PinnedWhat’s hard about sharing threat intelligence?Any industry finds sharing cyber threat intelligence challenging. But the obstacles to social media platforms and civil society…Apr 24Apr 24
PinnedWhat can usability research do for you?Working on digital tools for social good, I often need to explain what “user research” or “usability” are, and how and when they are (or…Mar 29, 2016Mar 29, 2016
Teaching about URLs, in two GIFsIf you know me, you know I’ve been a little obsessed with web addresses ever since I spent two years studying how people just don’t…May 18, 2023May 18, 2023
Five things you shouldn’t say about technology and cultureI’ll be teaching Technology and Culture this fall in the anthropology department at Teachers College, Columbia University, where I did my…Aug 22, 2022Aug 22, 2022
Lock Your Digital DoorI originally wrote this for Tactical Tech’s Data Detox Kit; it’s adapted here with permission and thanks.May 15, 2020May 15, 2020
No servers, no wires: A technical report on people’s mental models of emailIn 2016, I wrapped up a study of people’s conceptions of how email works, with the assistance of Renee Hobbs, Arne Renkema-Padmos, and…Oct 11, 2019Oct 11, 2019
Meltdown, Spectre, and user stories from the new security “normal”This article was originally published on the ThoughtWorks Insights blog.Feb 14, 20182Feb 14, 20182
Better security by designThe release of the OWASP Top Ten digital security threats gives us a moment to consider: What can designers and other UX folks do to…Nov 27, 2017Nov 27, 2017
Demand evidence: a digital security takeaway from ShmooConOn the human-factors side of the infosec community, we are at the mercy of those more technical than we are. Those of us who are better at…Jan 22, 20171Jan 22, 20171