“To programmers, "hacker" connotes
mastery in the most literal sense: someone
who can make a computer do what he wants
—whether the computer wants to or not.”
Slide 61
Slide 61 text
Cracking
Slide 62
Slide 62 text
DMCA
Slide 63
Slide 63 text
Copyright
Slide 64
Slide 64 text
DRM
Slide 65
Slide 65 text
Design
Slide 66
Slide 66 text
CRAP
Slide 67
Slide 67 text
Contrast
Repetition
Alignment
Proximity
Slide 68
Slide 68 text
Contrast
Slide 69
Slide 69 text
No content
Slide 70
Slide 70 text
No content
Slide 71
Slide 71 text
Repetition
Slide 72
Slide 72 text
No content
Slide 73
Slide 73 text
Alignment
Slide 74
Slide 74 text
No content
Slide 75
Slide 75 text
No content
Slide 76
Slide 76 text
Proximity
Slide 77
Slide 77 text
No content
Slide 78
Slide 78 text
No content
Slide 79
Slide 79 text
Usability
Slide 80
Slide 80 text
Visibility of system status
Slide 81
Slide 81 text
No content
Slide 82
Slide 82 text
Match between system
and real world
Slide 83
Slide 83 text
No content
Slide 84
Slide 84 text
User control and freedom
Slide 85
Slide 85 text
No content
Slide 86
Slide 86 text
Consistency and standards
Slide 87
Slide 87 text
No content
Slide 88
Slide 88 text
Error prevention
Slide 89
Slide 89 text
No content
Slide 90
Slide 90 text
Recognition rather than recall
Slide 91
Slide 91 text
No content
Slide 92
Slide 92 text
Flexibility and efficiency of use
Slide 93
Slide 93 text
No content
Slide 94
Slide 94 text
Aesthetic and minimalist design
Slide 95
Slide 95 text
No content
Slide 96
Slide 96 text
Help users recognize, diagnose, and
recover from errors
Slide 97
Slide 97 text
No content
Slide 98
Slide 98 text
Help and documentation
Slide 99
Slide 99 text
Typography
Slide 100
Slide 100 text
No content
Slide 101
Slide 101 text
No content
Slide 102
Slide 102 text
No content
Slide 103
Slide 103 text
No content
Slide 104
Slide 104 text
Leading
Slide 105
Slide 105 text
Tracking
Slide 106
Slide 106 text
Kerning
Slide 107
Slide 107 text
Design Critiques
Slide 108
Slide 108 text
No content
Slide 109
Slide 109 text
No content
Slide 110
Slide 110 text
No content
Slide 111
Slide 111 text
No content
Slide 112
Slide 112 text
No content
Slide 113
Slide 113 text
No content
Slide 114
Slide 114 text
No content
Slide 115
Slide 115 text
No content
Slide 116
Slide 116 text
No content
Slide 117
Slide 117 text
No content
Slide 118
Slide 118 text
Computer Science E-1
Lecture 7: Privacy and Design