{"id":13852,"date":"2021-02-25T10:32:59","date_gmt":"2021-02-25T09:32:59","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=13852"},"modified":"2022-03-19T09:53:35","modified_gmt":"2022-03-19T08:53:35","slug":"ux-design-enhance-data-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/","title":{"rendered":"7 Ways to Use UX Design to Enhance User Data Security"},"content":{"rendered":"\n<p>UX design and cybersecurity are not mutually exclusive. While data privacy and ensuring <a href=\"https:\/\/www.codemotion.com\/magazine\/articles\/stories\/cybersecurity-hiring-team\/\" class=\"ek-link\">security <\/a>in each line of your code should be an ethical consideration for UX designers, it\u2019s also a matter of building trust among your customers.&nbsp;<\/p>\n\n\n\n<p>Users trade their personal information with websites or mobile apps in exchange for a digital product. They expect this information to be handled with integrity.<\/p>\n\n\n\n<p>UX isn\u2019t just design and flow. A website with severe data security flaws will not be able to build the trust that\u2019s central to maintaining strong customer engagement. Security thus needs to be embedded in your <a href=\"https:\/\/www.jegdesign.com\/design-chat\/how-to-optimize-web-design-to-convert-better-than-competitors\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">web design<\/a>.&nbsp;<\/p>\n\n\n\n<p>Data breaches exposed <a href=\"https:\/\/www.securitymagazine.com\/articles\/94076-the-top-10-data-breaches-of-2020\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">36 billion records<\/a> in the first half of 2020, so data security is a real concern. One of the biggest challenges in interface design is to reconcile UX and security, but it is possible.<\/p>\n\n\n\n<p>A good UX design can make or break a brand, while failed data security strategies have led to the fall of many organizations. Using UX to design your security gateways will ensure your users have an experience that does not disappoint them in terms of either convenience or the safety of their data.&nbsp;<\/p>\n\n\n\n<p>With the number of businesses <a href=\"https:\/\/www.clicdata.com\/blog\/cloud-migration\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">migrating to cloud<\/a> increasing exponentially, data safety is now more important than ever before.&nbsp;<\/p>\n\n\n\n<p>The user is the one left wanting in the misperceived dichotomy of the two camps i.e. UX and data security. One strives for better design; the other, for security. But businesses and their customers shouldn\u2019t be forced to choose between a superior user experience or a secure one.<\/p>\n\n\n\n<p>While <a href=\"https:\/\/uxcam.com\/blog\/ux-statistics\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">88%<\/a> of users are less likely to return to a website after a bad user experience, <a href=\"https:\/\/www.toptal.com\/finance\/finance-directors\/cyber-security\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">75%<\/a> of organizations don\u2019t have the technology or security procedures to prevent potential cyber-attacks. However, UX and security is not a zero-sum game. You can have a product that maximizes both.&nbsp;<\/p>\n\n\n\n<p>Here are seven ways you can use a UX design to improve the data security picture.<\/p>\n\n\n\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-592c023e      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#1-encourage-safety-through-ux\" class=\"uagb-toc-link__trigger\">1.\u00a0 Encourage Safety Through UX<\/a><li class=\"uagb-toc__list\"><a href=\"#2-simplify-authentication\" class=\"uagb-toc-link__trigger\">2.\u00a0 Simplify Authentication<\/a><li class=\"uagb-toc__list\"><a href=\"#3-minimise-complexity\" class=\"uagb-toc-link__trigger\">3.\u00a0 Minimise Complexity<\/a><li class=\"uagb-toc__list\"><a href=\"#5-make-users-aware-of-phishing-attacks\" class=\"uagb-toc-link__trigger\">5.\u00a0 Make Users Aware of Phishing Attacks<\/a><li class=\"uagb-toc__list\"><a href=\"#6-design-for-transparency\" class=\"uagb-toc-link__trigger\">6.\u00a0 Design for Transparency<\/a><li class=\"uagb-toc__list\"><a href=\"#7-collect-less-data-and-reduce-the-number-of-cookies\" class=\"uagb-toc-link__trigger\">7.\u00a0 Collect Less Data and Reduce the Number of Cookies<\/a><li class=\"uagb-toc__list\"><a href=\"#the-takeaway\" class=\"uagb-toc-link__trigger\">The takeaway<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-encourage-safety-through-ux\"><strong>1.<\/strong>&nbsp; <strong>Encourage Safety Through UX<\/strong><\/h2>\n\n\n\n<p>Users are typically both active and attentive. Even if they\u2019re lazily browsing, however, there\u2019s still plenty of reason to make sure they\u2019re alerted to security risks. You can do this through a well thought out UX design.&nbsp;<\/p>\n\n\n\n<p>Tell users that security is in place and remind them that you use SSL encryption. This will increase trust in your product and <a href=\"https:\/\/www.sogosurvey.com\/blog\/how-to-conduct-a-cx-audit-to-improve-service-quality\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">services<\/a>. Implement features that encourage users to choose stronger passwords and remind them to give out as little personal information as possible.<\/p>\n\n\n\n<p>This micro-copy, visible when users create passwords, should encourage more secure selections. Rather than forcing users to create a strong password with one upper case letter, two special characters, and a number, tell them why it\u2019s important to have a carefully picked out password.&nbsp;<\/p>\n\n\n\n<p>You need to trust your customers to know the importance of securing their data. If the risk is made clear, they\u2019ll be motivated to create a stronger password.<\/p>\n\n\n\n<p>Make security notifications intuitive and meaningful. If the security measures require an extra step, tell your users why. Show your design expertise. Instead of a long security document, provide brief statements using copy and graphics to make the interaction enjoyable.&nbsp;<\/p>\n\n\n\n<p>If users complete the task, use pictures and text to applaud their commitment to security and tenacity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-simplify-authentication\"><strong>2.<\/strong>&nbsp; <strong>Simplify Authentication<\/strong><\/h2>\n\n\n\n<p>Security flows are the most disliked elements of UX. Logging in, remembering your passwords, two-step authentications, captcha etc. These are definitely not user friendly.&nbsp;<\/p>\n\n\n\n<p>Users want minimal fuss, and two-step authentications are time-consuming and downright annoying. They\u2019re a great cybersecurity measure, but they could be improved with an eye to UX.<\/p>\n\n\n\n<p>A single sign-in is a great way to enhance the user experience. You can still use two-factor authentication when credit card or financial information is being inputted, but for regular sign-ins where minimal data is collected, a single sign-in may be better.<\/p>\n\n\n\n<p>Instead of a complex and time-consuming authentication, <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/designer-cxo\/ux-designers-developers-together\/\" class=\"ek-link\">UX designers<\/a> can use links sent to the emails used to sign into the website. An example would be <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/peer-to-peer-video-conference\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">peer to peer video conferencing<\/a>. Once the link to the meeting is sent to your email, you don\u2019t need to sign in again to join. The link is authentication enough.<\/p>\n\n\n\n<p>A complex CAPTCHA can ruin your UX. Trying to prove they\u2019re not a robot will quickly come to annoy your users, and they might decide not to return to your webpage. Instead, look into other options. CAPTCHA technology is evolving apace, and there are now less cumbersome but equally effective alternatives out there.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-minimise-complexity\"><strong>3.<\/strong>&nbsp; <strong>Minimise Complexity<\/strong><\/h2>\n\n\n\n<p>Technical jargon is a deal-breaker. A good UX designer knows that design revolves around the user understanding it and seamlessly cruising through. If at any point you must tell the user about a security risk, it\u2019s best to do so in the simplest language possible.<\/p>\n\n\n\n<p>Provide a straightforward explanation of how a security measure works in layman\u2019s terms. Think of how technicalities might be interpreted by the user before you put them down. Don\u2019t use vague terms that may make users circumvent security features, but tell them simply what the problem is.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/user-friendly-cybersecurity-is-a-better-ux-the-key-to-a-better-defense-\/b\/d-id\/1337699?page_number=2\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">44%<\/a> of people think that easier security measures would make their organization more secure.&nbsp;<\/p>\n\n\n\n<p>A well-designed UX platform that embeds security and follows the UX standard is more likely to succeed compared to a poorly designed one. A usable interface inspires confidence and looks safer.&nbsp;<\/p>\n\n\n\n<p>Clearly pointing out features that offer security protection instead of just having them there will also make users feel safer.<\/p>\n\n\n\n<p><strong>4.<\/strong>&nbsp; <strong>Address Frequently Breached UX Areas To Build Trust<\/strong><\/p>\n\n\n\n<p>To truly meet the security needs of users, designers and data security experts need to sit together and understand the users\u2019 intentions, behaviors, and expectations. Using <a href=\"https:\/\/www.glip.com\/use-case\/collaboration-tools-for-design-teams\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">collaboration tools for design teams<\/a>, they can navigate through the design aspects while anticipating the risks involved.&nbsp;<\/p>\n\n\n\n<p>Ignoring stakeholders doubles the risk. Privacy needs to be built into your design by default.<\/p>\n\n\n\n<p>Your product needs to be usable, desirable, accessible, and safe. You must test it for usability and security. The best tools for user research and user testing utilize <a href=\"https:\/\/www.glip.com\/feature\/screen-sharing-software\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">screen sharing software<\/a> that captures in-site feedback.&nbsp;<\/p>\n\n\n\n<p>Identify security holes and take action accordingly instead of having a product so secure it isn\u2019t usable. Security measures need to be embedded into the design in its initial stage and throughout the life cycle of the product.<\/p>\n\n\n\n<p>To accomplish this:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Make sure usernames are not emails. Hackers could get access to any system that uses the same email.<\/li><li>Ensure error handling doesn\u2019t compromise the site\u2019s safety. If passwords are entered incorrectly, don\u2019t spell out the email which the password is sent to.<\/li><li>Require strong passwords.<\/li><li>Use two-factor authentication every time the bank is involved in a financial transaction. It helps to protect login data and credit card information.<\/li><li>Find alternatives to passwords for secure authentication, like biometric authentication.<\/li><li>Adjust settings so administrators and users can select who can share content.<\/li><li>Limit data access to only allow users to view and share what they want.<\/li><li>Use end-to-end encryption to build trust.<\/li><\/ul>\n\n\n\n<p>Many popular products on the web do not use end-to-end encryption, making data highly susceptible to a breach.&nbsp;<\/p>\n\n\n\n<p>An example is Skype, which only encrypts your conversations if you choose the \u201cPrivate Conversation\u201d feature. The <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/skype-alternatives\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">best alternatives to Skype<\/a> are listed here, many of them employing end-to-end encryption.<\/p>\n\n\n\n<p>You do not need security perimeters that are front-loaded; have them embedded inside the user journey and create a frictionless experience without compromising security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-5-make-users-aware-of-phishing-attacks\"><strong>5.<\/strong>&nbsp; <strong>Make Users Aware of Phishing Attacks<\/strong><\/h2>\n\n\n\n<p>Phishing is an online scam where criminals impersonate legitimate organizations via email, text, advertisement, or another means to steal sensitive information. To protect against phishing, UX designers can create pop-ups that alert users in a way that doesn\u2019t disrupt their browsing experience.<\/p>\n\n\n\n<p>Designers can also craft security forums and <a href=\"https:\/\/www.glip.com\/use-case\/collaboration-tools-for-it-teams\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">team collaboration tools<\/a> where users may report spam and help other users. They can employ popups or messages within their apps to alert users of phishing attempts too.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-6-design-for-transparency\"><strong>6.<\/strong>&nbsp; <strong>Design for Transparency<\/strong><\/h2>\n\n\n\n<p>Make sure your intentions are transparent. Ensure you inform users of how their data is being used and are upfront about what user actions entail.&nbsp;<\/p>\n\n\n\n<p>Users should have a say in what data is collected and be able to give their consent to each bit of data processing. They should also have the right to withdraw this consent when they feel like it. Designers should ensure that users also know of third parties that might use their data.<\/p>\n\n\n\n<p>Try to avoid storing sensitive information to proactively <a href=\"https:\/\/exclusive.multibriefs.com\/content\/5-data-protection-trends-of-2020-that-will-define-security-next-year\/science-technology\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">protect your data <\/a>from breaches. Always ask for permission before you store this.&nbsp;<\/p>\n\n\n\n<p>An excellent UX design would entail a well-structured and easily digestible privacy policy that tells users everything they need to know about their data and its uses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-7-collect-less-data-and-reduce-the-number-of-cookies\"><strong>7.<\/strong>&nbsp; <strong>Collect Less Data and Reduce the Number of Cookies<\/strong><\/h2>\n\n\n\n<p>Minimize the personal data you collect and work on keeping it secure. Ensure you destroy it when it\u2019s no longer needed.&nbsp;<\/p>\n\n\n\n<p>Alos make sure you track what data third parties collect, and if you can, anonymize personal data.&nbsp;<\/p>\n\n\n\n<p>Designers should ensure that closing an account is easy. Convenience is key even if the customer is leaving.<\/p>\n\n\n\n<p>While it\u2019s thought that collecting as much data as possible creates a more personalized experience, in a trade-off between more information and <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/web-app-security-tools\/\" target=\"_blank\" rel=\"noopener\">security concerns<\/a>, you need to prioritize the latter. Less is more, so think twice about how much data you require to provide a premium experience online.<\/p>\n\n\n\n<p>A user-based design pays attention to how data is collected and how questions are framed. Notifications, forms, and permission requests are posed to the user only when you are certain the customer will accept them.&nbsp;<\/p>\n\n\n\n<p>There are more chances your form will be filled in if it has fewer fields. <a href=\"https:\/\/unbounce.com\/conversion-rate-optimization\/how-to-optimize-contact-forms\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">Imagescape<\/a> reduced their contact form from 11 to four fields and gained a 120% increase in conversions.&nbsp;<\/p>\n\n\n\n<p>For example, for a <a href=\"https:\/\/www.bookinglive.com\/blog\/advantages-disadvantages-online-booking-system\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">booking appointments<\/a> website, it\u2019s useless to have fields in the booking form requesting the individual\u2019s address. You only need their name and credit card to complete the transaction.&nbsp;<\/p>\n\n\n\n<p>Of the many ways there are to enhance the user experience, reducing the number of cookies is a great one. Also, make sure the cookie banner isn\u2019t startling and doesn\u2019t take away from the user experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-takeaway\">The takeaway<\/h2>\n\n\n\n<p>A good <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/machine-learning-dev\/conversational-ai-new-ux\/\" class=\"ek-link\">UX<\/a> can change the fate of your company, but a product that\u2019s easy to navigate and enjoyable to use doesn\u2019t have to compromise on security. Security is sacrosanct. Without it your users are vulnerable.&nbsp;<\/p>\n\n\n\n<p>Luckily, UX and security can work hand in hand. They must. You can deliver a product that\u2019s both usable and highly secure.<\/p>\n\n\n\n<p>You don\u2019t have to decide on what\u2019s more important &#8212; increased security or a better experience. Product security doesn\u2019t stand at odds with design. The latter can in fact be used to improve online safety, as illustrated above.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Be aware of the human tendencies of your users, but ensure your security precautions don\u2019t remove their agency. Designers who understand their users\u2019 needs can still create products that provide an immersive experience, and a product that prioritizes data security builds trust more easily than one that doesn\u2019t.<\/p>\n\n\n\n<p>Cyber is a complex adaptive system, and UX design is crucial for success in the online world. Using UX to enhance data security is hitting two birds with one stone and setting yourself up for success.&nbsp;<\/p>\n\n\n\n<p>As long as you remain creative and open to tackling security issues with UX, you will find your customers reward you with increased engagement and trust.&nbsp;&nbsp;<\/p>\n\n\n\n<p>[jwp-video n=&#8221;1&#8243;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UX design and cybersecurity are not mutually exclusive. While data privacy and ensuring security in each line of your code should be an ethical consideration for UX designers, it\u2019s also a matter of building trust among your customers.&nbsp; Users trade their personal information with websites or mobile apps in exchange for a digital product. They&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\">Read more<\/a><\/p>\n","protected":false},"author":67,"featured_media":13853,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":8,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[76],"tags":[7152],"collections":[],"class_list":{"0":"post-13852","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-design-ux","8":"tag-security","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 Ways to Use UX Design to Enhance User Data Security - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Ways to Use UX Design to Enhance User Data Security\" \/>\n<meta property=\"og:description\" content=\"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:author\" content=\"#\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-25T09:32:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-19T08:53:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lorenzo Ermigiotti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@#\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lorenzo Ermigiotti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\"},\"author\":{\"name\":\"Lorenzo Ermigiotti\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/e54433adb771f0b877d4127bade34b40\"},\"headline\":\"7 Ways to Use UX Design to Enhance User Data Security\",\"datePublished\":\"2021-02-25T09:32:59+00:00\",\"dateModified\":\"2022-03-19T08:53:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\"},\"wordCount\":1968,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Design\/UX\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\",\"name\":\"7 Ways to Use UX Design to Enhance User Data Security - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg\",\"datePublished\":\"2021-02-25T09:32:59+00:00\",\"dateModified\":\"2022-03-19T08:53:35+00:00\",\"description\":\"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg\",\"width\":1200,\"height\":628,\"caption\":\"7 Ways to Use UX Design to Enhance User Data Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Frontend\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Design\/UX\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"7 Ways to Use UX Design to Enhance User Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/e54433adb771f0b877d4127bade34b40\",\"name\":\"Lorenzo Ermigiotti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f84c267900f04a567ce1305c970bdb4520775aae41992ae028d80e84dc7009a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f84c267900f04a567ce1305c970bdb4520775aae41992ae028d80e84dc7009a9?s=96&d=mm&r=g\",\"caption\":\"Lorenzo Ermigiotti\"},\"sameAs\":[\"#\",\"https:\/\/x.com\/#\"],\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/lorenzo-ermigiotti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 Ways to Use UX Design to Enhance User Data Security - Codemotion Magazine","description":"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/","og_locale":"en_US","og_type":"article","og_title":"7 Ways to Use UX Design to Enhance User Data Security","og_description":"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.","og_url":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_author":"#","article_published_time":"2021-02-25T09:32:59+00:00","article_modified_time":"2022-03-19T08:53:35+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg","type":"image\/jpeg"}],"author":"Lorenzo Ermigiotti","twitter_card":"summary_large_image","twitter_creator":"@#","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Lorenzo Ermigiotti","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/"},"author":{"name":"Lorenzo Ermigiotti","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/e54433adb771f0b877d4127bade34b40"},"headline":"7 Ways to Use UX Design to Enhance User Data Security","datePublished":"2021-02-25T09:32:59+00:00","dateModified":"2022-03-19T08:53:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/"},"wordCount":1968,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg","keywords":["Security"],"articleSection":["Design\/UX"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/","url":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/","name":"7 Ways to Use UX Design to Enhance User Data Security - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg","datePublished":"2021-02-25T09:32:59+00:00","dateModified":"2022-03-19T08:53:35+00:00","description":"UX design and cybersecurity are two worlds apart. Wrong! UX designers should consider data privacy and security in each line of code.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg","width":1200,"height":628,"caption":"7 Ways to Use UX Design to Enhance User Data Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/ux-design-enhance-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Frontend","item":"https:\/\/www.codemotion.com\/magazine\/frontend\/"},{"@type":"ListItem","position":3,"name":"Design\/UX","item":"https:\/\/www.codemotion.com\/magazine\/frontend\/design-ux\/"},{"@type":"ListItem","position":4,"name":"7 Ways to Use UX Design to Enhance User Data Security"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/e54433adb771f0b877d4127bade34b40","name":"Lorenzo Ermigiotti","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f84c267900f04a567ce1305c970bdb4520775aae41992ae028d80e84dc7009a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f84c267900f04a567ce1305c970bdb4520775aae41992ae028d80e84dc7009a9?s=96&d=mm&r=g","caption":"Lorenzo Ermigiotti"},"sameAs":["#","https:\/\/x.com\/#"],"url":"https:\/\/www.codemotion.com\/magazine\/author\/lorenzo-ermigiotti\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-600x600.jpg","author_info":{"display_name":"Lorenzo Ermigiotti","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/lorenzo-ermigiotti\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg",1200,628,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-300x157.jpg",300,157,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-768x402.jpg",768,402,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-1024x536.jpg",1024,536,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg",1200,628,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg",1200,628,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2.jpg",100,52,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2021\/02\/CO_magazine-template-2-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Lorenzo Ermigiotti","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/lorenzo-ermigiotti\/"},"uagb_comment_info":0,"uagb_excerpt":"UX design and cybersecurity are not mutually exclusive. While data privacy and ensuring security in each line of your code should be an ethical consideration for UX designers, it\u2019s also a matter of building trust among your customers.&nbsp; Users trade their personal information with websites or mobile apps in exchange for a digital product. They&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/13852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=13852"}],"version-history":[{"count":8,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/13852\/revisions"}],"predecessor-version":[{"id":17312,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/13852\/revisions\/17312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/13853"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=13852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=13852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=13852"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=13852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}