Biometrics and Usability March 21, 2008 Poor Usability: The Inherent Insider Threat Information Access Division Visualization and Usability Group Mary.

Slides:



Advertisements
Similar presentations
Linking regions and central governments: Indicators for performance-based regional development policy 6 th EUROPEAN CONFERENCE ON EVALUATION OF COHESION.
Advertisements

Chapter 1 Introducing User Interface Design. UIDE Chapter 1 Why the User Interface Matters Why the User Interface Matters Computers Are Ubiquitous Computers.
At What Cost Pervasive? A social computing view of mobile computing systems By: D.C.Dryer, C. Eisbach, and W.S. Ark IBM Systems Journal, online Presentation.
The Federal Bureaucracy Bureaucracy: a large, complex administrative structure that handles the everyday business of government. Deliver mail, collect.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Define usability testing Usability is all about how easy a product, service or system is to use. The extent to which a product can be used by specified.
10/7/1999Database Management -- R. Larson Database Administration: Additional Issues University of California, Berkeley School of Information Management.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Ch 3 Usability page 1CS 368 Usability Models the authors compare three usability models and introduce their own “the extent to which a product can be used.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Design, goal of design, design process in SE context, Process of design – Quality guidelines and attributes Evolution of software design process – Procedural,
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
How get your project management or professional services organization ISO 9001 certified.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
5-1 © Prentice Hall, 2007 Chapter 5: Determining Object-Oriented Systems Requirements Object-Oriented Systems Analysis and Design Joey F. George, Dinesh.
1 Interface Design Easy to use? Easy to understand? Easy to learn?
1 ICS 122: Software Specification and Quality Engineering Spring 2002Lecturers: H. Muccini and D. J. Richardson Lecture 13: Summary The three aspects:
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
Biometrics and Usability June 8, 2009 Usability and Key Management Information Access Division Visualization and Usability Group Mary Theofanos.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Context of Use (Based on Ch2 of Usability-Centered Development) Jim Carter USERLab University of Saskatchewan © Jim A Carter Jr 2012.
Security & Usability Charles Frank. Convenience is the Antithesis to Security  Computer systems must employ mechanisms that are difficult to use!
Copyright ©2015 Pearson Education, Inc.
Systems Design Approaches The Waterfall vs. Iterative Methodologies.
M-CERSI Workshop – Envisioning the Future of Mobile Informatics Division of Postmarket Surveillance 1 Overview I.What DPS does… II.The Brick Model… III.Where.
Other Quality Attributes Other Important Quality attributes Variability: a special form of modifiability. The ability of a system and its supporting artifacts.
Agile User Stories Enriched with Usability ANA M. MORENO AND AGUSTÍN YAGÜE UNIVERSIDAD POLITECNICA DE MADRID MADRID, SPAIN
Agenda Usability Usability Testing Method Demo IX Lab Tour 02/15/2006School of Information, The University of Texas at Austin1/12 Usability and Testing:
1 User-Centric The Human Factor in Design Susanne M. Furman, PhD Usability Engineer Web Communication and New Media Division U.S. Department of Health.
Software Testing and Quality Assurance Software Quality Assurance 1.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
© Pearson Education Limited 2015
DA vs. DBA The University of California Berkeley Extension Copyright © 2011 Patrick McDermott.
Self-Managed Networks: Dream or Reality? Jawad Khaki Corporate Vice President Windows Networking & Device Technologies.
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory PIV Pilot Usability Lessons Learned.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Example Incident Mgmt Initiation No recording of Incidents Users can approach different departments Solutions of previous incidents are not available.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Lecture 2 Intro. To Software Engineering and Object-Oriented Programming (1/2)
Leveraging the Power of Microsoft March 16, 2006.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Managing the Planning Process
Useability testing Software Development Unit 4 Outcome 1.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
A Pervasive Computing Solution To Asset, Problem And Knowledge Management Author: Suman Kalia Dr. Charles Tappert Dr. Allen Stix Dr. Fred Grossman.
System A system is a set of elements and relationships which are different from relationships of the set or its elements to other elements or sets.
Finance/Insurance CRM Edition Contact a Sales Rep for a demo ext 2008.
Lecture 2 Intro. To Software Engineering and Object-Oriented Programming (1/2)
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Implementing Strategies: Management and Operations Issues
HCC 831 User Interface Design and Evaluation. What is Usability?
System Management Issues for the Future Real-Time University Environment Tom Board September 22, 2004 Northwestern University Information Technology.
Software Development Unit 4 Outcome 1
Implementing Strategy in Companies That Compete in a Single Industry
HCI in the software process
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
The design process Software engineering and the design process for interactive systems Standards and guidelines as design rules Usability engineering.
International University of Japan
HCI in the software process
Lecture 10: Usable Security
HCI in the software process
What Is Good Software(Program)?
Human Computer Interaction Lecture 14 HCI in Software Process
System Reengineering Restructuring or rewriting part or all of a system without changing its functionality Applicable when some (but not all) subsystems.
Managing the Planning Process
Managing the Planning Process
Anna Adams Martina Angela Sasse
Presentation transcript:

Biometrics and Usability March 21, 2008 Poor Usability: The Inherent Insider Threat Information Access Division Visualization and Usability Group Mary Theofanos

2 Biometrics and Usability 2

3 3

4 4 The weakest link in the chain? Is it because the User is :  Careless and Ignorant OR  Frustrated and Overwhelmed

5 Biometrics and Usability 5 What is usability? ISO defines usability as: “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use” ISO defines usability as: “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use”

6 Biometrics and Usability 6 First Tenet: Know thy User  Policy Makers  Security Organization  End-Users

7 Biometrics and Usability 7 User goals and mission are not similar End-User  Task oriented – production tasks vs supporting tasks  Performance metric: efficiency, effectiveness of production tasks  The organization’s mission relies on the production tasks Security Organization  Security is the production task  Performance metric: how secure  Mission is Security but how does it relate to overall mission of the larger organization

8 Biometrics and Usability 8 User Perception Influences Behavior  Impossible demands  Need --Value  Complexity  Awkward Behavior

9 Biometrics and Usability 9 Context of Use Differences in physical location and devices influence usage  Laptop  Desktop  Office, Home, Airport, Battlefield

10 Biometrics and Usability 10 Today’s usability is one-sided In favor of the Security Organization  “Command and Control” approach  Policies constructed top-down, enforced through sanctions  Compliance monitored by checklists  One size fits all

11 Biometrics and Usability 11 What can we do?  Integrate Security and Usability  Include usability in software development cycle  Apply user-centered design to security design  Establish a partnership with users

12 Biometrics and Usability 12 Good Usability Strengthens Security  Easier to implement security policies, processes and procedures  Encourages users to follow good security practices  Reduces users inadvertently undermining security

13 Biometrics and Usability 13  The goal is to build systems that are actually secure not theoretically secure:  Security Mechanisms have to be usable in order to be effective