Top Banner
Designing Trustable Products Microinterac*ons Ma-er for Secure UX
35

Designing Trustable Products: Microinteractions Matter for Secure UX

Apr 05, 2017

Download

Technology

AME ELLIOTT
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Designing Trustable Products: Microinteractions Matter for Secure UX

Designing Trustable ProductsMicrointerac*ons Ma-er for Secure UX

Page 2: Designing Trustable Products: Microinteractions Matter for Secure UX

Introduc4ons

Page 3: Designing Trustable Products: Microinteractions Matter for Secure UX

Adrienne Porter Felt @__apf__ Google

Elizabeth Goodman @egoodman 18F/GSA

Ame Ellio4 @ameellio Simply Secure

Jen King @kingjen UC Berkeley

Page 4: Designing Trustable Products: Microinteractions Matter for Secure UX

Examples

Page 5: Designing Trustable Products: Microinteractions Matter for Secure UX

Browser Web Site Service IoT Device

Mass Surveillance Phishing IdenKty TheL Tampering

HTTPS Branding EncrypKon, 2-Factor Auth Alerts/NoKficaKons

Trust Concerns Do you trust the browser? Do you trust the website/host? Do you trust who else has access to your data? Do you trust that the protecKon mechanisms work?

PLATFORM THREAT PROTECTION

Examples of Trust-Building

Page 6: Designing Trustable Products: Microinteractions Matter for Secure UX

?Ques4ons

Page 7: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on What design details make people trust that their web browser is secure?

Page 8: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 9: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 10: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 11: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on

How do you know if you’re on a government website?

Page 12: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 13: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 14: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 15: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 16: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 17: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 18: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 19: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on

How can we make security saKsfying?

Page 20: Designing Trustable Products: Microinteractions Matter for Secure UX

The bank’s vault Your safe deposit box A key only you possess

Explaining encrypted personal data

Page 21: Designing Trustable Products: Microinteractions Matter for Secure UX

MicrointeracKons are tricky

Page 22: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 23: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on

What’s an example of a micro interacKon that builds trust?

Page 24: Designing Trustable Products: Microinteractions Matter for Secure UX

Read receipts show how systems work

Page 25: Designing Trustable Products: Microinteractions Matter for Secure UX

What would read receipts for voice be like?

Page 26: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on

What advice do you have for people geYng started in security?

Page 27: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 28: Designing Trustable Products: Microinteractions Matter for Secure UX

Ques4on

What’s an example of a security success?

Page 29: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 30: Designing Trustable Products: Microinteractions Matter for Secure UX
Page 31: Designing Trustable Products: Microinteractions Matter for Secure UX

Signal Messenger

Page 32: Designing Trustable Products: Microinteractions Matter for Secure UX

Audience Ques4ons?

Page 33: Designing Trustable Products: Microinteractions Matter for Secure UX

Key Points

Page 34: Designing Trustable Products: Microinteractions Matter for Secure UX

Security is too important to be leL to engineers and lawyers – designers are needed.

UX design plays a criKcal role in building trustable products and protecKng people’s privacy.

Security basics are accessible to everyone, and the design challenges of more complex security problems are exciKng and rewarding.

Get involved - there are ways to build your career as a design leader in designing for trust.