Delve into best practices for working with people on privacy-preserving technology
In this installment of our series on resources for field research, we discuss the participant's bill of rights. Additional resources include screeners and model releases...
This post is part of a series explaining our publicly available resources for user research. The previous installment covered how to write screeners to recruit...
This year's Consumer Electronics Show (CES ‘17) showcased numerous internet of things (IoT) devices but was found wanting when it came to security concerns. In...
When you're putting your heart and soul into designing, building, or improving a piece of software, tuning in to feedback from users can sometimes get...
From quick-start guides to professional discussion, the Knowledge Base helps you hone user research skills.
User research is about surfacing behavioral insights to design products. Build your knowledge of user research, including methods for conducting user interviews and ethics
Here are resources that provide tips and guidance, especially for those working on technical projects with a privacy component
Simply Secure provides resources for professional user researchers who want to further grow their skills and knowledge of best practices, with an emphasis on information...
While bigger companies have entire departments that do product design and market research, it can be difficult for smaller, distributed teams on a budget to get user feedback. We compiled a session guide to test your app with small groups, ideal for quick feedback at conferences and meetups.
I was in Darmstadt for Privacy and Security Week last week to present Simply Secure's work on ethics in user research at HotPETS. You can check out the paper and slides on GitHub.Resources for ethical researchIn 2015, we did a field study that we named Straight Talk: New Yorkers on... (Read more)
A screener is a questionnaire that helps researchers recruit the most appropriate participants for their user study research.Here is an example we used for our mobile messaging study in NYC. Blue Ridge Labs handled the recruiting. Most of this screener's questions are a standard part of how they work with... (Read more)
Last week Gus and I gave a talk at Shmoocon in DC. The focus was on helping technologists who don't have experience in human-centered design processes conduct basic research to improve their existing open-source tools. We covered four basic steps that we believe even small or volunteer teams can take:... (Read more)
2015 was our first full year in operation, and we’ve come a long way! Looking back at the past twelve months, here are some resources that we’ve found to be particularly useful (or entertaining). Let us know your favorites on Twitter!Ame’s picksThinking back on 2015, I’m really glad to be... (Read more)
People who think about computer security for a living sometimescringe when they read about the subject in the popular press.Security is a complex and nuanced topic, and it’s easy to makeassertions that don’t hold up to careful scrutiny. One basic-but-unintuitive principle is that security is not abinary property: in the... (Read more)
As a practitioner of Human-Centered Design, empathy is a core skill in the work I do. InNo Flex Zone: Empathy DrivenDevelopment, Duretti Hirpa writes about how empathy can be a competitive advantage.“We build software for all kinds of people, and empathy helps us to connect to these disparate audiences. We... (Read more)
Last week I went to the SOUPS conference in Ottawa. As a first-time attendee,it was a good opportunity to connect with some members of the academic usable-security community. One of thehighlights was keynote speaker Valerie Steeves.Steeves, sharing findings from her Young Canadians in aWired World research, reported results of an... (Read more)