Knowledge Base /

User Researchers

Delve into best practices for working with people on privacy-preserving technology

A Guide to Gathering Feedback

While bigger companies have entire departments that do product design and market research, it can be difficult for smaller, distributed teams on a budget to get user feedback. We compiled a session guide to test your app with small groups, ideal for quick feedback at conferences and meetups.

Respecting Participants in Privacy-related User Studies

I was in Darmstadt for Privacy and Security Week last week to present Simply Secure's work on ethics in user research at HotPETS. You can check out the paper and slides on GitHub. Resources for ethical research In 2015, we did a field study that we named Straight Talk: New Yorkers on Mobile Messaging and Implications for Privacy. We have since used it as a case study to demonstrate how to work with study participants.

Selecting Research Participants for Privacy and Beyond

A screener is a questionnaire that helps researchers recruit the most appropriate participants for their user study research. Here is an example we used for our mobile messaging study in NYC. Blue Ridge Labs handled the recruiting. Most of this screener's questions are a standard part of how they work with potential participants. Our questions, in red, focus on messaging and attitudes towards privacy. Additional questions about VPN use, email, and getting online were for our Fellow Gus Andrews's research.

Users are people too: our talk at Shmoocon

Last week Gus and I gave a talk at Shmoocon in DC. The focus was on helping technologists who don't have experience in human-centered design processes conduct basic research to improve their existing open-source tools. We covered four basic steps that we believe even small or volunteer teams can take: Agree on your target users Do an expert review of your UX to identify (& fix) low-hanging fruit Interview real users Build a model of your users and their needs Smooth the path for user feedback Iterate until you get it right Overall the talk was well received, with a few choice quotes making their way onto Twitter.

Some Of Our 2015 Favorites

2015 was our first full year in operation, and we’ve come a long way! Looking back at the past twelve months, here are some resources that we’ve found to be particularly useful (or entertaining). Let us know your favorites on Twitter! Ame’s picks Thinking back on 2015, I’m really glad to be part of Simply Secure and for the opportunity to be an evangelist for design. I’m thankful for resources that make design easier.

Usability and Security: Not Binary Properties

People who think about computer security for a living sometimes cringe when they read about the subject in the popular press. Security is a complex and nuanced topic, and it’s easy to make assertions that don’t hold up to careful scrutiny. One basic-but-unintuitive principle is that security is not a binary property: in the absence of other context, it’s hard to definitively say that a particular system or piece of software is “secure” or “insecure”.

Empathy In The Real World

As a practitioner of Human-Centered Design, empathy is a core skill in the work I do. In No Flex Zone: Empathy Driven Development, Duretti Hirpa writes about how empathy can be a competitive advantage. “We build software for all kinds of people, and empathy helps us to connect to these disparate audiences. We have to choose empathy, but I’d argue, it’s undeniably the ‘one weird trick’ to future-proofing the software engineering.

Kids’ Online Privacy: SOUPS Conference Keynote

Last week I went to the SOUPS conference in Ottawa. As a first-time attendee, it was a good opportunity to connect with some members of the academic usable-security community. One of the highlights was keynote speaker Valerie Steeves. Steeves, sharing findings from her Young Canadians in a Wired World research, reported results of an in-depth study of 5,436 Canadians in Grades 4-11. Based on a survey and in-person discussions, she shared sobering findings that kids’ expectations of online privacy are not being met.