SlideShare a Scribd company logo
Bug or Feature? Covert Impairments to Human
Computer Interaction
John V. Monaco
Naval Postgraduate School, Monterey, CA
CHI 2020
Kim SeongOuk
2021.08.13.
Contents
•Introduction
•Definition and Background
•Kind of Impairments
•Covert Impairments
•Discussion
•Related Works
•Conclusion and Future Work
2
Introduction
• Motivation
 Users have acclimated to subtle HCI anomalies
 Intentional anomalies(covert impairments) Appeared
 Widespread, but little is known
• Goal
 Provide a coherent framework for covert impairments
 Highlight usage of covert impairments in “wild”
3
Definition and Background
• Deceive - User’s belief about a system is “demonstrably false”
• Modify - “Intentionally” adjust peripheral input
• Influence - within cognitive level(10−1
s~102
s) of the Newell’s time
scale
4
Kind of Impairments
• Interaction, Impairment
 Interaction – Mechanical determination
 Impairment – Breakdown between input and invoked state
• Unintentional Impairments
 Not intentionally introduced, but attributed to a legitimate sources
 Main sources
• Hardware defects
• Software bugs
• Resource constraints
• Covert Impairments
5
Covert Impairments
• Use inductive coding procedure
 Start with set of exemplars encountered by authors and colleagues
• Extract 4 canonical impairments(IDSL)
 Search other applications with 3 Conditions
1. Modify user input
2. Don’t reveal to the user those modification
3. Decrease task performance
 Characterize in 5 dimensions
6
Covert Impairments
• Modality – peripheral sensor
through which the impairment
occurs
• Impairment – modification to the
input event provided by the sensor
 Insertion
 Deletion
 Substitution
 Lag
7
Covert Impairments
• Intent – which party will benefit from the
impairment
• Malevolent
 Designer > User
 Risk to harm to the user without benefit
• Benevolent
 Designer ≤ User
 Doesn’t mean no risk, but minimized or balanced with
other needs
8
Covert Impairments
• Reaction – Whether designer rely on individual
or group
• Individual
 Between-subject differences due to Unique and
identifiable behavior of individuals
• Group
 Between-subject similarities due to same set of
physiological and cognitive constraints
9
Covert Impairments
• Goal – Outcome from interaction
• Elicit
 Influence user’s behavior to reveal information
 User identification (Cognitive biometrics)
 Bot/fraud detection(CAPTCHA)
10
Covert Impairments
• Coerce
 Influence users to perform a chosen action
 (click, cursor, stroke)-jacking
 Electronic voting
11
Covert Impairments
• Induce
 Alter the user’s affective state and reveal
limits of human psychomotor system
 Affective computing
 Cognitive science
 Entertainment
12
Covert Impairments
13
Discussion
• Ethical and practical consideration
 Involuntary actions
 Resentment
 Privacy
 Cost vs return
 Timing
 Sustainability
 Three impact to balance these consideration
• Task impact – Event sequence difference
• User impact – Cost to the user
• Population impact – Proportion of users vulnerable to impairment
14
Discussion
• Detection and countermeasures
 Defenses Range from detection to prevention
• Detection – Establish the presence and can avoid
• Prevention – removed or neutralized
 Malevolent impairments
• Detection and prevention for users
• Detection – closed loop measurements
• Prevention – using concepts in W3C UI safety specification
 Benevolent impairments
• Need to be effective and not circumvented
15
Related Works
• Concealed information tests
 Reveal deception through mouse pointer motion
• Reflexive eye movements
 Induce Reflexive eye movements for biometric authentication
• Subliminal cueing Through UI design
• Difficult interfaces
 Show users’ reaction and adaption to impairments
• Dark patterns
 Similar with Covert impairments, but have key differences
• All of these are at interface level
16
Conclusion and Future Work
• This paper
 Systemized impairments into 4 kinds (IDSL)
 Use of Covert impairments is largely concentrated in cybersecurity
 Mitigation
Opinion
 Detailed description with examples
 Not enough/appropriate figures
 Covert impairment for preventing over-immersion?
 Other unsystematized things like this?
17
Else – Doing regretful behavior
• Distraction
 How blocking distractions affects workplace focus and productivity (Gloria Mark, et
al. UbiComp ‘17)
• Drunk
 Drunk User Interfaces: Determining Blood Alcohol Level through Everyday
Smartphone Tasks (Alex Mariakakis, et al. CHI ’18)
• Mistakes in social media
 Eye Tracking Analysis of User Behavior in Online Social Networks (Wan Adilah Wan
Adnan, et al. HCII 2013)
Thank you
Any questions?

More Related Content

PPTX
Effects of Individual Differences in Blocking Workplace Distractions
PPTX
[0402]hwiyeon labseminar
PDF
Beyond Eye Tracking: Using User Temperature, Rating Dials, and Facial Analysi...
PDF
Agile, DevOps, X-Teams: Is software a social science?
PPTX
D esign rules(ch7)
PDF
Introduction to Systems Thinking
PDF
Keep Calm and Read the Instructions: Factors for Successful User Equipment Setup
PDF
Metrics in usability testing and user experiences
Effects of Individual Differences in Blocking Workplace Distractions
[0402]hwiyeon labseminar
Beyond Eye Tracking: Using User Temperature, Rating Dials, and Facial Analysi...
Agile, DevOps, X-Teams: Is software a social science?
D esign rules(ch7)
Introduction to Systems Thinking
Keep Calm and Read the Instructions: Factors for Successful User Equipment Setup
Metrics in usability testing and user experiences

What's hot (10)

PDF
Meta-study results of participatory processes
PPT
EDUCAUSE: Transformation of Help Desk Services at Rutgers
PPTX
Guerrilla (or Agile) Evaluation for Learning
PPT
Decision making
PPTX
MPhil Mid-Candidature
PDF
Work related stress 23 oct15
PDF
Permaculture Assessment; Processes for Closed Resource Cycles, Energy, John C...
PPTX
Activity Systems Analysis in Design Research
PPTX
Methods for analyzing the impacts of workplace changes on knowledge work
PPT
E3 chap-07
Meta-study results of participatory processes
EDUCAUSE: Transformation of Help Desk Services at Rutgers
Guerrilla (or Agile) Evaluation for Learning
Decision making
MPhil Mid-Candidature
Work related stress 23 oct15
Permaculture Assessment; Processes for Closed Resource Cycles, Energy, John C...
Activity Systems Analysis in Design Research
Methods for analyzing the impacts of workplace changes on knowledge work
E3 chap-07
Ad

Similar to Bug or Feature? Covert Impairments to Human Computer Interaction (20)

PPTX
Design Tips to Help Users with Visual Disabilities Stay Safe Online
PPTX
Design Tips to Help Non-Visual Visitors Stay Safe Online
PDF
Chapter1. Introduction to Human Computer Interaction
PDF
Accessible Privacy and Security
PPTX
Human Factors at the Grid Edge
PPTX
The Psychology of Human-Computer Interaction
PPTX
Chapter 3 principles of hci
PDF
Cognitive Disabilities
PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPTX
Lorrie Cranor - Usable Privacy & Security
PDF
HCI - 2 - Usability & User Experience.pdf
PPTX
Web_Accessibility
PPTX
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
PPT
Disabilities and Accessible Web
DOCX
Designing with the Mind in MindSimple Guide to Unde.docx
PPTX
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
PDF
Designing for Usable Security and Privacy
PPTX
CHAPTER 1 RESUME.pptx
DOCX
3282016 Additional Book Resourceshttpscourserooma.cap.docx
PDF
chapter_01_5e.pdf
Design Tips to Help Users with Visual Disabilities Stay Safe Online
Design Tips to Help Non-Visual Visitors Stay Safe Online
Chapter1. Introduction to Human Computer Interaction
Accessible Privacy and Security
Human Factors at the Grid Edge
The Psychology of Human-Computer Interaction
Chapter 3 principles of hci
Cognitive Disabilities
2.4.1 - Intro to Cyber Security for students.ppt
Lorrie Cranor - Usable Privacy & Security
HCI - 2 - Usability & User Experience.pdf
Web_Accessibility
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Disabilities and Accessible Web
Designing with the Mind in MindSimple Guide to Unde.docx
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Designing for Usable Security and Privacy
CHAPTER 1 RESUME.pptx
3282016 Additional Book Resourceshttpscourserooma.cap.docx
chapter_01_5e.pdf
Ad

More from ivaderivader (20)

PPTX
Argument Mining
PPTX
Papers at CHI23
PPTX
DDGK: Learning Graph Representations for Deep Divergence Graph Kernels
PPTX
So Predictable! Continuous 3D Hand Trajectory Prediction in Virtual Reality
PPTX
Reinforcement Learning-based Placement of Charging Stations in Urban Road Net...
PPTX
Prediction for Retrospection: Integrating Algorithmic Stress Prediction into ...
PPTX
Mem2Seq: Effectively Incorporating Knowledge Bases into End-to-End Task-Orien...
PPTX
A Style-Based Generator Architecture for Generative Adversarial Networks
PPTX
CatchLIve: Real-time Summarization of Live Streams with Stream Content and In...
PPTX
Perception! Immersion! Empowerment! Superpowers as Inspiration for Visualization
PPTX
Learning to Remember Patterns: Pattern Matching Memory Networks for Traffic F...
PPTX
Neural Approximate Dynamic Programming for On-Demand Ride-Pooling
PPTX
StoryMap: Using Social Modeling and Self-Modeling to Support Physical Activit...
PPTX
Bad Breakdowns, Useful Seams, and Face Slapping: Analysis of VR Fails on YouTube
PPTX
Invertible Denoising Network: A Light Solution for Real Noise Removal
PPTX
Traffic Demand Prediction Based Dynamic Transition Convolutional Neural Network
PPTX
MusicBERT: Symbolic Music Understanding with Large-Scale Pre-Training
PPTX
Screen2Vec: Semantic Embedding of GUI Screens and GUI Components
PPTX
Augmenting Decisions of Taxi Drivers through Reinforcement Learning for Impro...
PPTX
Natural Language to Visualization by Neural Machine Translation
Argument Mining
Papers at CHI23
DDGK: Learning Graph Representations for Deep Divergence Graph Kernels
So Predictable! Continuous 3D Hand Trajectory Prediction in Virtual Reality
Reinforcement Learning-based Placement of Charging Stations in Urban Road Net...
Prediction for Retrospection: Integrating Algorithmic Stress Prediction into ...
Mem2Seq: Effectively Incorporating Knowledge Bases into End-to-End Task-Orien...
A Style-Based Generator Architecture for Generative Adversarial Networks
CatchLIve: Real-time Summarization of Live Streams with Stream Content and In...
Perception! Immersion! Empowerment! Superpowers as Inspiration for Visualization
Learning to Remember Patterns: Pattern Matching Memory Networks for Traffic F...
Neural Approximate Dynamic Programming for On-Demand Ride-Pooling
StoryMap: Using Social Modeling and Self-Modeling to Support Physical Activit...
Bad Breakdowns, Useful Seams, and Face Slapping: Analysis of VR Fails on YouTube
Invertible Denoising Network: A Light Solution for Real Noise Removal
Traffic Demand Prediction Based Dynamic Transition Convolutional Neural Network
MusicBERT: Symbolic Music Understanding with Large-Scale Pre-Training
Screen2Vec: Semantic Embedding of GUI Screens and GUI Components
Augmenting Decisions of Taxi Drivers through Reinforcement Learning for Impro...
Natural Language to Visualization by Neural Machine Translation

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25-Week II
WOOl fibre morphology and structure.pdf for textiles
Encapsulation_ Review paper, used for researhc scholars
Chapter 5: Probability Theory and Statistics
Zenith AI: Advanced Artificial Intelligence
Approach and Philosophy of On baking technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Bug or Feature? Covert Impairments to Human Computer Interaction

  • 1. Bug or Feature? Covert Impairments to Human Computer Interaction John V. Monaco Naval Postgraduate School, Monterey, CA CHI 2020 Kim SeongOuk 2021.08.13.
  • 2. Contents •Introduction •Definition and Background •Kind of Impairments •Covert Impairments •Discussion •Related Works •Conclusion and Future Work
  • 3. 2 Introduction • Motivation  Users have acclimated to subtle HCI anomalies  Intentional anomalies(covert impairments) Appeared  Widespread, but little is known • Goal  Provide a coherent framework for covert impairments  Highlight usage of covert impairments in “wild”
  • 4. 3 Definition and Background • Deceive - User’s belief about a system is “demonstrably false” • Modify - “Intentionally” adjust peripheral input • Influence - within cognitive level(10−1 s~102 s) of the Newell’s time scale
  • 5. 4 Kind of Impairments • Interaction, Impairment  Interaction – Mechanical determination  Impairment – Breakdown between input and invoked state • Unintentional Impairments  Not intentionally introduced, but attributed to a legitimate sources  Main sources • Hardware defects • Software bugs • Resource constraints • Covert Impairments
  • 6. 5 Covert Impairments • Use inductive coding procedure  Start with set of exemplars encountered by authors and colleagues • Extract 4 canonical impairments(IDSL)  Search other applications with 3 Conditions 1. Modify user input 2. Don’t reveal to the user those modification 3. Decrease task performance  Characterize in 5 dimensions
  • 7. 6 Covert Impairments • Modality – peripheral sensor through which the impairment occurs • Impairment – modification to the input event provided by the sensor  Insertion  Deletion  Substitution  Lag
  • 8. 7 Covert Impairments • Intent – which party will benefit from the impairment • Malevolent  Designer > User  Risk to harm to the user without benefit • Benevolent  Designer ≤ User  Doesn’t mean no risk, but minimized or balanced with other needs
  • 9. 8 Covert Impairments • Reaction – Whether designer rely on individual or group • Individual  Between-subject differences due to Unique and identifiable behavior of individuals • Group  Between-subject similarities due to same set of physiological and cognitive constraints
  • 10. 9 Covert Impairments • Goal – Outcome from interaction • Elicit  Influence user’s behavior to reveal information  User identification (Cognitive biometrics)  Bot/fraud detection(CAPTCHA)
  • 11. 10 Covert Impairments • Coerce  Influence users to perform a chosen action  (click, cursor, stroke)-jacking  Electronic voting
  • 12. 11 Covert Impairments • Induce  Alter the user’s affective state and reveal limits of human psychomotor system  Affective computing  Cognitive science  Entertainment
  • 14. 13 Discussion • Ethical and practical consideration  Involuntary actions  Resentment  Privacy  Cost vs return  Timing  Sustainability  Three impact to balance these consideration • Task impact – Event sequence difference • User impact – Cost to the user • Population impact – Proportion of users vulnerable to impairment
  • 15. 14 Discussion • Detection and countermeasures  Defenses Range from detection to prevention • Detection – Establish the presence and can avoid • Prevention – removed or neutralized  Malevolent impairments • Detection and prevention for users • Detection – closed loop measurements • Prevention – using concepts in W3C UI safety specification  Benevolent impairments • Need to be effective and not circumvented
  • 16. 15 Related Works • Concealed information tests  Reveal deception through mouse pointer motion • Reflexive eye movements  Induce Reflexive eye movements for biometric authentication • Subliminal cueing Through UI design • Difficult interfaces  Show users’ reaction and adaption to impairments • Dark patterns  Similar with Covert impairments, but have key differences • All of these are at interface level
  • 17. 16 Conclusion and Future Work • This paper  Systemized impairments into 4 kinds (IDSL)  Use of Covert impairments is largely concentrated in cybersecurity  Mitigation Opinion  Detailed description with examples  Not enough/appropriate figures  Covert impairment for preventing over-immersion?  Other unsystematized things like this?
  • 18. 17 Else – Doing regretful behavior • Distraction  How blocking distractions affects workplace focus and productivity (Gloria Mark, et al. UbiComp ‘17) • Drunk  Drunk User Interfaces: Determining Blood Alcohol Level through Everyday Smartphone Tasks (Alex Mariakakis, et al. CHI ’18) • Mistakes in social media  Eye Tracking Analysis of User Behavior in Online Social Networks (Wan Adilah Wan Adnan, et al. HCII 2013)

Editor's Notes

  • #5: Deceive – Similar with behavior deception in the work Adar et al, but have key different
  • #6: Interaction – mechanical determination Impairments – breakdown that occurs somewhere between user input and system state. In
  • #7: Condition 3 ? – To exclude assistive technology such as hardware acceleration
  • #11: 유저 식별 사진 출처: https://patents.google.com/patent/US20140078061A1/en 봇 탐지 사진 출처: https://reader.elsevier.com/reader/sd/pii/S0969476517301145?token=8AECE520914B7DA352CA52FB9336B29275041D0D2117FD4FA1B656152B73DC591C13BA9A8A05CB228082BEEA911D4E16&originRegion=us-east-1&originCreation=20210811013156 Invisible challenges: the next step in behavioural biometrics?
  • #13: 팩맨 사진 출처 - Affective Pacman: A Frustrating Game for Brain-Computer Interface Experiments in Experimental Approach to Affective Interaction in Games – frustratio이 BCI에 주는 영향을 확인하기 위해 Covert impairment를 활용 왼쪽 사진 출처 - Fast corrections of movements with a computer mouse -
  • #15: Cost to the user(e.g. increased cognitive load, negative effect)
  • #17: A subliminal cue is defined as any cue whose intensity is below the level of consciousness but receives perceptual and semantic processing Dark patterns VS Covert impairments DP: all malevolent, not all deceptive Covert impairments: not all malevolent, all deceptive
  • #18: Mitigation and detection of Covert impairments can be used to ensure HCI integrity