Designing for usability: key principles and what designers think
Communications of the ACM
Direct manipulation: A step beyond programming languages
Human-computer interaction
Information rules: a strategic guide to the network economy
Information rules: a strategic guide to the network economy
Information ecologies: using technology with heart
Information ecologies: using technology with heart
Sorting things out: classification and its consequences
Sorting things out: classification and its consequences
Interaction Design
Applying Attention Investment to End-User Programming
HCC '02 Proceedings of the IEEE 2002 Symposia on Human Centric Computing Languages and Environments (HCC'02)
The Simplicity Shift: Innovative Design Tactics in a Corporate World
The Simplicity Shift: Innovative Design Tactics in a Corporate World
Meta-design: a manifesto for end-user development
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
The Laws of Simplicity
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Debugging reinvented: asking and answering why and why not questions about program behavior
Proceedings of the 30th international conference on Software engineering
The Future of the Internet--And How to Stop It
The Future of the Internet--And How to Stop It
The state of the art in end-user software engineering
ACM Computing Surveys (CSUR)
On-line privacy and consent: a dialogue, not a monologue
Proceedings of the 2010 workshop on New security paradigms
User Interface Design and E-Commerce Security Perception: An Empirical Study
International Journal of E-Business Research
Hi-index | 0.00 |
In this position paper we consider the ways in which users can be given control over technology and information, considering the spectrum of design possibilities from 'generative component' solutions, to 'appliance' solutions. We show how security concerns and the processes of user centered design tend to encourage a migration towards the appliance end of the spectrum and then describe problems that arise from this. We then suggest an alternative route towards allowing users more direct control over their information via end user programming, discuss some of the challenges in doing so and how they might be overcome and conclude with a suggestion of a practical first step that system designers might consider.