Loading…
This event has ended. Visit the official site or create your own event on Sched.

Welcome to the Official Schedule for RightsCon Toronto 2018. This year’s program, built by our global community, is our most ambitious one yet. Within the program, you will find 18 thematic tracks to help you navigate our 450+ sessions

Build your own customized RightsCon schedule by logging into Sched (or creating an account), and selecting the sessions that you wish to attend. Be sure to get your ticket to RightsCon first. You can visit rightscon.org for more information. 

To createIf you’ve created a profile with a picture and bio, please allow a few hours for the RightsCon team to merge it with your existing speaker profile. 

Last updated: Version 2.3 (Updated May 15, 2018).

View analytic
Wednesday, May 16 • 10:30 - 11:45
Making the Tech USABLE -- how to gather and share user feedback from our digital security trainings

Sign up or log in to save this to your schedule and see who's attending!

Feedback does not just take the form of user testing of tools and software. In fact, in digital security trainings, we must adapt the ways in which we collect useful information from users that can help shape and improve technologies they need the most. Trainers play a critical role in this feedback loop, as they tend to work with high risk communities who are often hard to engage with safely. They also have a a deep understanding of the risks, threats, and needs humans using these critical products.

During the past year, the USABLE (https://usable.tools) team has been working with trainers, developers, and designers to craft sessions and UX activities within digital security workshops that capture much needed information required in making usability improvements. This session will demonstrate several UX activities created by trainers and designers for the purpose of collecting feedback during a digital security training. This session will be as hands on as possible so trainers, developers and designers can experience first hand what it’s like to capture user feedback in a digital security training setting. The walk-through will be co-led by Megan DeBlois (Internews), Neema Iyer (Defend Defenders), and Neil Blazeciv (Defend Defenders) and will focus on one of the following:

Tool Feedback Collection: Tool-specific feedback collection activities that trainers can easily run in a digital security training with the purpose of sending to the developer afterward.

Persona Generation: Sessions or exercises trainers are already running or they can run easily in parallel with their digital security training with the purpose of having users generate their own personas, or profiles, of themselves (see template).

Who is this session for?

Digital Security Trainers, Developers, Designers, and Technology Influencers

What outcomes would you like your session to have?

Concrete improvements to the feedback collection methods proposed.

Directly connect developers, trainers, and designers with one another. Specifically we would like trainers to connect directly with other open-source tool developers (e.g. KeePassXC, Pisphon, The Guardian,, Enigmail, Tor, Mailvelope, Peerio, and others).

Raise awareness around the importance of trainers in the feedback and design process in software development for high risk communities.


Moderators
avatar for Megan DeBlois

Megan DeBlois

Program Manager, Information Security Programs, Internews
Let's talk usability! Currently working with humans around the globe to make security usable for those who need it most! | | Twitter: @realMegDeBlois

Speakers

Wednesday May 16, 2018 10:30 - 11:45
200B

Attendees (70)