HRCD
Security

Resources

HOW TO USE

INTRODUCTION

CHAPTER 1 - Figuring out the Problem and Whether You Are The Person to Help Solve it

CHAPTER 2 - Working with a community

CHAPTER 3 - Understanding Harm: Threat Modeling

CHAPTER 4 - Research Methods

CHAPTER 5 - Designing for Everyone

CHAPTER 6 - Personas

CHAPTER 7 - Ideation & Validating Research Findings

CHAPTER 8 - Remote User Testing for Communities

CHAPTER 9 - Building a Secure, Ethical Prototype and Preparing for Alpha Release