manager who introduces a new touch screen register for his franchises
Introduction
The case is about a manager who introduces a new touch screen register for his franchises. The system requires every individual to have a password as well as ID so that they can assess the system. Therefore, the manager ensures that every person has his password and ID to login to the system. When the individuals log into the account and forget to logout the system locks, nobody can log into that system apart from the person who logged in at first. Due to this, it increases the ineffectiveness in the organization since some of the people forgets their passwords and ID. Thus they are waiting for other people to open for them or ask the manager to log in on their behave. The process leads to time wastage and inconveniences since some people forgot to log out of their accounts as they are going for off hence being a problem for the other person to get access. It forces the manager to restart the machine, which takes more time from three to five minutes.
How to correct the design issues.
The design system unveiled by the manager has some issues that are making the system to be ineffective. One of the problems with this system is that they are using more time to unlock the register. Therefore, it’s good to allow them to look at their usernames and passwords before registering. It will help them to minimize the time they take to register since they know their passwords and username, therefore no time for trial and error while registering. Hence there will be no wastage of time while people are roistering to start working. The process will also help the manager to solve the issue of forgetting the user name and password. The other problem with the system is that when one forgets to log out of the account, it causes inconveniences the following day, mostly if the individual does not report the next morning. Therefore, the manager should ensure that the system is designed so that if the machine goes off, another person can quickly login only if they use their account password and user name. It will minimize the time of waiting for the manager to reboot the system, taking a long time.
Design plan
The design plan for this interface will involve the description of how this system will be more effective. It will describe all the tasks that will help in improving the system. The tasks will be as follows: ensure users can access their passwords, notify users of suspicious behavior, limit the number of password and user name login attempt, introduce modern password strength checker, update current password and user name login standards and eliminate the need for a new password and user name.
Ensuring users can access their password.
Most of the systems when people are login in don’t see the password they are typing. Since most of the design will allow a password to appear in dots form on the screen; therefore, users will not identify where they are making mistakes. Hence, they are likely to introduce a simple password to avoid getting wrong. For security purposes, most people present complex passwords that contain too many characters, which is a recommendable factor. Therefore, most of the users will not recognize where they make mistakes when typing the password since it’s in dot form.
Consequently, it’s time-consuming during logins due to long typing passwords where one cannot see the characters they are typing hence hoping that they are typing the right thing, forcing them to keep on retyping (Khan, 2011). Thus instead of the manager encouraging the use of simple passwords, they should create a design that allows them to view their password as they type. The users will be able to counter check their password minimizing error making during logins hence saving time as well as providing options for them to hind their password where they are not in the safe place as they log in.
Notifying the uses of suspicious login behavior.
The securing of data of an organization is the most crucial factor that the manager should maintain. Therefore, it’s his responsibility to ensure that the users are informed when there are suspicious activities in their accounts. For, instance when there are many times of attempt to login in a short period, data breach, changes made by the user during account settings, and when a request for the password is changing, the user should be notified (Treu, 2012). When this happens, they should tell the users via email accounts or messages either by texting them. It will help the manager to know whether they are responsible for the changes that have been made or it’s from an unauthorized person.
Limit the number of passwords and user name login attempts.
The system designed by the manager allows four times attempt of the wrong password before the account is locked. Therefore, the struggle should be reduced to at least three times. It’s because too much effort creates room for the hacking of the organization only.
Ditch modern password checker
The manager should try to develop a policy that will encourage the users to create a stronger password that cannot be easily hacked. He should try not to come up with a specific strategy for creating strong passwords such as the use of two uppercase letters, the use of symbols and numbers, and the creation of passwords of eight to ten characters. Hence the protection of the sensitive data as he introduces the new system. It’s at this level where the manager can test whether the passwords used by the workers are strong enough or not. If it’s strong hence continue using it, but if not, they require adjusting them.
Update your current password and username login standards.
On a day to day life activities, technology keeps on changing. The user of the system should always be updated on how the password formulation keeps on changing hence the reliable security of your data.
Eliminate the need for a password and user name.
The management has been suffering while using a password and user name. It’s because most people keep on forgetting their password and even to logout as they go home. Therefore, the manager should try to look for an alternative that only authorized people will have to assess instead of using a password. The other option that they can use is the use of fingerprint, which more secure even than a password and user name.
Most of the IT professionals believe that security and usability are antagonistic goals that must be balanced. For instance, it’s easy for users to use a computer without a password, but without a password, the information is at risk. It’s because unauthorized people can access the data; therefore, the management tries to balance password implementation and usability (Garfinkel, 2004). Thus, were developing a design interface, the manager should consider the users as the priority. They should find both the experts and those who are not experts on before developing the given design. For a system design to be secure and user-friendly, it’s the one that allows the participation of the users while implementing them. It will encourage them to use this system so comfortable despite the use of the password for accessibility. Therefore, the system will end up promoting strong security and usability. But the challenges are where the users may disclose their passwords to unauthorized users or even write down their password and user name in a yellow sticker and leave it aimlessly where everyone
can access it.
The management should make the changes so that the security objective and be more users are creating a new path of human-computer interaction (HCI). It is a process that happens during the development of its system as well as maintenance. The HCI increases the usability of the system since the main objective of the project is that they define usability as the critical path of the plan (Cranor & Garfinkel, 2020). The HCI will as well help in maintaining the security of the information and the user’s information. Since most people interact with the system, they will readily accept and understand the need to secure data from unauthorized people. Therefore, through the implementation of HCI, the usability will increase as the security rate increases.
Conclusion
In conclusion, the privacy of the information is crucial for every user of the system to understand and implement. Therefore, the system design should always be users friendly so that the data can be secured. So that the manager to overcome the problem of poor time management and forgetting of the password by its users, he should encourage the HCI system. Hence, the work will be sufficient, and the users will be more productive than before since the time is saved.
(Cranor & Garfinkel, 2020).
The diagram shows the result of the users when we encourage and increase the system’s usability. The changes that manager can make is supporting the visibility of password by a user as they key in their password in the computer because it will reduce the number of their attempt to open the laptop.
Reference
Khan, B. (2011). User interface design for virtual environments: Challenges and advances: Challenges and advances. IGI Global.
Lorrie Faith Cranor & Simson Garfinkel (2020).Security and Usability.
https://www.oreilly.com/library/view/security-and-usability/0596008279/ch04.html
Simson Garfinkel (2004). Security and Usability: Keep It Simple.
https://www.csoonline.com/article/2117849/security-and-usability–keep-it-simple.html
Treu, S. (2012). User interface design: A structured approach. Springer Science & Business Media.