User Interface Dependability Through Goal-Error Prevention

Total Page:16

File Type:pdf, Size:1020Kb

User Interface Dependability Through Goal-Error Prevention International Conference on Dependable Systems & Networks: Yokohama, Japan, 28 June - 01 July 2005 User Interface Dependability through Goal-Error Prevention Robert W. Reeder and Roy A. Maxion [email protected] and [email protected] Dependable Systems Laboratory Computer Science Department Carnegie Mellon University Pittsburgh, Pennsylvania 15213 / USA Abstract human error leads people off the path of correctly complet- ing a task and on to lengthy delays or partial or total task User interfaces form a critical coupling between humans failure. Thus, it is imperative for interface designers to un- and computers. When the interface fails, the user fails, and derstand the common types and causes of human error and the mission is lost. For example, in computer security appli- the ways in which they may be prevented. When interfaces cations, human-made configuration errors can expose en- are designed to eliminate the conditions that lead humans to tire systems to various forms of attack. make mistakes, interfaces will be more dependable. To avoid interaction failures, a dependable user inter- One domain in which user interface accuracy is critically face must facilitate the speedy and accurate completion of important is computer security. Inaccurate security settings user tasks. Defects in the interface cause user errors (e.g., can have a high cost – they can make sensitive data vul- goal, plan, action and perception errors), which impinge on nerable, or they can leave an entire system open to attack. speed and accuracy goals, and can lead to mission failure. Adding to this cost, security problems have what Whitten One source of user error is poor information represen- and Tygar [20] have called the “barn door property” – once tation in the interface. This can cause users to commit a a system has had a vulnerability for any length of time, there specific class of errors – goal errors. A design principle may be no way to know if the vulnerability has been ex- (anchor-based subgoaling) for mitigating this cause was ploited, so the system will have to be considered compro- formulated. The principle was evaluated in the domain of mised, whether it has been or not. setting Windows file permissions. The native Windows XP The present work investigates user interface dependabil- file permissions interface, which did not support anchor- ity and human error in the security context of setting file based subgoaling, was compared to an alternative, called permissions under Microsoft’s Windows XP operating sys- Salmon, which did. In an experiment with 24 users, Salmon tem, which uses Microsoft’s NT file system (NTFS). A sig- achieved as much as a four-fold increase in accuracy for a nificant amount of anecdotal evidence suggests that setting representative task and a 94% reduction in the number of NTFS file permissions is a particularly error-prone task. goal errors committed, compared to the XP interface. For example, there is the so-called “Memogate” scandal, in which staffers from one party on the United States Sen- ate Judiciary Committee stole confidential memos from the 1 Introduction opposing party [19]. The memos were stored on a shared One locus of vulnerability in a computer system is the NTFS server. The theft was possible in part because an in- user interface. Undependable interfaces are those that do experienced system administrator had failed to set permis- not meet their specifications in terms of the speed and ac- sions correctly on the shared server. As another example, curacy with which users should complete tasks. One rea- a Windows network administrator at Carnegie Mellon Uni- son why some user interfaces fail to meet their speed and versity reports that many users want to share their files so accuracy specifications is human error. Researchers have they can access them both at work and at home; they ac- long recognized that human error has causes and manifes- cidentally make their private files accessible to all (several tations similar across all domains of human endeavor, from hundred) users on the network, because it is too confusing to aviation, to power plant operation, to making a cup of tea set permissions as actually desired [18]. Finally, Microsoft [13, 15, 17, 21]. In the domain of software user interfaces, publishes a list of “best practices” for NTFS security that 0-7695-2282-3/05 $20.00 c 2005 IEEE 60 DSN 2005: Reeder & Maxion International Conference on Dependable Systems & Networks: Yokohama, Japan, 28 June - 01 July 2005 advises users not to use several of the features of the NTFS Specifically, information that was necessary to complete permissions model, such as negative (i.e., DENY) permis- tasks accurately was hidden or was entirely missing from sions [10]. Use of these features “... could cause unexpected the interface. Cognitive theory suggests that without ready access problems or reduce security.” Providing access to access to necessary information, users are likely to commit features which are apparently problematic is bound to lead goal errors (see Section 5.1). A solution was proposed to to errors. reduce the occurrence of goal errors. This solution, called As these anecdotes indicate, setting and checking per- anchor-based subgoaling, led to the following hypothesis: missions cannot always be left to expert system adminis- trators – users in many environments need or want to take Use of anchor-based subgoaling in user interface responsibility for protecting their own data. Nevertheless, design reduces the likelihood that users will com- setting file permissions is not an everyday task; it may need mit goal errors, and task accuracy rates should im- to be done only every few weeks or months. Thus, those prove when goal errors are reduced. setting file permissions will often not be expert system ad- ministrators – they will be novice or occasional users, who, This hypothesis was tested by implementing an interface, from time to time, want to restrict access to files or grant ac- Salmon, designed in accordance with the anchor-based sub- cess to a limited number of associates. They will not readily goaling procedure, and by conducting a laboratory user remember arcane details about how to operate a permission- study comparing the XPFP interface to Salmon. Task suc- setting interface. The present work adopts the position that cess rates and goal-error occurrences were compared be- permission-setting interfaces should accommodate novice tween XPFP and Salmon to determine whether anchor- and occasional users. based subgoaling as implemented in Salmon was an effec- This paper reports an investigation into, and a solution tive means of improving successful task completion and re- for, one type of human error encountered in permission- ducing goal errors. setting interfaces. An existing interface for setting NTFS 3 Related work permissions, the Windows XP File Permissions interface File permissions are an instance of the broader area of (hereafter abbreviated XPFP), was shown to have accuracy access control in which several authors have published re- rates as low as 25% on permission-setting tasks. Errors lated work. Those who have evaluated interfaces for setting made by users of the XPFP interface were identified and file access include Good and Krekelberg [7], Long et al. [9] categorized into types according to an established human- and Zurko et al. [24]. Zurko et al. conducted a user study error framework. Goal errors, the failures of users to under- on the Visual Policy Builder, a graphical user interface for stand what to do, were identified as the dominant type of specifying access control policies for their Adage system. error. A primary cause of goal errors, namely a poor exter- Good and Krekelberg showed that the Kazaa peer-to-peer nal representation of the information needed to complete the file-sharing service’s interface misled many users into unin- user’s root goal – a representation that is sometimes called tentionally sharing confidential files. Long et al. evaluated a an anchor (for concepts held in human memory) – was iden- preliminary, paper-based interface for limiting applications’ tified. A design principle, anchor-based subgoaling, was access to system resources. While these three interface eval- proposed to reduce goal errors, and was implemented in a uations were interesting in their specific task domains, none new interface, called Salmon, for setting NTFS file permis- appear to lead to any conclusion about design principles for sions. The design principle was evaluated in a laboratory security interfaces in a larger context. user study comparing Salmon to XPFP. Salmon achieved Other work in usable access control in various domains a success rate of 100% on the task on which XPFP had includes Balfanz [2], Sampemane et al. [16], and Dewan achieved a 25% accuracy rate, and showed a 94% reduc- and Shen [5]. With the exception of the Adage project and tion in the number of goal errors users made on the same Long et al., work in this area involves outlining access con- task. trol models, not evaluating access control interfaces, as the 2 Problem and approach present work sets out to do. The objective of the present work is to understand the In the broader human-computer interaction and security causes of user error in user interfaces generally, and in literature (an emerging field known as HCISEC), those who XPFP in particular, and to determine what can be done to have proposed principles for better security interface de- mitigate or eliminate them. It is a further objective to find sign include Whitten and Tygar [20], Adams and Sasse [1], a design principle that can be applied to new generations of Besnard and Arief [3], Zurko and Simon [25], and Yee [23]. user interfaces so that the same user errors are not encoun- These authors propose ideas for making security tasks eas- tered again and again in future user interfaces.
Recommended publications
  • User Interface Design Issues in HCI
    IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.8, August 2018 153 User Interface Design Issues In HCI Waleed Iftikhar, Muhammad Sheraz Arshad Malik, Shanza Tariq, Maha Anwar, Jawad Ahmad, M. Saad sultan Department of Computing, Riphah International University, Faisalabad, Pakistan Summary Command line is the interface that allows the user to This paper presents an important analysis on a literature review interact with the computer by directly using the commands. which has the findings in design issues from the year 1999 to But there is an issue that the commands cannot be changed, 2018. This study basically discusses about all the issues related they are fixed and computer only understands the exact to design and user interface, and also gives the solutions to make commands. the designs or user interface more attractive and understandable. This study is the guideline to solve the main issues of user Graphical user interface is the interface that allows the interface. user to interact with the system, because this is user There is important to secure the system for modern applications. friendly and easy to use. This includes the graphics, The use of internet is quickly growing from years. Because of pictures and also attractive for all type of users. The this fast travelling lifestyle, where they lets the user to attach with command line is black and white interface. This interface systems from everywhere. When user is ignoring the is also known as WIMPS because it uses windows, icons, functionalities in the system then the system is not secure but, in menus, pointers.
    [Show full text]
  • Designing for Increased Autonomy & Human Control
    IFIP Workshop on Intelligent Vehicle Dependability and Security (IVDS) January 29, 2021 Designing for Increased Autonomy & Human Control Ben Shneiderman @benbendc Founding Director (1983-2000), Human-Computer Interaction Lab Professor, Department of Computer Science Member, National Academy of Engineering Photo: BK Adams IFIP Workshop on Intelligent Vehicle Dependability and Security (IVDS) January 29, 2021 Designing for Increased Automation & Human Control Ben Shneiderman @benbendc Founding Director (1983-2000), Human-Computer Interaction Lab Professor, Department of Computer Science Member, National Academy of Engineering Photo: BK Adams What is Human-Centered AI? Human-Centered AI Amplify, Augment, Enhance & Empower People Human Responsibility Supertools and Active Appliances Visual Interfaces to Prevent/Reduce Explanations Audit Trails to Analyze Failures & Near Misses Independent Oversight à Reliable, Safe & Trustworthy Supertools Digital Camera Controls Navigation Choices Texting Autocompletion Spelling correction Active Appliances Coffee maker, Rice cooker, Blender Dishwasher, Clothes Washer/Dryer Implanted Cardiac Pacemakers NASA Mars Rovers are Tele-Operated DaVinci Tele-Operated Surgery “Robots don’t perform surgery. Your surgeon performs surgery with da Vinci by using instruments that he or she guides via a console.” https://www.davincisurgery.com/ Bloomberg Terminal A 2-D HCAI Framework Designing the User Interface Balancing automation & human control First Edition: 1986 Designing the User Interface Balancing automation &
    [Show full text]
  • Exploring the User Interface Affordances of File Sharing
    CHI 2006 Proceedings • Activity: Design Implications April 22-27, 2006 • Montréal, Québec, Canada Share and Share Alike: Exploring the User Interface Affordances of File Sharing Stephen Voida1, W. Keith Edwards1, Mark W. Newman2, Rebecca E. Grinter1, Nicolas Ducheneaut2 1GVU Center, College of Computing 2Palo Alto Research Center Georgia Institute of Technology 3333 Coyote Hill Road 85 5th Street NW, Atlanta, GA 30332–0760, USA Palo Alto, CA 94304, USA {svoida, keith, beki}@cc.gatech.edu {mnewman, nicolas}@parc.com ABSTRACT and folders shared with other users on a single computer, With the rapid growth of personal computer networks and often as a default system behavior; files shared with other the Internet, sharing files has become a central activity in computers over an intranet or home network; and files computer use. The ways in which users control the what, shared with other users around the world on web sites and how, and with whom of sharing are dictated by the tools FTP servers. Users also commonly exchange copies of they use for sharing; there are a wide range of sharing documents as email attachments, transfer files during practices, and hence a wide range of tools to support these instant messaging sessions, post digital photos to online practices. In practice, users’ requirements for certain photo album services, and swap music files using peer–to– sharing features may dictate their choice of tool, even peer file sharing applications. though the other affordances available through that tool Despite these numerous venues for and implementations of may not be an ideal match to the desired manner of sharing.
    [Show full text]
  • User Interface for Volume Rendering in Virtual Reality Environments
    User Interface for Volume Rendering in Virtual Reality Environments Jonathan Klein∗ Dennis Reuling† Jan Grimm‡ Andreas Pfau§ Damien Lefloch¶ Martin Lambersk Andreas Kolb∗∗ Computer Graphics Group University of Siegen ABSTRACT the gradient or the curvature at the voxel location into account and Volume Rendering applications require sophisticated user interac- require even more complex user interfaces. tion for the definition and refinement of transfer functions. Tradi- Since Virtual Environments are especially well suited to explore tional 2D desktop user interface elements have been developed to spatial properties of complex 3D data, bringing Volume Render- solve this task, but such concepts do not map well to the interaction ing applications into such environments is a natural step. However, devices available in Virtual Reality environments. defining new user interfaces suitable both for the Virtual Environ- ment and for the Volume Rendering application is difficult. Pre- In this paper, we propose an intuitive user interface for Volume vious approaches mainly focused on porting traditional 2D point- Rendering specifically designed for Virtual Reality environments. and-click concepts to the Virtual Environment [8, 5, 9]. This tends The proposed interface allows transfer function design and refine- to be unintuitive, to complicate the interaction, and to make only ment based on intuitive two-handed operation of Wand-like con- limited use of available interaction devices. trollers. Additional interaction modes such as navigation and clip In this paper, we propose an intuitive 3D user interface for Vol- plane manipulation are supported as well. ume Rendering based on interaction devices that are suitable for The system is implemented using the Sony PlayStation Move Virtual Reality environments.
    [Show full text]
  • Effective User Interface Design for Consumer Trust Two Case Studies
    2005:097 SHU MASTER'S THESIS Effective User Interface Design for Consumer Trust Two Case Studies XILING ZHOU XIANGCHUN LIU Luleå University of Technology MSc Programme in Electronic Commerce Department of Business Administration and Social Sciences Division of Industrial marketing and e-commerce 2005:097 SHU - ISSN: 1404-5508 - ISRN: LTU-SHU-EX--05/097--SE Luleå University of Technology E-Commerce ACKNOWLEDGEMENT This thesis is the result of half a year of work whereby we have been accompanied and supported by many people. It is a pleasant aspect that we could have this opportunity to express our gratitude to all of them. First, we are deeply indebted to our supervisor Prof. Lennart Persson who is from Division of Industrial Marketing at LTU. He helped us with stimulating suggestions and encouragement in all the time of research and writing of this thesis. Without his never-ending support during this process, we could not have done this thesis. Especially, we would like to express our gratitude to all of participants, who have spent their valuable time to response the interview questions and discuss with us. Finally, we would like to thank our family and friends. I, Zhou Xiling am very grateful for everyone who gave me support and encouragement during this process. Especially I felt a deep sense of gratitude to my father and mother who formed part of my vision and taught me the good things that really matter in the life. I also want to thank my friend Tang Yu for his never-ending support and good advices. I, Liu XiangChun am very grateful for my parents, for their endless love and support.
    [Show full text]
  • A High Level User Interface for Topology Controlled Volume Rendering
    Topological Galleries: A High Level User Interface for Topology Controlled Volume Rendering Brian MacCarthy, Hamish Carr and Gunther H. Weber Abstract Existing topological interfaces to volume rendering are limited by their re- liance on sophisticated knowledge of topology by the user. We extend previous work by describing topological galleries, an interface for novice users that is based on the design galleries approach. We report three contributions: an interface based on hier- archical thumbnail galleries to display the containment relationships between topo- logically identifiable features, the use of the pruning hierarchy instead of branch decomposition for contour tree simplification, and drag-and-drop transfer function assignment for individual components. Initial results suggest that this approach suf- fers from limitations due to rapid drop-off of feature size in the pruning hierarchy. We explore these limitations by providing statistics of feature size as function of depth in the pruning hierarchy of the contour tree. 1 Introduction The overall goal of scientific visualisation is to provide useful insight into existing data. As visualisation techniques have become more complex, so have the interfaces for controlling them. In cases where the interface has been simplified, it has often been at the cost of the functionality of the program. Thus, while expert users are capable of using state of the art technology, novice users who would otherwise have uses for this technology are restricted by unintuitive interfaces. Topology-based volume rendering, while powerful, is difficult to apply success- fully. This difficulty is due to the fact that the interface used to design transfer func- Brian MacCarthy University College Dublin, Belfield, Dublin 4, Ireland, e-mail: [email protected] Hamish Carr University of Leeds, Woodhouse Lane, Leeds LS2 9JT, England e-mail: [email protected] Gunther H.
    [Show full text]
  • Xfel Database User Interface P.D
    THPB039 Proceedings of SRF2015, Whistler, BC, Canada XFEL DATABASE USER INTERFACE P.D. Gall, V. Gubarev, D. Reschke, A. Sulimov, J.H. Thie, S. Yasar DESY, Notkestrasse 85, 22607 Hamburg, Germany Abstract Using this protection system we have divided all The XFEL database plays an important role for an customers into different groups: effective part of the quality control system for the whole ● RI group has permission to view production cavity production and preparation process for the results from RI only and open information European XFEL on a very detailed level. Database has the ● ZANON group has permission to view Graphical User Interface based on the web-technologies, production results from ZANON only and open and it can be accessed via low level Oracle SQL. information ● DESY group has permission to view all results INTRODUCTION from all companies Beginning from TTF a relational database for cavities ● Not authorised people have access to the open was developed at DESY using the ORACLE Relational information only Database Management System (RDBMS) [1]. To get authorised access to the database one have to The database is dynamically accessible from contact the responsible persons listed in the XFEL everywhere via a graphical WEB interface based on database GUI pages. ORACLE. At the moment we use the version Oracle GRAPHICAL USER INTERFACE Developer 10g Forms and Reports. The graphical tools are developed in Java. The XFEL database GUI was developed to meet the The database is created to store data for more than 840 requirements of experts involved. According to the people cavities coming from the serial production and about 100 needs the GUI applications can logically be divided into modules.
    [Show full text]
  • User Interface Defect Detection by Hesitation Analysis
    User Interface Defect Detection by Hesitation Analysis Robert W. Reeder and Roy A. Maxion [email protected], [email protected] Dependable Systems Laboratory Computer Science Department Carnegie Mellon University Pittsburgh, Pennsylvania 15213 / USA Abstract User interface dependability can be defined as the extent to which a user interface allows human users to complete Delays and errors are the frequent consequences of intended goals within specified speed and accuracy targets. people having difficulty with a user interface. Such de- When an interface prevents users from meeting these speed lays and errors can result in severe problems, particularly and accuracy targets, defects in the design of the interface for mission-critical applications in which speed and ac- are likely to be at fault. Following Maxion and deChambeau curacy are of the essence. User difficulty is often caused [16], a user interface defect is defined here as any aspect of a by interface-design defects that confuse or mislead users. user interface that impairs a user’s ability to achieve a goal. Current techniques for isolating such defects are time- Examples of such defects include ambiguous labels on in- consuming and expensive, because they require human an- terface controls, incomprehensible instructions, confusing alysts to identify the points at which users experience dif- icons, and inadequate system-status feedback. Such de- ficulty; only then can diagnosis and repair of the defects fects can confuse users, causing delays and errors in users’ take place. This paper presents an automated method for progress toward goal completion. detecting instances of user difficulty based on identifying Interface dependability can only be achieved if interface hesitations during system use.
    [Show full text]
  • Building a 3D Graphic User Interface in Linux
    Freescale Semiconductor Document Number: AN4045 Application Note Rev. 0, 01/2010 Building a 3D Graphic User Interface in Linux Building Appealing, Eye-Catching, High-End 3D UIs with i.MX31 by Multimedia Application Division Freescale Semiconductor, Inc. Austin, TX To compete in the market, apart from aesthetics, mobile Contents 1. X Window System . 2 devices are expected to provide simplicity, functionality, and 1.1. UI Issues . 2 elegance. Customers prefer attractive mobile devices and 2. Overview of GUI Options for Linux . 3 expect new models to be even more attractive. For embedded 2.1. Graphics Toolkit . 3 devices, a graphic user interface is essential as it enhances 2.2. Open Graphics Library® . 4 3. Clutter Toolkit - Solution for GUIs . 5 the ease of use. Customers expect the following qualities 3.1. Features . 5 when they use a Graphical User Interface (GUI): 3.2. Clutter Overview . 6 3.3. Creating the Scenegraph . 7 • Quick and responsive feedback for user actions that 3.4. Behaviors . 8 clarifies what the device is doing. 3.5. Animation by Frames . 9 • Natural animations. 3.6. Event Handling . 10 4. Conclusion . 10 • Provide cues, whenever appropriate, instead of 5. Revision History . 11 lengthy textual descriptions. • Quick in resolving distractions when the system is loading or processing. • Elegant and beautiful UI design. This application note provides an overview and a guide for creating a complex 3D User Interface (UI) in Linux® for the embedded devices. © Freescale Semiconductor, Inc., 2010. All rights reserved. X Window System 1 X Window System The X Window system (commonly X11 or X) is a computer software system and network protocol that implements X display protocol and provides windowing on bitmap displays.
    [Show full text]
  • Chapter 6 Operating Systems
    CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 6 Operating Systems 1 Operating Systems 1. Operating Systems 2. Types of Operating System 3. Major Functions 4. User Interface 5. Examples of Operating System 2 Operating Systems Operating Systems • The operating system is the most important program that runs on a computer. • Operating system is an interface between computer and user. • It is responsible for the management and coordination of activities and the sharing of the resources of the computer. 3 Operating Systems Operating Systems 4 Operating Systems Operating Systems 5 Operating Systems Types of Operating System • Real-time • Multi-user vs. Single-user • Multi-tasking vs. Single-tasking • Distributed • Embedded 6 Operating Systems Types of Operating System Real-Time • A real-time operating system is a multitasking operating system that aims at executing real-time applications. • Responds to input instantly. 7 Operating Systems Types of Operating System Multi-user vs. Single user . A multi-user operating system allows multiple users to access a computer system concurrently. Time-sharing system can be classified as multi-user systems as they enable a multiple user access to a computer through the sharing of time. Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user at a time. 8 Operating Systems Types of Operating System Multi-tasking vs. Single-tasking . When a single program is allowed to run at a time, the system is grouped under a single-tasking system . While in case the operating system allows the execution of multiple tasks at one time, it is classified as a multi-tasking operating system.
    [Show full text]
  • Methods and Qualities of a Good User Interface Design
    2008:PR002 User Interface Design – Methods and Qualities of a Good User Interface Design Ravi Chandra Chaitanya Guntupalli MASTER’S THESIS Software Engineering, 2008 Department of Technology, Mathematics and Computer Science MASTER’S THESIS User Interface Design – Methods and Qualities of a Good User Interface Design Summary User interface (UI) plays a vital role in software. In terms of visibility, its design and precision holds the primary importance for depicting the exact amount of information for the intended user. Every minor decision taken for the designing of UI can contribute to the software both positively and negatively. Therefore, our study is intended to highlight the strategies that are currently being used for successfully designing UIs, and make appropriate suggestions for betterment of UI designs based on case studies and research findings. Author: Ravi Chandra Chaitanya. Guntupalli Examiner: Dr. Samantha Jenkins Advisor: Dr. Samantha Jenkins Programme: Software Engineering, 2008 Subject: Software Engineering Level: Master Date: June, 2008 Report Number: 2008:PR002 Keywords User interface design, Software Quality, Reliability, Efficiency, Conciseness, Portability, Consistency, Maintainability, Understandability, System status visibility, System consistency, Error handling, Feedback systems, Memory loading, Efficiency, Appropriate outlook, UI design principles, Usability design, Interface design, Information design, Stake holder, End user. Publisher: University West, Department of Technology, Mathematics and Computer Science,
    [Show full text]
  • Computer Networks As Human System Interface
    +6, 5]HV]RZ3RODQG0D\ Computer Networks as Human System Interface Nam Pham1, Bogdan M. Wilamowski2, A. Malinowski3 1 2Electrical and Computer Engineering, Auburn University, Alabama, USA 3Electrical and Computer Engineering, Bradley University, Peoria Illinois, USA [email protected] [email protected] [email protected] years, network software has also evolved and many Abstract – With the dramatic increase of network technologies have been tried and applied to network bandwidth and decrease of network latency and because of software development [6]. Computer networks have been development of new network programming technologies, the changing the philosophy of not only the engineering view dynamic websites provide dynamic interaction to the end user and at the same time implement asynchronous client-server but also the business view as well. Nowadays, many communication in the background. Many applications are companies rely on computer systems and networks for being deployed through the computer and are becoming more functions such as order entry, order processing, customer popular and are effective means in computing and simulation. support, supply chain management, and employee Running software over the Internet introduced in this paper is administration, etc. Therefore, reliability and availability of one of the applications of computer networks which enhance such systems and networks are becoming critical factors of interaction between human and CAD tools while computer networks are used as a human system interface. Instead of the the present-day enterprises or institutions [7]. The required design, software must be installed and license improvement of network security, network speed, etc opens purchased for each computer where software is used, now the possibility for new kinds of applications.
    [Show full text]