The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2009 vol.7)
pp: 64-67
Gregory Conti , US Military Academy at West Point
Edward Sobiesk , US Military Academy at West Point
ABSTRACT
Contrary to conventional wisdom, many computer interfaces don't assist users in accomplishing tasks quickly, easily, and efficiently. A growing number of interfaces, particularly on the Web, seek to frustrate user task accomplishment, instead seeking to manipulate users into taking undesired actions or revealing personal data. In these situations, we argue that the interface designer has become a potent adversary who puts his goals ahead of the user's at the cost of a users' time, attention, and personal information. The authors explore the problem of these malicious interfaces as well as their impact on privacy.
INDEX TERMS
malicious interfaces, adversarial interface design, evil interfaces, design principles, Web usability, security & privacy, privacy interests, privacy
CITATION
Gregory Conti, Edward Sobiesk, "Malicious Interfaces and Personalization's Uninviting Future", IEEE Security & Privacy, vol.7, no. 3, pp. 64-67, May/June 2009, doi:10.1109/MSP.2009.71
REFERENCES
1. K. Mitnick and W. Simon, The Art of Deception: Controlling the Human Element of Security, Wiley, 2003.
2. J. Long and J. Wiles, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Syngress, 2008.
3. T. Jagatic et al., "Social Phishing," Comm. ACM, vol. 50, no. 10, 2007, pp. 94–100.
4. G. Conti and M. Ahamad, "A Framework for Countering Denial of Information Attacks," IEEE Security &Privacy, vol. 3, no. 6, 2005, pp. 50–56.
5. M. Ahamad et al., "Guarding the Next Internet Frontier: Countering Denial of Information Attacks," Proc. New Security Paradigms Workshop, ACM Press, 2002, pp. 136–143.
6. G. Conti, M. Ahamad, and J. Stasko, "Attacking Information Visualization System Usability: Overloading and Deceiving the Human," Proc. Symp. Usable Privacy and Security (SOUPS 05), ACM Press, 2005, pp. 89–100.
7. G. Conti, "Evil Interfaces: Violating the User," Hackers on Planet Earth (HOPE), July 2008; www.thelasthope.orgtalks.html.
8. K. Poulsen, "Hackers Assault Epilepsy Patients via Computer," Wired,28 Mar. 2008; www.wired.com/politics/security/news/2008/ 03epilepsy.
9. C. Doctorow, "Future Tense: Pester Power," Comm. ACM, vol. 51, no. 12, 2008, pp. 119–120.
10. E. Sobiesk and G. Conti, "The Cost of Free Web Tools," IEEE Security &Privacy, vol. 5, no. 3, 2007, pp. 66–68.
11. C. Daniel and M. Palmer, "Google's Goal: To Organise Your Daily Life," Financial Times Online,22 May 2007; www.ft.com/cms/s/2c3e49548-088e-11dc-b11e-000b5df10621.html .
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool