Flag

We stand with Ukraine and our team members from Ukraine. Here are ways you can help

Home ›› Privacy and Data Security ›› Page 7

Privacy and Data Security

Read these first

As radio frequency identification tags become more cost effective, a smart fridge might emerge that is able to take full advantage of the Internet of Things

Article by Avi Itzkovitch
Share:The Internet of Things and the Mythical Smart Fridge
12 min read
internet-of-things-small

With gamification continuing to grow in popularity as a way to engage users, the new book Gamification at Work lays out the five steps of “player centered design.”

Article by Janaki Kumar
Share:Five Steps to Enterprise Gamification
7 min read
5-steps-to-gaw-small

Avoid creating scuzzy user experiences by studying the oeuvre of Seth Rogen.

Article by Steve Tengler
Share:Five User Experience Lessons from Seth Rogen
9 min read
rogen-5-ux-lessons-small

Building a bridge between the disparate experiences of IT administrators and end users can improve UX in enterprise software.

Article by Michael Ashley
Share:Rethinking Enterprise UX in the Age of Consumerization
5 min read
rethinking-enterprise-ux-small

When it comes to privacy issues, you need to build trust with users—here are seven actions that engender transparency and control.

Article by Ilana Westerman
Share:7 Actions that Earn User Trust
6 min read
7-actions-earn-trust-small

A study of North American consumers shows that users are comfortable sharing their personal information when they know exactly how it will be used and shared, and are given control over when they are releasing it.

Article by Ilana Westerman
Share:Control and Transparency
7 min read
transparency-and-control-small

Tell us about you. Enroll in the course.

    This website uses cookies to ensure you get the best experience on our website. Check our privacy policy and