Evaluating Adversarial Interfaces: An Automated Approach

No Thumbnail Available

Authors

Tate, Ryan
Conti, Gregory
Farmer, Alexander
Sobiesk, Edward

Issue Date

2016

Type

journal-article

Language

Keywords

Human computer interaction , Design methodology , User centered design , Browsers , Mathematical model , User interfaces , Performance Evaluation

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Contrary to the idealistic notion that human-computer interfaces are designed to actively help users accomplish their goals, millions of people who use the World Wide Web every day encounter a wide variety of interfaces that aggressively divert users toward the goals of the designer and away from those of the user. We label such strategies "adversarial interface design." Techniques of adversarial design include coercion, confusion, distraction, exploiting errors, forced work, interruption, manipulating navigation, obfuscation, restricting functionality, shock, and trickery [10]. See Figure 1 for several illustrations of these techniques. A key distinction of adversarial design from bad design is the deliberate attempt by the designer to manipulate the user or subvert user intentions.

Description

Citation

R. Tate, G. Conti, A. Farmer and E. Sobiesk, "Evaluating Adversarial Interfaces: An Automated Approach," in IEEE Technology and Society Magazine, vol. 35, no. 1, pp. 56-68, March 2016, doi: 10.1109/MTS.2016.2518249.

Publisher

IEEE

License

Journal

Volume

Issue

PubMed ID

ISSN

0278-0097

EISSN