UX Research | Interviews | Focus Groups | Accessibility Guidelines
Researching improvements to multi-factor authentication through participatory design and focus groups.
In this course project, I worked with another researcher and a group of older adult research participants to explore how multi-factor authentication could be improved. Authentication is necessary to access important apps such as banking, investments, healthcare, insurance, and more, but there is a lack of standardization methods across industries.
We envision authentication to be more accessible and efficient for a wider range of users, starting with older adult users.
This project hinged on the participatory design and co-working sessions with our older adult research participants, and it was a wonderful opportunity to use a different approach to research.
Role
UX Designer & Researcher | Focus Group Facilitator
Client
Course Project in Master’s of Human-Computer Interaction
Multi-factor authentication is a non-negotiable for most secure apps such as financial apps, but there is a lack of standardization that results in increased difficulty of use and constant learning.
We identified 12 different methods of authentication, each with subtypes, for a minimum of 22 possible ways to authenticate. This means there is at least 22 possible ways to authenticate which requires different abilities, patterns, devices, behaviors, etc.
Our research explores usability of authentication in two regards:
We started with literature reviews to understand the existing landscape. Part of this was finding examples of the types of authentication for clear grouping as we evaluated project scope.
We sent out emails to our older adult co-designers with an introduction and project plan to gauge if our problem statement was relevant to them. Here is some of the feedback we got:
Types of Authentication Methods to Include:
Research Questions to Explore:
We conducted semi-structured interviews with handouts of some commonly used authentication methods to give our participants some context. We discussed their experience, usage, help-seeking behaviors, security, devices used, and activity based preferences for authentication. The interview concluded with an interactive session where participants read CAPTCHAs.
Affinity Diagramming
The interviews provided us with rich data. A few insights below:
Refining Plans
Our initial ideas focused on the accessibility and efficiency of the most frequent authentication methods. However, our plans started changing based on two emerging themes:
Support Systems
Support for setting up and troubleshooting are vital for all users, but they vary widely.
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
Security of Authentication
Users’ perceptions regarding security for tasks, for different authentication methods, and for the tradeoff between security and convenience, affected their willingness to utilize authentication.
“I don’t understand social logins and usually think it’s suspicious, but I’ve done it because it’s easier.”
“I don’t feel safe giving out data like my fingerprints, so we do not use biometrics”
Limitations
At this point in the project, we kept running into two themes below. Due to our project timeline and the need for support from other department areas such as psychology, cybersecurity, and education, we decided to put these topics to the side and hone in on what we could tackle in our remaining time.
Support Systems
Implications of how users perceive security and identity verification when using digital products
Tech Literacy as Part of UX
Widely varying levels of understanding of security methods that impact how people use authentication
We conducted a semistructured focus group discussion with handouts. Each page of the handout contained the relevant guidelines, our proof of concept screens, and an example that didn’t follow the guidelines.
We wanted to understand how the participants feel about the guidelines in practice, contrasted with screens that do not meet them.
Some key themes we wanted to observe were:
During the focus group, we asked participants to review the screens and provide feedback using sticky notes. The purpose of this activity was to encourage participants to share their input, even if they did not have the opportunity to speak up verbally.
Through this exercise, participants documented numerous comments and observations, covering topics such as icon selection, terminology usage, error handling, and more.
Some of the unexpected feedback that stood out to us at first was:
We produced a comprehensive list of findings, but I am only including the two main themes below for brevity.
Theme 1: Support Systems
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
“It’s not easy for me to get tech support over the phone.”
Theme 2: Clarity & Accessibility
“I’m not colorblind, but the colors can be difficult.”
“I think it’s reasonable that older adults want to know what happens when they press a button.”
“Authentication can be logistically harder that we think it is.”
Based on the insights, we created a set of guidelines for best practices while designing authentication along with a proof of concept:
Guidelines
UX Research | Interviews | Focus Groups | Accessibility Guidelines
Researching improvements to multi-factor authentication through participatory design and focus groups.
In this course project, I worked with another researcher and a group of older adult research participants to explore how multi-factor authentication could be improved. Authentication is necessary to access important apps such as banking, investments, healthcare, insurance, and more, but there is a lack of standardization methods across industries.
We envision authentication to be more accessible and efficient for a wider range of users, starting with older adult users.
This project hinged on the participatory design and co-working sessions with our older adult research participants, and it was a wonderful opportunity to use a different approach to research.
Role
UX Designer & Researcher | Focus Group Facilitator
Client
Course Project in Master’s of Human-Computer Interaction
Multi-factor authentication is a non-negotiable for most secure apps such as financial apps, but there is a lack of standardization that results in increased difficulty of use and constant learning.
We identified 12 different methods of authentication, each with subtypes, for a minimum of 22 possible ways to authenticate. This means there is at least 22 possible ways to authenticate which requires different abilities, patterns, devices, behaviors, etc.
Our research explores usability of authentication in two regards:
We started with literature reviews to understand the existing landscape. Part of this was finding examples of the types of authentication for clear grouping as we evaluated project scope.
We sent out emails to our older adult co-designers with an introduction and project plan to gauge if our problem statement was relevant to them. Here is some of the feedback we got:
Types of Authentication Methods to Include:
Research Questions to Explore:
We conducted semi-structured interviews with handouts of some commonly used authentication methods to give our participants some context. We discussed their experience, usage, help-seeking behaviors, security, devices used, and activity based preferences for authentication. The interview concluded with an interactive session where participants read CAPTCHAs.
Affinity Diagramming
The interviews provided us with rich data. A few insights below:
Refining Plans
Our initial ideas focused on the accessibility and efficiency of the most frequent authentication methods. However, our plans started changing based on two emerging themes:
Support Systems
Support for setting up and troubleshooting are vital for all users, but they vary widely.
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
Security of Authentication
Users’ perceptions regarding security for tasks, for different authentication methods, and for the tradeoff between security and convenience, affected their willingness to utilize authentication.
“I don’t understand social logins and usually think it’s suspicious, but I’ve done it because it’s easier.”
“I don’t feel safe giving out data like my fingerprints, so we do not use biometrics”
Limitations
At this point in the project, we kept running into two themes below. Due to our project timeline and the need for support from other department areas such as psychology, cybersecurity, and education, we decided to put these topics to the side and hone in on what we could tackle in our remaining time.
Support Systems
Implications of how users perceive security and identity verification when using digital products
Tech Literacy as Part of UX
Widely varying levels of understanding of security methods that impact how people use authentication
We conducted a semistructured focus group discussion with handouts. Each page of the handout contained the relevant guidelines, our proof of concept screens, and an example that didn’t follow the guidelines.
We wanted to understand how the participants feel about the guidelines in practice, contrasted with screens that do not meet them.
Some key themes we wanted to observe were:
During the focus group, we asked participants to review the screens and provide feedback using sticky notes. The purpose of this activity was to encourage participants to share their input, even if they did not have the opportunity to speak up verbally.
Through this exercise, participants documented numerous comments and observations, covering topics such as icon selection, terminology usage, error handling, and more.
Some of the unexpected feedback that stood out to us at first was:
We produced a comprehensive list of findings, but I am only including the two main themes below for brevity.
Theme 1: Support Systems
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
“It’s not easy for me to get tech support over the phone.”
Theme 2: Clarity & Accessibility
“I’m not colorblind, but the colors can be difficult.”
“I think it’s reasonable that older adults want to know what happens when they press a button.”
“Authentication can be logistically harder that we think it is.”
Based on the insights, we created a set of guidelines for best practices while designing authentication along with a proof of concept:
Guidelines
UX Research | Interviews | Focus Groups | Accessibility Guidelines
Researching improvements to multi-factor authentication through participatory design and focus groups.
In this course project, I worked with another researcher and a group of older adult research participants to explore how multi-factor authentication could be improved. Authentication is necessary to access important apps such as banking, investments, healthcare, insurance, and more, but there is a lack of standardization methods across industries.
We envision authentication to be more accessible and efficient for a wider range of users, starting with older adult users.
This project hinged on the participatory design and co-working sessions with our older adult research participants, and it was a wonderful opportunity to use a different approach to research.
Role
UX Designer & Researcher | Focus Group Facilitator
Client
Course Project in Master’s of Human-Computer Interaction
Multi-factor authentication is a non-negotiable for most secure apps such as financial apps, but there is a lack of standardization that results in increased difficulty of use and constant learning.
We identified 12 different methods of authentication, each with subtypes, for a minimum of 22 possible ways to authenticate. This means there is at least 22 possible ways to authenticate which requires different abilities, patterns, devices, behaviors, etc.
Our research explores usability of authentication in two regards:
We started with literature reviews to understand the existing landscape. Part of this was finding examples of the types of authentication for clear grouping as we evaluated project scope.
We sent out emails to our older adult co-designers with an introduction and project plan to gauge if our problem statement was relevant to them. Here is some of the feedback we got:
Types of Authentication Methods to Include:
Research Questions to Explore:
We conducted semi-structured interviews with handouts of some commonly used authentication methods to give our participants some context. We discussed their experience, usage, help-seeking behaviors, security, devices used, and activity based preferences for authentication. The interview concluded with an interactive session where participants read CAPTCHAs.
Affinity Diagramming
The interviews provided us with rich data. A few insights below:
Refining Plans
Our initial ideas focused on the accessibility and efficiency of the most frequent authentication methods. However, our plans started changing based on two emerging themes:
Support Systems
Support for setting up and troubleshooting are vital for all users, but they vary widely.
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
Security of Authentication
Users’ perceptions regarding security for tasks, for different authentication methods, and for the tradeoff between security and convenience, affected their willingness to utilize authentication.
“I don’t understand social logins and usually think it’s suspicious, but I’ve done it because it’s easier.”
“I don’t feel safe giving out data like my fingerprints, so we do not use biometrics”
Limitations
At this point in the project, we kept running into two themes below. Due to our project timeline and the need for support from other department areas such as psychology, cybersecurity, and education, we decided to put these topics to the side and hone in on what we could tackle in our remaining time.
Perceptions of Security
Implications of how users perceive security and identity verification when using digital products
Tech Literacy as Part of UX
Widely varying levels of understanding of security methods that impact how people use authentication
We conducted a semistructured focus group discussion with handouts. Each page of the handout contained the relevant guidelines, our proof of concept screens, and an example that didn’t follow the guidelines.
We wanted to understand how the participants feel about the guidelines in practice, contrasted with screens that do not meet them.
Some key themes we wanted to observe were:
During the focus group, we asked participants to review the screens and provide feedback using sticky notes. The purpose of this activity was to encourage participants to share their input, even if they did not have the opportunity to speak up verbally.
Through this exercise, participants documented numerous comments and observations, covering topics such as icon selection, terminology usage, error handling, and more.
Some of the unexpected feedback that stood out to us at first was:
We produced a comprehensive list of findings, but I am only including the two main themes below for brevity.
Theme 1: Support Systems
“There’s no help if you can’t do it. The burden is entirely left to the user.”
“I’m of two minds with the multiple options: why don’t you just give me one that works. But you don’t know which one works.”
“It’s not easy for me to get tech support over the phone.”
Theme 2: Clarity & Accessibility
“I’m not colorblind, but the colors can be difficult.”
“I think it’s reasonable that older adults want to know what happens when they press a button.”
“Authentication can be logistically harder that we think it is.”
Based on the insights, we created a set of guidelines for best practices while designing authentication along with a proof of concept:
Guidelines