Alma Whitten

Learn More
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it(More)
World Wide Web electronic commerce applications often require consumers to enter private informa tion such as credit card numbers into forms in the browser window If third parties can insert trojan horse applications onto a consumer s machine they can monitor keyboard strokes and steal private infor mation This paper outlines a simple way to accomplish this(More)
In this position paper we consider the ways in which users can be given control over technology and information, considering the spectrum of design possibilities from 'generative component' solutions, to 'appliance' solutions. We show how security concerns and the processes of user centered design tend to encourage a migration towards the appliance end of(More)
We now live in an age of information abundance. A nearinfinite supply of information presents unique opportunities to tackle the most difficult contemporary social problems. The fields of medicine, energy and the environment, finance, governance, and even agriculture have already been transformed by information technology and are about to hit a second(More)
  • 1