ºÝºÝߣshows by User: AmeElliott / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: AmeElliott / Thu, 23 Mar 2017 00:16:02 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: AmeElliott Designing Trustable Products: Microinteractions Matter for Secure UX /slideshow/designing-trustable-products-microinteractions-matter-for-secure-ux/73510065 trustable-microinteractionssecureux-170323001602
Ame Elliott, Elizabeth Goodman, Adrienne Porter Felt, and Jennifer King have a conversation about the whys and hows of microinteractions, a particularly important way to build trust. Historically, security has been treated as an engineering topic, with UX separated from the technical implementation. This division of labor undermines user trust because most users can’t assess technical security merit and instead make decisions about trust based on the quality of UX. If people don’t trust your product to protect them from theft, harassment, or even physical violence, they won’t use your product. Designers need to get involved with the mechanisms of protection and help users understand how the product protects them. Beginning with examples from web applications, including Chrome’s browser security indicators and large-scale deployments of authentication and identity verification, Ame, Elizabeth, Adrienne, and Jennifer discuss how to build trust with microinteractions, grounded in current best practices in usable security, and address how to adapt and extend successful microinteractions into the emerging areas of wearable and embedded devices, which bring computing closer to the body and to domestic spaces. Microinteractions are how the hard work of security is successfully communicated to the end user. These examples demonstrate how engineering, data, UI, design, research, and policy work together to deliver the trustworthy experiences necessary to insure broad adoption of your products and services.]]>

Ame Elliott, Elizabeth Goodman, Adrienne Porter Felt, and Jennifer King have a conversation about the whys and hows of microinteractions, a particularly important way to build trust. Historically, security has been treated as an engineering topic, with UX separated from the technical implementation. This division of labor undermines user trust because most users can’t assess technical security merit and instead make decisions about trust based on the quality of UX. If people don’t trust your product to protect them from theft, harassment, or even physical violence, they won’t use your product. Designers need to get involved with the mechanisms of protection and help users understand how the product protects them. Beginning with examples from web applications, including Chrome’s browser security indicators and large-scale deployments of authentication and identity verification, Ame, Elizabeth, Adrienne, and Jennifer discuss how to build trust with microinteractions, grounded in current best practices in usable security, and address how to adapt and extend successful microinteractions into the emerging areas of wearable and embedded devices, which bring computing closer to the body and to domestic spaces. Microinteractions are how the hard work of security is successfully communicated to the end user. These examples demonstrate how engineering, data, UI, design, research, and policy work together to deliver the trustworthy experiences necessary to insure broad adoption of your products and services.]]>
Thu, 23 Mar 2017 00:16:02 GMT /slideshow/designing-trustable-products-microinteractions-matter-for-secure-ux/73510065 AmeElliott@slideshare.net(AmeElliott) Designing Trustable Products: Microinteractions Matter for Secure UX AmeElliott Ame Elliott, Elizabeth Goodman, Adrienne Porter Felt, and Jennifer King have a conversation about the whys and hows of microinteractions, a particularly important way to build trust. Historically, security has been treated as an engineering topic, with UX separated from the technical implementation. This division of labor undermines user trust because most users can’t assess technical security merit and instead make decisions about trust based on the quality of UX. If people don’t trust your product to protect them from theft, harassment, or even physical violence, they won’t use your product. Designers need to get involved with the mechanisms of protection and help users understand how the product protects them. Beginning with examples from web applications, including Chrome’s browser security indicators and large-scale deployments of authentication and identity verification, Ame, Elizabeth, Adrienne, and Jennifer discuss how to build trust with microinteractions, grounded in current best practices in usable security, and address how to adapt and extend successful microinteractions into the emerging areas of wearable and embedded devices, which bring computing closer to the body and to domestic spaces. Microinteractions are how the hard work of security is successfully communicated to the end user. These examples demonstrate how engineering, data, UI, design, research, and policy work together to deliver the trustworthy experiences necessary to insure broad adoption of your products and services. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/trustable-microinteractionssecureux-170323001602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ame Elliott, Elizabeth Goodman, Adrienne Porter Felt, and Jennifer King have a conversation about the whys and hows of microinteractions, a particularly important way to build trust. Historically, security has been treated as an engineering topic, with UX separated from the technical implementation. This division of labor undermines user trust because most users can’t assess technical security merit and instead make decisions about trust based on the quality of UX. If people don’t trust your product to protect them from theft, harassment, or even physical violence, they won’t use your product. Designers need to get involved with the mechanisms of protection and help users understand how the product protects them. Beginning with examples from web applications, including Chrome’s browser security indicators and large-scale deployments of authentication and identity verification, Ame, Elizabeth, Adrienne, and Jennifer discuss how to build trust with microinteractions, grounded in current best practices in usable security, and address how to adapt and extend successful microinteractions into the emerging areas of wearable and embedded devices, which bring computing closer to the body and to domestic spaces. Microinteractions are how the hard work of security is successfully communicated to the end user. These examples demonstrate how engineering, data, UI, design, research, and policy work together to deliver the trustworthy experiences necessary to insure broad adoption of your products and services.
Designing Trustable Products: Microinteractions Matter for Secure UX from Ame Elliott
]]>
306 2 https://cdn.slidesharecdn.com/ss_thumbnails/trustable-microinteractionssecureux-170323001602-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
UX for Security: Power of Design /AmeElliott/ux-for-security-power-of-design elliott-oreilydesignv3-160122183257
The power of UX design to protect people's privacy. Examples of better basics + new frontiers for security. Given at O'Reilly Design Conference Jan 2016.]]>

The power of UX design to protect people's privacy. Examples of better basics + new frontiers for security. Given at O'Reilly Design Conference Jan 2016.]]>
Fri, 22 Jan 2016 18:32:57 GMT /AmeElliott/ux-for-security-power-of-design AmeElliott@slideshare.net(AmeElliott) UX for Security: Power of Design AmeElliott The power of UX design to protect people's privacy. Examples of better basics + new frontiers for security. Given at O'Reilly Design Conference Jan 2016. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/elliott-oreilydesignv3-160122183257-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The power of UX design to protect people&#39;s privacy. Examples of better basics + new frontiers for security. Given at O&#39;Reilly Design Conference Jan 2016.
UX for Security: Power of Design from Ame Elliott
]]>
836 5 https://cdn.slidesharecdn.com/ss_thumbnails/elliott-oreilydesignv3-160122183257-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Experience Design for IoT Security /slideshow/experience-design-for-iot-security/52400333 solidconf-ux-iot-elliott-150903211012-lva1-app6892
As presented at Solid Conference June 2015. Lessons from architecture school for designing a human-centered, more secure, internet of things.]]>

As presented at Solid Conference June 2015. Lessons from architecture school for designing a human-centered, more secure, internet of things.]]>
Thu, 03 Sep 2015 21:10:12 GMT /slideshow/experience-design-for-iot-security/52400333 AmeElliott@slideshare.net(AmeElliott) Experience Design for IoT Security AmeElliott As presented at Solid Conference June 2015. Lessons from architecture school for designing a human-centered, more secure, internet of things. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/solidconf-ux-iot-elliott-150903211012-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As presented at Solid Conference June 2015. Lessons from architecture school for designing a human-centered, more secure, internet of things.
Experience Design for IoT Security from Ame Elliott
]]>
662 7 https://cdn.slidesharecdn.com/ss_thumbnails/solidconf-ux-iot-elliott-150903211012-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-AmeElliott-48x48.jpg?cb=1490228129 Ame has fifteen years experience in human-centered innovation. She has led multi-disciplinary teams in hardware, software, and service design for industries including media, consumer electronics, enterprise systems, healthcare, education, financial services, and social impact. Her background is in Human-Computer Interaction, and she has a passion for the social and organizational implications of technology. Ame’s portfolio spans the entire design process from initial need-finding and strategy, through prototyping, implementation, and evaluation. Specialties: design research, user experience, design strategy, user-centered design, design thinking. https://twitter.com/ameellio https://cdn.slidesharecdn.com/ss_thumbnails/trustable-microinteractionssecureux-170323001602-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/designing-trustable-products-microinteractions-matter-for-secure-ux/73510065 Designing Trustable Pr... https://cdn.slidesharecdn.com/ss_thumbnails/elliott-oreilydesignv3-160122183257-thumbnail.jpg?width=320&height=320&fit=bounds AmeElliott/ux-for-security-power-of-design UX for Security: Power... https://cdn.slidesharecdn.com/ss_thumbnails/solidconf-ux-iot-elliott-150903211012-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/experience-design-for-iot-security/52400333 Experience Design for ...