(Stalker-Firth, R., July 2003)
Continue readingAuthor: stalker
stalker
Why task analysis doesn’t do it for me
Like every self-respecting human-computer interaction (HCI) lecturer, I introduce task analysis or the technique of analysing how people perform a
Continue readingCodebreaking: Humans are the weakest link
People are the weakest link in all computer systems. We hear about the best cryptography money can buy: integrity checking,
Continue readingCognitive Science for IT Security
Humans are involved in 80-90% of IT security system breaches. We have the technological capacity to keep our software systems
Continue readingWho ordered pizza?
In the above picture a newbie gamer has organised a telephone for his Sim so that it can order pizza.
Continue reading