Re: ISSUE-37: qualify your interrupts (from public comments)

I think we're good on this one.

And as we've discussed, not all presentation techniques can be (easily) 
spoofed. Those relying on "shared secrets" (petnames, tartans, personal 
information), for example. And of course, input rituals are not "only" 
presentation techniques. 

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect




Web Security Context Issue Tracker <dean+cgi@w3.org> 
Sent by: public-wsc-wg-request@w3.org
04/15/2007 10:48 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>


To
public-wsc-wg@w3.org
cc

Subject
ISSUE-37: qualify your interrupts (from public comments)








ISSUE-37: qualify your interrupts (from public comments)

http://www.w3.org/2006/WSC/Group/track/issues/37

Raised by: Bill Doyle
On product: Note: use cases etc.

>From public comments
raised by: Al Gilman Alfred.S.Gilman@ieee.org

http://lists.w3.org/Archives/Public/public-usable-
authentication/2007Apr/0000.html

qualify your interrupts 
where it says, in 2.4 User awareness of security information
  The Working Group will recommend presentation techniques that
   integrate the consumption of security information by the user into
   the normal browsing workflow. Presenting security information in a
   way that is typically ignored by the user is of little value.
please consider
Yes.  The WAI-ARIA technologies are targeted to bring into the fold of 
accessible web content newer, more integrated high-usability interaction 
gestures (such as transient flyouts for information or action), as opposed 
to 
older gestures such as loading a whole new page or launching a popup 
dialog. 
We should work together. And yes, you sometimes have to get the user's 
attention.  But on the other hand there are real "boy crying wolf" 
problems if 
you contend too hard for the user's attention. 
Why? 
There is a rather unruly free-for-all going on out there vying for the Web 

wanderer's attention.  How do you get the user's appropriate attention? In 

part by not seeking it unnecessarily.  I know you are addressing this in 
part 
under 2.2.  But it also goes for how you blend the security message into 
the 
flow vs. distinguish it so that it is recognized for what it is.  All 
presentation-based distinctions (2.3) are subject to imitative spoofing 
attacks.  The communication of a "continuing all clear" security status 
should 
be something the user is likely to ignore.  Because it doesn't represent a 

change from what the user has internalized about their dialog context, nor 

anything that the user needs to do something about.  The trick is to have 
the 
user's field of focus infiltrated with rationally-chosen gestures of 
graded 'initiative-grabbing' quality for the communication of different 
hazard 
or reassurance levels in the security context.  Contemporary 
rich-interaction 
Web and installed applications afford a greater variety of such gestures 
with 
more subtle variation in attention- or initiative-grabbing quality.  Yes, 
we 
want to get with the program in this regard.

Received on Wednesday, 18 April 2007 12:36:53 UTC