AXIS Resources for Trainers, Auditors, Developers, and Designers

AXIS event logo, Blue Globe with stamps in circle

Many of the most at-risk communities around the globe rely on open source privacy and security tools. However, these tools are often designed, developed, and maintained by individuals or small teams who have little to no access to their target audience — journalists, activists, human rights defenders, and other high-risk groups. This often results in tools that poorly fit the threats, challenges, and/or accessibility or usability requirements of end-users. Internews and the USABLE Team have worked with many community members across the globe to support tool developers who want to better understand their users’ needs, security practices, and operating environment, establishing stronger feedback loops between the communities who make the tools and the communities who use them.

The activities and resources shared below were inspired by existing formal methods of feedback collection and were adapted by the USABLE team, digital security trainers, and user-experience (UX) specialists. They take into account the specific limitations of open source projects and the sensitivities around working with high-risk communities. More details on each of the below activities can be found in the UX Feedback Collection Guidebook.

Human-Centered Design and the Development Ecosystem

Human-centered design is a principle that intentionally places humans, their needs, their concerns, and their experiences front and center when building a system. The blogs listed below provide an introduction to this principle and how it fits into the development of privacy and security tools as well as the role of trainers and auditors in the process.

Blogs

Incorporating Feedback Collection

This section includes blogs, podcasts, activities, and templates to help digital security trainers (new or experienced), user-experience (UX) specialists, trusted facilitators, and open source tool teams understand the value and process of capturing feedback where possible and how to share it with developers. When done effectively, this process can transform the design and development of the most commonly used privacy and security tools for at-risk users. For more information, see Part I and Part II of the guidebook.

Blogs

Podcasts

Activities

Templates

Synthesizing Feedback and Connecting with Developers

This section includes resources and guidance for digital security trainers and user experience experts who may be less familiar with communicating with tool teams. From communication channels to best practices, this section supports facilitators with the basic skills needed to connect with tool teams and share relevant feedback. For more information, see Part IV: Communicating with Developers and Tool Teams in the guidebook.

Blogs

Activities

Community-developed Resources

This section includes resources created by digital security trainers in the community who have experience incorporating feedback collection during trainings.

Blogs

Podcasts

  • Making Easy Decisions: The Digital Security Checklist You can make easy decisions about digital security. Listen as Łukasz walks us through a helpful checklist to make simple decisions about the tools we decide to use. View the checklist at https://lukaszkrol.net/due_diligence/.
Find the transcript for this recording at https://usable.tools//pdfs/AXIS/AXIS_Lukasz.pdf/

Featured Resources for Feedback Collection

USABLE's UX Feedback Collection Guidebook Okthanks' Exploratorium Simply Secure Knowledge Base