An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | March 1, 2016

Automated Metrics for Evaluating Adversarial Interfaces

By Ryan Tate, Col. Gregory Conti, Alexander Farmer, and Dr. Edward Sobiesk

Contrary to the idealistic notion that human-computer interfaces are designed to actively help users accomplish their goals, millions of people who use the World Wide Web every day encounter a wide variety of interfaces that aggressively divert users toward the goals of the designer and away from those of the user. We label such strategies "adversarial interface design." Techniques of adversarial design include coercion, confusion, distraction, exploiting errors, forced work, interruption, manipulating navigation, obfuscation, restricting functionality, shock, and trickery [10]. See Figure 1 for several illustrations of these techniques. A key distinction of adversarial design from bad design is the deliberate attempt by the designer to manipulate the user or subvert user intentions.

 

READ MORE

 

PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023