Log in or create a free Rosenverse account to watch this video.
Log in Create free account100s of community videos are available to free members. Conference talks are generally available to Gold members.
Summary
If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.
Key Insights
-
•
Security user experience (UX) has significant implications for personal safety and operational integrity.
-
•
Collaboration across disciplines—UX design, engineering, compliance, and security—is necessary for effective security practices.
-
•
Users often have different definitions and perceptions of security that need to be understood by designers and security professionals.
-
•
Alice (user persona) represents the end user who often finds security measures cumbersome or confusing.
-
•
Charlie (personification of security systems) embodies the frustration users feel when interacting with security protocols.
-
•
Threat actors possess a deep understanding of user weaknesses and often have better insight into user behaviors than the designers themselves.
-
•
Effective security measures should be integrated seamlessly into user experiences to minimize disruption.
-
•
Initial stages like onboarding and signup are critical for shaping long-term user security practices.
-
•
Clear language and communication strategies are essential to help users navigate security complexities.
-
•
User education about security is paramount, especially given the increasing sophistication of threats.
Notable Quotes
"I have become even more worried about the state of the security user experience and the impact that it may have on all of us."
"We all need to collaborate to understand the complex security ecosystem and improve security outcomes."
"When security impacts the user experience, that's where Alice meets Charlie."
"The dynamic between Alice and Charlie is really important."
"If Alice doesn't believe Charlie, she's going to resent him."
"We're often unhelpful, right? The way that Charlie comes across is complicated."
"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."
"Threat actors are constantly adapting, and we need to be as good as them at understanding the dynamics of security and users."
"We have to understand that dynamic in order to improve security outcomes."
"Saying we want to be more secure is not enough. What are the behaviors that lead to more secure?"
















More Videos

"Design operations is never done; it's always evolving."
Kristin Skinner Kamdyn MooreGroup Activity: A Deep Dive Into Value and Outcomes
October 23, 2019

"The broader framing here is about enhancing our thinking through effective note-taking."
Jorge ArangoThe Best of Both Worlds: How to Integrate Paper and Digital Notes (1st of 3 seminars) (Videoconference)
April 5, 2024

"We want to make it simple and easy and let you do that without losing your flow."
Prabhas Pokharel Mayo NissenOrder and Chaos: New Ways of Collaborating on Synthesis and Storytelling
March 10, 2022

"Modern mobile apps have features that can greatly enhance accessibility needs."
Sam ProulxMobile Accessibility: Why Moving Accessibility Beyond the Desktop is Critical in a Mobile-first World
March 10, 2022

"Every research project should start with the concrete decisions it hopes to enable."
Roberta Dombrowski Sam Duong WoloszynskiMaking Research a Team Sport
March 11, 2022

"We have a tendency to always look outside and say these changes are needed."
Josina VinkNavigating the pitfalls of systems thinking in service design
December 4, 2024

"Design operations are often viewed as a luxury, rather than a necessity in organizations."
Angelos ArnisNavigating the Rapid Shifts in Tech's Turbulent Terrain
October 2, 2023

"We can leverage our strengths with customers by directly going to large businesses."
Ted NewardTheme 4: Enterprise Organizational Journey
June 4, 2019

"Change has to come from within the community."
Maria SkaadenPanel Discussion: Methodologies and Work Environments
November 8, 2018