Latest news & updates – Page 25 of 29

Nostalgia, Trust, and Brand Guidelines

Last week Google unveiled a new logo as part of an updated brand identity. Professional typographic designers were swift to react. Tobias Frere-Jones, designer of Interstate and other widely-used fonts, said "I really hope this 'e' does not become a thing." Beyond professional designers, the New Yorker's Sarah Larson complained Google "took something we trusted and filed off its dignity." The Google logo reaches the level of cultural commentary in a general interest magazine because its use is so widespread.

Art, Design, and the Future of Privacy

We're headed to NYC next week for our annual Advisors' Meeting. While we're there we're thrilled to be partnering with Dis Magazine to host Art, Design, and the Future of Privacy. If you're in the area, please join us; the event is free and open to the public. 7:30pm, Thursday Sept 17 Pioneer Works, Brooklyn Join cryptographers, critical theorists, architects, designers, sociologists, user experience researchers and other bright luminaries for a casual evening discussing privacy, the culture of technology, and possibilities for creative intervention in the age of ubiquitous digital tracking.

Briar: Notes From An Expert Review

Researchers who want to evaluate software interfaces have a number of tools at their disposal. One option for identifying obvious and significant problems is an expert review, which is often used to catch low-hanging fruit before performing any kind of user testing. Expert reviews employ usability heuristics, which systematically explore potential problems with a piece of software by applying patterns for good design. With some guidance from UX-research veteran Susan Farrell, we recently performed expert reviews of a few open source tools for encrypting communications.

Usability and Security: Not Binary Properties

People who think about computer security for a living sometimes cringe when they read about the subject in the popular press. Security is a complex and nuanced topic, and it’s easy to make assertions that don’t hold up to careful scrutiny. One basic-but-unintuitive principle is that security is not a binary property: in the absence of other context, it’s hard to definitively say that a particular system or piece of software is “secure” or “insecure”.

Design Thinking

The latest Harvard Business Review (paywall, but with limited free content) has two articles about design thinking that are relevant for teams working on security and privacy: Design for Action by Tim Brown and Roger Martin and Design Thinking Comes of Age by Jon Kolko. These articles describe how design thinking has moved beyond creating tangible products and on to supporting collaborative design of complex systems. They give an overview of design thinking’s evolution, from its roots in Herbert Simon’s The Sciences of the Artificial, through Richard Buchanan’s Wicked Problems in Design Thinking, and into addressing challenges for domains far outside areas historically considered “design.