ITIS 6010/8010 Usable Privacy & Security Dr. Heather Richter Lipford

Slides:



Advertisements
Similar presentations
Team 6 Lesson 3 Gary J Brumbelow Matt DeMonbrun Elias Lopez Rita Martin.
Advertisements

6.811 / PPAT: Principles and Practice of Assistive Technology Wednesday, 16 October 2013 Prof. Rob Miller Today: User Testing.
CS305: HCI in SW Development Evaluation (Return to…)
Cognitive Walkthrough More evaluation without users.
Data analysis and interpretation. Agenda Part 2 comments – Average score: 87 Part 3: due in 2 weeks Data analysis.
©2010 John Wiley and Sons Chapter 14 Research Methods in Human-Computer Interaction Chapter 14- Working with Human Subjects.
Semester in review. The Final May 7, 6:30pm – 9:45 pm Closed book, ONE PAGE OF NOTES Cumulative Similar format to midterm (probably about 25% longer)
Chapter 14: Usability testing and field studies. Usability Testing Emphasizes the property of being usable Key Components –User Pre-Test –User Test –User.
©N. Hari Narayanan Computer Science & Software Engineering Auburn University 1 COMP 7620 Evaluation Chapter 9.
Discount Evaluation Evaluating with experts. Agenda Online collaboration tools Heuristic Evaluation Perform HE on each other’s prototypes Cognitive Walkthrough.
Think-aloud usability experiments or concurrent verbal accounts Judy Kay CHAI: Computer human adapted interaction research group School of Information.
05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.
Experiments Testing hypotheses…. Agenda Homework assignment Review evaluation planning Observation continued Empirical studies In-class practice.
Doing Social Psychology Research
Experiments Testing hypotheses…. Recall: Evaluation techniques  Predictive modeling  Questionnaire  Experiments  Heuristic evaluation  Cognitive.
Heuristic Evaluation Evaluating with experts. Discount Evaluation Techniques  Basis: Observing users can be time- consuming and expensive Try to predict.
Evaluating with experts
An evaluation framework
Intro to Evaluation See how (un)usable your software really is…
The Experimental Approach September 15, 2009Introduction to Cognitive Science Lecture 3: The Experimental Approach.
1 User Centered Design and Evaluation. 2 Overview My evaluation experience Why involve users at all? What is a user-centered approach? Evaluation strategies.
Saul Greenberg Evaluating Interfaces With Users Why evaluation is crucial to interface design General approaches and tradeoffs in evaluation The role of.
ISE554 The WWW 3.4 Evaluation Methods. Evaluating Interfaces with Users Why evaluation is crucial to interface design General approaches and tradeoffs.
James Tam Evaluating Interfaces With Users Why evaluation is crucial to interface design General approaches and tradeoffs in evaluation The role of ethics.
Measuring Learning Outcomes Evaluation
Usability Methods: Cognitive Walkthrough & Heuristic Evaluation Dr. Dania Bilal IS 588 Spring 2008 Dr. D. Bilal.
Spring break survey how much will your plans suck? how long are your plans? how many people are involved? how much did you overpay? what’s your name? how.
The Scientific Method.  Theory  Hypothesis  Research  Support the theory OR Refute/Fail.
Requirements, cont. …and a word on Ethics. Project Part 1: Requirements Gather data using one or more techniques Learn about environment, users, tasks,
Empirical Evaluation Assessing usability (with users)
Predictive Evaluation
Evaluation Framework Prevention vs. Intervention CHONG POH WAN 21 JUNE 2011.
Chapter 11: An Evaluation Framework Group 4: Tony Masi, Sam Esswein, Brian Rood, & Chris Troisi.
Discount Evaluation Evaluating with experts. Discount Evaluation Techniques Basis: – Observing users can be time-consuming and expensive – Try to predict.
Intro to Evaluation See how (un)usable your software really is…
Evaluating a Research Report
Data Collection Methods
Fall 2002CS/PSY Empirical Evaluation Analyzing data, Informing design, Usability Specifications Inspecting your data Analyzing & interpreting results.
Human Computer Interaction
Chapter 2 Doing Social Psychology Research. Why Should You Learn About Research Methods?  It can improve your reasoning about real-life events  This.
ITIS 6010/8010 Principles of Human Computer Interaction Dr. Heather Richter
Assumes that events are governed by some lawful order
COMP5047 Pervasive Computing: 2012 Think-aloud usability experiments or concurrent verbal accounts Judy Kay CHAI: Computer human adapted interaction research.
Data analysis and interpretation. Project part 3 Watch for comments on your evaluation plans Finish your plan – Finalize questions, tasks – Prepare scripts.
Intro to Evaluation See how (un)usable your software really is…
Task Analysis …and we’ll really get to Ethics this time.
Usability Engineering Dr. Dania Bilal IS 582 Spring 2006.
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
Usability Evaluation, part 2. REVIEW: A Test Plan Checklist, 1 Goal of the test? Specific questions you want to answer? Who will be the experimenter?
Usability Engineering Dr. Dania Bilal IS 592 Spring 2005.
Working with People & Project Overview “Doing right by your participants”
Psychology As Science Psychologists use the “scientific method” Steps to the scientific method: - make observations - ask question - develop hypothesis.
Cognitive Walkthrough More evaluating with experts.
Intro to Evaluation See how (un)usable your software really is…
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Oct 211 The next two weeks Oct 21 & 23: Lectures on user interface evaluation Oct 28: Lecture by Dr. Maurice Masliah No office hours (out of town) Oct.
Introduction to Evaluation “Informal” approaches.
Fall 2002CS/PSY Predictive Evaluation (Evaluation Without Users) Gathering data about usability of a design by a specified group of users for a particular.
Usability Evaluation or, “I can’t figure this out...do I still get the donuts?”
Usability Engineering Dr. Dania Bilal IS 582 Spring 2007.
Usability Engineering Dr. Dania Bilal IS 587 Fall 2007.
1 Usability Analysis n Why Analyze n Types of Usability Analysis n Human Subjects Research n Project 3: Heuristic Evaluation.
School of Engineering and Information and Communication Technology KIT305/607 Mobile Application Development Week 7: Usability (think-alouds) Dr. Rainer.
9 Procedure for Conducting an Experiment.
Provide instruction.
Inspecting your data Analyzing & interpreting results
Evaluation.
HCI Evaluation Techniques
Human-Computer Interaction: Overview of User Studies
Presentation transcript:

ITIS 6010/8010 Usable Privacy & Security Dr. Heather Richter Lipford

Agenda Evaluation (from last time) Evaluation (from last time) Ethics & IRB Ethics & IRB Assignments update Assignments update Chapter 2 & 3 discussion Chapter 2 & 3 discussion

When to do evaluation? Summative Summative –assess an existing system –judge if it meets some criteria Formative Formative –assess a system being designed –gather input to inform design Which you do depends on maturity of prototypes and goals of evaluation Which you do depends on maturity of prototypes and goals of evaluation Same techniques work for both Same techniques work for both

Evaluation techniques Feedback from experts Feedback from experts –Discount usability techniques: heuristic evaluation, cognitive walkthrough Observe users Observe users –Think-aloud & Cooperative evaluation Talk to users Talk to users –Interviews & Focus groups Survey users Survey users –Questionnaires Test hypotheses Test hypotheses –Experiments

Typical User Study Bring participants into a controlled setting (lab) Bring participants into a controlled setting (lab) Introductions and consent Introductions and consent Gather demographic data and give instructions Gather demographic data and give instructions Ask participant to do a set of tasks Ask participant to do a set of tasks –Prototype can be simulated or partially functional Observe and record behavior Observe and record behavior Ask participant for feedback about interface Ask participant for feedback about interface

Many variations Show or demonstrate mockup, storyboard, screenshots and gather feedback Show or demonstrate mockup, storyboard, screenshots and gather feedback Observe or gather data about behavior in a natural setting Observe or gather data about behavior in a natural setting Can be multiple sessions or just one Can be multiple sessions or just one

Evaluation planning Decide on techniques, tasks, materials Decide on techniques, tasks, materials –What are usability criteria? –How much required authenticity? How many people, how long How many people, how long How to record data, how to analyze data How to record data, how to analyze data Prepare materials – interfaces, storyboards, questionnaires, etc. Prepare materials – interfaces, storyboards, questionnaires, etc. Pilot the entire evaluation Pilot the entire evaluation –Test all materials, tasks, questionnaires, etc. –Find and fix the problems with wording, assumptions –Get good feel for length of study

General Recommendations Clearly identify evaluation goals Clearly identify evaluation goals Include both objective & subjective data Include both objective & subjective data –e.g. “completion time” and “preference” Use multiple measures, within a type Use multiple measures, within a type – e.g. “reaction time” and “accuracy” Use quantitative measures where possible Use quantitative measures where possible – e.g. preference score (on a scale of 1-7) Note: Only gather the data required; do so with minimum interruption, hassle, time, etc.

Performing the Study Be well prepared so participant’s time is not wasted Be well prepared so participant’s time is not wasted Describe the purpose of the evaluation Describe the purpose of the evaluation –“I’m testing the product; I’m not testing you” Explain procedures without compromising results Explain procedures without compromising results Session should not be too long, subject can quit anytime Session should not be too long, subject can quit anytime Never express displeasure or anger Never express displeasure or anger Data to be stored anonymously, securely, and/or destroyed Data to be stored anonymously, securely, and/or destroyed

Consent Why important? Why important? –People can be sensitive about this process and issues –Errors will likely be made, participant may feel inadequate –May be mentally or physically strenuous What are the potential risks (there are always risks)? What are the potential risks (there are always risks)? “Vulnerable” populations need special care & consideration “Vulnerable” populations need special care & consideration – Children; disabled; pregnant; students (why?) More later on IRB… More later on IRB…

Now what do you do? Start just looking at the data Start just looking at the data –Were there outliers, people who fell asleep, anyone who tried to mess up the study, etc.? Sort & prioritize the data Sort & prioritize the data Identify & summarize issues: Identify & summarize issues: –Overall, how did people do? –“5 W’s” (Where, what, why, when, and for whom were the problems?) Compile aggregate results and descriptive statistics Compile aggregate results and descriptive statistics

Making Conclusions Where did you meet your criteria? Where didn’t you? Where did you meet your criteria? Where didn’t you? What were the problems? How serious are these problems? What were the problems? How serious are these problems? What design changes should be made? What design changes should be made? –Update task analysis, scenarios, etc. Prioritize and plan changes to the design Prioritize and plan changes to the design Modify prototypes and go again Modify prototypes and go again

Experiments A controlled way to determine impact of design parameters on user experience A controlled way to determine impact of design parameters on user experience Want results to eliminate possiblity of chance Want results to eliminate possiblity of chance Hypothesis: What you predict will happen Hypothesis: What you predict will happen –More specifically, the way you predict the dependent variable (i.e., accuracy) will depend on the independent variable(s)

Types of Variables Independent Independent –What you’re studying, what you intentionally vary (e.g., interface feature, interaction device, selection technique) Dependent Dependent –Performance measures you record or examine (e.g., time, number of errors) Controlled Controlled –Factors you want to prevent from influencing results

“Controlling” Variables Prevent a variable from affecting the results in any systematic way Prevent a variable from affecting the results in any systematic way Methods of controlling for a variable: Methods of controlling for a variable: –Don’t allow it to vary e.g., all males e.g., all males –Allow it to vary randomly e.g., randomly assign participants to different groups e.g., randomly assign participants to different groups –Counterbalance - systematically vary it e.g., equal number of males, females in each group e.g., equal number of males, females in each group The appropriate option depends on circumstances The appropriate option depends on circumstances

Example Do people complete operations faster with a black-and-white display or a color one? Do people complete operations faster with a black-and-white display or a color one? –Independent - display type (color or b/w) –Dependent - time to complete task (minutes) –Controlled variables - same number of males and females in each group –Hypothesis: Time to complete the task will be shorter for users with color display –H o : Time color = Time b/w

Experimental Designs Within Subjects Design Within Subjects Design –Every participant provides a score for all levels or conditions Color B/W P1 12 secs. 17 secs. P2 19 secs. 15 secs. P3 13 secs. 21 secs....

Experimental Designs Between Subjects Between Subjects –Each participant provides results for only one condition Color B/W P1 12 secs. P2 17 secs. P3 19 secs. P5 15 secs. P4 13 secs. P6 21 secs....

Comparison Within subjects Within subjects –More efficient: fewer trials and participants –But need to avoid “order effects” e.g. seeing color then b/w may be different from seeing b/w then color e.g. seeing color then b/w may be different from seeing b/w then color Between subjects Between subjects –Simpler design & analysis because fewer order effects –Often shorter, so easier to recruit participant –More subjects for same statistical power

Hypothesis Testing Tests to determine differences Tests to determine differences –t-test to compare two means – ANOVA (Analysis of Variance) to compare several means –Need to determine “statistical significance” “Significance level” (p): “Significance level” (p): –The probability that your null hypothesis was wrong, simply by chance –p (“alpha” level) is often set at 0.05, or 5% of the time you’ll get the result you saw, just by chance

Discount Evaluation Techniques Basis: Basis: –Observing users can be time-consuming and expensive –Try to predict usability rather than observing it directly –Conserve resources (quick & low cost) Expert reviewers used Expert reviewers used –HCI experts interact with system and try to find potential problems and give prescriptive feedback

Example: Heuristic evaluation 3-5 experts in HCI view or interact with a prototype. 3-5 experts in HCI view or interact with a prototype. –May vary from mock-ups and storyboards to a working system They use high-level heuristics as guidelines, and identify any problems they see. For example: They use high-level heuristics as guidelines, and identify any problems they see. For example: –Does the interface use natural and simple dialog? –Does the interface provide good error messages? Designers compile and summarize all the problems and iterate. Designers compile and summarize all the problems and iterate. Where to get heuristics? Where to get heuristics? – –

Cognitive Walkthrough Assess learnability and usability through simulation of way novice users explore and become familiar with interactive system Assess learnability and usability through simulation of way novice users explore and become familiar with interactive system Experts walk through all steps in representative tasks, identifying trouble spots based on 4 questions Experts walk through all steps in representative tasks, identifying trouble spots based on 4 questions Will users be trying to produce whatever effect action has?Will users be trying to produce whatever effect action has? Will users be able to notice that the correct action is available? (is it visible)Will users be able to notice that the correct action is available? (is it visible) Once found, will they know it’s the right one for desired effect? (is it correct)Once found, will they know it’s the right one for desired effect? (is it correct) Will users understand feedback after action?Will users understand feedback after action?

Advantages & Disadvantages Fast and cheap Fast and cheap Does not need working system Does not need working system Detailed, careful examination that can cover entire interface Detailed, careful examination that can cover entire interface Problems are subjective – are they really usability problems? Problems are subjective – are they really usability problems? Outcomes depend upon expertise and experience of the reviewers Outcomes depend upon expertise and experience of the reviewers

For more info: s/2006/6010/index.html s/2006/6010/index.htmlor 400/ITIS6400_Home.html 400/ITIS6400_Home.html Or take the course in the spring.

Ethics of working with people Usability testing can be arduous; privacy is important Usability testing can be arduous; privacy is important Each person should know and understand what they are participating in: Each person should know and understand what they are participating in: –what to expect, time commitments –what the potential risks are –how their information will be used Must be able to stop without danger or penalty Must be able to stop without danger or penalty All participants to be treated with respect All participants to be treated with respect

Attribution Theory Studies why people believe that they succeeded or failed--themselves or outside factors (gender, age differences) Studies why people believe that they succeeded or failed--themselves or outside factors (gender, age differences) Make sure participants do not feel that they did something wrong, that the errors are their problem Make sure participants do not feel that they did something wrong, that the errors are their problem

Respecting your participants Be well prepared so participant’s time is not wasted Be well prepared so participant’s time is not wasted Make sure they know you are testing software, not them Make sure they know you are testing software, not them Explain procedures without compromising results Explain procedures without compromising results Make them aware they can quit anytime Make them aware they can quit anytime Make sure participant is comfortable Make sure participant is comfortable Session should not be too long Session should not be too long Maintain relaxed atmosphere Maintain relaxed atmosphere Never indicate displeasure or anger Never indicate displeasure or anger State how session will help you improve system (“debriefing”) State how session will help you improve system (“debriefing”) Don’t compromise privacy (never identify people, only show videos with explicit permission) Don’t compromise privacy (never identify people, only show videos with explicit permission)

IRB Institutional Review Board (IRB) Institutional Review Board (IRB) Federal law governs procedures Federal law governs procedures Reviews all research involving human (or animal) participants Reviews all research involving human (or animal) participants Safeguarding the participants, and thereby the researcher and university Safeguarding the participants, and thereby the researcher and university Not a science review (i.e., not to asess your research ideas); only safety & ethics Not a science review (i.e., not to asess your research ideas); only safety & ethics

Ethics Certification Ethics is not just common sense Ethics is not just common sense Training being standardized to ensure even and equal understanding of issues Training being standardized to ensure even and equal understanding of issues Go get your certification: due Sept. 18! Go get your certification: due Sept. 18!

UNCC On-line tutorial On-line tutorial Guidelines Guidelines Consent procedures and template forms Consent procedures and template forms Protocol application forms Protocol application forms IRB Protocol 101 Training IRB Protocol 101 Training – –9/10, 9/11, 9/12, 9/18, 9/20 from 6-7pm

Assignments

Scenario Your target users work in a hospital. Confidentiality of patient data cannot be compromised. Different employees have different levels of clearance within the one system that controls all of the patient records. There are a limited number of public workstations that are highly trafficked throughout the day. Current practice at the hospital is that one worker logs in and often many people with different levels of clearance work under that same account, even though they are not authorized to do so. Often, the workstation remains logged in between users, thus an unauthorized user could gain access to patient records. In addition, passwords change on a monthly basis so it is more convenient for the workers to just use the account that has already been logged in than try to recall their always changing password. Management insists that the passwords much change frequently to reduce the risk of a hacker viewing the confidential data. How to address security needs with passwords or other forms of authentication in this context? How to address security needs with passwords or other forms of authentication in this context?

My current scenario Your target users are students and faculty doing studies in the usability lab. This lab is a room with two Novell computers with special usability recording software on them. Access to the lab is controlled by 49er card. All study personnel need to be able to access the study materials, but no one else should have access to those materials. Study materials include consent forms, questionnaires, and instructions to give study participants, both in digital and physical forms. Additionally, on the computer are the application and application data to be tested, as well as the digital recordings of the study. An external hard drive contains back up copies of all the recordings and application data. Most of the people in the lab will have Novell accounts, but not everyone. How can we provide shared access to the study materials? How can we prevent unauthorized people from getting access to the study materials and records? How can we provide shared access to the study materials? How can we prevent unauthorized people from getting access to the study materials and records?

Usable Privacy & Security: An Introduction “weakest link property” – attackers only have to exploit one error or vulnerability “weakest link property” – attackers only have to exploit one error or vulnerability Sociotechnical system – complex system of technologies and people/organizations Sociotechnical system – complex system of technologies and people/organizations So are people really the weakest link in security or privacy systems? How much is a self-fulfilling prophecy? So are people really the weakest link in security or privacy systems? How much is a self-fulfilling prophecy? Are security and usability competing goals? Are security and usability competing goals?

The product The technologies and processes put in place for security and privacy protection Why don’t they work? Why don’t they work? –Users are unable to behave as required How many accounts with passwords do you have? How many accounts with passwords do you have? How many actual passwords do you have? How many actual passwords do you have? –Users are unwilling to behave as required Do you create strong passwords all the time? Do you create strong passwords all the time?

User motivations Users underestimate their risk and the negative outcomes Users underestimate their risk and the negative outcomes –Has anyone ever had a password compromised or misused? –how concerned are you about shoulder surfing for your passwords? –What could happen if someone could get into your ? Your blog? Your bank account? Users are not held accountable Users are not held accountable –Who makes sure you don’t write down your password? Who makes sure you don’t reuse passwords? Conflicts with social norms & self image Conflicts with social norms & self image –Have you ever shared a password with a friend/colleague? –Why wouldn’t you share your bank password with your spouse? Question: The real-world equivalent of good security is locking your home or car to protect your belongings. Yet those who follow good cybersecurity practices are perceives as “anal” or “paranoid.” Why the difference? Question: The real-world equivalent of good security is locking your home or car to protect your belongings. Yet those who follow good cybersecurity practices are perceives as “anal” or “paranoid.” Why the difference?

The process The methods for creating the product. In your organization: In your organization: –Who creates security policies and technologies for the employees? –Who creates the security policies and technologies for the customers/users? AEGIS AEGIS –What are the benefits of this method? –What are its drawbacks? –Do the methods change if your users are non-technical?

The panorama The context of the products, the larger environment Education Education –Teaching concepts and skills Training Training –Correct usage of security mechanisms through drills, monitoring, feedback, reinforcement –Should encompass all staff, not only those with immediate access to systems deemed at risk Attitudes Attitudes –Role models What training/education have you had on good passwords? What training/education have you had on good passwords? What training/education has your [favorite-non-technical-person] had? What training/education has your [favorite-non-technical-person] had? –What do you think they should have? –How could that be provided to them?

Tog’s advice Achieving balance Achieving balance –User context and bad guy context –User task and authentication –Security and privacy “RingWall” metaphor “RingWall” metaphor –Castlekeep, ramparts, town wall, outside –Is this a reasonable metaphor? Question: Much of security and privacy concerns has more to do with where your information is, than where you are. Does Tog’s same desire for flexibility of privacy settings based on the user’s environment apply? Do the same metaphors apply? Question: Much of security and privacy concerns has more to do with where your information is, than where you are. Does Tog’s same desire for flexibility of privacy settings based on the user’s environment apply? Do the same metaphors apply?