{"id":266554,"date":"2024-12-06T16:44:08","date_gmt":"2024-12-06T21:44:08","guid":{"rendered":"https:\/\/rosenfeldmedia.com\/?page_id=266554"},"modified":"2024-12-06T16:47:16","modified_gmt":"2024-12-06T21:47:16","slug":"human-centered-security-frequently-asked-questions","status":"publish","type":"page","link":"https:\/\/rosenfeldmedia.com\/books\/human-centered-security-frequently-asked-questions\/","title":{"rendered":"Frequently Asked Questions"},"content":{"rendered":"
These common questions about security and their short answers are taken from Heidi Trost’s book Human-Centered Security<\/em>. You can find longer answers to each in your copy of the book, either printed or digital version.<\/p>\n Where does security impact the user experience?<\/strong> In these scenarios, your users typically aren\u2019t thinking about security, which means that you and your cross-disciplinary teams need to be thinking about security.<\/p>\n I\u2019m a designer, so what do I bring to the table when it comes to security? Who will listen to me?<\/strong> How do I get buy-in to improve the security user experience?<\/strong> If people don\u2019t trust you with their information, they won\u2019t sign up. If they lose trust in you by the way you (mis)handle their information, or if they feel you\u2019ve violated their safety or privacy, they\u2019ll leave. If they can\u2019t sign into their account, they\u2019ll leave (or rather, ironically, you\u2019ve made it so they can\u2019t come back). Not to mention the thousands of confused and angry customer service messages you\u2019ll receive and need to address. (See Chapter 1, \u201cSecurity Impacts the User Experience\u201d and Chapter 7, \u201cLearn and Iterate.\u201d)<\/p>\n When you\u2019re looking to get buy-in and promote collaboration with cross-disciplinary teams, take a cue from my colleague, John Robertson, senior principal UX researcher at Secureworks. John actively seeks out different groups at his organization and joins their Slack channels or participates in discussions around the latest research papers on topics like AI and security. John doesn\u2019t have to do this\u2014it isn\u2019t part of his job description. But, in these low-key forums, the exchanging of ideas is inevitable. John learns about data science and security. The data science and security teams learn about human-centered design. When they have a question, they are more likely to seek John out. And vice versa. Win-win! Do not underestimate these informal channels.1 Chapter 4, \u201cFind the Right People, Ask the Right Questions,\u201d also has more information about finding and collaborating with your cross-disciplinary team members.<\/p>\n","protected":false},"excerpt":{"rendered":" These common questions about security and their short answers are taken from Heidi Trost’s book Human-Centered Security. You can find longer answers to each in your copy of the book, either printed or digital version. Where does security impact the user experience? Security impacts the user experience in nearly every part of the user journey. … Continued<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":187323,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-266554","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/pages\/266554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/comments?post=266554"}],"version-history":[{"count":2,"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/pages\/266554\/revisions"}],"predecessor-version":[{"id":266558,"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/pages\/266554\/revisions\/266558"}],"up":[{"embeddable":true,"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/pages\/187323"}],"wp:attachment":[{"href":"https:\/\/rosenfeldmedia.com\/wp-json\/wp\/v2\/media?parent=266554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nSecurity impacts the user experience in nearly every part of the user journey. (Check out Chapter 1, \u201cSecurity Impacts the User Experience,\u201d for more details.) Security impacts the user experience most often when a user:<\/p>\n\n
\nIf you design products, I guarantee you are designing for the security user experience\u2014even if you have never thought of it that way before. (Check out Chapter 1, \u201cSecurity Impacts the User Experience.\u201d) The design decisions you make influence the security (and privacy) choices that users make or the actions they take. You (and your cross-disciplinary team) understand your product more than your users ever will\u2014including potential security threats that directly impact your users. You are in a unique position to solve for those threats and protect your users from them.<\/p>\n
\nWhen talking to leadership, try reframing the conversation around trust, rather than focusing on the word \u201csecurity.\u201d Trust is where you gain or lose customers. In other words, trust is where the business makes money or loses money.<\/p>\n