Learn More
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it(More)
Human factors are perhaps the greatest current barrier to effective computer security. Most security mechanisms are simply too difficult and confusing for the average computer user to manage correctly. Designing security software that is usable enough to be effective is a specialized problem, and user interface design strategies that are appropriate for(More)
In this paper, we introduce the technique of safe staging for computer security, which is adapted from conventional user interface staging to meet the specific needs of computer security in consumer software. Safe staging can reduce the initial complexity of security concepts for novice users while providing continuous protection against dangerous security(More)
In this position paper we consider the ways in which users can be given control over technology and information, considering the spectrum of design possibilities from 'generative component' solutions, to 'appliance' solutions. We show how security concerns and the processes of user centered design tend to encourage a migration towards the appliance end of(More)
We now live in an age of information abundance. A near-infinite supply of information presents unique opportunities to tackle the most difficult contemporary social problems. The fields of medicine, energy and the environment, finance, governance, and even agriculture have already been transformed by information technology and are about to hit a second(More)
World Wide Web electronic commerce applications often require consumers to enter private information (such as credit card numbers) into forms in the browser window. If third parties can insert trojan horse applications onto a consumer's machine, they can monitor keyboard strokes and steal private information. This paper outlines a simple way to accomplish(More)
  • 1