hy

[ASAP] Directional off-Normal Photon Streaming from Hybrid Plasmon-Emitter Coupled Metasurfaces

ACS Photonics
DOI: 10.1021/acsphotonics.0c00196




hy

[ASAP] Line-Scan Hyperspectral Imaging Microscopy with Linear Unmixing for Automated Two-Dimensional Crystals Identification

ACS Photonics
DOI: 10.1021/acsphotonics.0c00050




hy

Iconography of Security

Molly Wilson and Eileen Wagner battle the age old Christmas issues of right and wrong, good and evil, and how the messages we send through iconography design can impact the decisions users make around important issues of security. Are you icons wise men, or are they actually King Herod?


Congratulations, you’re locked out! The paradox of security visuals

Designers of technology are fortunate to have an established visual language at our fingertips. We try to use colors and symbols in a way that is consistent with people’s existing expectations. When a non-designer asks a designer to “make it intuitive,” what they’re really asking is, “please use elements people already know, even if the concept is new.”

Lots of options for security icons

We’re starting to see more consistency in the symbols that tech uses for privacy and security features, many of them built into robust, standardized icon sets and UI kits. To name a few: we collaborated with Adobe in 2018 to create the Vault UI Kit, which includes UI elements for security, like touch ID login and sending a secure copy of a file. Adobe has also released a UI kit for cookie banners.

Activity log from the Vault Secure UI Kit, by Adobe and Simply Secure.
Cookie banner, from the Cookie Banner UI Kit, by Adobe.

Even UI kits that aren’t specialized in security and privacy include icons that can be used to communicate security concepts, like InVision’s Smart Home UI Kit. And, of course, nearly every icon set has security-related symbols, from Material Design to Iconic.

Key, lock, unlock, shield, and warning icons from Iconic.
A selection of security-related icons from Material Design.
Security shields from a selection of Chinese apps, 2014. From a longer essay by Dan Grover.

Many of these icons allude to physical analogies for the states and actions we’re trying to communicate. Locks and keys; shields for protection; warning signs and stop signs; happy faces and sad faces. Using these analogies helps build a bridge from the familiar, concrete world of door locks and keyrings to the unfamiliar, abstract realm of public- and private-key encryption.

flickr/Jim Pennucci
GPG Keychain, an open-source application for managing encryption keys. Image: tutsplus.com

When concepts don’t match up

Many of the concepts we’re working with are pairs of opposites. Locked or unlocked. Private or public. Trusted or untrusted. Blocked or allowed. Encouraged or discouraged. Good or evil. When those concept pairs appear simultaneously, however, we quickly run into UX problems.

Take the following example. Security is good, right? When something is locked, that means you’re being responsible and careful, and nobody else can access it. It’s protected. That’s cause for celebration. Being locked and protected is a good state.

“Congratulations, you’re locked out!”

Whoops.

If the user didn’t mean to lock something, or if the locked state is going to cause them any inconvenience, then extra security is definitely not good news.

Another case in point: Trust is good, right? Something trusted is welcome in people’s lives. It’s allowed to enter, not blocked, and it’s there because people wanted it there. So trusting and allowing something is good.

“Good job, you’ve downloaded malware!”

Nope. Doesn’t work at all. What if we try the opposite colors and iconography?

That’s even worse. Even though we, the designers, were trying both times to keep the user from downloading malware, the user’s actual behavior makes our design completely nonsensical.

Researchers from Google and UC Berkeley identified this problem in a 2016 USENIX paper analyzing connection security indicators. They pointed out that, when somebody clicks through a warning to an “insecure” website, the browser will show a “neutral or positive indicator” in the URL bar – leading them to think that the website is now safe. Unlike our example above, this may not look like nonsense from the user point of view, but from a security standpoint, suddenly showing “safe/good” without any actual change in safety is a pretty dangerous move.

The deeper issue

Now, one could file these phenomena under “mismatching iconography,” but we think there is a deeper issue here that concerns security UI in particular. Security interface design pretty much always has at least a whiff of “right vs. wrong.” How did this moralizing creep into an ostensibly technical realm?

Well, we usually have a pretty good idea what we’d like people to do with regards to security. Generally speaking, we’d like them to be more cautious than they are (at least, so long as we’re not trying to sneak around behind their backs with confusing consent forms and extracurricular data use). Our well-intentioned educational enthusiasm leads us to use little design nudges that foster better security practices, and that makes us reach into the realm of social and psychological signals. But these nudges can easily backfire and turn into total nonsense.

Another example: NoScript

“No UX designer would be dense enough to make these mistakes,” you might be thinking.

Well, we recently did a redesign of the open-source content-blocking browser extension NoScript, and we can tell you from experience: finding the right visual language for pairs of opposites was a struggle.

NoScript is a browser extension that helps you block potential malware from the websites you’re visiting. It needs to communicate a lot of states and actions to users. A single script can be blocked or allowed. A source of scripts can be trusted or untrusted. NoScript is a tool for the truly paranoid, so in general, wants to encourage blocking and not trusting. But:

“An icon with a crossed-out item is usually BAD, and a sign without anything is usually GOOD. But of course, here blocking something is actually GOOD, while blocking nothing is actually BAD. So whichever indicators NoScript chooses, they should either aim to indicate system state [allow/block] or recommendation [good/bad], but not both. And in any case, NoScript should probably stay away from standard colors and icons.”

So we ended up using hardly any of the many common security icons available. No shields, no alert! signs, no locked locks, no unlocked locks. And we completely avoided the red/green palette to keep from taking on unintended meaning.

Navigating the paradox

Security recommendations appear in most digital services are built nowadays. As we move into 2020, we expect to see a lot more conscious choice around colors, icons, and words related to security. For a start, Firefox already made a step in the right direction by streamlining indicators for SSL encryption as well as content blocking. (Spoilers: they avoided adding multiple dimensions of indicators, too!)

The most important thing to keep in mind, as you’re choosing language around security and privacy features, is: don’t conflate social and technical concepts. Trusting your partner is good. Trusting a website? Well, could be good, could be bad. Locking your bike? Good idea. Locking a file? That depends.

Think about the technical facts you’re trying to communicate. Then, and only then, consider if there’s also a behavioral nudge you want to send, and if you are, try to poke holes in your reasoning. Is there ever a case where your nudge could be dangerous? Colors, icons, and words give you a lot of control over how exactly people experience security and privacy features. Using them in a clear and consistent way will help people understand their choices and make more conscious decisions around security.


About the author

Molly Wilson is a designer by training and a teacher at heart: her passion is leveraging human-centered design to help make technology clear and understandable. She has been designing and leading programs in design thinking and innovation processes since 2010, first at the Stanford d.school in Palo Alto, CA and later at the Hasso-Plattner-Institut School of Design Thinking in Potsdam, Germany. Her work as an interaction designer has focused on complex products in finance, health, and education. Outside of work, talk to her about cross-cultural communication, feminism, DIY projects, and visual note-taking.

Molly holds a master’s degree in Learning, Design, and Technology from Stanford University, and a bachelor’s degree magna cum laude in History of Science from Harvard University. See more about her work and projects at http://molly.is.

Eileen Wagner is Simply Secure’s in-house logician. She advises teams and organizations on UX design, supports research and user testing, and produces open resources for the community. Her focus is on information architecture, content strategy, and interaction design. Sometimes she puts on her admin hat and makes sure her team has the required infrastructure to excel.

She previously campaigned for open data and civic tech at the Open Knowledge Foundation Germany. There she helped establish the first public funding program for open source projects in Germany, the Prototype Fund. Her background is in analytic philosophy (BA Cambridge) and mathematical logic (MSc Amsterdam), and she won’t stop talking about barbershop music.

More articles by Molly Wilson & Eileen




hy

Why they marched: untold stories of the women who fought for the right to vote / Susan Ware

Dewey Library - JK1896.W37 2019




hy

Assessment of the in-house laboratory independent research at the Army's Research, Development, and Engineering Centers / Army Research Program Review and Analysis Committee, Division on Engineering and Physical Sciences

Online Resource




hy

Why veterans run: military service in American presidential elections, 1789-2016 / Jeremy M. Teigen

Dewey Library - JK524.T36 2018




hy

The light that failed: why the West is losing the fight for democracy / Ivan Krastev and Stephen Holmes

Dewey Library - JC574.K74 2019




hy

The morals of the market: human rights and the rise of neoliberalism / Jessica Whyte

Dewey Library - JC574.W428 2019




hy

Dying for rights: putting North Korea's human rights abuses on the record / Sandra Fahy

Dewey Library - JC599.K7 F34 2019




hy

Principled spying: the ethics of secret intelligence / David Omand and Mark Phythian

Dewey Library - JF1525.I6 O42 2018




hy

Votes that count and voters who don't: how journalists sideline electoral participation (without even knowing it) / Sharon E. Jarvis and Soo-Hye Han

Dewey Library - JK1965.J37 2018




hy

Why liberalism failed / Patrick J. Deneen ; foreword by James Davison Hunter and John M. Owen IV.

Dewey Library - JC574.D473 2018




hy

Dilsukhnagar blasts case: Yasin Bhatkal brought to Hyderabad

Yaskin Bhatkal's close associate Asadullah Akhtar is presently being interrogated by the NIA.




hy

Hyderabad blasts: IM co-founder Bhatkal sent to judicial custody remand till Oct 17

After an initial probe by Andhra Pradesh police, the NIA had taken over the case.




hy

TRS President for Hyderabad as Telangana capital, warns stir

KCR's statement came against the backdrop of reports of proposals making Hyderabad a UT.




hy

Centre seeks report on jail break in Madhya Pradesh

Asked for circumstances leading to the jail break and the measures taken to nab the prisoners.




hy

Modi's toilet remark finds support in Madhya Pradesh

Former MP Chief Secretary says similar statements were made by Jairam Ramesh, action yet to be seen.




hy

BJP MLA joins Congress ahead of Madhya Pradesh polls

I was being "ignored by BJP on almost every issue," Devendra Patel said.




hy

Himachal resorts, hydro projects may have to surrender encroached land

There have been serious charges that power companies have taken over prime land in excess of their requirements.




hy

Cybernetical physics [electronic resource] : from control of chaos to quantum control / Alexander L. Fradkov

Berlin ; New York : Springer, [2007]




hy

Cryptography and coding [electronic resource] : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings / Nigel P. Smart (ed.)

Berlin : Springer, [2005]




hy

Cryptography and coding [electronic resource] : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings / Steven D. Galbraith (ed.)

Berlin ; New York : Springer, [2007]




hy

Control theory in physics and other fields of science [electronic resource] : concepts, tools, and applications / Michael Schulz

Berlin ; New York : Springer, [2006]




hy

Control of nonlinear and hybrid process systems [electronic resource] : designs for uncertainty, constraints and time-delays / Panagiotis D. Christofides, Nael H. El-Farra

Berlin ; New York : Springer, [2005]




hy

Why good people do bad environmental things / Elizabeth R. DeSombre

DeSombre, Elizabeth R., author




hy

Why big fierce animals are rare : an ecologist's perspective / Paul Colinvaux ; with a new foreword by Cristina Eisenberg

Colinvaux, Paul, 1930- author




hy

Complex ecology : foundational perspectives on dynamic approaches to ecology and conservation / edited by Charles G. Curtin (University of Montana), Timothy F.H. Allen (University of Wisconsin, Madison)




hy

Fundamentals of site remediation : for metal and hydrocarbon-contaminated soils / John Pichtel

Pichtel, John, 1957- author




hy

Global environment outlook : GEO-6 : healthy planet, healthy people / edited by Paul Elkins, Joyeeta Gupta, Pierre Boileau




hy

Why we love and exploit animals : bridging insights from academia and advocacy / edited by Kristof Dhont, Gordon Hodson




hy

Coronavirus has accelerated importance of AI, hybrid cloud: IBM CEO

Speaking during a keynote at the IBM's Think Digital 2020 conference, Krishna said the pace of adoption of transformation journeys by enterprises has been "compacted" into months




hy

Breaking news : the remaking of journalism and why it matters now / Alan Rusbridger

Rusbridger, Alan, author




hy

Eminent litterateur Sunil Gangopadhyay passes away




hy

Why did HBT not approach WB govt directly: minister



  • DO NOT USE West Bengal
  • India

hy

Pressure Hydrometallurgy 2004 : 34th Annual Hydrometallurgy Meeting of CIM, October 23 rd--27th, 2004, Banff, Alberta, Canada : proceedings of the International Conference on the Use of Pressure Vessels for Metal Extraction and Recovery / editors, M.J.Col

Hydrometallurgy Meeting (34th : 2004 : Banff, Alta.)




hy

ALTA Copper 1999 : copper sulphides symposium & copper hydrometallurgy forum : technical proceedings




hy

Copper Hydrometallurgy Forum : September 18-19, 1995, Sheraton Hotel, Brisbane, Australia / organised by ALTA Metallurgical Services

Copper Hydrometallurgy Forum (1995 : Brisbane, Qld.)




hy

ALTA 1997 Copper Hydrometallurgy Forum : October 20-21, 1997, Sheraton Hotel, Brisbane, Australia

Copper Hydrometallurgy Forum (1997 : Brisbane, Qld.)




hy

ALTA 1996 Copper Hydrometallurgy Forum : October 14-15, 1996, Sheraton Hotel, Brisbane, Australia / organised by ALTA Metallurgical Services

Copper Hydrometallurgy Forum (1996 : Brisbane, Qld.)




hy

ALTA 1998 Copper Hydrometallurgy Forum : October 20-21, 1998, Brisbane Marriott Hotel, Queensland, Australia : technical proceedings / organised by ALTA Metallurgical Services

Copper Hydrometallurgy Forum 1998 : Brisbane, Qld.)




hy

ALTA 1999 Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum : May 11-12, 1999, Rendezvous Observation City Hotel, Perth, Australia / ALTA Metallurgical Services, Melbourne, Australia

Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum (5th : 1999 : Perth, W.A.)




hy

ALTA 1998 Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum : May 25-27, 1998, Hyatt Regency Hotel, Perth, Australia / ALTA Metallurgical Services, Melbourne, Australia

Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum (4th : 1998 : Perth, W.A.)




hy

ALTA 1997 Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum : May 19-20, 1997, Hyatt Hotel, Perth, Western Australia

Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum (1997 : Perth, W.A.)




hy

Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum : May 13-14, 1996, Hyatt Hotel, Perth, Western Australia / organised by ALTA Metallurgical Services

Nickel/Cobalt Pressure Leaching & Hydrometallurgy Forum (1996 : Perth, W.A.)




hy

Nickel/Cobalt SX/EW Seminar : May 16, 1996, Hyatt Hotel, Perth, Western Australia / organised by ALTA Metallurgical Services




hy

The use of smoke water and gibberellic acid to break dormancy in hypocalymma angustifolium / E. L. Cromer

Cromer, E. L




hy

Impurity control and disposal in hydrometallurgical processes : 24th annual Hydrometallurgical Meeting : proceedings of the International Symposium on Impurity Control and Disposal in Hydrometallurgical Processes, Toronto, Ontario, Canada, August 21-24, 1

International Symposium on Impurity Control and Disposal in Hydrometallurgical Processes (1994 : Toronto, Ont.)




hy

Hydrometallurgy : principles and applications / Tomáš Havlik

Havlík, T. (Tomáš)




hy

International Symposium on Hydrometallurgy, Chicago, Illinois, February 25-March 1, 1973. : Editors: D. J. I. Evans and R. S. Shoemaker

International Symposium on Hydrometallurgy (2nd : 1973 : Chicago, Ill.)




hy

Impurity control & disposal : proceedings of the CIM 15th Annual Hydrometallurgical meeting, held in conjunction with the CIM 24th Annual Conference of Metallurgists, Vancouver, Canada, 1985

Hydrometallurgical Meeting (15th : 1985 : Vancouver, B.C.)