Beyond EUP to EUSE Mary Shaw Carnegie Mellon University.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
1 End User Software Engineering Mary Shaw Carnegie Mellon University.
What is a creative idea? FORMAL DEFINITIONS AND COGNITIVE IMPLICATIONS.
Workshop 2 Day 2 Classroom Observation Certification Assessor Training Program.
28 February UN Meeting on Cartography and Geographic Information Science Matching User’s Needs to Technology - An Architectural Approach Chris Duhring.
Potential of Public Health Systematic Reviews to Impact on Primary Research Professor Laurence Moore September 2007.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Aging Users are Still Users Today’s tech-savvy boomers will remain comfortable with technology as they age, though they may need different interfaces.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Page 1 Building Reliable Component-based Systems Ivica Crnkovic Chapter 9 Component Composition and Integration.
Who Are the “End Users”? Mary Shaw Carnegie Mellon University.
Verification & Validation.  Validation  are we building the right product?  Verification  are we building the product right?
ITEC810 Project By: P. M. Mathindri Nilushika Pathiraja 1.
Evaluation of usability tests. Why evaluate? 1. choose the most suitable data- collection techniques 2. identify methodological strength and weaknesses.
Unified Modeling (Part I) Overview of UML & Modeling
SE 555 Software Requirements & Specification Beyond Requirements Based on Weigers Chapter17.
RETSINA: A Distributed Multi-Agent Infrastructure for Information Gathering and Decision Support The Robotics Institute Carnegie Mellon University PI:
Data Seal of Approval Overview Lightning Talk RDA Plenary 5 – San Diego March 11, 2015 Mary Vardigan University of Michigan Inter-university Consortium.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 2- Software Process Lecture 4. Software Engineering We have specified the problem domain – industrial strength software – Besides delivering the.
BIS310: Week 7 BIS310: Structured Analysis and Design Data Modeling and Database Design.
What Exactly are the Techniques of Software Verification and Validation A Storehouse of Vast Knowledge on Software Testing.
Final Year Project Presentation E-PM: A N O NLINE P ROJECT M ANAGER By: Pankaj Goel.
Software Testing Verification and validation planning Software inspections Software Inspection vs. Testing Automated static analysis Cleanroom software.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Short story: How Internet changed Real estate market… Jarosław Sobolewski – CEO, IAB Poland.
Effective User Services for High Performance Computing A White Paper by the TeraGrid Science Advisory Board May 2009.
Lesson 4: The Internet and Outlook. Learning Objectives After studying this lesson, you will be able to:  Use the Search box with Internet Explorer 
Software Acceptance: Direct Artifact Assurance William L. Scherlis Carnegie Mellon University Professor, School of Computer Science Director, CMU/NASA.
Year Seven Self-Evaluation Workshop OR Getting from Here to There Northwest Commission on Colleges and Universities.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
Best Systems Engineering Products Drive CMMI NDIA 6th Annual Systems Engineering Supportability & Interoperability Conference October 21, 2003 Dr. Tom.
Architecture styles Pipes and filters Object-oriented design Implicit invocation Layering Repositories.
© Synergetics Portfolio Security Aspecten.
IEEE SCC41 PARs Dr. Rashid A. Saeed. 2 SCC41 Standards Project Acceptance Criteria 1. Broad market application  Each SCC41 (P1900 series) standard shall.
GOMs and Action Analysis and more. 1.GOMS 2.Action Analysis.
An Introduction to Software Engineering. Communication Systems.
Copyright © 2007 Pearson Education Canada 1 Chapter 24: Assurance Services: Internal Auditing and Government Auditing.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Ethics Citation Policy Know the Rules and Save the Fines.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
AI on the Battlefield: an Experimental Exploration Alexander Kott BBN Technologies Robert Rasch US Army Battle Command Battle Lab Views expressed in this.
Formal Methods.
Session Objectives Analyze the key components and process of PBL Evaluate the potential benefits and limitations of using PBL Prepare a draft plan for.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Information Management and Market Research. Marketing Research Links…. Consumer, Customer, and Public Marketer through information Marketing Research:
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Computer Science and Engineering 1 Mobile Computing and Security.
Chapter 7 K NOWLEDGE R EPRESENTATION, O NTOLOGICAL E NGINEERING, AND T OPIC M APS L EO O BRST AND H OWARD L IU.
Chapter 13: Managing Groups and Teams Learning Objectives
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
The Two Cultures: Mashing up Web 2.0 and the Semantic Web The 16 th International World Wide Web Conference (2007) - Position Paper - Presented By Anupriya.
Using Workflow With Dataforms Tim Borntreger, Director of Client Services.
Navigation Aided Retrieval Shashank Pandit & Christopher Olston Carnegie Mellon & Yahoo.
Business Communication Today
Crowd-based mining of reusable process model patterns Carlos Rodríguez, Florian Daniel, Fabio Casati BPM 2014, September 9th 2014, Eindhoven, The Netherlands.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
The Semantic Web By: Maulik Parikh.
Service Organization Control (SOC)
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
CS385T Software Engineering Dr.Doaa Sami
Self-Managed Systems: an Architectural Challenge
Presentation transcript:

Beyond EUP to EUSE Mary Shaw Carnegie Mellon University

EUSE has wider scope than EUP  Concern for system properties – usability, dependability, security, privacy These depend on the integrated system, not the individual parts  Sufficiently dependable for the current need In the context of each EU’s expectations Using low-ceremony as well as high-ceremony knowledge  EU composition of resources from diverse sources to solve that EU’s own problem Components, data feeds, …  … and more, but let’s discuss these points …

EUs are not SEs  EUs do not have rich and robust mental models of their computing systems they fail to do backups, misunderstand storage models, execute malware, and innocently engage in other risky behavior  EUSE is not “fixing the users”  EUSE must be about developing ways for EUs themselves to address traditional SE concerns system-level properties sufficient quality for current task (cost-effectiveness) integration of resources from multiple sources

Everyday Dependability

High Ceremony Evidence  Widely accepted among computer scientists  Potentially high levels of assurance  Need precise specifications, substantial effort  The Academic Big Four – the “gold standard” Formal verification Results from trusted automatic generator Systematic testing Empirical studies in operation  And also Inspections Assurance cases, other sound certification (others from comparative analysis)

Low Ceremony Evidence  Widely available information, used informally  Largely ignored by professionals  Not suitable for high assurance, but inexpensive  Examples “best X” reports (linear functions of subjective marks) editorial reviews recommending certain components for certain contexts (cf Consumer Reports) advertising claims by vendors, branding, seller reputation 3rd party reviews of vendors and products by users recommendations by co-workers auction and betting mechanisms, “wisdom of crowds”, subjective certification checklists popularity

Open Resource Coalitions Objective: compose autonomous distributed resources “Coalitions” because the resources will not have a shared objective “Open” in contrast to control assumed for closed-shop development cf “mash-up”s This changes everything!

Example: Yahoo pipes  Promising, but limited not quite unix pipe/filters  Domain: RSS feeds (and similar) sequence of items (title, link, attributes) plus strings, numbers, URLs, … as parameters  Operations: sequence operations fetch, merge, filter, sort, … compute/collect parameters  Composition by drag-and-drop  Warning: “save” button doesn’t show up in IE  Example: