Thank you to everyone who attended our (Karl Smith and Thom Heslop) talk at SXSW, it’s the start of a long road into a really complex and contextual problem. But being silent in the crowd as the King walks by with no clothes on is not an option, peoples lives, futures and prosperity is at risk, not to mention the risk of multi-trillion dollar lawsuits that can follow by knowingly distracting people who are engaged in critical tasks. The IoT – Internet of Things (Ubiquity) is the next great opportunity for commerce to engage with business enterprises and customers. However, there is no unified approachRead More →

I just logged into my BA account to book a ticket, but BA does not want my business because they have implemented new security without thinking about the impact on users. After making my selection I’m shown the page below instead of a flight selection page. I could understand getting this if I’m not logged in, but I am so I have already authenticated my session. But there is no excuse for sending me to a blank screen, my firewall does not block Captcha, I know this for a fact. When was this tested or has it gone up today without being tested, who knows?Read More →

I have been involved in Agile for a very long time, mainly because it uses methods from the human computer interaction scientific process (CHI/HCI). Agile Networking Group (20,000 members on LinkedIn) https://www.linkedin.com/groups/81065. Signed the Agile Manifesto on 3rd April 2008 (http://agilemanifesto.org/display/000000111.html) Certified member of the Scrum Alliance Certificant ID: 52664 I’m surprise no one else has blogged about the use of CHI/HCI processes in Agile before, but though I should say something as I keep getting told that it’s interesting how many CHI/HCI people have embraced Agile. In fact it’s the other way around we have simply re-appropriated our own techniques that have new Agile names.Read More →

I have been using the Internet for years in fact long before the world wide web became available but one thing has always mystified me; Why do people willingly give away so much private, valuable and dangerous information about themselves? Going back to a pre-web example, I realized years ago, in my teens that my signature was valuable, it may have been while forging my mothers on a school sick note. But the knowledge of that essential truth made me have different signatures for different purposes, government documents, cheques, membership forms etc all have different levels of importance and risk. And because of my experiencesRead More →

I like many other people love to use my mobile phone to view the web, contact friends through mobile applications and keep up to date. But recent changes by companies are driving me nuts; it’s so bad that I’m considering not using their services. So what’s the problem with mobile? When the World Wide Web started to go mobile, the complex problem of screen size and control had many solutions, some worked some did not. I remember writing my first WEP site; it worked but was an awful user experience. Then CSS took over as the solution of choice, now it’s purpose built applications (lessRead More →

Security and trust are vital principals in building interpersonal and business relationships. These same principles should be employed to both directly and indirectly communicate with users. The following post shows how the construction of password reset challenge questions tell a narrative story of capability and intention as much as supporting text and brand values of the system and service that is secured by them.Read More →