Users

Changing Profiles: The Missing Edit Button

  Social media sites such as Facebook, LinkedIn, and Twitter have changed the nature of digital identities. The anonymous or pseudonymous online profiles of the 90s have been eschewed for real and “verified” identities. However, why do websites force us to conform to variables that describe our identities according to inflexible database fields? Identities are fluid by nature and change over time. We adopt nicknames and change them. We marry and change our surnames. We remarry and change them again. We endure ordeals in life and change our names to distance ourselves from threatening people or violent events. We change our names to avoid responsibilities. We even play with identity and names as an expressive art form. Though government agencies are adept at tracking the various forms of our identities, the common social media and web services that we use daily are not so willing. For example, Facebook has name standards. Their standards limit personal expression. They encourage people to use “real names” but names are subjective and contextual. In fact, the California law that governs identity recognizes that a name others use for you, even if not your “real name” can be legally valid. Furthermore, the “usage method” of the…

The Post-Password Era Begins

In November of 2012, Wired Magazine wrote a cover story titled, “Kill the Password,” in which Mat Honan retold how hackers stole his identity and hijacked his social media accounts. After some research, Honan shared just how easy it is for hackers to steal passwords, often with some fairly low-tech methods. Fast forward to October 9, 2013, when Adobe Systems emailed its users that hackers had stolen encrypted user passwords. However, the fact that Adobe was hacked wasn’t the problem. The email was sent to call attention to the real problem: “We recommend that you also change your password on any website where you use the same user ID or password.” Yikes! How many web-based accounts do I have that use the same user name? In January of 2012, I began documenting all the web-based accounts I use. 66 of 167 web accounts use the same user name. 40 use another. How many use the same password? Coincidentally, 66 use the same password. Despite how obviously vulnerable I am, I might have been complacent enough to ignore my own security negligence had two more Internet companies not emailed me about Adobe’s password breach. On November 16, Eventbrite emailed me to recommend that I change my password on their site because…

Language, Culture, and Communication

Where we come from — our background culture: our country of origin and language, our heritage and religion (or lack thereof), our family, our education, our friends, and where we live — has an enormous impact on our ability to communicate. What’s more, when people from different cultural backgrounds try to interact with each other, these differences can cause catastrophic failures. Direct versus Indirect Communication Styles Consider the following set of remarks about doing homework: Do your homework! Can you start doing your homework? Would you mind starting your homework now? Let’s clean the table so you can start your homework. Do you need help with homework? It’s getting late, do you have a lot of homework? Didn’t you say you have a lot of homework? Johnny’s mom said that he has a lot of homework today… Do you have everything ready for school tomorrow? Look how late it is — it’s almost time for bed. You have school tomorrow. Each of the statements above represents a progressively less direct command to do homework. In my family, I usually pick number 2 to communicate my desires for finished homework to my sons (although number 1 is perfectly acceptable, to me).…

Tools to Jump-start Product Design Process

product design proposal: user groups

I often encounter the Blank Page Syndrome among our clients. They have an IDEA, but find it difficult to translate the nebulous desires into plans and actions that become a business. I hear a lot: “I know what I want, I just don’t know how that gets translated into something tangible.” The problem though is that most times, these individuals don’t know what they really want. And my job as a designer is to do product design therapy to uncover the real needs and separate them from vague desires. There are a few strategies for this (cognitive scaffolding for the design process). From the point of view of the final product, it is important that the client buys into the ideas and makes them their own. When I hear my words spoken back to me a few weeks into the process, I feel more confidant that the final result will be the practical manifestation of my client’s desires. Define the Categories of Product Users When one runs a business, selling products or providing services, it’s important to keep in mind that in most cases it’s not about you (typical mirroring error). The products and services have to appeal to end…

Cuteness Inspires Violence Research and Angry Birds

cheek pinching

Have you ever felt the urge to hug someone too hard? Squeeze a baby? Pinch a cheek? Even when you knew it might hurt the other person? If you have, you are not alone! Last month, Scientific American published an article Cuteness Inspires Aggression on the study done by Rebecca Dyer and Oriana Aragon of Yale University, documenting the intense response to cuteness. Cute aggression’s prevalence does not mean that people actually want to harm cuddly critters, Aragon explains. Rather the response could be protective, or it could be the brain’s way of tamping down or venting extreme feelings of giddiness and happiness. The scientists are currently conducting additional studies to determine what drives the need to squeeze. So this research led me to think of the success of the Angry Birds game. Originally, I thought that it was the juxtaposition of the cuteness factor and violence that made the game so irresistible as a sales effort (once people started playing it, the puzzles were good enough to sustain engagement with the game without the cute + aggressive factor). Would the game be just as fun to talk about (or to wear t-shirts) if the birds weren’t so damn cute?…

User Roles and Governance

2013-06-09 Role vs Governance Diagram for NIH Citizen Engagement Think Tank

One of the areas of discussion at the NIH Citizen Science Engagement Think Tank meeting last month was how to categorize the roles (and thus rules of engagement) for citizen scientists. There was a continuous pressure to call individuals who “donate” their medical data to scientific research patients. Let me start by saying that I find that unacceptable — aside from the fact that every human being on Earth has been or will be a patient at some point in their lives; the label patient implies a lower level on the hierarchy than doctor or scientist. The whole point of citizen science initiative is to break down the barriers to entry — we are ALL scientists! Being a scientist is not measured by the number of years in school or diplomas on the wall. It is the willingness to do science that is key. Thus we can all be scientists. With that said, what follows is the discussion on group dynamics — how do people work in groups and how we can support productive scientific endeavors through good design and social engineering. Think Different Collective Groups of people are not made up of homogeneous people — we are all idiosyncratically…