Open sesame: re-envisioning the design of a gesture-based access control system

We present results of an exploratory study employing a Wizard of Oz mockup of a new gesture-based access control system we are constructing for our lab's entryway. Among user interactions witnessed, we have identified several behaviors of interest to security researchers and HCI researchers alike. We discuss our security system design approach as an extrapolation of two identified trends, demonstrating the potential for the felt experience of pleasurable and playful systems to help solve difficult interaction problems. We also show the great value of prototyping a mockup to reveal designers' assumptions about human interactions with new technology use cases.

[1]  Susanne Bødker,et al.  When second wave HCI meets third wave challenges , 2006, NordiCHI '06.

[2]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[3]  C. Pollard,et al.  Center for the Study of Language and Information , 2022 .

[4]  Thomas W. Malone,et al.  Heuristics for designing enjoyable user interfaces: Lessons from computer games , 1982, CHI '82.

[5]  F. Strack,et al.  Inhibiting and facilitating conditions of the human smile: a nonobtrusive test of the facial feedback hypothesis. , 1988, Journal of personality and social psychology.

[6]  G. A. Mendelsohn,et al.  Affect grid : A single-item scale of pleasure and arousal , 1989 .

[7]  Philippe A. Palanque,et al.  Human-Computer Interaction – INTERACT 2007 , 2007, Lecture Notes in Computer Science.

[8]  Jon D. Morris Observations: SAM: The Self-Assessment Manikin An Efficient Cross-Cultural Measurement Of Emotional Response 1 , 1995 .

[9]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[10]  David M'Raïhi,et al.  Designing a Trade-Off Between Usability and Security: A Metrics Based-Model , 2007, INTERACT.

[11]  Amy J. C. Cuddy,et al.  Power Posing , 2010, Psychological science.

[12]  Terry Winograd,et al.  A language/action perspective on the design of cooperative work , 1986, CSCW '86.

[13]  Simson L. Garfinkel,et al.  Security and Usability , 2005 .

[14]  Lujo Bauer,et al.  Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.

[15]  鈴木 聡 Media Equation 研究の背景と動向 , 2011 .

[16]  John M. Carroll Beyond fun , 2004, INTR.

[17]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[18]  Lucy Suchman,et al.  Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .

[19]  Marije Kanis HCI for Positive Change , 2009 .

[20]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[21]  Zhen Wang,et al.  uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications , 2009, PerCom.

[22]  P. Jordan Human factors for pleasure in product use. , 1998, Applied ergonomics.