Early this month, The Ethical Design Handbook joined the Smashing Library of essential books for designers and developers. Changes around the world have meant changes in the book release, but readers love it so far! Ethical Design principles are timeless and we are seeing the results of that during an unprecedented time of change.
Read more…
In this episode of the Smashing Podcast, we’re talking about Ethical Design. What does it mean for a design to be ethical, and how do we make improvements in our own projects? Drew McLellan speaks to Trine Falbe and Martin Michael Frederiksen to find out.
Read more…
We need to craft better digital products that respect customer’s choices without hurting business KPIs. And we need to do so by taming data collection and abandoning dark patterns, from hidden checkboxes to ambiguous copywriting. Today, Vitaly Friedman brings you our new practical guide on how to influence a positive change in your company and help your business grow sustainably. Without dark patterns, with ethics in mind, and ready for GDPR and CCPA. Jump to table of contents or pre-order the book right away.Read more…
Today, we broadcasted a live session on privacy UX, highlighting privacy UX patterns and strategies to consider when designing and building privacy-aware websites and apps. As the webinars have always been about sharing lessons learned with the community, we’d like to open them up to everybody, with Members having a chance to ask questions right after the session.
Read more…
Dark patterns are prevailing many of the interfaces we use, and our data is collected, evaluated and handed over to third-parties left and right, often without us noticing at all. Can we fix it? Watch an informal panel discussion, moderated by Vitaly Friedman, exploring questions you have, and the problems that we all need to address. Watch the recording (Vimeo).
Read more…
Now that we have a year of GDPR under our belts, and the ePR is coming soon, there’s no better time than now to review your websites. Do you know what kinds of cookies collect information from your site? And have you provided visitors with information about an option to accept those cookies? If your site is currently not in compliance, or you’re not sure if it is, read this post and start using CookiePro’s cookie consent tool to get your sites moving in the right direction.
Read more…
Many mobile applications require access to location, photos, and even the camera during installation, which isn’t something most customers would be happy to consent to. In this series of articles, Vitaly Friedman talks about privacy-related design patterns. You’ll be exploring some of the respectful ways to approach privacy and data collection, and how to deal with the notorious cookie consent prompts, intrusive push notifications, glorious permission requests, malicious third-party tracking and offboarding experience.
Read more…
With so many applications and services and people and machines and chatbots fighting for our attention, staying focused is a luxury that needs to be savored and protected, and so no wonder notifications don’t enjoy a decent reputation these days. More than that, often they feel off the point and manipulative, too. In this series of articles, Vitaly Friedman will talk about privacy-related design patterns. He’ll be exploring some of the respectful ways to approach privacy and data collection, and how to deal with those notorious cookie consent prompts, intrusive push notifications, glorious permission requests, malicious third-party tracking and offboarding experience.
Read more…
Web interfaces have become quite a character, haven’t they? Self-indulgent, impolite, disrespectful and obsessed with user’s data. In this series of articles, we’re looking into privacy UX patterns to make our interfaces better without leaving conversion considerations behind. In this four-part series, Vitaly Friedman will explore some of the respectful ways to approach privacy and data collection, and how to deal with notorious GDPR cookie consent prompts, intrusive push notifications, glorious permission requests, malicious third-party tracking, and offboarding experience.
Read more…
Nowadays, users are increasingly cautious of online and email scams, phishing attacks, and data breaches. In this article, Lyndon Cerejo will present a brief history of persuasion, look at how persuasion is used with technology and new media, and present food for thought for designers and developers to avoid crossing the ethical line to the dark side of persuasion.
Read more…