Most of the time, honest conversations about sensitive topics happen between people who have known each other a long time, who've worked together, who've built up a foundation of trust. They don't happen when some unknown people cold-email you and ask to make a one-hour appointment with you – right?
Doing data handling with privacy and security in mind means spending some time to identify different threats, culminating in a threat model, and coming up with strategies that fit the particular threat model. We've compiled some best practices for both risk assessment and security strategies.
While bigger companies have entire departments that do product design and market research, it can be difficult for smaller, distributed teams on a budget to get user feedback. We compiled a session guide to test your app with small groups, ideal for quick feedback at conferences and meetups.
In this installment of our series on resources for field research, we discuss the participant’s bill of rights. Additional resources include screeners and model releases for photography.
Why Consent Matters Field research such as interviews and …
This post is part of a series explaining our publicly available resources for user research. The previous installment covered how to write screeners to recruit participants. This week, we discuss how to get model releases to share photos from user …
A screener is a questionnaire that helps researchers recruit the most appropriate participants for their user study research.
Here is an example we used for our mobile messaging study in NYC. Blue Ridge Labs handled the recruiting. Most of this …