All tags /
Information security focuses on third parties’ access to user data without permission. Develop your knowledge of principles and practices to design transparent and accountable systems
IoT security needs UX design to appropriately manage complexity. Architecture school teaches how to design for an IoT context with privacy in mind..
This year's Consumer Electronics Show (CES ‘17) showcased numerous internet of things (IoT) devices but was found wanting when it came to security concerns. In his UX of IoT report from CES, Scott Jenson assesses that “companies really, really, REALLY want to make home automation systems,” but how can we... (Read more)
To help you assess risks to your data, we provide ways to dissect threats and tips to protect against them.
Building trustworthy technology requires more than technical expertise. Interaction design, service design, brand strategy, and writing are needed.
Get prepared to discuss security with more technical team mates. If you’re a designer, learn useful background information.
My last post examined the concept of phishing, which is a type of social-engineering attack to con people into divulging private information like passwords or credit card numbers. When you look for advice on how to protect against phishing, most of what you’ll find is tired wisdom such as “check... (Read more)
Most people who spend time online have a general idea of what "phishing" is, but it can be hard for folks outside of the security community to pin down an exact definition. Understanding the threat that phishing attacks pose can help designers and other UX experts become effective advocates for... (Read more)
This list of questions about the security features of software can help UX professionals collaborate with security experts.
Chatbots, or conversational programs that simulate interactive human speech patterns, are a hot topic in UX right now. Microsoft CEO Satya Nadella recently claimed that “bots are the new apps”, and that they are the interface of the future for tasks like ordering food and booking transportation. In San Francisco,... (Read more)
Many regular readers of our blog have already drunk the metaphorical Kool-Aid. You know that a good user experiences is critical to an app's success; moreover, you know that when a piece of software seeks to preserve its users' privacy, a poor UX can have disastrous results.But working in a... (Read more)
As a practitioner of Human-Centered Design, empathy is a core skill in the work I do. InNo Flex Zone: Empathy DrivenDevelopment, Duretti Hirpa writes about how empathy can be a competitive advantage.“We build software for all kinds of people, and empathy helps us to connect to these disparate audiences. We... (Read more)
This is the third and final installment in the series on Lessons fromArchitecture School: Lessons for IoT Security. You can also read the first and secondinstallments, or download the presentation.Thank you to the audience at Solid Conference forgood questions and lively discussion.Homes Are More Than HousesShop houses are a type... (Read more)