IDScout

A data monitor and passwords management solution

TEAM

1 PM
2 Researchers
2 Designers

WHAT I DID

User Interview
Persona
Prototype
UI/UX Design

DURATION

2020.10-2020. 12

Challenge

Credentials of Zoom accounts were found for sale on the dark web on 04/14/2020
0
Facebook users from 106 countries was posted online for free in a low-level hacking forum on 04/03/2021
0
LinkedIn user profiles were discovered on the dark web on 04/06/2021
0

If my personal information has been compromised in a data breach, I could be at an increased risk of identity theft.

Then what should I do?

  • How do I find out if my individual information was compromised?
  • What type of data was stolen?
  • Should I change all the online login information and passwords?
  • What additional action I should take?

How can we provide credit card and smartphone users a simple and efficient way to investigate and monitor their online identity?

Introduce IDScout

IDScout is a data monitor and pw management solution, a mobile application that helps users be notified about data breaches quickly. It has a centralized system to help users go through multiple sources to find the relevant information they need.

Easy and Secure Onboarding

Fred can easily sign up the IDScout without giving permission to his personal data. After knowing how does the app work, Fred connected his email and all other accounts with IDScout for ease future data management. 

Accounts Manager

Once Fred set up all his accounts, he was able to see his account status, and he felt empowered in protecting his personal information and taking actions when necessary.

Mass Passwords Updates

Fred was notified that 6 of his linked accounts are involved and his passwords were compromised. The mass passwords updates features allow him to update accounts automatically or manually just with a few click. 

How we get there

Research

Our research’s goal was to help us figure out a solution to the problems people face when investigating and monitoring their online personal information whenever data breaches occur. We also wanted to learn about what remediation steps do users take next. To learn this, we employed 3 research methods: literature review, surveys, and interviews.

RESEARCH METHODS

RESEARCH FINDINGS

Literature Review

We started with a literature review as a way to quickly gather a wide range on insights on our potential target users and and inclination of their needs.

Data breaches are increasing at an alarming rate (2020 experienced a 273% increase over 2019)

People under 45 are most concerned about information privacy.

Survey

Armed with an understanding of our target users, we formulated questions for an online survey that was answered by 31 people. The survey included user demographic information (age, gender), user’s attitude in several topics regarding data security, and actions taken when dealing with the security of personal data.

81% of respondents feel like they have lost control over it during the past five years

95% of respondents could not identify the data that was affected (e.g. addresses, credit card details, SSN, etc.)

50% of respondents struggle understanding the impact these breaches might have on them

Structured Interviews

Armed with an understanding of our target With an understanding of our target user supported by our literature review and survey, we conducted four structured interviews, meant to dig deeper into our audiences experiences regarding data breaches and bring clarity to our design solution.

Respondents who believe they have not experienced a data breach know less about their data and are not aware of steps they can take to protect it

Building personas

User Insights

Combining the insights from the different research sources as well as from the persona, it became clear that the app had to focus on excelling in the following aspects.

USER NEEDS

DESIGN GOALS

Armed with an understanding of our target Users want data breach data to be centralized, as users are tired of having to go through  multiple sources to find the relevant information they need.

Our design will give users relevant information on data breaches in a centralized  location.

Users need a simplified process for managing and maintaining online passwords.

Our design will give users an easy way to update passwords.

Users want updates on the status of their accounts on a regular basis, as this helps them  feel empowered in protecting their information.

Our design will show users the security status of their accounts.

Users want to find about data breaches in a digital manner, as the user has access to  smartphones and/or personal computers.

Our design will be compatible on both cell phones and personal laptops.

Ideation

Having our personas and design requirements on hand as a source of inspiration, Our team conducted an ideation section where we brainstormed and sketched as many ideas as possible that could meet our users’ needs.

Based on discussions and feedback from other people, we narrow down to three ideas-Accounts Management, Mass Passwords Update and ID monitoring and as the features in the final product. At this point we also decided the design solution should be able to sync users data to every device automatically.

Brainstorming
Initial Ideas
Previous
Next

Story Board

In order to better understand how these potential solutions could help the user, I created three short storyboards, one for each feature that demonstrate scenarios in which our users will employ our solution.

Previous
Next

Prototyping

With multiple feedback sessions and many more rounds of discussion, I synthesized the insights and features to articulate a single idea into a site map. Base on the information hierarchy, we then created digital, clickable wireframes by Figma in order to get feedback on the usability and direction of our design solution. Due to the time constrain, we only developed mobile app prototype.


We conducted five usability tests with our target users. Based on the main application features (Onboarding, Home page, Monitoring, Accounts Page, Password Update, My IDScout page, we set up 6 tasks from each part and asked the participants to complete the tasks, and asked them their experience throughout the process. Overall, participants gave a positive note about the solution and would want to use the product.

Site Map

Wireframe

Modifications

  1. Clarify the reasoning behind email and data requests in the onboarding process.
  2. Improving the interface design by uniformized the visual components and the placements of buttons.
  3. Optimized the information searching feature by giving more clear sorting filters.
  4. Clarify passwords updating flow and combine redundant steps
  5. Consider remove the “view all passwords” feature

Iterating

The feedback from the test  gave me insights into how individuals can differ in how they experience personal data management. It was revealed that there were common flaws and pain points in the user flow. I refined the design solution in the following 5 features: Onboarding, Home, Alert, My Accounts and Passwords Update.

onboard boforeonboard after
home beforehome after
alert beforealert after
account beforeaccount after
pw beforepw after