Rational interfaces for effective security software: polite interaction guidelines for secondary tasks

  • Authors:
  • Gisela Susanne Bahr;William H. Allen

  • Affiliations:
  • Psychology, Florida Institute of Technology, Melbourne, Florida;Computer Sciences, Florida Institute of Technology, Melbourne, Florida

  • Venue:
  • UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

States of the science and practice agree on the failure of security application to engage end users in the assurance of security and privacy in everyday personal computing. We propose as the cause an underlying irrational interface model of security related applications. Irrational Interfaces are counterproductive because they minimize the intended software utility and pay-off. In the case of security interactions, utility is minimized by the assumption of security primacy and the alienation of end user from the decision making process through disruptive messaging and disengaging content. Therefore effective security dialogues must be based on a rational interaction model. We present a small set of simple guidelines based on cognitive psychological research for polite interactions that appropriately optimize user engagement during tasks that users perceive as secondary. The guidelines for secure applications that politely interact with the end user are supported by a pay-off matrix that can be used to predict and evaluate rational secure interface performance. The rational, polite interface is a radical paradigm shift for security applications' design because it integrates end users as active stakeholders and resources in the assurance of security and privacy.