All tags /
Information security focuses on third parties’ access to user data without permission. Develop your knowledge of principles and practices to design transparent and accountable systems
In October 2022, Open Technology Fund (OTF) brought together a group of around 50 technologists, researchers, usability experts, and digital security practitioners working on internet shutdowns. Together, the group engaged in many topics, ranging from understanding the lived experience of an internet shutdown to the challenges around technology interventions, and measuring and monitoring networks during a shutdown. An internet shutdown is when access to the internet is restricted, such that people are unable to use the internet or internet based services. This is an information control tactic that is increasingly being used around the world to affect the free flow of information. Our learnings from this session are outlined in this blog post.
Every day tech platforms confront us with information about how our data is used, and pop-ups with language like this website uses cookies, accept and continue are an accepted part of the online experience. Consenting to sharing data is so strongly encouraged by the platforms that “opting in” or “opting out” is not the right framework because coerced consent cannot be meaningful. However, new privacy regulations such as the forthcoming Digital Service Act from the European Union and California’s Consumer Privacy Act are initial attempts to empower individuals to give meaningful consent to data collection
IoT security needs UX design to appropriately manage complexity. Architecture school teaches how to design for an IoT context with privacy in mind..
This year's Consumer Electronics Show (CES ‘17) showcased numerous internet of things (IoT) devices but was found wanting when it came to security concerns. In his UX of IoT report from CES, Scott Jenson assesses that “companies really, really, REALLY want to make home automation systems,” but how can we begin to consider the ethics when developers don’t even consider security risks? IoT systems pose two security challenges. First, they can be manipulated as surveillance infrastructure to target vulnerable people.
To help you assess risks to your data, we provide ways to dissect threats and tips to protect against them.
Building trustworthy technology requires more than technical expertise. Interaction design, service design, brand strategy, and writing are needed.
Get prepared to discuss security with more technical team mates. If you’re a designer, learn useful background information.
My last post examined the concept of phishing, which is a type of social-engineering attack to con people into divulging private information like passwords or credit card numbers. When you look for advice on how to protect against phishing, most of what you’ll find is tired wisdom such as “check the email carefully” or “never click on links in emails.” This type of advice assumes that the burden is entirely on would-be victims to protect themselves.
Most people who spend time online have a general idea of what "phishing" is, but it can be hard for folks outside of the security community to pin down an exact definition. Understanding the threat that phishing attacks pose can help designers and other UX experts become effective advocates for experiences that protect users. In this post, we will explore the basics of how phishing attacks work, and in a follow-up post, we will examine some of the mechanisms that protect users against them.
This list of questions about the security features of software can help UX professionals collaborate with security experts.
Chatbots, or conversational programs that simulate interactive human speech patterns, are a hot topic in UX right now. Microsoft CEO Satya Nadella recently claimed that “bots are the new apps”, and that they are the interface of the future for tasks like ordering food and booking transportation. In San Francisco, tech elites use a multitude of oft-parodied services like Wag to find dog walkers and Rinse to have their laundry done.
Many regular readers of our blog have already drunk the metaphorical Kool-Aid. You know that a good user experiences is critical to an app's success; moreover, you know that when a piece of software seeks to preserve its users' privacy, a poor UX can have disastrous results. But working in a community of passionate individuals – whether it's as a designer, a cryptographer, or an internet-freedom activist – can make it easy to forget that the majority of the human race isn't aware of your favorite issues.
As a practitioner of Human-Centered Design, empathy is a core skill in the work I do. In No Flex Zone: Empathy Driven Development, Duretti Hirpa writes about how empathy can be a competitive advantage. “We build software for all kinds of people, and empathy helps us to connect to these disparate audiences. We have to choose empathy, but I’d argue, it’s undeniably the ‘one weird trick’ to future-proofing the software engineering.
This is the third and final installment in the series on Lessons from Architecture School: Lessons for IoT Security. You can also read the first and second installments, or download the presentation. Thank you to the audience at Solid Conference for good questions and lively discussion. Homes Are More Than Houses Shop houses are a type of vernacular architecture built throughout Southeast Asia. Vernacular architecture is built using folk knowledge and local customs, typically without the use of an architect.