Focusing on solutions as you start UX research might lead to misunderstanding or overlooking user problems, which in turn, damages the whole design and development process.
To decrease the risk of poorly developed solutions and costly adjustments, it’s necessary to invest time and effort in discovering user problems and pain points, clearly distinguish them from users’ goals, and use diverse research methods.
Although focusing on pain points might seem more time-consuming initially, problems are more concrete, easier to uncover, and ultimately are the source for meaningful solutions.
Read the full article for perspective on how this shift from focusing on solutions to focusing on problems can be a powerful tool as you begin UX research.
App login design: Choosing the right user login option for your app
When deciding on your app’s login method, choosing between security and user convenience is somewhat of a balancing act. This article explores some options and the pros and cons of each.
There are 4 common options to consider when designing an app login screen: an email with password login and registration UX, social and third-party login UX, mobile login and registration UX, multi-factor login and registration UX.
Password login. Passwords are common but it can be hard for the user to remember all passwords. That is why security breaches could be caused by using password managers and using the same password for various apps/sites.
Social login and third-party login. Users are grateful for having one less password to memorize, and developers happy with high conversions and all the data they receive asses to. This method is mobile-friendly and free to use. But developers have to rely on the 3rd party security and expect to lose users who do not trust social media.
Mobile number login. The mobile number tends to be a much more unique identifier, and this method doesn’t require the user to remember passwords. On the other side, mobile numbers could change, and migrating accounts becomes complicated.
Multi-factor authentication (MFA). Its main strength is security. You can find temporary pins, third-party authenticator apps, retina, biometrics, or fingerprint, among MFA methods. Often, it requires a second device that can be stolen.
Read the full article for a more in-depth breakdown of each login option.