Professional Documents
Culture Documents
LECTURE 11:
User Interface and System Security
and Controls
1
Topics
Inputs and Outputs
User and System Interface
User-Centered Design
Metaphors for HCI
Designing System Inputs
Designing System Outputs
Designing Integrity Controls
Designing Security Controls
Managing User Access
Data Security 2
Identifying and Classifying
Inputs and Outputs
Identified by analyst when defining
system scope
4
User versus System Interface
6
Aspects of the User Interface
7
User-Centered Design
Focus early on the users and their work by
focusing on requirements
Usability - system is easy to learn and use
Iterative development keeps focus on
user
Continually return to user requirements and
evaluate system after each iteration
Human-computer interaction (HCI)
Study of end users and interaction with
computers
Human factors engineering (ergonomics)
8
Metaphors for
Human-Computer Interaction
Direct manipulation metaphor
User interacts with objects on display
screen
Document metaphor
Computer is involved with browsing and
entering data in electronic documents
WWW, hypertext, and hypermedia
Dialog metaphor
Much like carrying on a conversation
9
Desktop Metaphor Based on Direct
Manipulation Shown on Display
Screen
10
Document Metaphor Shown as
Hypermedia in Web Browsers
11
Dialog Metaphor Expresses the
Messaging Concept
12
Guidelines for Designing User
Interfaces
Visibility
All controls should be visible
Provide immediate feedback to indicate control
is responding
Affordance
Appearance of control should suggest its
functionality – purpose for which it is used
System developers should use published
interface design standards and guidelines
13
Eight Golden Rules for
Interactive Interface Design
14
Documenting Dialog Designs
Done simultaneously with other system
activities
Based on inputs and outputs requiring user
interaction
Used to define menu hierarchy
Allows user to navigate to each dialog
Provides overall system structure
Each Use
Case is Listed
Under a Menu
Utilities,
Preferences,
and Help Are
Added
16
Dialogs and Storyboards
Many methods exist for documenting
dialogs
Written descriptions following flow of activities
like in use case description
Narratives
Sketches of screens
Storyboarding – showing sequence of sketches
of display screen during a dialog
17
Storyboard
for the
Downtown
Videos
Rent
Videos
Dialog
18
Guidelines for Designing
Windows and Browser Forms
Each dialog might require several windows forms
Standard forms are widely available
Windows: Visual Basic, C++, C#, Java
Browser: HTML, VBScript, JavaScript, ASP, Java servlets
Implementation
Identify objectives of form and associated data fields
Construct form with prototyping tools
19
Form Design Issues
Main menu
Customer
Item search
Product detail
Order summary
Shipping and payment options
Order confirmation 22
Design Concept for Sequential
Approach to Create New Order
Dialog
23
Design Concept for Order-Centered
Approach to Create New Order
Dialog
24
Prototype Main Menu Form for
Order-Centered Approach to Dialog
25
Order Summary and Product
Detail Forms
26
Completed Order Summary and
Shipping Payment Forms
27
Identifying System Interfaces
http://www.informationaddicts.com 29
Full Range of Inputs and Outputs
30
Design of System Inputs
34
Automation Boundary on a
System-Level DFD
35
Create New Order DFD with
an Automation Boundary
36
List of Inputs for Customer
Support System
37
Data Flows, Data Couples, and Data
Elements Making Up Inputs
38
Using Object-Oriented Models
39
Partial System Sequence Diagram
for Payroll System Use Cases
40
System Sequence Diagram for
Create New Order
41
Input Messages and Data
Parameters from RMO System
Sequence Diagram
42
Designing System Outputs
Types of reports
Printed reports
Electronic displays
Turnaround documents
Can use traditional structured models
to identify outputs
Data flows crossing automation
boundary
Data couples and report data
requirements on structure chart
44
Table of System Outputs Based on
Traditional Structured Approach
45
Using Object-Oriented Models
46
Table of System Outputs Based
on OO Messages
47
Designing Integrity Controls
Integrity controls
Built into application and database
system to safeguard information
Security controls
Built into operating system and network48
Objectives of Integrity Controls
50
Input Integrity Controls
Access controls
Data encryption
Transaction controls
Update controls
Backup and recovery protection
52
Output Integrity Controls
55
Designing Security Controls
56
Security for Access to Systems
58
Managing User Access
59
Data Security
61
Asymmetric Key Encryption
62
Digital Signatures and Certificates
64
Secure Transactions
65
The End!
http://www.visualjokes.com
66