Privacy-enhancing
technology
Business growth and risk mitigation for the new data economy
scroll

Building users trust in a technical solution
With emerging technologies, my role as a designer is not just to create usable interfaces, but to create a solution users trust. Most users will not understand the underlying technologies at play, but they need to trust that their data is secure and that their goals are being achieved.
In order to create trust, you need integrate predefined methods of UX/UI to speak to users. These methods create a sense of familiarity and help users understand how new technologies are not as strange as them may seem. When you are able to explain to users what's happening in the background, they can trust the system more fully.

Prototyping: developing demos for stakeholder and customer buy-in
As a designer in a very innovative space and working with emerging technologies, my role as a designer is not just to create usable interfaces, but to create a solution users trust. Most users will not understand the underlying technologies at play, but they need to trust that their data is secure and that their goals are being achieved.
In order to create trust, you need to play on defined methods in UX/UI to speak to users sense of familiarity and to be as transparent as possible. When you are able to explain to users what's happening in the background, they can trust the system more fully.
Enterprise-ready solutions: privacy by design
Before
Results table is not usable in this state. The results must be downloaded then uploaded into an excel sheet in order to work with the data.
The identifier (row_id) is not understood. Although it proves that the data is in fact encrypted, the end-user cannot easily decipher which person is associated with the row_id.
The matched criteria is not understood in this design. What is matched criteria?
After
Results can be filtered, sorted, highlighted, tagged, and arranged in order to facilitate usability and ease of visibility.
By implementing privacy-enhancing technologies, we are able to show real data without compromising any personally identifying information or data leaks through the system.
The matched criteria is completely visible, allowing the users to understand the risk of each case fully.