1 https://cdn.slidesharecdn.com/ss_thumbnails/forosu-faklaris-socialcybersecurity-osu-fall2019-191028112711-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Self-Report Measure of End-User Security Attitudes (SA-6) /slideshow/a-selfreport-measure-of-enduser-security-attitudes-sa6/162080423 soups2019-sa-6scale1-190807191059
We present SA-6, a six-item psychometric scale for assessing peoples security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing peoples attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA. ]]>

We present SA-6, a six-item psychometric scale for assessing peoples security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing peoples attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA. ]]>
Wed, 07 Aug 2019 19:10:59 GMT /slideshow/a-selfreport-measure-of-enduser-security-attitudes-sa6/162080423 CoriFaklaris@slideshare.net(CoriFaklaris) A Self-Report Measure of End-User Security Attitudes (SA-6) CoriFaklaris We present SA-6, a six-item psychometric scale for assessing peoples security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing peoples attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/soups2019-sa-6scale1-190807191059-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We present SA-6, a six-item psychometric scale for assessing peoples security attitudes that we developed by following best practices. We identify six scale items based on theoretical and empirical research with sufficient response variance, reliability, and validity in a combined sample (N = 478) from Amazon Mechanical Turk and a university-based study pool. We validate the resulting measure with a U.S. Census-tailored Qualtrics panel (N = 209). SA-6 significantly associates with self-report measures of behavior intention and recent secure behaviors. Our work contributes a lightweight method for (1) quantifying and comparing peoples attitudes toward using recommended security tools and practices, and (2) improving predictive modeling of who will adopt security behaviors. Presentation to the Usenix Symposium on Usable Privacy and Security (SOUPS 2019), Aug. 12, 2019, Santa Clara, CA, USA.
A Self-Report Measure of End-User Security Attitudes (SA-6) from Cori Faklaris
]]>
253 6 https://cdn.slidesharecdn.com/ss_thumbnails/soups2019-sa-6scale1-190807191059-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reframing Usable Privacy + Security to Design for 'Cyber Health' /slideshow/reframing-usable-privacy-security-to-design-for-cyber-health/138642630 faklaris-wicys2019lightningtalk-ttm-190329130745
My lightning talk to the 2019 Women in Cybersecurity conference in Pittsburgh, PA, USA, given March 29, 2019.]]>

My lightning talk to the 2019 Women in Cybersecurity conference in Pittsburgh, PA, USA, given March 29, 2019.]]>
Fri, 29 Mar 2019 13:07:45 GMT /slideshow/reframing-usable-privacy-security-to-design-for-cyber-health/138642630 CoriFaklaris@slideshare.net(CoriFaklaris) Reframing Usable Privacy + Security to Design for 'Cyber Health' CoriFaklaris My lightning talk to the 2019 Women in Cybersecurity conference in Pittsburgh, PA, USA, given March 29, 2019. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-wicys2019lightningtalk-ttm-190329130745-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My lightning talk to the 2019 Women in Cybersecurity conference in Pittsburgh, PA, USA, given March 29, 2019.
Reframing Usable Privacy + Security to Design for 'Cyber Health' from Cori Faklaris
]]>
262 1 https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-wicys2019lightningtalk-ttm-190329130745-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences /slideshow/social-cybersecurity-ideas-for-nudging-secure-behaviors-through-social-influences/119966253 socialcybersecurity-trissoct192019pittsburgh-181019043204
Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University.]]>

Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University.]]>
Fri, 19 Oct 2018 04:32:04 GMT /slideshow/social-cybersecurity-ideas-for-nudging-secure-behaviors-through-social-influences/119966253 CoriFaklaris@slideshare.net(CoriFaklaris) Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences CoriFaklaris Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/socialcybersecurity-trissoct192019pittsburgh-181019043204-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation to the Three Rivers Information Security Symposium (TRISS 2018) on Oct. 19, 2018, in Monroeville, Pennsylvania. Based on ideas developed at Carnegie Mellon University.
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences from Cori Faklaris
]]>
236 6 https://cdn.slidesharecdn.com/ss_thumbnails/socialcybersecurity-trissoct192019pittsburgh-181019043204-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relationships (SOUPS 2018) /CoriFaklaris/share-share-alike-an-exploration-of-secure-behaviors-in-romantic-relationships-soups-2018 shareandsharealike-hciicommtalk-soups2018-180819202120
Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships. ]]>

Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships. ]]>
Sun, 19 Aug 2018 20:21:20 GMT /CoriFaklaris/share-share-alike-an-exploration-of-secure-behaviors-in-romantic-relationships-soups-2018 CoriFaklaris@slideshare.net(CoriFaklaris) Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relationships (SOUPS 2018) CoriFaklaris Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users' social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/shareandsharealike-hciicommtalk-soups2018-180819202120-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation at the 2018 USENIX Symposium on Usable Privacy and Security (SOUPS 2018) in Baltimore, Md., USA. (https://www.usenix.org/conference/soups2018/presentation/park) Security design choices often fail to take into account users&#39; social context. Our work is among the first to examine security behavior in romantic relationships. We surveyed 195 people on Amazon Mechanical Turk about their relationship status and account sharing behavior for a cross-section of popular websites and apps (e.g., Netflix, Amazon Prime). We examine differences in account sharing behavior at different stages in a relationship and for people in different age groups and income levels. We also present a taxonomy of sharing motivations and behaviors based on the iterative coding of open-ended responses. Based on this taxonomy, we present design recommendations to support end users in three relationship stages: when they start sharing access with romantic partners; when they are maintaining that sharing; and when they decide to stop. Our findings contribute to the field of usable privacy and security by enhancing our understanding of security and privacy behaviors and needs in intimate social relationships.
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relationships (SOUPS 2018) from Cori Faklaris
]]>
142 3 https://cdn.slidesharecdn.com/ss_thumbnails/shareandsharealike-hciicommtalk-soups2018-180819202120-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reframing Organizational Cybersecurity to Design for Cyber Health /slideshow/reframing-organizational-cybersecurity-to-design-for-cyber-health/107916960 faklarisorgscicybersectalkjuly20181-180729220917
Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach wicked problems of organizational security that are not tame or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action. ]]>

Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach wicked problems of organizational security that are not tame or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action. ]]>
Sun, 29 Jul 2018 22:09:17 GMT /slideshow/reframing-organizational-cybersecurity-to-design-for-cyber-health/107916960 CoriFaklaris@slideshare.net(CoriFaklaris) Reframing Organizational Cybersecurity to Design for Cyber Health CoriFaklaris Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach wicked problems of organizational security that are not tame or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklarisorgscicybersectalkjuly20181-180729220917-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented July 15, 2018 to the 2018 Organizational Science and Cybersecurity Workshop, George Mason University, Fairfax, VA, USA. In this talk, I present the Transtheoretical Model (TTM) of Behavior Change for use in an organizational context as part of a larger reframing of end-user cybersecurity as a problem of organization health and wellness. I explain a visual diagram of six TTM Stages of Change and associated intervention strategies, as adapted from medical and wellness literature, and relate these to examples of security interventions currently in use, such as password strength indicators and Facebook Trusted Contacts. I conclude with my view that this framing can help researchers and practitioners approach wicked problems of organizational security that are not tame or one-and-done engineering problems but socio-cultural conditions that call for sustained, empowered action.
Reframing Organizational Cybersecurity to Design for Cyber Health from Cori Faklaris
]]>
325 3 https://cdn.slidesharecdn.com/ss_thumbnails/faklarisorgscicybersectalkjuly20181-180729220917-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Media Best Practices - CMU Fall 2017 /slideshow/social-media-best-practices-cmu-fall-2017/81150698 socialmediatalkatchimpslabcmu-171024140827
際際滷s for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University's Human Computer Interaction Institute in the School of Computer Science.]]>

際際滷s for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University's Human Computer Interaction Institute in the School of Computer Science.]]>
Tue, 24 Oct 2017 14:08:27 GMT /slideshow/social-media-best-practices-cmu-fall-2017/81150698 CoriFaklaris@slideshare.net(CoriFaklaris) Social Media Best Practices - CMU Fall 2017 CoriFaklaris 際際滷s for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University's Human Computer Interaction Institute in the School of Computer Science. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/socialmediatalkatchimpslabcmu-171024140827-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷s for a presentation on what works in social media for academics, given Oct. 24, 2017 to the CHIMPS Lab at Carnegie Mellon University&#39;s Human Computer Interaction Institute in the School of Computer Science.
Social Media Best Practices - CMU Fall 2017 from Cori Faklaris
]]>
246 7 https://cdn.slidesharecdn.com/ss_thumbnails/socialmediatalkatchimpslabcmu-171024140827-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
If You Are Going To Skydive, You Need a Parachute: Navigating the World of Higher Education as an Adult/Returning Student /slideshow/if-you-are-going-to-skydive-you-need-a-parachute-navigating-the-world-of-higher-education-as-an-adultreturning-student/66574283 finalinwic2016-hookandfaklaris-160929194959
You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career. This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about or in the process of pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future. Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan.]]>

You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career. This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about or in the process of pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future. Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan.]]>
Thu, 29 Sep 2016 19:49:59 GMT /slideshow/if-you-are-going-to-skydive-you-need-a-parachute-navigating-the-world-of-higher-education-as-an-adultreturning-student/66574283 CoriFaklaris@slideshare.net(CoriFaklaris) If You Are Going To Skydive, You Need a Parachute: Navigating the World of Higher Education as an Adult/Returning Student CoriFaklaris You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career. This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about or in the process of pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future. Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/finalinwic2016-hookandfaklaris-160929194959-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> You have reached that point in your life where a change is needed. Perhaps you have been contemplating an upgrade to your skill set, a new degree or certificate, additional credentials or even a completely new career. This special session at InWIC is designed to offer insights, practical tips and encouragement to anyone who is thinking about or in the process of pursing additional education. The co-presenters will offer their personal experiences in navigating the financial, logistical and emotional/psychological issues involved in being an adult/returning student and will provide a number of useful resources for addressing these issues. The session will include time for participants to share their own experiences and to form a network for support in the future. Success is within your grasp, but in order to have smooth sailing, enjoy the view on the way down and not crash to the ground, you need a parachute a plan for how you will address the risks, meet the challenges and maximize the opportunities and experiences that higher education presents. This InWIC session is intended to help you begin to prepare your plan.
If You Are Going To Skydive, You Need a Parachute: Navigating the World of Higher Education as an Adult/Returning Student from Cori Faklaris
]]>
368 4 https://cdn.slidesharecdn.com/ss_thumbnails/finalinwic2016-hookandfaklaris-160929194959-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
"Visualizing Email Content": Article discussion slides /slideshow/visualizing-email-content-article-discussion-slides/55522544 faklarish565111015visualizingemaildiscussion-151125205352-lva1-app6892
Presentation prepared by Cori Faklaris of the Vi辿gas et al. 2006 paper on the "Themail" email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI's School of Informatics and Computing.]]>

Presentation prepared by Cori Faklaris of the Vi辿gas et al. 2006 paper on the "Themail" email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI's School of Informatics and Computing.]]>
Wed, 25 Nov 2015 20:53:52 GMT /slideshow/visualizing-email-content-article-discussion-slides/55522544 CoriFaklaris@slideshare.net(CoriFaklaris) "Visualizing Email Content": Article discussion slides CoriFaklaris Presentation prepared by Cori Faklaris of the Vi辿gas et al. 2006 paper on the "Themail" email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI's School of Informatics and Computing. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/faklarish565111015visualizingemaildiscussion-151125205352-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation prepared by Cori Faklaris of the Vi辿gas et al. 2006 paper on the &quot;Themail&quot; email visualization tool for H565 Collaborative and Social Computing, Fall 2015, in the Department of Human-Centered Computing at IUPUI&#39;s School of Informatics and Computing.
"Visualizing Email Content": Article discussion slides from Cori Faklaris
]]>
388 10 https://cdn.slidesharecdn.com/ss_thumbnails/faklarish565111015visualizingemaildiscussion-151125205352-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Together: An app to foster community for young urbanites /slideshow/together-an-app-to-foster-community-for-young-urbanites-55522368/55522368 finalgroupgpresentationh541102215-151125204728-lva1-app6892
Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis. ]]>

Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis. ]]>
Wed, 25 Nov 2015 20:47:27 GMT /slideshow/together-an-app-to-foster-community-for-young-urbanites-55522368/55522368 CoriFaklaris@slideshare.net(CoriFaklaris) Together: An app to foster community for young urbanites CoriFaklaris Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/finalgroupgpresentationh541102215-151125204728-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation for a UX design and development project authored by myself, Melissa Dryer and Joe Dara for H541 Interaction Design Practice, Fall 2015, in the graduate program in Human-Computer Interaction at Indiana University-Purdue University Indianapolis.
Together: An app to foster community for young urbanites from Cori Faklaris
]]>
287 6 https://cdn.slidesharecdn.com/ss_thumbnails/finalgroupgpresentationh541102215-151125204728-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The State of E-Discovery as Social Media Goes Mobile /slideshow/the-state-of-ediscovery-as-social-media-goes-mobile/52945426 6ednornutsiyl1ii8vsk-signature-8eab69de8c94314dc93b2a31aa197db6b70a40b9db66a4439b53ec91ee757e70-poli-150918184244-lva1-app6891
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.]]>

Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.]]>
Fri, 18 Sep 2015 18:42:44 GMT /slideshow/the-state-of-ediscovery-as-social-media-goes-mobile/52945426 CoriFaklaris@slideshare.net(CoriFaklaris) The State of E-Discovery as Social Media Goes Mobile CoriFaklaris Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6ednornutsiyl1ii8vsk-signature-8eab69de8c94314dc93b2a31aa197db6b70a40b9db66a4439b53ec91ee757e70-poli-150918184244-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
The State of E-Discovery as Social Media Goes Mobile from Cori Faklaris
]]>
669 10 https://cdn.slidesharecdn.com/ss_thumbnails/6ednornutsiyl1ii8vsk-signature-8eab69de8c94314dc93b2a31aa197db6b70a40b9db66a4439b53ec91ee757e70-poli-150918184244-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
5 ideas for paying for college as an adult returning student /slideshow/my-in-wic-talk-030715/45549360 myinwictalk030715-150307065147-conversion-gate01
It's exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I'm leaving my full-time job. I detail five methods I'm focusing on to make my finances work.]]>

It's exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I'm leaving my full-time job. I detail five methods I'm focusing on to make my finances work.]]>
Sat, 07 Mar 2015 06:51:47 GMT /slideshow/my-in-wic-talk-030715/45549360 CoriFaklaris@slideshare.net(CoriFaklaris) 5 ideas for paying for college as an adult returning student CoriFaklaris It's exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I'm leaving my full-time job. I detail five methods I'm focusing on to make my finances work. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/myinwictalk030715-150307065147-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It&#39;s exciting to enter graduate school and return to college life again. But my first concern upon getting my acceptance letter was: Great, now how will I pay for it? As an adult returning student, I have more options than I did as a teenager for paying for college -- even though I&#39;m leaving my full-time job. I detail five methods I&#39;m focusing on to make my finances work.
5 ideas for paying for college as an adult returning student from Cori Faklaris
]]>
994 5 https://cdn.slidesharecdn.com/ss_thumbnails/myinwictalk030715-150307065147-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social media boot camp: "HeyCori"'s tips for successful engagement online /slideshow/social-media-boot-camp-heycoris-tips-for-successful-engagement-online/44761021 socialmediabootcamp-150216194545-conversion-gate01
Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website.]]>

Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website.]]>
Mon, 16 Feb 2015 19:45:44 GMT /slideshow/social-media-boot-camp-heycoris-tips-for-successful-engagement-online/44761021 CoriFaklaris@slideshare.net(CoriFaklaris) Social media boot camp: "HeyCori"'s tips for successful engagement online CoriFaklaris Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/socialmediabootcamp-150216194545-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cori Faklaris, known as @heycori on Twitter and on Facebook, LinkedIn, Pinterest, Instagram and other social media platforms, offers her lessons from years curating a her online brand as a news personality and in managing social media accounts for the IndyStar.com news website.
Social media boot camp: "HeyCori"'s tips for successful engagement online from Cori Faklaris
]]>
608 2 https://cdn.slidesharecdn.com/ss_thumbnails/socialmediabootcamp-150216194545-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-CoriFaklaris-48x48.jpg?cb=1724126092 I innovate solutions for usable security and privacy challenges in media and social computing. Please connect with me on LinkedIn to get updates on my research and career progress. corifaklaris.com https://cdn.slidesharecdn.com/ss_thumbnails/cispajuly232024-240721162617-76c63238-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/connecting-attitudes-and-social-influences-with-designs-for-usable-security-and-privacy/270381910 Connecting Attitudes a... https://cdn.slidesharecdn.com/ss_thumbnails/faklaris-ai-unitedwayapril2024boardretreatrevised2-240607154109-864dc5e3-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/a-guide-to-ai-for-smarter-nonprofits-dr-cori-faklaris-unc-charlotte/269561752 A Guide to AI for Smar... https://cdn.slidesharecdn.com/ss_thumbnails/faklariscaper110223copy-humanfactorsatgridedge-231107153301-5da10149-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/human-factors-at-the-grid-edge/263161111 Human Factors at the G...