{"id":697729,"date":"2020-10-13T11:32:28","date_gmt":"2020-10-13T18:32:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-blog-post&#038;p=697729"},"modified":"2020-10-14T09:25:47","modified_gmt":"2020-10-14T16:25:47","slug":"designing-user-experiences-that-support-security-and-compliance","status":"publish","type":"msr-blog-post","link":"https:\/\/www.microsoft.com\/en-us\/research\/articles\/designing-user-experiences-that-support-security-and-compliance\/","title":{"rendered":"Designing user experiences that support security and compliance"},"content":{"rendered":"<p>By <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/megan-brown-4b401033\/\">Megan Brown<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<div id=\"attachment_697186\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-697186\" class=\"size-large wp-image-697186\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/iStock-1143926748-2-1024x748.jpg\" alt=\"\" width=\"1024\" height=\"748\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/iStock-1143926748-2-1024x748.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/iStock-1143926748-2-300x219.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/iStock-1143926748-2-768x561.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/iStock-1143926748-2.jpg 1103w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-697186\" class=\"wp-caption-text\">Photo credit: iStock<\/p><\/div>\n<p><span data-contrast=\"auto\">While it may\u00a0<\/span><span data-contrast=\"auto\">not appear to be the case<\/span><span data-contrast=\"auto\">, when it comes to\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">c<\/span><span data-contrast=\"auto\">ompliance<\/span><span data-contrast=\"auto\">, providing\u00a0<\/span><span data-contrast=\"auto\">a good<\/span><span data-contrast=\"auto\">\u00a0end user experience\u00a0<\/span><i><span data-contrast=\"auto\">is<\/span><\/i><span data-contrast=\"auto\">\u00a0top of mind for enterprise decision-makers.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Why is the user experience (UX)\u00a0<\/span><span data-contrast=\"auto\">in<\/span><span data-contrast=\"auto\">\u00a0this\u00a0<\/span><span data-contrast=\"auto\">area<\/span><span data-contrast=\"auto\">\u00a0so important?\u00a0<\/span><span data-contrast=\"auto\">To be effective, Information Workers (IWs) must use security and compliance\u00a0<\/span><span data-contrast=\"auto\">features,\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0use them correctly. Otherwise, the solutions the organization has invested in don\u2019t provide the intended value<\/span><span data-contrast=\"auto\">\u00a0in helping the organization remain safe, secure, and compliant<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Stated<\/span><span data-contrast=\"auto\">\u00a0well by\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0decision-maker<\/span><span data-contrast=\"auto\">:<\/span><span data-contrast=\"auto\">\u00a0\u201c<\/span><span data-contrast=\"auto\">No one wants to do compliance, right? It\u2019s the worst part of everyone\u2019s job \u2026 but it\u2019s the thing that\u2019s most important, so we need to make it as simple as possible.\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When doing user<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">research<\/span><span data-contrast=\"auto\">\u00a0on security\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0compliance experiences in<\/span><span data-contrast=\"auto\">\u00a0Microsoft Office,\u00a0<\/span><span data-contrast=\"auto\">we\u2019ve uncovered learnings about how to design better experiences in this space.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Through focus groups, usability studies, and customer conversations, we have been\u00a0<\/span><span data-contrast=\"auto\">hearing themes\u00a0<\/span><span data-contrast=\"auto\">about the top areas to focus on when designing end user facing security\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0compliance features.\u00a0<\/span><span data-contrast=\"auto\">These areas of focus demonstrate the<\/span><span data-contrast=\"auto\">\u00a0need for\u00a0the design\u00a0to achieve these five tenets:\u00a0<\/span><b><span data-contrast=\"auto\">Understandable<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">Efficient<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">Habituating<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">Discreet<\/span><\/b><span data-contrast=\"auto\">, and\u00a0<\/span><b><span data-contrast=\"auto\">Beautiful<\/span><\/b><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These design principles represent a subset of tenets from the\u00a0<\/span><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/uitraps.com\/\"><span data-contrast=\"none\">UI Tenets & Traps<\/span><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span data-contrast=\"auto\">\u00a0framework, a heuristic framework<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">for evaluating user interfaces<\/span><span data-contrast=\"auto\">\u00a0(UI)<\/span><span data-contrast=\"auto\">\u00a0t<\/span><span data-contrast=\"auto\">hat, when followed, can quickly and effectively improve a design.<\/span><span data-contrast=\"auto\">*<\/span><span data-contrast=\"auto\">\u00a0Read on to learn their significance in the context of the\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance<\/span><span data-contrast=\"auto\">\u00a0space<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"auto\">Fi<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">ve\u00a0<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">design\u00a0<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">tenets<\/span><\/i><\/b><b><i><span data-contrast=\"auto\">\u00a0for end user security and compliance experiences<\/span><\/i><\/b><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\"> Understandable<\/span><\/b><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">\u201cWhen a UI is understandable, the user is aware of the actions they can take because the UI contains concepts that are learned quickly.\u201d \u2013 UI Tenets & Traps<\/span><\/i><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why make it Understandable?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">W<\/span><span data-contrast=\"auto\">hen\u00a0<\/span><span data-contrast=\"auto\">I<\/span><span data-contrast=\"auto\">W<\/span><span data-contrast=\"auto\">s\u00a0<\/span><span data-contrast=\"auto\">have a limited understanding\u00a0<\/span><span data-contrast=\"auto\">of how to\u00a0<\/span><span data-contrast=\"auto\">uphold security and compliance<\/span><span data-contrast=\"auto\">, they cannot\u00a0<\/span><span data-contrast=\"auto\">reliabl<\/span><span data-contrast=\"auto\">y<\/span><span data-contrast=\"auto\">\u00a0do so<\/span><span data-contrast=\"auto\">\u00a0for their organization<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Unfortunately,\u00a0<\/span><span data-contrast=\"auto\">it is not uncommon for\u00a0<\/span><span data-contrast=\"auto\">IWs<\/span><span data-contrast=\"auto\">\u00a0to<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">lack knowledge in two\u00a0<\/span><span data-contrast=\"auto\">key<\/span><span data-contrast=\"auto\">\u00a0areas: (1) the tools, more specifically that they exist and how to use them, and (2) general knowledge of compliance rules and security best practices. While IT departments<\/span><span data-contrast=\"auto\">\u00a0do<\/span><span data-contrast=\"auto\">\u00a0send out training material, organizations are<\/span><span data-contrast=\"auto\">\u00a0still<\/span><span data-contrast=\"auto\">\u00a0experiencing\u00a0<\/span><span data-contrast=\"auto\">lack<\/span><span data-contrast=\"auto\">\u00a0of engagement with the tools and incorrect\u00a0<\/span><span data-contrast=\"auto\">u<\/span><span data-contrast=\"auto\">se,<\/span><span data-contrast=\"auto\">\u00a0leaving assets unprotected or with inadequate protection.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-697297 alignnone\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png\" alt=\"\" width=\"44\" height=\"44\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png 150w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-180x180.png 180w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-360x360.png 360w\" sizes=\"auto, (max-width: 44px) 100vw, 44px\" \/>How might\u00a0<\/span><span data-contrast=\"auto\">a design<\/span><span data-contrast=\"auto\">\u00a0reduce complexity\u00a0<\/span><span data-contrast=\"auto\">for\u00a0<\/span><span data-contrast=\"auto\">IWs<\/span><span data-contrast=\"auto\">?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Conduct user research to understand<\/span><span data-contrast=\"none\">\u00a0what the end users do and do not already know, then<\/span><span data-contrast=\"none\">\u00a0use<\/span><span data-contrast=\"none\">\u00a0the<\/span><span data-contrast=\"none\">\u00a0terms<\/span><span data-contrast=\"none\">\u00a0that are familiar to users<\/span><span data-contrast=\"none\">\u00a0in the\u00a0<\/span><span data-contrast=\"none\">UI<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">If<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">it is necessary to introduce new concepts<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">provide\u00a0<\/span><span data-contrast=\"none\">a<\/span><span data-contrast=\"none\">\u00a0way for\u00a0<\/span><span data-contrast=\"none\">users<\/span><span data-contrast=\"none\">\u00a0to lear<\/span><span data-contrast=\"none\">n<\/span><span data-contrast=\"none\">\u00a0about them.<\/span><\/p>\n<ol start=\"2\">\n<li><b><span data-contrast=\"auto\"> Efficient<\/span><\/b><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">\u201cA UI is efficient when users perceive that they are doing things in a minimal number of steps.\u201d \u2013 UI Tenets & Traps<\/span><\/i><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why make it Efficient?<\/span><\/b><span data-contrast=\"auto\">\u00a0Productivity is often at odds with\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">c<\/span><span data-contrast=\"auto\">ompliance. When IWs are trying to accomplish their work, any security or compliance step that gets\u00a0<\/span><span data-contrast=\"auto\">in the way<\/span><span data-contrast=\"auto\">\u00a0feels like a burden<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">This\u00a0<\/span><span data-contrast=\"auto\">often\u00a0<\/span><span data-contrast=\"auto\">leads\u00a0<\/span><span data-contrast=\"auto\">to\u00a0pushback\u00a0and help desk calls. On the flip side, when these features are too subtle or do not appear within their main workflows,\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance is often ignored by IWs.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This issue has been a longstanding\u00a0<\/span><span data-contrast=\"auto\">challenge<\/span><span data-contrast=\"auto\">\u00a0in\u00a0<\/span><span data-contrast=\"auto\">the space<\/span><span data-contrast=\"auto\">, impacting some of the most essential initiatives<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">A<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">d<\/span><span data-contrast=\"auto\">ecision-maker explained,\u00a0<\/span><span data-contrast=\"auto\">\u201cWhen we implemented multifactor auth it was not [culturally]\u00a0<\/span><span data-contrast=\"auto\">accepted. [People complained]<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0\u2018It\u2019s a nightmare.\u2019 \u2018It takes forever.\u2019 It was a massive shift to the security side with pushback.\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-697297 alignnone\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png\" alt=\"\" width=\"44\" height=\"44\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png 150w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-180x180.png 180w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-360x360.png 360w\" sizes=\"auto, (max-width: 44px) 100vw, 44px\" \/>How might\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance experiences appear within the user\u2019s flow in a way that feels seamless and friction-free?<\/span><span data-contrast=\"auto\"> L<\/span><span data-contrast=\"none\">ook for opportunities to reduce unnecessary steps, text, and graphics\u2013apply \u2018fierce reduction\u2019.<\/span><span data-ccp-props=\"{\"134233279\":true,\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<ol start=\"3\">\n<li><b><\/b><b><span data-contrast=\"auto\">Habituating<\/span><\/b><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">\u201cA UI is habituating when, over time, the user does things automatically. This quick learning and understanding create a familiarity that encourages future use & enhanced efficiency in task performance.\u201d \u2013 UI Tenets & Traps<\/span><\/i><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why make it\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Habituating<\/span><\/b><b><span data-contrast=\"auto\">?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">O<\/span><span data-contrast=\"auto\">rganizations\u00a0<\/span><span data-contrast=\"auto\">find it challenging\u00a0<\/span><span data-contrast=\"auto\">to teach IWs to use<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><i><span data-contrast=\"auto\">consistently\u00a0<\/span><\/i><span data-contrast=\"auto\">use<\/span><span data-contrast=\"auto\">, and\u00a0<\/span><i><span data-contrast=\"auto\">correctly\u00a0<\/span><\/i><span data-contrast=\"auto\">use<\/span><span data-contrast=\"auto\">\u00a0security and compliance features<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Complex and inconsistent systems add to this problem<\/span><span data-contrast=\"auto\">, increasing cognitive load and making it difficult to\u00a0<\/span><span data-contrast=\"auto\">learn and\u00a0<\/span><span data-contrast=\"auto\">establish\u00a0<\/span><span data-contrast=\"auto\">habits.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If we can ensure users interact with a security system\u00a0<\/span><span data-contrast=\"auto\">the same way every time<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and remov<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">\u00a0unnecessary decision points<\/span><span data-contrast=\"auto\">, they can more easily\u00a0<\/span><span data-contrast=\"auto\">build<\/span><span data-contrast=\"auto\">\u00a0security and compliance habits<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and use the system with less thinking required<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">In addition to reducing effort, it can reduce the chance of\u00a0<\/span><span data-contrast=\"auto\">error<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">lead<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0to better outcomes<\/span><span data-contrast=\"auto\">\u00a0for the organization<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png\" width=\"44\" height=\"44\" \/>During the design process, how might we leverage systems thinking and an eye for coherence throughout the system to improve end user habituation?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">When you\u00a0<\/span><span data-contrast=\"auto\">find<\/span><span data-contrast=\"auto\">\u00a0redundancy,\u00a0<\/span><span data-contrast=\"auto\">streamline the experience by\u00a0<\/span><span data-contrast=\"auto\">p<\/span><span data-contrast=\"none\">rovid<\/span><span data-contrast=\"none\">ing\u00a0<\/span><span data-contrast=\"none\">just one way for actions to be completed\u00a0<\/span><span data-contrast=\"none\">to improve learnability<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">When you\u00a0<\/span><span data-contrast=\"none\">find<\/span><span data-contrast=\"none\">\u00a0inconsistenc<\/span><span data-contrast=\"none\">ies<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">fix it by\u00a0<\/span><span data-contrast=\"none\">presenting the\u00a0<\/span><span data-contrast=\"none\">labels and controls\u00a0<\/span><span data-contrast=\"none\">in the same manner and location whenever the user encounters them.<\/span><span data-ccp-props=\"{\"134233279\":true,\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<ol start=\"4\">\n<li><b><span data-contrast=\"auto\"> Discreet<\/span><\/b><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">\u201c\u2019Unwanted disclosures\u2019 violate the tenet of \u2018discreet&#8217; by sharing user information, causing unwanted attention, or disrupting others &#8230;\u00a0<\/span><\/i><i><span data-contrast=\"auto\">[and] can result in physical and\/or emotional harm and embarrassment if users unknowingly share information beyond their trusted community, poor brand image and press, as well as expensive lawsuits.\u201d \u2013 UI Tenets & Traps<\/span><\/i><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why make it Discreet?<\/span><\/b><span data-contrast=\"auto\">\u00a0In the context of\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance experiences, a discreet system prevents oversharing of information, which in turn can prevent embarrassment and harm to the IW and the organization.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">IWs<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">may\u00a0<\/span><span data-contrast=\"auto\">intentionally or unintentionally\u00a0<\/span><span data-contrast=\"auto\">overshare information<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">not realizing the\u00a0<\/span><span data-contrast=\"auto\">risk of their actions<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">One<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">security professional<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">commented<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0\u201cThe issue is my users aren\u2019t aware. They send all [information] when a [recipient] only needs\u00a0<\/span><span data-contrast=\"auto\">some<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">\u2026 They have too much faith the system will protect\u00a0<\/span><span data-contrast=\"auto\">them<\/span><span data-contrast=\"auto\">\u00a0and they make poor choices.\u201d<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-697297 alignnone\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png\" alt=\"\" width=\"44\" height=\"44\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png 150w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-180x180.png 180w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-360x360.png 360w\" sizes=\"auto, (max-width: 44px) 100vw, 44px\" \/>How might we\u00a0<\/span><span data-contrast=\"auto\">design experiences that\u00a0<\/span><span data-contrast=\"auto\">prevent IWs from accidentally oversharing information\u00a0<\/span><span data-contrast=\"auto\">and guide them to make better choices<\/span><span data-contrast=\"auto\">?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">As a starting point, ensure\u00a0<\/span><span data-contrast=\"none\">the user\u00a0<\/span><span data-contrast=\"none\">is aware of what information<\/span><span data-contrast=\"none\">\u00a0is being shared<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">and\u00a0<\/span><span data-contrast=\"none\">to whom<\/span><span data-contrast=\"none\">, as well as the sensitivity of the information<\/span><span data-contrast=\"none\">\u00a0and its required\u00a0<\/span><span data-contrast=\"none\">protections<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{\"134233279\":true,\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<ol start=\"5\">\n<li><b><span data-contrast=\"auto\"> Beautiful<\/span><\/b><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">\u201cAn \u2018unattractive appearance\u2019 violates the tenet of \u2018beautiful\u2019\u00a0<\/span><\/i><i><span data-contrast=\"auto\">\u2026 [and]\u00a0<\/span><\/i><i><span data-contrast=\"auto\">can result in negative emotions from users, less forgiveness, more difficultly to use interfaces, longer task times, user abandonment of the interface or system, etc.\u201d \u2013 UI Tenets & Traps<\/span><\/i><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why make it Beautiful?<\/span><\/b><span data-contrast=\"auto\">\u00a0Even a little bit of visual design\u00a0<\/span><span data-contrast=\"auto\">can go a long way<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">So often do\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance features focus on utility\u00a0<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">\u00a0suffer from an unattractive appearance.<\/span><span data-contrast=\"auto\">\u00a0The risk of an unattractive appearance is that (1) for an optional\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance experience, it doesn\u2019t get used or is used incorrectly, and (2) for a mandatory experience that IWs are forced to use, it creates friction and discontent between IWs and those responsible for the\u00a0<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">ecurity\u00a0<\/span><span data-contrast=\"auto\">and c<\/span><span data-contrast=\"auto\">ompliance posture of the organization.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-697297 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png\" alt=\"\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-150x150.png 150w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-180x180.png 180w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/10\/light-bulb-360x360.png 360w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>How might <\/span><span data-contrast=\"auto\">we design<\/span><span data-contrast=\"auto\">\u00a0security and compliance<\/span><span data-contrast=\"auto\">\u00a0features\u00a0<\/span><span data-contrast=\"auto\">with a thoughtful<\/span><span data-contrast=\"auto\">\u00a0visual design that<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">aids in the ease of use<\/span><span data-contrast=\"auto\">?<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">A<\/span><span data-contrast=\"auto\">pply a<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">modern visual design\u00a0<\/span><span data-contrast=\"auto\">consistently throughout the experience<\/span><span data-contrast=\"auto\">\u2013<\/span><span data-contrast=\"auto\">one\u00a0<\/span><span data-contrast=\"auto\">in which form and function work together to improve the user experience.<\/span><span data-ccp-props=\"{\"134233279\":true,\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><b><i><span data-contrast=\"auto\">The takeaway\u00a0<\/span><\/i><\/b><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The choices\u00a0<\/span><span data-contrast=\"auto\">IWs<\/span><span data-contrast=\"auto\">\u00a0make\u00a0<\/span><span data-contrast=\"auto\">impact\u00a0<\/span><span data-contrast=\"auto\">the security and compliance posture of their organization.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Good UX for end users is\u00a0<\/span><span data-contrast=\"auto\">necessary for supporting<\/span><span data-contrast=\"auto\">\u00a0organizations.\u00a0<\/span><span data-contrast=\"auto\">The more that these systems and tools are\u00a0<\/span><span data-contrast=\"auto\">understood, and successfully integrated into daily processes, the safe<\/span><span data-contrast=\"auto\">r<\/span><span data-contrast=\"auto\">\u00a0and more secure organizations will remain.<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While achieving simplicity in an inherently complex space is a challenging effort, our hope is tha<\/span><span data-contrast=\"auto\">t<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">by\u00a0<\/span><span data-contrast=\"auto\">providing more information about<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">these<\/span><span data-contrast=\"auto\">\u00a0tenets and the context\u00a0<\/span><span data-contrast=\"auto\">in which they exist, product\u00a0<\/span><span data-contrast=\"auto\">developers of any discipline<\/span><span data-contrast=\"auto\">\u00a0will be able to\u00a0<\/span><span data-contrast=\"auto\">create better\u00a0<\/span><span data-contrast=\"auto\">end user experiences.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><strong>References\u00a0<\/strong><\/p>\n<p><span data-contrast=\"none\">*<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/uitraps.com\/\">https:\/\/uitraps.com\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/span><span data-contrast=\"none\">\u00a0&#8211;\u00a0<\/span><span data-contrast=\"none\">UI<\/span><span data-contrast=\"none\">\u00a0evaluation tool<\/span><span data-contrast=\"none\">\u00a0based on<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">a large body of knowledge<\/span><span data-contrast=\"none\">\u00a0that\u00a0<\/span><span data-contrast=\"none\">researchers and designers<\/span><span data-contrast=\"none\">\u00a0can use\u00a0<\/span><span data-contrast=\"none\">to improve<\/span><span data-contrast=\"none\">\u00a0the quality of UI.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/p>\n<p><strong>How does this measure up to your experience in designing user experiences? Have you used the UI tenets and traps? If so, what did you think of them?<\/strong> <strong>Let us know!<\/strong>\u00a0<strong class=\"x-hidden-focus\">Tweet us\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.x.com\/MicrosoftRI\">@MicrosoftRI<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0or\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.facebook.com\/MicrosoftRI\">like us on Facebook<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>\u00a0and join the conversation.<\/strong><\/p>\n<p><em><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">Megan Brown is a user researcher and product planner on the XC Planning & Research team. She works on experiences that span the Microsoft Office suite including security & compliance,\u00a0<\/span><\/span><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">collaboration, and privacy.\u00a0<\/span><\/span><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">Before Microsoft, Megan studied Psychology at Duke University, where she also taught Computer Science 101 to undergraduate students as a teaching assistant. She enjoys work that brings<\/span><\/span><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">\u00a0<\/span><\/span><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">together\u00a0<\/span><\/span><span class=\"TextRun SCXW20294391 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW20294391 BCX8\">multiple disciplines, and collaborating closely with designers, program managers, and engineers to bring thoughtful user experiences to life.<\/span><\/span><span class=\"EOP SCXW20294391 BCX8\" data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\">\u00a0<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When doing user research on security and compliance experiences in Microsoft Office, we\u2019ve uncovered learnings about how to design better experiences in this space. Through focus groups, usability studies, and customer conversations, we have been hearing themes about the top areas to focus on when designing end user facing security and compliance features. <\/p>\n","protected":false},"author":38703,"featured_media":697687,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-content-parent":616842,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[],"msr-locale":[268875],"msr-post-option":[],"class_list":["post-697729","msr-blog-post","type-msr-blog-post","status-publish","has-post-thumbnail","hentry","msr-locale-en_us"],"msr_assoc_parent":{"id":616842,"type":"group"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-blog-post\/697729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-blog-post"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-blog-post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/38703"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-blog-post\/697729\/revisions"}],"predecessor-version":[{"id":697903,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-blog-post\/697729\/revisions\/697903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/697687"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=697729"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=697729"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=697729"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=697729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}