Nick Merrill

Nick Merrill
  • Doctor of Philosophy
  • Managing Director at University of California, Berkeley

About

33
Publications
12,319
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
965
Citations
Current institution
University of California, Berkeley
Current position
  • Managing Director

Publications

Publications (33)
Conference Paper
Full-text available
We presented software engineers in the San Francisco Bay Area with a working brain-computer interface (BCI) to surface the narratives and anxieties around these devices among technical practitioners. Despite this group's heterogeneous beliefs about the exact nature of the mind, we find a shared belief that the contents of the mind will someday be "...
Conference Paper
Full-text available
While brain-computer interfaces (BCI) based on electroencephalography (EEG) have improved dramatically over the past five years, their inconvenient, head-worn form factor has challenged their wider adoption. In this paper, we investigate how EEG signals collected from the ear could be used for "gestural" control of a brain-computer interface (BCI)....
Conference Paper
Full-text available
We investigate interpretations of a biosignal (heartrate) in uncertain social interactions. We describe the quantitative and qualitative results of a randomized vignette experiment in which subjects were asked to make assessments about an acquaintance based on an imagined scenario that included shared heartrate information. We compare the results o...
Article
Numerous toolkits have been developed to support ethical AI development. However, toolkits, like all tools, encode assumptions in their design about what work should be done and how. In this paper, we conduct a qualitative analysis of 27 AI ethics toolkits to critically examine how the work of ethics is imagined and how it is supported by these too...
Preprint
Full-text available
Artificial intelligence (AI) technologies are widely deployed in smartphone photography; and prompt-based image synthesis models have rapidly become commonplace. In this paper, we describe a Research-through-Design (RtD) project which explores this shift in the means and modes of image production via the creation and use of the Entoptic Field Camer...
Preprint
Full-text available
Numerous toolkits have been developed to support ethical AI development. However, toolkits, like all tools, encode assumptions in their design about what work should be done and how. In this paper, we conduct a qualitative analysis of 27 AI ethics toolkits to critically examine how the work of ethics is imagined and how it is supported by these too...
Preprint
Full-text available
Design research is important for understanding and interrogating how emerging technologies shape human experience. However, design research with Machine Learning (ML) is relatively underdeveloped. Crucially, designers have not found a grasp on ML uncertainty as a design opportunity rather than an obstacle. The technical literature points to data an...
Conference Paper
Full-text available
This paper introduces “infrastructural speculations,” an orientation toward speculative design that considers the complex and long-lived relationships of technologies with broader systems, beyond moments of immediate invention and design. As modes of speculation are increasingly used to interrogate questions of broad societal concern, it is pertine...
Conference Paper
This one-day workshop aims to explore ubiquitous privacy research and design in the context of mobile and IoT by facilitating discourse among scholars from the networked privacy and design communities. The complexity in modern socio-technical systems points to the potential of utilizing various design techniques (e.g., speculative design, design fi...
Conference Paper
Full-text available
Biosensors-devices that sense the human body-are increasingly ubiquitous. However, it is unclear how people evaluate the risks associated with their use, in part because it is not well-understood what people believe these sensors can reveal. In this study, participants ranked biosensors by how likely they are to reveal what a person is thinking and...
Article
Full-text available
In-ear EEG offers a promising path toward usable, discreet brain-computer interfaces (BCIs) for both healthy individuals and persons with disabilities. To test the promise of this modality, we produced a brain-based authentication system using custom-fit EEG earpieces. In a sample of N = 7 participants, we demonstrated that our system has high accu...
Conference Paper
Full-text available
Drawing on philosophies of embodied, distributed & extend cognition, this paper argues that the mind is readable from sensors worn on the body and embedded in the environment. It contends that past work in HCI has already begun such work, introducing the term models of minds to describe it. To those who wish to develop the capacity to build models...
Article
Full-text available
We investigate cybersecurity toolkits, collections of public facing materials intended to help users achieve security online. Through a qualitative analysis of 41 online toolkits, we present a set of key design dimensions: agentive scale (who is responsible for security), achievability (can security be achieved), and interventional stage (when are...
Conference Paper
Full-text available
In this paper, we empirically demonstrate the vulnerability of a passthought authentication system to fake signals generated by Generative Adversarial Networks (GANs), and use these same signals to make authenticators more robust. We first train a classifier that is able to authenticate a subject based on their EEG signals. The classifier performs...
Conference Paper
Full-text available
In this paper, we use design fiction to explore the social implications for adoption of brain-computer interfaces (BCI). We argue that existing speculations about BCIs are incomplete: they discuss fears about radical changes in types of control, at the expense of discussing more traditional types of power that emerge in everyday experience, particu...
Conference Paper
Full-text available
Privacy policies are critical to understanding one's rights on online platforms, yet few users read them. In this pictorial, we approach this as a systemic issue that is part a failure of interaction design. We provided a variety of people with printed packets of privacy policies, aiming to tease out this form's capabilities and limitations as a de...
Conference Paper
Full-text available
The emerging ecology of commercial social VR currently includes a diverse set of applications and competing models of what it means to be social in VR. This study maps a slice of this ecology, comparing and contrasting ways different applications frame, support, shape, or constrain social interaction. We deploy a method of design-oriented autobiogr...
Conference Paper
Full-text available
Passthoughts, in which a user thinks a secret thought to log in to services or devices, provides two factors of authentication (knowledge and inherence) in a single step. Since its proposal in 2005, passthoughts enjoyed a number of successful empirical studies. In this paper, we renew the promise of passthoughts authentication, outlining the main c...
Conference Paper
Full-text available
Multifactor authentication presents a robust security method, but typically requires multiple steps on the part of the user resulting in a high cost to usability and limiting adoption. Furthermore, a truly usable system must be unobtrusive and inconspicuous. Here, we present a system that provides all three factors of authentication (knowledge, pos...
Conference Paper
Full-text available
In February of 2017, Google announced the first SHA1 col- lision. Using over nine quintillion computations (over 6,500 years of compute time), a group of academic and industry researchers produced two different PDF files with identical SHA1 checksums. But why? After all, SHA1 had already been deprecated by numerous standards and advisory bodies. Th...
Conference Paper
Full-text available
This workshop seeks to expand our understanding and imaginations regarding the possible roles biosensors (sensors measuring humans) can-and should-play in everyday life. By applying a critical lens to issues of interpretation, representation, and experience around biosensing and biosensors, we aim to shape research agendas within DIS, and generate...
Conference Paper
Full-text available
This study examines heartrate sharing in the context of a trust-building game. Through quantitative and qualitative analyses, we find that "elevated" (versus “normal”) heartrate of an exchange partner is associated with negative mood attributions and reduced cooperation in a social dilemma game. To investigate how specific our findings are to heart...
Conference Paper
Full-text available
Personal and wearable computing are moving toward smaller and more seamless devices. We explore how this trend could be mirrored in an authentication scheme based on electroencephalography (EEG) signals collected from the ear. We evaluate this model using a low cost, single-channel, consumer grade device for data collection. Using data from 12 stud...
Article
Full-text available
This paper exhibits two methods for decreasing the time associated with training a machine learning classifier on biometric signals. Using electroencephalography (EEG) data obtained from a consumer-grade headset with a single electrode, we show that these methods produce significant gains in the computational performance and calibration time of a s...
Article
Full-text available
Recent scholarship suggests that immersive virtual worlds may be especially well suited for friendship formation on the Internet. Through 65 semi-structured interviews with residents in highly-populated portions of the virtual world Second Life, we explore the nature of friendship within the immersive virtual world, examining friendship claims and...

Network

Cited By