Generative usability: security and user centered design beyond the appliance

In this position paper we consider the ways in which users can be given control over technology and information, considering the spectrum of design possibilities from 'generative component' solutions, to 'appliance' solutions. We show how security concerns and the processes of user centered design tend to encourage a migration towards the appliance end of the spectrum and then describe problems that arise from this. We then suggest an alternative route towards allowing users more direct control over their information via end user programming, discuss some of the challenges in doing so and how they might be overcome and conclude with a suggestion of a practical first step that system designers might consider.

[1]  Scott Jenson,et al.  The Simplicity Shift: Innovative Design Tactics in a Corporate World , 2002 .

[2]  Margaret M. Burnett,et al.  Applying attention investment to end-user programming , 2002, Proceedings IEEE 2002 Symposia on Human Centric Computing Languages and Environments.

[3]  Margaret M. Burnett,et al.  Testing vs. code inspection vs. what else?: male and female end users' debugging strategies , 2008, CHI.

[4]  M. Wendy Hennequin,et al.  The Future of the Internet and How to Stop It , 2011 .

[5]  Laura A. Beckwith Gender HCI issues in end-user programming , 2007 .

[6]  M. Foucault The History of Sexuality , 1976 .

[7]  John Maeda,et al.  The laws of simplicity , 2006, Design, technology, business, life.

[8]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[9]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[10]  Y. Rogers,et al.  Interaction Design , 2002 .

[11]  Mary Shaw,et al.  The state of the art in end-user software engineering , 2011, ACM Comput. Surv..

[12]  Mark J. Safferstone Information Rules: A Strategic Guide to the Network Economy , 1999 .

[13]  Brad A. Myers,et al.  Debugging reinvented , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[14]  Chris Jay Hoofnagle,et al.  Research Report: What Californians Understand About Privacy Offline , 2008 .

[15]  Luke Church,et al.  Tradeoffs in Future Proofing Notations , 2007 .

[16]  Sharon Poggenpohl,et al.  The Laws of Simplicity: Design, Technology, Business, Life , 2007 .

[17]  M. Foucault,et al.  The History of Sexuality, Volume 1: An Introduction , 1990 .

[18]  Bonnie A. Nardi,et al.  Information Ecologies: Using Technology with Heart , 1999 .

[19]  Marian Petre,et al.  Usability Analysis of Visual Programming Environments: A 'Cognitive Dimensions' Framework , 1996, J. Vis. Lang. Comput..

[20]  Clayton Lewis,et al.  Designing for usability—key principles and what designers think , 1983, CHI '83.

[21]  A. Young Sorting Things Out: Classification and Its Consequences. , 2001 .

[22]  Ben Shneiderman,et al.  Direct Manipulation: A Step Beyond Programming Languages , 1983, Computer.

[23]  Alan F. Blackwell,et al.  The Abstract is an Enemy: Alternative Perspectives to Computational Thinking , 2008, PPIG.

[24]  Thomas R. G. Green The Hindsight Saga , 2006, PPIG.

[25]  Gerhard Fischer,et al.  Meta-design , 2004, Commun. ACM.