top of page
Mockup 7.png

Increase identity security by being 

proactive

CLIENT

Identity Force

MY ROLE

User Research, Ideation 

Prototype production (low-fi wireframes) and 

Conceptual hi-fi mock-ups

 

TIMEFRAME

2 Weeks

TEAM

Meredith Nelson, UX-designer

Omid Moayedi, UX-Designer

 

 

 

 

 

Asset 9.png

TOOLS

  • Sketch (Wireframes)

  • Illustrator (Imagery and icons)

  • Photoshop

  • InVision (Prototyping)

  • Zeplin (Annotations)

IDENTITY FORCE

Identity Force is one of the front-runners in identity security and credit protection for individuals, businesses and government agencies.

THE CHALLENGE

IdentityForce’s main form of communication with their subscribers till thus far has been via email. However, this communication method does not allow sufficient communication regarding proactive identity security measures their users should be following. IdentityForce needs to find a mutually beneficial method of encouraging and incentivizing their current users to practice proactive identity security.

SNEAK PEEK AT OUR SOLUTIONS

Artboard.png

1. Central Information-hub​

Users can access important identity security best practices from their mobile applications. This feature creates a central location for information and tips regarding identity security best practices.

2. Gamefication

Users will receive points for completing tasks, which would pro-actively contribute to protecting their personal identity information. These points could then be exchanged for discounts on their service plans or unlocking prime features not available in their current service plan.

3. Increasing Convenience

Users are able to set and manage personal reminders regarding their information and personal security updates.

a.png
a copy.png

DESIGN PROCESS

How did we determine our solutions?

 

  1. Business Needs and Analysis

  2. User Research and Archetype development

  3. Competitive and Comparative Analysis

  4. Product Prototype Development

  5. Usability Testing and Next Steps

DOUBLE DIAMNOND.png

1. Business Needs and Analysis: What does the client need?

From our research, we found the client/business needs included:

 

  • Revenue: The business needed to generate revenue, so offering a free service wasn't within their scope

  • Reputation: They have a reputation to uphold and needed their users to trust in their services

  • Compliance: They needed their users to be proactive and comply with stipulated guidelines and advice

 

2. User research and Archetypes: Our empathetic approach to determine what our users needed

Survey participants: 40       

Interviews participants:10

We gathered survey information from 40 participants, following 10 user interviews with users currently utilizing identity security services. Synthesizing the qualitative and quantitative data provided, with a research technique called affinity mapping, we had a better idea of the types of users we had to cater our solutions to, allowing us to create three archetype groups and determine what their main characteristics and needs are. This will give us a better understanding of exactly who our users are and how we should tailor our design solutions to satisfy their needs.

group-of-people-in-a-formation.png

This information will tell us...

 

  • What users already knew regarding identity security

 

  • What motivated current users to subscribe to these identity security services

 

  • Which proactive measures they were currently taking to protect their personal information

From our research, we were able to determine 3 archetype groups, which would represent our target user base.

These included:

 

Asset 20.png
Asset 19.png
Asset 23.png

Our solution needed to satisfy the needs of both parties involved, namely the business as well as our users

Slide 22.png

Luckily for us, our business- and user- needs were aligned: To create a more engaging communication channel between the mobile application and their users.

Seeking Inspiration...Now that we knew who we had to tailor our solutions, we had to determine what competition we had and how our solution could stand out from the rest

3. Competitive and Comparative Analysis

At this point, we knew who our users were and what they wanted from this experience. We just needed to determine what mental models our users have developed and what worked really well for them. Enter competitive and comparative analysis.

Competitive Analysis

Identity Force's biggest competitors were determined to be LifeLock and Identity guard. Since convenience was one of our main user needs, we decided to focus predominantly on mobile applications. In this case, Lifelock has been a front-runner in intuitive design and heuristics.

Comparative Analysis

Comparators who stood out amongst our users seem to be Acorns (Grow your knowledge page) as well as Credit Karma (Automated messaging system)

 

Screen Shot 2018-12-05 at 10.29.15 PM.pn
Screen Shot 2018-12-05 at 10.29.03 PM.pn

Credit Karma: Automated Message System

Acorns: Grow Your Knowledge

4. PRODUCT PROTOTYPE DEVELOPMENT

USERS.png

After synthesizing our research, we had a good understanding of what the business goals are and what our users needed from this experience. The next step would be to start ideating on possible solutions. My team and I performed a design studio to get our creative juices flowing and ideate on possible solutions for the challenge at hand.

This process started with:

  1. Drafting a solution map: this would help us determine the constraints of our project and help us to prioritize solutions based on their level of impact, but still be within our scope for this project.​

  2. Drawing up some rough sketches of our ideas

Design Studio! Brainstorming and visualizing our ideas

Wireframes (medium-fidelity)

After choosing which ideas to move forward with, we created our medium-fidelity wireframes. In this case, medium fidelity would suffice to test our concepts.

Wireframe 1.png
  • From the home screen, the user would be able to view their current points level, as well as access important alerts and then manage their profile account.

  • To improve their points rating users will be able to complete a series of tasks resulting in an increased point level while taking control and educating themselves on their information security.

Wireframe 2.png
Wireframe 3.png
  • Here the user has a central location to learn more information regarding the protection of their identity security. This functionality was modeled in the Acorns application “Grow your knowledge feature”.

  • Once a task is completed the user is notified that their points have increased. Taking a page out of our comparators’ handbook, trusty credit karma, we decided to present this modal of achieving a goal in this way to create a positive tone for completing a task. This way the user is positively congratulated on completing a task and we’re keeping to the “gamefication” theme

Wireframe 4.png
Wireframe 5.png
  • A/B testing was performed to determine which layout for the reminder functionality would resonate better with users. Although both versions tested equally well with users in terms of functionality, users did appreciate the option to have pre-set reminder options to choose from. Thus, for this prototype we settled on option 2.

Slide 36 Copy 3.png

Primary Iterations 

  • Points percentage indicator changes to a points progress bar. This representation tested better with users, since progression and progress in usually indicated with a forward progression from left to right.

Slide 36 Copy 3.png
  •  In terms of functionality, users appreciated the option to have pre-set reminder options to choose from. A click-through reminder setting method was iterated on to allow for pre-set toggles. This function is similar to the native alarm application on IOS, thus allows for increased learnability since most IOS users would already have a mental model of how this feature works.

Prototype in action

5. Usability Testing Insights

Information Hub

The learning center (information hub) functionality tested really well, with users following the user flow intuitively.

 

"Improve your rating" CTA

CTA for users to Improve their score wasn’t attention-grabbing enough. Many of our users were a little confused by the incentive game functionality at first when opening the application since it’s not generally expected from an identity security application.

However, users seemed to understand the concept quickly enough once they reached the incentives page, but ambiguity between “alerts” and “reminders” came forth as a point of contention.

 

The learnability of this new concept might be a steep learning curve for IdentityForce’s current user-base. The concept would need to be tested further and added to the current application via gradual implementation.

Next Steps

  1. Improved User Communication - More Robust Feedback and Support

  2. Resolve Issues from First Prototype - Disambiguation of Alerts vs. Reminders

  3. Determine Awards Structure - Points Per Action, Rewards

  4. Incentive Hub and/or Embedded Incentives?

bottom of page