skip to main content


Title: A Data Analytics Approach to Persona Development for The Future Mobile Office
The concept of using automated vehicles as mobile workspaces is now emerging. Consequently, the in- vehicle environment of automated vehicles must be redesigned to support user interactions in performing work-related tasks. During the design phase, interaction designers often use personas to understand target user groups. Personas are representations of prototypical users and are constructed from user surveys and interview data. Although data-driven, large samples of user data are typically assessed qualitatively and may result in personas that are not representative of target user groups. To create representative personas, this paper demonstrates a data analytics approach to persona development for future mobile workspaces using data from the occupational information network (O*NET). O*NET consists of data on 968 occupations, each defined by 277 features. The data were reduced using dimensionality reduction and 7 personas were identified using cluster analysis. Finally, the important features of each persona were identified using logistic regression.  more » « less
Award ID(s):
1839484
NSF-PAR ID:
10317865
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting
Volume:
64
Issue:
1
ISSN:
2169-5067
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    A recent S-STEM award has allowed the engineering program in a rural, liberal arts institution to offer a need-based scholarship program for its students. The engineering program has a number of veteran, underrepresented minority, transfer, and nontraditional students. Many students are also first-generation college students. The institution and engineering program matriculate a number of under-served populations, students who may have needs that are not well understood in the typical engineering education literature. The scholarship program and its associated mentoring and activities will assist workforce development and will also incorporate a number of research avenues to better understand and serve the student population in this unique setting. To apply for the program, students must fill out an application with four 250 – 500 word essay responses relating to their academic progress, perceived barriers to degree completion, and how this award would help them to complete their degree. This study continues work using personas, a method used in human-centered design. Using the first round of scholarship application essays as a source, three personas were developed, one successful applicant, one unsuccessful applicant, and one general applicant. Personas are detailed profiles of a fake person who could reasonably be in each category of interest. In human-centered design, personas are detailed descriptions of likely clients or end-users, developed to help the engineers focus on who they might be designing for. The profiles developed in this study were used to gain insight into which students were likely to choose to apply and which students may be missing out on this opportunity. It is time for another round of applications for this grant and the use of personas will continue and expand as part of this study. Before reviewing applications, the committee will create two personas as ideal candidates instead of developing a standardized rubric. Subsequently, three personas will be developed from the Fall 2020 applications, one for all applicants, one for successful applicants, and one for unsuccessful applicants. These personas will then be compared to the personas created by the application review committee and the personas created from the Fall 2018 applicants. Similarities and differences across the persona groups will be explored to determine whether the applicants are what the reviewers expected and whether the pool of applicants has evolved or remained mostly the same throughout the scholarship program. Review committee members will also be interviewed in a focus group setting to discuss their experiences using common personas rather than standardized rubrics in the application review process. At this time, the applications are not yet due and the analysis has not yet begun. Initial interest for the grant has been strong and we anticipate at least thirty applications for the nineteen available grants. Results presented will include the student profiles and faculty experiences with the use of personas as a metric for reviewing student applications. 
    more » « less
  2. Purugganan, Michael (Ed.)
    Abstract Structural variants (SVs) are a largely unstudied feature of plant genome evolution, despite the fact that SVs contribute substantially to phenotypes. In this study, we discovered SVs across a population sample of 347 high-coverage, resequenced genomes of Asian rice (Oryza sativa) and its wild ancestor (O. rufipogon). In addition to this short-read data set, we also inferred SVs from whole-genome assemblies and long-read data. Comparisons among data sets revealed different features of genome variability. For example, genome alignment identified a large (∼4.3 Mb) inversion in indica rice varieties relative to japonica varieties, and long-read analyses suggest that ∼9% of genes from the outgroup (O. longistaminata) are hemizygous. We focused, however, on the resequencing sample to investigate the population genomics of SVs. Clustering analyses with SVs recapitulated the rice cultivar groups that were also inferred from SNPs. However, the site-frequency spectrum of each SV type—which included inversions, duplications, deletions, translocations, and mobile element insertions—was skewed toward lower frequency variants than synonymous SNPs, suggesting that SVs may be predominantly deleterious. Among transposable elements, SINE and mariner insertions were found at especially low frequency. We also used SVs to study domestication by contrasting between rice and O. rufipogon. Cultivated genomes contained ∼25% more derived SVs and mobile element insertions than O. rufipogon, indicating that SVs contribute to the cost of domestication in rice. Peaks of SV divergence were enriched for known domestication genes, but we also detected hundreds of genes gained and lost during domestication, some of which were enriched for traits of agronomic interest. 
    more » « less
  3. null (Ed.)
    Introduction: Alzheimer’s disease (AD) causes progressive irreversible cognitive decline and is the leading cause of dementia. Therefore, a timely diagnosis is imperative to maximize neurological preservation. However, current treatments are either too costly or limited in availability. In this project, we explored using retinal vasculature as a potential biomarker for early AD diagnosis. This project focuses on stage 3 of a three-stage modular machine learning pipeline which consisted of image quality selection, vessel map generation, and classification [1]. The previous model only used support vector machine (SVM) to classify AD labels which limited its accuracy to 82%. In this project, random forest and gradient boosting were added and, along with SVM, combined into an ensemble classifier, raising the classification accuracy to 89%. Materials and Methods: Subjects classified as AD were those who were diagnosed with dementia in “Dementia Outcome: Alzheimer’s disease” from the UK Biobank Electronic Health Records. Five control groups were chosen with a 5:1 ratio of control to AD patients where the control patients had the same age, gender, and eye side image as the AD patient. In total, 122 vessel images from each group (AD and control) were used. The vessel maps were then segmented from fundus images through U-net. A t-test feature selection was first done on the training folds and the selected features was fed into the classifiers with a p-value threshold of 0.01. Next, 20 repetitions of 5-fold cross validation were performed where the hyperparameters were solely tuned on the training data. An ensemble classifier consisting of SVM, gradient boosting tree, and random forests was built and the final prediction was made through majority voting and evaluated on the test set. Results and Discussion: Through ensemble classification, accuracy increased by 4-12% relative to the individual classifiers, precision by 9-15%, sensitivity by 2-9%, specificity by at least 9-16%, and F1 score by 712%. Conclusions: Overall, a relatively high classification accuracy was achieved using machine learning ensemble classification with SVM, random forest, and gradient boosting. Although the results are very promising, a limitation of this study is that the requirement of needing images of sufficient quality decreased the amount of control parameters that can be implemented. However, through retinal vasculature analysis, this project shows machine learning’s high potential to be an efficient, more cost-effective alternative to diagnosing Alzheimer’s disease. Clinical Application: Using machine learning for AD diagnosis through retinal images will make screening available for a broader population by being more accessible and cost-efficient. Mobile device based screening can also be enabled at primary screening in resource-deprived regions. It can provide a pathway for future understanding of the association between biomarkers in the eye and brain. 
    more » « less
  4. Increasingly, more and more mobile applications (apps for short) are using the cloud as the back-end, in particular the cloud APIs, for data storage, data analytics, message notification, and monitoring. Unfortunately, we have recently witnessed massive data leaks from the cloud, ranging from personally identifiable information to corporate secrets. In this paper, we seek to understand why such significant leaks occur and design tools to automatically identify them. To our surprise, our study reveals that lack of authentication, misuse of various keys (e.g., normal user keys and superuser keys) in authentication, or misconfiguration of user permissions in authorization are the root causes. Then, we design a set of automated program analysis techniques including obfuscation-resilient cloud API identification and string value analysis, and implement them in a tool called LeakScope to identify the potential data leakage vulnerabilities from mobile apps based on how the cloud APIs are used. Our evaluation with over 1.6 million mobile apps from the Google Play Store has uncovered 15, 098 app servers managed by mainstream cloud providers such as Amazon, Google, and Microsoft that are subject to data leakage attacks. We have made responsible disclosure to each of the cloud service providers, and they have all confirmed the vulnerabilities we have identified and are actively working with the mobile app developers to patch their vulnerable services. 
    more » « less
  5. Increasingly, more and more mobile applications (apps for short) are using the cloud as the back-end, in particular the cloud APIs, for data storage, data analytics, message notification, and monitoring. Unfortunately, we have recently witnessed massive data leaks from the cloud, ranging from personally identifiable information to corporate secrets. In this paper, we seek to understand why such significant leaks occur and design tools to automatically identify them. To our surprise, our study reveals that lack of authentication, misuse of various keys (e.g., normal user keys and superuser keys) in authentication, or misconfiguration of user permissions in authorization are the root causes. Then, we design a set of automated program analysis techniques including obfuscation-resilient cloud API identification and string value analysis, and implement them in a tool called LeakScope to identify the potential data leakage vulnerabilities from mobile apps based on how the cloud APIs are used. Our evaluation with over 1.6 million mobile apps from the Google Play Store has uncovered 15, 098 app servers managed by mainstream cloud providers such as Amazon, Google, and Microsoft that are subject to data leakage attacks. We have made responsible disclosure to each of the cloud service providers, and they have all confirmed the vulnerabilities we have identified and are actively working with the mobile app developers to patch their vulnerable services. 
    more » « less