作者: Courtney Moskowitz , Greg Ganger , A. Chris Long
DOI:
关键词:
摘要: Viruses, trojan horses, and other malware are a growing problem for computer users, but current tools research do not adequately aid users in fighting these threats. One approach to increasing security is partition all applications data based on general task types, or “roles,” such as “Personal,” “Work,” “Communications.” This can limit the effects of single role rather than allowing it affect entire computer. We developing prototype investigate usability this model. Our initial investigation uses cognitive walkthrough think-aloud user studies paper prototypes look at model context realistic tasks, compare different interface mechanisms managing role-based system. For most participants, our was simple understand use. In addition that intrinsically useful, we believe development system will inform issues design implementation usable interfaces, refinement guidelines. work supported by grants from Center Computer Communications Security (C3S) Carnegie Mellon University Critical Infrastructure Protection Information Assurance Fellowship Department Defense. thank members companies PDL Consortium (including EMC, Hewlett-Packard, Hitachi, IBM, Intel, Microsoft, Network Appliance, Oracle, Panasas, Seagate, Sun, Veritas) their interest, insights, feedback, support. also participants studies.