PinnedWhat can usability research do for you?Working on digital tools for social good, I often need to explain what “user research” or “usability” are, and how and when they are (or should be) deployed in software development. Here’s a list of some types of usability work, linking to examples from my portfolio. Design research Do this first…User Experience4 min readUser Experience4 min read
May 18Teaching about URLs, in two GIFsIf you know me, you know I’ve been a little obsessed with web addresses ever since I spent two years studying how people just don’t understand URLs, as part of my dissertation. I wrote an article on how UX designers’ choice over a decade ago to start hiding and…Digital Literacy4 min readDigital Literacy4 min read
Aug 22, 2022Five things you shouldn’t say about technology and cultureI’ll be teaching Technology and Culture this fall in the anthropology department at Teachers College, Columbia University, where I did my doctoral work and where I follow in the footsteps of anthropology pioneer Margaret Mead as well as sex therapist (and Holocaust survivor, former sniper, and all-around badass) “Dr. Ruth”…Technology4 min readTechnology4 min read
May 15, 2020Let the Right One InMake Your Passwords Stronger — I originally wrote this security advice piece for Tactical Tech’s Data Detox Kit; it’s adapted here with permission and thanks. Do you find yourself reusing the same password for all or most of your online accounts? Because strong passwords can be so hard to memorize, you may tend to reuse…Passwords7 min readPasswords7 min read
May 15, 2020Lock Your Digital DoorI originally wrote this security advice piece for Tactical Tech’s Data Detox Kit; it’s adapted here with permission and thanks. Although it may seem like taking care of your digital life is something that only happens online — in your email, the cloud, or a cell phone tower someplace —…Privacy6 min readPrivacy6 min read
Oct 11, 2019No servers, no wires: A technical report on people’s mental models of emailIn 2016, I wrapped up a study of people’s conceptions of how email works, with the assistance of Renee Hobbs, Arne Renkema-Padmos, and Blue Ridge Labs. While I have previously spoken informally about the findings of this study, due to editorial logistics and time constraints I was unable to release…Cybersecurity1 min readCybersecurity1 min read
Feb 14, 2018Meltdown, Spectre, and user stories from the new security “normal”This article was originally published on the ThoughtWorks Insights blog. When I talk to people about how to protect themselves against security problems, often the first feeling they express is guilt or shame. That’s what I heard from my friend Lindsay the other day when I exclaimed to my old…Security11 min readSecurity11 min read
Nov 27, 2017Better security by designThe release of the OWASP Top Ten digital security threats gives us a moment to consider: What can designers and other UX folks do to support security? — This article was originally published on thoughtworks.com. Human error is one of the toughest things to guard against when planning digital security. It’s the single biggest attack surface in digital systems. And yet, security and user-experience (UX) design are generally not considered in tandem — in fact, security and usability…Security8 min readSecurity8 min read
Jan 22, 2017Demand evidence: a digital security takeaway from ShmooConOn the human-factors side of the infosec community, we are at the mercy of those more technical than…Cybersecurity5 min readCybersecurity5 min read
Jun 1, 2016Adapting Lean UX methods to free/open-source software: Report from the GridSync design workshopActivity: “Lean”-style workshop to develop a more usable new interface for an open-source distributed file-sharing system. Takeaways: Refine background materials thoroughly for short events. Talk about conflicting assumptions to make progress. Working with open-source secure tools developers, I have had few opportunities to bring design and user needs to early…Free Software7 min readFree Software7 min read