Log in or create a free Rosenverse account to watch this video.
Log in Create free account100s of community videos are available to free members. Conference talks are generally available to Gold members.
Summary
Imagine slipping on a sleek pair of smart glasses. Not only do you look sharp, the glasses capture everything you see, hear, and do. Your AI assistant—built into the glasses and synced to your email, social media accounts, health apps, and finances—manages your life. It’s tasked with paying bills, booking trips, replying to messages, even helping you swipe right. Over time, you find yourself chitchatting with your AI assistant. You call him Charlie. Now imagine you’re a threat actor. That trust between user and AI assistant? It’s your entry point. If your product is powered by AI, you’re not just designing features—you’re designing an entire relationship. You’re designing Charlie. Let’s talk about where that goes wrong—and how to get it right.
Key Insights
-
•
Users often do not understand why AI-powered systems request extensive personal data, increasing privacy risks.
-
•
Trust in AI agents can become excessive, creating new vectors for manipulation by threat actors.
-
•
Security issues typically occur beneath the surface until alerts disrupt the user experience, often causing frustration.
-
•
Prompt injection attacks pose a novel threat where malicious inputs manipulate AI agents to access sensitive user data.
-
•
Multimodal AI interfaces introduce complexity in security decisions, increasing chances for user errors.
-
•
Secure by default settings reduce burden on users and improve overall protection without requiring user intervention.
-
•
Cross-disciplinary collaboration between UX, security, product, legal, and compliance teams is crucial for safer AI design.
-
•
Users need clear, contextual guidance during onboarding to make informed decisions about data sharing and security settings.
-
•
Transparency about AI limitations and giving users the option to reverse AI actions are essential for building trust.
-
•
Threat actors are likely to exploit growing AI access to personal data and automate vulnerabilities discovery.
Notable Quotes
"When a product is powered by AI, you're not just designing the features; you are designing an entire relationship."
"Charlie is like the most annoying coworker who constantly surfaces problems but never offers solutions to Alice."
"Threat actors probably know your system better than you do and are looking for any entry points to exploit."
"Alice often perceives Charlie as just another barrage of alerts filled with jargon she doesn't understand."
"Prompt injection attacks can trick AI agents into accessing private data like emails without the user realizing."
"People become incrementally more comfortable giving away data because they see the value AI provides."
"We need secure defaults that protect users out of the box without them having to figure it out."
"Alert fatigue is real; users can't be burdened with constant security decisions or they'll ignore them."
"Giving users the ability to reverse AI-driven actions is critical but currently underexplored."
"If Charlie has been tampered with, Alice needs a clear way to be alerted that she shouldn't trust it."
Or choose a question:
More Videos
"Use whatever information is available in the tool. Views, downloads, and links in Slack channels are all helpful adoption metrics."
Gabrielle VerderberDocumentation Your Team Will Actually Use
October 3, 2023
"All the brands that came to us to understand women were really trying to understand us."
Jennifer KanyamibwaCreating the Blueprint: Growing and Building Design Teams
November 8, 2018
"If we are working on something that does not ladder up to our KSPs, then we should not be working on it."
Saara Kamppari-Miller Nicole Bergstrom Shashi JainKey Metrics: Comparing Three Letter Acronym Metrics That Include the Word “Key”
November 13, 2024
"Accessibility isn’t just for developers or designers—everyone has a role to play."
Samuel ProulxDesigning beyond caricatures: Embracing real, diverse user needs
December 4, 2024
"Being able to see faces and first names of people we're learning from makes those users tangible to the team."
Catherine DubutBridging Physical and Digital Spaces: Approaches to Retail Service Design
March 18, 2021
"If you’re a Theory X manager, you believe work is something people hate and must be controlled."
Sam LadnerData Exhaust and Personal Data: Learning from Consumer Products to Enhance Enterprise UX
June 8, 2016
"When you magnify prototypes, they may look blurry, but that’s something to fix in the final website design."
Sam ProulxPrototype Reviews, People With Disabilities, and You
December 8, 2021
"The current decline in response and participant engagement rates is a genuine crisis that threatens research data quality."
Jemma Ahmed Megan Blocker Eduardo OrtizRedefining the research toolkit: Expanding methodologies for a changing world
March 12, 2025
"We invited BCG’s clients to live with us in multidisciplinary innovation studios for 12 to 18 months."
Kevin BethuneReimagining Design: Unlocking Strategic Innovation
June 8, 2022