Designing for fallible humans

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Security and privacy solutions today are designed with an assumption of a rational user. System designers assume that the user is able to review all information shown to them, consider it along with other information they have, and user priorities, and make a conscious, rational decision in their best interest. We all know that these assumptions are wrong. Even worse, they are simply excuses for technology-centric, best-effort design. This paper argues for designing for fallible humans, taking into account human cognitive limitations, human bias and human preferences. Such design means anticipating human error and compensating for it with built-in safeguards, it means presenting information in a way palatable to humans, it means soliciting user input and working collaboratively with the user's cognitive biases and preferences. It means helping users weave security and privacy into their daily routine, and not view them as obstacles or overhead to other, more desirable tasks.

Original languageEnglish
Title of host publicationProceedings - 2019 IEEE 5th International Conference on Collaboration and Internet Computing, CIC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages298-305
Number of pages8
ISBN (Electronic)9781728167398
DOIs
StatePublished - Dec 2019
Event5th IEEE International Conference on Collaboration and Internet Computing, CIC 2019 - Los Angeles, United States
Duration: 12 Dec 201914 Dec 2019

Publication series

NameProceedings - 2019 IEEE 5th International Conference on Collaboration and Internet Computing, CIC 2019

Conference

Conference5th IEEE International Conference on Collaboration and Internet Computing, CIC 2019
Country/TerritoryUnited States
CityLos Angeles
Period12/12/1914/12/19

Keywords

  • Bounded-rationality,-human-factor,-cognitive-bias,-cybersecurity,-privacy,-passwords

Fingerprint

Dive into the research topics of 'Designing for fallible humans'. Together they form a unique fingerprint.

Cite this