Humans are involved in 80-90% of IT security system breaches. We have the technological capacity to keep our software systems
Continue reading
| fascinated by how people use technology & vice-versa…
Humans are involved in 80-90% of IT security system breaches. We have the technological capacity to keep our software systems
Continue reading
In the above picture a newbie gamer has organised a telephone for his Sim so that it can order pizza.
Continue reading
[update 20/8/20: My guide to human-computer interaction is now available over on Udemy.] The recent furore over the 2012 Olympics Logo reminds
Continue reading
In the 1530s when Henry VIII realised that dissolving the monastries would get him much needed assets, he commissioned a
Continue reading
Read the full article on A List Apart. Theoretically, usability testing is a great way of finding out what is wrong
Continue reading