PinnedGus AndrewsWhat’s hard about sharing threat intelligence?Any industry finds sharing cyber threat intelligence challenging. But the obstacles to social media platforms and civil society…Apr 24Apr 24
PinnedGus AndrewsWhat can usability research do for you?Working on digital tools for social good, I often need to explain what “user research” or “usability” are, and how and when they are (or…Mar 29, 2016Mar 29, 2016
Gus AndrewsTeaching about URLs, in two GIFsIf you know me, you know I’ve been a little obsessed with web addresses ever since I spent two years studying how people just don’t…May 18, 2023May 18, 2023
Gus AndrewsFive things you shouldn’t say about technology and cultureI’ll be teaching Technology and Culture this fall in the anthropology department at Teachers College, Columbia University, where I did my…Aug 22, 2022Aug 22, 2022
Gus AndrewsLock Your Digital DoorI originally wrote this for Tactical Tech’s Data Detox Kit; it’s adapted here with permission and thanks.May 15, 2020May 15, 2020
Gus AndrewsNo servers, no wires: A technical report on people’s mental models of emailIn 2016, I wrapped up a study of people’s conceptions of how email works, with the assistance of Renee Hobbs, Arne Renkema-Padmos, and…Oct 11, 2019Oct 11, 2019
Gus AndrewsMeltdown, Spectre, and user stories from the new security “normal”This article was originally published on the ThoughtWorks Insights blog.Feb 14, 20182Feb 14, 20182
Gus AndrewsBetter security by designThe release of the OWASP Top Ten digital security threats gives us a moment to consider: What can designers and other UX folks do to…Nov 27, 2017Nov 27, 2017
Gus AndrewsDemand evidence: a digital security takeaway from ShmooConOn the human-factors side of the infosec community, we are at the mercy of those more technical than we are. Those of us who are better at…Jan 22, 20171Jan 22, 20171