Tag Archive: Workshop

Persuasive Experiences

A culture is defined by its shared stories and the messages that people communicate with each other. Computing has created new ways for stories to be told in entertainment and education. This workshop outlined how we can bring digital storytelling from the realm of multimillion dollar productions down to the practical needs of everyday social, educational and political discourse.

Interactive System Architecture

The last few decades have produced many new interactive technologies and many interactive techniques. Few of them are making their way into actual use because they are so hard to integrate. This workshop created an agenda for new architectures for building interactive systems that integrate basic interaction in powerful new ways and provide new opportunities and foundations on which to build usable systems.

CRA/CCC Workshop on Extreme Scale Design Automation

Design automation tools have been an enabling force in the computing revolution. Beginning in the 1970s, rapid advances have allowed semiconductor chips to evolve from a handful of transistors to modern processors and systems with billions devices.

This is part of a series of workshops - view the series page.

2025 Roundtable

The Visions 2025 initiative is intended to inspire the computing community to envision future trends and opportunities in computing research. Where is the computing field going over the next 10-15 years? What are potential opportunities, disruptive trends, and blind spots? Are there new questions and directions that deserve greater attention by the research community and new investments in computing research?

Privacy by Design – Engineering Privacy

This workshop will survey emerging challenges in engineering privacy from applications of cryptographic protocols and privacy-preserving databases, to formal notations and programming languages in identity management, de-identification, and software specification. This survey will review known challenges, such as understanding privacy policies (e.g., privacy laws in regulated sectors like healthcare and finance; privacy promises in self-regulated sectors like Web services) in computational terms so that tools can be developed to help with their enforcement, which includes conflicts introduced by cross-references from one legal text to another, difficulties reflecting use based models, modeling business process’ compliance with the law; and policy weaknesses exposed by computer scientists that limit the utility of translation for privacy protection (e.g., the atomic view of information types that ignores statistical correlations leading to weak de-identification requirements and ineffective approaches to privacy-preserving big data analytics).

This is part of a series of workshops - view the series page.
privacy_sm

Privacy by Design – Privacy Enabling Design

This workshop covered the latest research results in user interface design, usability and human factors including studies of user behavior and recent findings in privacy displays, nudging, privacy preference modeling, to name a few. While regulators attempt to drive privacy-by-design, there is little evidence that the class of professionals who consider themselves designers are engaged in the conversation. Workshops at CHI, and SOUPS continue to generate interesting research and spark conversation, however our efforts to identify designers in industrial innovators who are fluent in privacy—in any form—has come up relatively empty. Surely privacy, like other human values, is a source of norms and expectations that influences how designers approach their work, however, we do not have a good sense of how they approach it, whether they use distinct methodologies or tools to do so, and what concepts guide their inquiries.

This is part of a series of workshops - view the series page.

The New Making Renaissance: Programmable Matter and Things

The goal of this workshop was to inspire the computing community to envision future trends and opportunities within this critical emerging landscape. Where are the potential opportunities, disruptive trends, and blind spots? Are there new questions and directions that deserve greater attention by the research community and new investments in computing research?