Consumer Attitudes Towards Product Safety

Report Cover of Consumer Attitudes Towards Product Safety: Physical Consumer Goods vs. Internet Connected Products, featuring a dark purple diagonal section on top with the title and a light purple diagonal section on the bottom, featuring a cartoon of a woman in glasses and a messy bun, holding a papers labeled "product safety" and a thought bubble with a seesaw measuring two, lower white bags on the left side, marked "Injury" and a bag on the higher, right side labeled "loss of privacy"

Just published: “Consumer Attitudes Towards Product Safety: Physical Consumer Goods vs. Internet Connected Products”. In my latest research with Lisa LeVasseur at Internet Safety Labs. we looked consumer perceptions and attitudes of safety of a variety of products. This research received financial support from the Internet Society Foundation.

Yahoo! Finance picked it up!

…and if the 75 min read warning on LinkedIn scares you (it’s mostly charts anyway) jump to the intro and discussion to see what you really should be concerned about as digital makers. This is important information that every product designer and engineer should know.

Some interesting findings about product safety attitudes:

* When it comes to product safety, there’s a double standard among consumers for connected vs. unconnected products.

People expect product makers to be responsible for the safety of things like home goods, cars, cleaning products and the like. But they don’t have the same expectation when it comes to websites, Smart TVS and mobile apps.

* Many consumers appear unaware of the causal connection between personal and societal harms such as physical, emotional, reputational, and financial damage and the systemic loss of privacy tied to connected products and services.

Product consumers are subjecting themselves to more harms than they think when they trust digital product makers to take proper care of their personal information.

* Even though survey respondents didn’t score mobile apps as the “least safe” optionwebsites, smart automobiles and smart homes got that dubious honorconsumers expressed more concern about the safety of apps than the safety of other internet-connected products.

If you find that last point interesting, you will find Internet Safety Lab’s AppMicroscope educating. App Microscope displays Safety Labels for mobile applications. Currently, App Microscope contains over 1700 apps studied in the ISL 2022 K-12 EdTech safety benchmark.

Read the full report at Internet Safety Labs:

Consumer Attitudes Towards Product Safety: Consumer Products vs Internet-Connected Products:

Look for other reports in a summary of my work for Internet Safety Labs.

UX-LX: Talks on Digital Harm and Understanding Searcher Behavior

User Experience Lisbon 2023

In May, I was invited to speak at UX Lisbon, on Preventing Digital Harm in Online Spaces. At the main event, I presented the Internet Safety Lab’s framework for evaluating the relationship that digital technologies have with consumers and what we can do as designers to mitigate the digital harms and dark patterns that could potentially violate that relationship. You can download my presentation below.

On the first day of the event, I ran a half-day, pre-conference workshop titled “Designing Effective Search Strategies” in which I introduced a new framework using observation as a powerful tool to understand site search behavior. To explore this, we broke into seven groups and worked on creating empathy maps, search personas (including group personas) and mapping the user journey toward information discovery. As a takeaway, all participants received a toolkit for crafting these artifacts and a step-by-step process to enhance product search. We got to eat yummy Portuguese snacks, too!

“Noreen … made the interesting point that if we build an accessible design we’ll also be solving many search problems.”

UXLx: UX Lisbon

What a wonderful event, interesting and welcoming people and an absolutely unforgettable time!

I am available to teach your team mitigating digital harm as a solo facilitator or how to understand user search behavior, solo or with my colleagues at the Information Architecture Gateway. Let me know if we can help.

Read the UXLX Write-ups at Medium:

UXLX 2023 Wrap Up: Workshops

UXLX 2023 Wrap Up: Talks Day

Ethics in Computer Programming: Move Fast, and Let Someone Else Break Things

In a session yesterday of the NSF CyberAmbassadors leadership training program, my breakout group were tasked with discussing a case study of a potential ethics violation in research data privacy. The Code of Conduct that we were to use to determine if a violation occurred was the Association for Computing Machinery’s (ACM).

The case study involved a research scientist who had made software to analyze three sets of participant data, including DNA records, medical records and social media posts. There was a problem with the program and the scientist wanted to be able to do a crowdsourced code review. They asked their ERB team to review whether they could release the codebase to the public to crowdsource the problem. The ERB approved the request as long as no participant data was also released or could be reidentified. The case expressed a statement that there was a risk of reidentifying data but didn’t say specifically how. Just that the request was approved.

My first impression was that the research scientist was hiding behind item 2.6 in the ACM Code of Conduct, which says to only do work within your area of competence. The way we read it, the researcher relied on the Ethics Review Board (ERB) to make the ethical determination. Since the ERB approved the study, was the researcher in the clear?

Conversation ensued about how a data analytics program that didn’t include test data could be tested, or whether it could be tested with dummy data and a sample of open social media posts/hashtags, etc. but that was actually aside from our real interest, which was the idea that technology developers, including those with less funding, but also those with fewer guardrails, may not be competent to or interested in make ethical decisions.

Someone brought up AI. People working in AI today or really any large, complex model affecting global populations, are often making decisions way outside of their area of competence. They may do well, in one or two disciplines, but understanding and unraveling the externalities of what the thing will do once it’s in the world is of lesser interest since they aren’t ethicists.

In fact, not all companies have ERBs and many big names, you know who, have quietly and unceremoniously disbanded their ethics teams. In a world of move fast and break things, it’s not their area of competence.

Is this the world we want to live in?

Thoughts on Diversity, Equity and Inclusion (DEI) as a Design Framework

“Tools for Accessibility” by Noreen Whysel. AI generated art produced at NightCafe Studio

I was on a call the other day where we were discussing identity services for underserved populations. Someone brought up Diversity, Equity, and Inclusion (DEI) as a framework for ensuring accessible services for all.

DEI, as applied to product and service design, is a three-pronged philosophy that asks if you are assuring that diverse perspectives and lived experiences are being considered in the design of the service; whether access to the design or service is fair to all categories of people; and whether those—whose diverse experiences are considered—feel safe, welcome and included in the service and its outcome.

We discussed DEI in our group, but one person became uncomfortable, insisting that it doesn’t matter who is using the services as long as everyone can use it. He was concerned that focusing on DEI might mean that the unique needs of people, like the parent of a disabled person, would be excluded from consideration in the design of a product or service.

I thought this was an odd framing. He isn’t wrong to worry that caregivers may not have the best-designed experiences, which is why Universal Design, or design that everyone can use without impediment, is so important as a framework.

But rejecting conversations about DEI outright seems short sighted.

As a framework, I like DEI because it offers a reminder that there are people who get forgotten in the design process. It asks questions like “Who are we including?” and “Who are we leaving out?” So, my colleague’s concern about addressing the needs of the parent of a disabled person is exactly the type of inclusion issue that a DEI framework can help to identify.

It is also an area that I have been focusing on at IA Gateway with Shari Thurow and Bev Corwin. We are working on a model for a group persona that addresses the search needs of caregivers and people with a medical concern, whether a family member, acquaintance or someone in guardianship care.

Resilient Identifiers for Underserved Populations WG Charter Approved

I’m pleased to announce that the Charter for the Resilient Identifiers for Underserved Populations work group (RIUP WG) was approved by the Kantara Initiative Leadership Council earlier this week. This work group combines the legacy work groups (WGs) from the Identity Ecosystem Steering Group, which was formed in 2011 to provide a trust registry under the White House’s National Strategy for Trusted Identity in Cyberspace and absorbed by Kantara in 2018. I was a member of the UX Committee and wrote the User Experience Guidelines and Metrics document for the ID Ecosystem Framework Registry.

For the RIUP WG, two groups, Federated Identifiers for a Resilient Ecosystem (FIRE WG) and Healthcare ID Assurance (HIAWG) were combined to address identity assurance concerns for underserved people, who are often referred to as “vulnerable populations” by healthcare sector.

1) WG NAME (and any acronym or abbreviation of the name):  Resilient Identifiers for Underserved Populations Work Group (RIUP WG) 

(2) PURPOSE:  The purpose of the Work Group is to support vulnerable and underserved populations in America. At a high level, these populations include those with physical and cognitive disabilities, or who are homeless, impoverished, senior citizens, immigrants, incarcerated, institutionalized and otherwise underserved minority groups that need digital credentials to access online resources; particularly, online healthcare and financial resources. Without an easily reusable identifier, it is nearly impossible for these individuals to gain secure access to the resources and services that may be available to them. 

We will work, in collaboration with other private sector and public agencies towards establishing identifiers and access management (IAM) solutions that respect privacy, promote efficiency, limit redundancy, reduce barriers to use/adoption, increase interoperability, improve security, enhance safety and trust, eliminate identification errors, support resiliency, and achieve greater empowerment across the entire spectrum of online transactions. The RIUP WG will identify, coordinate, innovate and harmonize with ongoing and emerging identity initiatives, standards, and technologies, and communicate our findings to all relevant stakeholders, both in the US and, selectively, with other countries, under the leadership of the Kantara Initiative.  

(3) A SCOPE – Guidelines for Cultivating a User-Centric Trust and Promoting Adoption within Underserved Communities 

About “Underserved Populations”

Why does the RIUP WG use “underserved” rather than “vulnerable” when discussing the needs of healthcare populations? The US Health and Human Services tends to use “vulnerable” or “vulnerable and/or underserved” when discussing needs of people who require healthcare services but do not reflect the typical healthcare technology user.

In human subject testing, the category generally includes the elderly, poor, pregnant women, children, and infants, and recently, incarcerated people have been included in this description. But for the purposes of access to healthcare services, it also includes rural populations, those with permanent and temporary disabilities, indigenous peoples and others who may object to being described as vulnerable, yet need services that may be difficult to find, therefore rendering them “underserved.”

I had a conversation with Dana Chisnell, a founding member of the US Digital Service now serving as Deputy Design Director at US DHS, who convinced me to use “underserved” as a descriptor for identifiers. While there will still be “vulnerable populations” requiring special services, “underserved” puts the onus of care on the service provider rather than the traits of an individual which may or may not reflect their needs, abilities or level of personal agency. This work follows my research interest at the Internet Safety Lab where we are changing the conversation around digital harms, where the outcome of a service or lack of service can be harmful.

What’s Next?

RIUP WG will begin by creating guidelines for cultivating a user-centric trust registry and promoting adoption within Underserved Communities. We will publish a Use Case for Trusted Identifiers for underserved populations. And with a universal design strategy we will emphasize, highlight and prioritize user scenarios/stories from vulnerable and underserved populations to improve services for all users. We will test the use case and user stories across different verticals and persons of varying backgrounds and cultures. And we will create a dictionary that is harmonized with industry terminology.

There are a lot of initiatives that we will be watching. NIST is drafting 800-63-4 Digital Identity Guidelines, so we will work on comments on how to incorporate the needs of underserved people. The HSS Office of the National Coordinator (ONC) referenced trust registries in its work on Social Determinants of Health for Medicaid and we are participating in its information forums. We also plan to update the MAAS draft to incorporate recommendations from these efforts.

Lots to do and a great time to get involved.

Great teamwork!

Losing Our Third Place

Three women in a liminal space. Digital art generated by Night Cafe.
Three women in a liminal space. Digital art generated by Night Cafe.

I have been working from home for a couple decades, so a number of things were new for me during the COVID pandemic, and the hardest was probably having everyone else at home with me. My husband and my eldest who was in college and studying remotely, and occasionally my youngest who was in off-campus housing at college in New Orleans, but ended up back at home due to COVID and storm evacuations.

During this time, I needed to change my routine. Sharing my office with my husband was difficult because he took frequent calls that broke my concentration and he’s a noisy typer. I moved my “office” to my son’s room and had to negotiate when I could and couldn’t socialize or use the kitchen, since everyone’s lunch schedules were all a bit different.

The other thing that was different was that my normally “out of the house” activities were also back in house. I teach at a local college that was online for several semesters. (I’ve been teaching on campus for the past semester, with some online weeks, but a lot of students are still in hybrid classes). The evening meetups and other professional networking that I used to go out for a night or two a week were still happening from home, which can be awkward when the family expects to eat and relax together normally at that time.

Posting the schedule on the door or through a shared calendar has been helpful for coordinating my family activities. My husband or one of my kids cook dinner and feed the cat on the nights when I have an evening meetup or when I am teaching online, just as they would have done when I wasn’t here. Taking calls outside when the weather cooperates was also helpful, though not ideal. The alternative to evening meetups was to find similar activities during the day, and I found quite a lot that fit my schedule, but it meant negotiating midday things again.

My students at CUNY City Tech, who are mostly college junior and seniors, are also only now getting to classes on campus. They have been under a lot of stress about finding internships and post-college jobs and generally negotiating their own living spaces with family. Having to attend school from home was one of the added stresses that pandemic lockdown caused for students. And negotiating hybrid schedules can be exhausting.

A few semesters ago at the beginning of the pandemic, I had a student I’ll call Fatima who was attending my class from home. Her brother was also at attending school from home and space was tight. Fatima complained to me that her mom was always on her to clean up and complaining about why she wasn’t doing her part. It was causing her a lot of stress worrying about sick relatives, schoolwork, and extra home chores on top of it all, when she would normally be taking classes on campus and have had the “excuse” of not being at home.

I think what was going on at her house and in the homes of many of my students at the time was similar to what was happening with household supply shortages at the beginning of pandemic lockdown, where things you would normally use at work or school were now being purchased and used at home. Only for Fatima, instead of a shortage of toilet paper and bleach, there was a shortage of liminal space, the time and physical passages between her school and home life, that allowed her to adjust to and negotiate the activities that happen in those spaces.

Fatima was at home. Her brother was at home. Her mom and dad were also at home. The stress of being the busy student, helpful daughter, and goofy friend crammed in one space was exhausting. When her mom was complaining about the mess, Fatima was operating in busy student mode, not helpful daughter mode, which caused conflict.

What seemed to click for Fatima and a lot of my students was the idea of the lost “Third Places” or those special places and conditions outside of home or school or work that define different aspects of our being, but that are now collapsed into a less private and more awkward home/Zoom life. Interestingly, Fatima’s mother was losing her third place, as well. She used to have space at home that was her own to be who she was when she was not surrounded by all the extra activity, people and messes that everyone, her children, her husband, living in the same space all the time created.

And with hybrid classes and workspaces continuing to conflate our work, home, social, spiritual, and mental lives, conflict and negotiation will likely continue as we sort out these disparate spaces. It is important to recognize these conflicts, and to be a lot more forgiving of ourselves and others as we negotiate this new way of living. Because we aren’t back to “normal” yet, if we ever will be.

Crypto, NFTs and Dadaism

POGs (Source: File:Pogslam.jpg – Wikimedia Commons)

Those of you interested in artists’ collaborative spaces may find the Dada.art platform unique. I found it while pondering the connection between NFTs (Non-Fungible Tokens) and Dadaism, an early 20th century, anti-capitalist art movement “expressing nonsense, irrationality, and anti-bourgeois protest in their works.” (I wondered to myself, half seriously, whether anyone had made NFTs from POGs, the 1990s collector’s item. Turns out someone has).

Of course the NFT platform is called DADA.art and they recently sold a collection of collaborative works as an NFT to Metapurse for 500 ETH (Etherium crypto coin). All proceeds were donated back to the community to provide a basic income (in ETH) to artists on the platform. Fascinating.

Safe Tech Audit Sketchnotes – IAC22

Zsofi Lang’s Sketchnotes from my talk “Safe Tech Audit: IA as a Framework for Respectful Design” from The Information Architecture Conference 2022:

Image