Designing for security and privacy. Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments.

Slides:



Advertisements
Similar presentations
Research Methods and Usability Guidelines for Ecommerce Web Sites Mary Czerwinski Microsoft Research Note: Many of these slides came from a Keynote address.
Advertisements

Member FINRA/SIPCThursday, November 12, 2009 Resource Menu Changes - Report User Experience Study | Kevin Cornwall.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 11 Designing for Usability I.
Trust and Privacy. Agenda Questions? Questions? Trust Trust More project time More project time Privacy Privacy.
Location Based Social Networking For All Presenter: Danny Swisher.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
Ch 11 Cognitive Walkthroughs and Heuristic Evaluation Yonglei Tao School of Computing and Info Systems GVSU.
11 HCI - Lesson 5.1 Heuristic Inspection (Nielsen’s Heuristics) Prof. Garzotto.
Electronic Communications Usability Primer.
Copyright © 2005, Pearson Education, Inc. Chapter 8 Command and Natural Languages.
Part 4: Evaluation Days 25, 27, 29, 31 Chapter 20: Why evaluate? Chapter 21: Deciding on what to evaluate: the strategy Chapter 22: Planning who, what,
Content Management System 213 Project Peter Roessler, Dhea Maloney, Chris Marin, Chan Jean Lee.
INTERACTIVE BRAND COMMUNICATION Class 7 Creative Issues II: Creating Effective Online Advertising.
Phishing and Trust. Agenda Questions? Questions? Phishing Phishing Project feedback Project feedback Trust Trust.
Midterm Exam Review IS 485, Professor Matt Thatcher.
Inspection Methods. Inspection methods Heuristic evaluation Guidelines review Consistency inspections Standards inspections Features inspection Cognitive.
Heuristic Evaluation Evaluating with experts. Discount Evaluation Techniques  Basis: Observing users can be time- consuming and expensive Try to predict.
Evaluating with experts
Mid-Term Exam Review IS 485, Professor Matt Thatcher.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
Review an existing website Usability in Design. to begin with.. Meeting Organization’s objectives and your Usability goals Meeting User’s Needs Complying.
Heuristic evaluation IS 403: User Interface Design Shaun Kane.
1. Learning Outcomes At the end of this lecture, you should be able to: –Define the term “Usability Engineering” –Describe the various steps involved.
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
SAMPLE HEURISTIC EVALUATION FOR 680NEWS.COM Glenn Teneycke.
1 The Web & Professional Communication English 3104.
CS 4720 Usability and Accessibility CS 4720 – Web & Mobile Systems.
Notes on our audience People have selective attention/tunnel vision (especially if problem-solving), limited working/short-term memory, slow long-term.
Trust Jason Chalecki Usable Privacy and Security – Spring 2006.
Patterns, effective design patterns Describing patterns Types of patterns – Architecture, data, component, interface design, and webapp patterns – Creational,
Nielsen’s Ten Usability Heuristics
Usability Evaluation/LP Usability: how to judge it.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
10 Usability Heuristics for User Interface Design.
Multimedia Specification Design and Production 2012 / Semester 1 / week 5 Lecturer: Dr. Nikos Gazepidis
Heuristic evaluation Functionality: Visual Design: Efficiency:
SEG3120 User Interfaces Design and Implementation
1 ISE 412 Usability Testing Purpose of usability testing:  evaluate users’ experience with the interface  identify specific problems in the interface.
INTRO TO USABILITY Lecture 12. What is Usability?  Usability addresses the relationship between tools and their users. In order for a tool to be effective,
1 3132/3192 User Accessibility © University of Stirling /3192 User Accessibility 2.
User Interface Theory & Design Lecture 6a 1.  User interface is everything the end user comes into contact with while using the system  To the user,
Evaluating a UI Design Expert inspection methods Cognitive Walkthrough
1 COSC 4406 Software Engineering COSC 4406 Software Engineering Haibin Zhu, Ph.D. Dept. of Computer Science and mathematics, Nipissing University, 100.
Usability 1 Usability evaluation Without users - analytical techniques With users - survey and observational techniques.
Developed by Tim Bell Department of Computer Science and Software Engineering University of Canterbury Human Computer Interaction.
Heuristic Evaluation JUAN MONRREAL JANETTE VAZQUEZ INEZ VELA.
Heuristic Evaluation Short tutorial to heuristic evaluation
Yonglei Tao School of Computing & Info Systems GVSU Ch 7 Design Guidelines.
Chapter 5:User Interface Design Concepts Of UI Interface Model Internal an External Design Evaluation Interaction Information Display Software.
Creating & Building the Web Site Week 8. Objectives Planning web site development Initiation of the project Analysis for web site development Designing.
Importance of user interface design – Useful, useable, used Three golden rules – Place the user in control – Reduce the user’s memory load – Make the.
Usability Heuristics Avoid common design pitfalls by following principles of good design Nielsen proposes 10 heuristics, others propose more or less. Inspect.
Human-Computer Interaction Design process Task and User Characteristics Guidelines Evaluation ISE
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
Basic Elements.  Design is the process of collecting ideas, and aesthetically arranging and implementing them, guided by certain principles for a specific.
Usability Olaa Motwalli CIS764, DR Bill – KSU. Overview Usability factors. Usability guidelines.  Software application.  Website. Common mistakes. Good.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 13 Usability 1.
Designing with Persuasion Is good design always persuasive? Push persuasion Take my product (advice) Buy my product Solicitation Messages & Warnings Pull.
© 2016 Cognizant. © 2016 Cognizant Introduction PREREQUISITES SCOPE Heuristic evaluation is a discount usability engineering method for quick, cheap,
The Information School of the University of Washington Information System Design Info-440 Autumn 2002 Session #20.
Ten Usability Heuristics These are ten general principles for user interface design. They are called "heuristics" because they are more in the nature of.
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
Human Computer Interaction Lecture 21 User Support
A NEW FACE OF THE TECHNICAL COMMUNICATOR – UX IS OUR STRENGTH – WE DESIGN TO WRITE BY CHRIS GANTA © 2016, STC INDIA CHAPTER.
Unit 14 Website Design HND in Computing and Systems Development
Heuristic Evaluation Jon Kolko Professor, Austin Center for Design.
One-timer?. A new face of the technical communicator – UX is our strength – we design to write.
Nilesen 10 hueristics.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Designing for security and privacy

Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments

What next? So you know usability is important… So you know usability is important… And many systems lack usability… And many systems lack usability… So, how do you create a good one? So, how do you create a good one? Its hard! Its hard! –But we can certainly do better than we are doing now!

Design Understand current practices and needs Understand current practices and needs Follow heuristics and guidelines Follow heuristics and guidelines Avoid pitfalls Avoid pitfalls Prototype, evaluate, and iterate Prototype, evaluate, and iterate

Mental Model reminder Users conception of what the software is doing should match with what the software actually does. Users conception of what the software is doing should match with what the software actually does. Interface What user thinks is happening What is really happening

Designation vs. Admonition Security by designation Security by designation –When a user designates an action, take appropriate security related actions Security by admonition Security by admonition –Provide notifications that the user looks at and takes appropriate action from –Display a warning when the user tries to do something dangerous Question: when could we use designation today? When can we not use designation?

General usability guidelines Affordances Affordances Visibility Visibility Mapping Mapping Feedback Feedback Constraints Constraints Error prevention Error prevention Error recovery Error recovery Aesthetics & minimalist design Aesthetics & minimalist design Consistency Consistency Flexibility Flexibility

Yee guidelines (Ch. 13) Match the most comfortable way to do tasks with the least granting of authority Match the most comfortable way to do tasks with the least granting of authority Grant authority to others in accordance with user actions indicating consent Grant authority to others in accordance with user actions indicating consent Offer the user ways to reduce others’ authority Offer the user ways to reduce others’ authority Maintain awareness of others’ authority Maintain awareness of others’ authority Maintain accurate awareness of user’s own authority Maintain accurate awareness of user’s own authority Protect user’s channels to agents that manipulate authority Protect user’s channels to agents that manipulate authority Enable user to express safe security policies in terms that fit the task Enable user to express safe security policies in terms that fit the task Draw distinctions among objects and actions along boundaries relevant to the task Draw distinctions among objects and actions along boundaries relevant to the task Present objects using distinguishable, truthful appearances Present objects using distinguishable, truthful appearances Indicate consequences of decisions Indicate consequences of decisions How do these relate to general usability guidelines?

Trust Design Guidelines 1. Ensure good ease of use. 2. Use attractive design. 3. Create a professional image – avoid spelling mistakes and other simple errors. 4. Don’t mix advertising and content – avoid sales pitches and banner advertisements. 5. Convey a “real-world” look and feel – for example, with use of high- quality photographs of real places and people. 6. Maximize the consistency, familiarity, or predictability of an interaction both in terms of process and visually. 7. Include seals of approval such as TRUSTe. 8. Provide explanations, justifying the advice or information given. 9. Include independent peer evaluation such as references from past and current users and independent message boards. 10. Provide clearly stated security and privacy statements, and also rights to compensation and returns. 11. Include alternative views, including good links to independent sites with the same business area. 12. Include background information such as indicators of expertise and patterns of past performance. 13. Clearly assign responsibilities (to the vendor and the customer). 14. Ensure that communication remains open and responsive, and offer order tracking or an alternative means of getting in touch. 15. Offer a personalized service that takes account of each client’s needs and preferences and reflects its social identity.

Web bloopers 2. Confusing classifications. Content categories seem arbitrary or nonsensical. 4.Conflicting content. Information in different parts of site disagrees. 5.Outdated content. Content on site is out-of-date, but not clearly marked as archival. 6. Missing or useless content. Information users need to accomplish goals is missing. 9.Requiring unneeded data. Making users provide non-essential information. 10.Pointless choice. Offering or requiring meaningless choices. 19.Lost in space: Current page not indicated. Page doesn’t clearly show where user is. 30.Mysterious controls. Operation of controls is unclear due to poor labeling, poor layout, or uniqueness of controls. 31.Baffling search controls. Search options require knowledge of computer or industry-insider concepts. 41.Too much text. Overly-verbose instructions, messages, or link-labels. 47.Typos and grammos: Sloppy writing. Failing to check and fix text before going live. Jeff Johnson, …also GUI Bloopers

Privacy Pitfalls Understanding Privacy Implications Understanding Privacy Implications –Obscuring potential information flow (1) –Obscuring actual information flow (2) Socially Meaningful Action Socially Meaningful Action –Emphasizing configuration over action (3) –Lacking coarse-grained control (4) –Inhibiting established practice (5) Any others you want to suggest? Can privacy-insensitive systems still be successful?

Example: Faces Specify who can see what and when Specify who can see what and when Mobile interface for in-situ feedback Mobile interface for in-situ feedback Design activities: Design activities: –Literature review –Interviewed 12 local residents, surveyed 130 people –Iterated through series of low-fidelity prototypes Findings: Findings: –Primary determinant of privacy preferences is who (inquirer) –disclosure situation is also important

Faces cont. Different disclosure preferences for different inquirers Different disclosure preferences for different inquirers Optionally add situation parameter Optionally add situation parameter Each disclosure preference can be associated with a face Each disclosure preference can be associated with a face “If this inquirer wants info when I’m in this situation, show her this face” “If this inquirer wants info when I’m in this situation, show her this face”

Problems with Faces What pitfalls did this violate? What pitfalls did this violate? Which ones did it avoid? Which ones did it avoid? So what was critical failure? So what was critical failure? Why didn’t they figure this out earlier? Why didn’t they figure this out earlier?

Chameleon Evolved through prototyping Evolved through prototyping What is good about the design? What is good about the design? What is potentially problematic? What is potentially problematic?

Your assignment Designs Designs –What were the problems? General usability or specific to security or privacy? –How did you come up with solution? Which is your favorite? Which is your favorite?