Humans are involved in 80-90% of IT security system breaches. We have the technological capacity to keep our software systems
Continue readingAuthor: stalker
stalker
Who ordered pizza?
In the above picture a newbie gamer has organised a telephone for his Sim so that it can order pizza.
Continue readingHuman-computer interaction: Can you see what it is yet?
[update 20/8/20: My guide to human-computer interaction is now available over on Udemy.] The recent furore over the 2012 Olympics Logo reminds
Continue readingVisualisation: Information is power – just avoid drowning in data
In the 1530s when Henry VIII realised that dissolving the monastries would get him much needed assets, he commissioned a
Continue readingInside Your Users’ Mind: The Cultural Probe
Read the full article on A List Apart. Theoretically, usability testing is a great way of finding out what is wrong
Continue reading