User-Centered Research and Design: Cerberus Security
The following is a user-centered design project that was conducted for my Human-Computer Interaction master's program. This project follows the complete design process from problem-space researching, establishing design requirements, prototype design and creation, user testing, and design iteration recommendations.
Users have issues with remembering codes and badges required for the secured environments. Also, there are workarounds with users piggybacking off of other users’ resources/protected information. How can we develop a successful solution that would transfer the burden from the stakeholders to the security system while keeping the environments secure?
- Problem space interview question writing
- Problem statements
- Affinity diagramming
- Business requirements
- Persona writing
- Iterative prototyping - screens design and wristband device creation
- User testing evaluation metrics
- Survey - writing and analysis
- Presentation writing and editing
- Accessing secured environments requires the users to take on the burden of memorizing codes and/or carrying badges. Using door codes and badges introduces breakdowns when users fail to remember codes or forget their badges. These issues affect employees, vendors, visitors, emergency responders, building management, and system administrators leading to a loss of productivity due to stakeholders forgetting badges/access codes. A successful solution would transfer the burden from the stakeholders to the security system while keeping the environments secure.
Justification of Problem Statement:
- Users have issues with remembering codes and badges required for the secured environments. Also, there are workarounds with users piggybacking off of other users’ resources/protected information.
Final Design Recommendations:
- Fix unlock screen wording for a more consistent user experience
- On sensor screen ensure call button is obvious to user
- Discover ways to let users know they don’t have to hold wristband up to sensor
- Explore ideas on how to incorporate chip into insertable items
- Possibly remove on/off switch to remove bulk/user confusion
- Two participants
- Observed entering their office building and reaching their personal work spaces
- Affinity diagramming using Stormboard
- Four user profiles ranging from building engineer to manager
- Information included: name, age, occupation, education level, level of computer comfort out of 10, tagline, goals/motivations, frustrations/pain points, and a short narrative
- Personas generated business requirements
- Cerberus is designed to solve issues around to building security. This product is a response to issues common in current security systems that require passcodes or keycards to access secured areas. We have developed a hands-free system that allows users to gain access within the building.
- Cerberus Wristband is wearable -- with built-in NFC chip technology. The Cerberus wristband allows for hands free access to secured environments in an office building without the burden of memorizing codes and/or carrying badges.
- Cerberus App was designed in the event that the Cerberus Wristband is lost, stolen, or left at home. The Cerberus App not only allows access to secured environments, but also logs user activity.
- In order to prevent security concerns associated with piggybacking, facial recognition technology is used as added security so all users that pass through a secured entrance are accounted.
- Three rounds of iterations
- Participants interacted with paper prototypes;
- Revisions based on verbal feedback and moderator observation
- Final round of tests included evaluating using quantitative-based user metrics
The affinity diagramming process yielded the five following themes:
- Tools used to gain access
- Technical and mechanical breakdowns
- Environment of secured area
- Users' prior experience using security devices
- User breakdowns
PERSONAS and Business requirements
We set out to create for personas of four different types of users that would need access to secured areas within an office building. Thinking about the diverse needs of individuals in a shared commercial space would allowed us to broaden our understanding of the business requirements. The persona information included: name, age, occupation, education level, level of computer comfort out of 10, tagline, goals/motivations, frustrations/pain points, and a short narrative.
BUSINESS REQUIREMENTS as Persona Quotes
- "As a small business owner, I need a security system to protect my employees, equipment, and intellectual property."
- Alesia needs a way to access the secured environment without using her hands so that she doesn’t have to put down her bags to get inside.
- "As a building manager, I need to make sure that the secured doorways meet Americans with Disabilities Act and Occupational Safety and Health Administration standards."
- Paul needs to pull reports from the security system in order to ensure his employees are arriving for work on time.
- "As a career woman and mother, I need to be able to access secured environments seamlessly to keep up with my fast-paced lifestyle."
- Billy needs security monitoring on an individual user-level in the case of emergencies to have the ability to track building occupancy.
- "As the building engineer, I require one central administration overseeing security so that I don’t have to be responsible for guest access procedures."
- Don wants the burden of security to be left to the system so he can focus on his job.
The following are the first round of mockups and wristband designed based on the user needs of an employee:
Based on the feedback we had received from the first round of testing, three issues needed to be redesigned:
The following are the second round of mockups and wristband designed based on the feedback from round one:
Based on the feedback we had received from the second round of testing, three issues needed to be redesigned:
With no revisions needed to the wristband, the following are the third and final round of mockups based on the feedback from round two.
We added a Cerberus Logo splash page for when the app opens and is loading and a welcome splash page to let the user know they have been logged in. We also added a call button to the access denied screen.
We removed the labeling of the facial recognition camera on the sensor screens and added a call button for the access denied sensor screen.
- 8 Participants
- 4 females; 4 males
- Ages range from 20-25 bracket to 45-50 bracket
- Average self-rated technology expertise: 7.71 out of 10 (10 being expert)
- Occupation titles: Desktop Support, Level 2 Threat Intelligence Operative, Senior Corporate Account Specialist, Marketing Communications Coordinator, Scientist, Program Manager of an After School Program, Master Soccer Coach, Sales
- Participants are aligned as general users. Our participants are representative of 3 of the 4 personas that were created.
User test Video
The following is a video featuring two participants of the user tests. Tests moderated and video edited by Elaina Boytor (me).
quantitative-based user metrics Results
All users were able to complete the tasks
- Users who were familiar with security systems finished tasks within allotted metric
- Users not familiar with security systems had many questions on how to use the system
App unlock had incorrect wording - The prompt says “hit yes to unlock” - yet the button is labeled “unlock” not “yes”.
Fix unlock screen wording for a more consistent user experience
Difficult for users to ascertain that from the sensor screen they can call facilities.
On sensor screen ensure call button is obvious to user
Users have a tendency to hold wristband next to sensor (7 out of 8 users did this).
Discover ways to let users know they don’t have to hold wristband up to sensor
While 62% preferred it as a wristband, 38% would like to be able to insert the security device into a carry-on item.
Explore ideas on how to incorporate chip into insertable items
Based on the comments on four users about the necessity and/or obtrusive presence of the off and on switch, we would remove the switch. Since it was included with the intention of indicating to the user that it would interact with the sensor, we believe that the responses from the sensor screen showing access granted or denied will suffice.
Possibly remove on/off switch to remove bulk/user confusion
CLICK HERE to download the PDF of the full presentation