Tag Archives: authentication

Ten essential UX factors to create products your customers will LOVE

easyThis week Apple launched the iPad 2, reminding us that creating a great User Experience (UX) is much more than providing a clean, simple User Interface (UI). Those of us who want to build products that are loved by our customers need to achieve a great UX across areas—not just one:

1. Easy authentication. People have far too many logins and passwords than they can possibly remember. Making them create and manage yet another identity is a hassle that can potentially turn-off over half of your customers. Aim to enable one-click login that re-uses an identity your customers already love (like the Facebook SocialGraph).

2. Clean, simple UI for mainstream users. It is so incredibly easy to fall into the trap of overloading a UI with some many features, making your product non-intuitive the 80% people who constitute your mainstream customers. If you need to provide instructions for basic use, you have made you product too complicated. Strive for simplicity, like Twitter does.

3. Configurable UI for advanced users. Over time, 10-20% of your customers will be your core, “power users.” To keep them happy, you need to provide them the ability to create shortcuts and customizations that let them use your product more effectively. The key is focusing on making their experience more efficient—not more cluttered. Facebook does a good job of this for consumers; Salesforce for business users.

4. Open APIs for partners. Many are afraid to open their product (and data) up to others. In a “Web 2.0 World” this can be a fatal mistake. Build your product to make it easy for others to build create applications on top of your product. This social production taps the creativity and work of others to make your product more useful and valuable to your customers. Look at what this provided Facebook, Twitter, and Salesforce.

5. Easy installation of partner apps. You need to architect your product from Day One to let make it simple for people outside your organization install and integrate applications that work with your product. When you achieve this, your customers see your product as an easy platform to add whatever the need. Contrast how Apple does this vs. RIM and WordPress vs. all other blogging tool to understand this UX firsthand.

6. Device compatibility. If you are building applications for tablets or mobile, endeavor to be platform agnostic. This gives your customers the freedom to chose the device that best fits their need—a great UX—vs. denying them choice. Take a look at the explosion of Android to understand how much people love this.

7. Built-in reporting. (Mostly applicable for business apps). The worst thing you can do to customers is providing them a product without the tools to enable measure and understand what it is doing for them. Build in intuitive reporting from the start. Make it easy for customers to export data for their own use. Be a source of insight—not obfuscation.

8. Non-technical customization. (Another item mostly for business applications). Everyone has unique ways of working. Forcing your customers to conform to ways of working your engineers cooked up in isolation is not a good UX (nor is forcing them to spend obscene amounts of money on customization). Make it easy for non-technical people to adapt your product to how they work. Hint: look again at Saleforce to see how to do this well.

9. Painless upgrade. Technology is an innovative business. If you want to keep your customers, you need to provide them regular improvements and innovation. Making this painful, costly and intrusive will guarantee you loose customers to someone who makes it easy. Making it easy makes you a constant source of improved UX. WordPress does this incredibly well—for individuals and business alike.

10. Transparent pricing. This is one people tend to forget. You can make the easiest-to-use product unappealing if you make the purchase process complicated. Too many software pricing models can make buying software akin to buying a new car. Transparent pricing—based on what your customer value (not your costs)—provides a great experience. Pardot does this really well.

An interesting exercise to try for yourself

Look at the products you provide (and the ones you use). How many of them achieve all ten of these? How many even half? Which of those do you enjoy using the most?

Social Networks for Business Tip #9: Create a SAFE Environment

I have found ten common tips that apply irrespective of what your enterprise does, your market is or what technology platform you are using. This is my ninth tip in this series. There will be 10 total posts; each with a particular theme. These intended to be read in the order presented, as they will build upon each other…


Too Many Communities are Not Safe

I don’t mean to be an alarmist, but too many enterprise (i.e., mission-focused) communities are simply not safe. I routinely look at newly launched Enterprise 2.0 and Government 2.0 communities and immediate spot holes that I could easily compromise to do any of the following, within minutes or hours:

  • Hijack the community’s core mission and message with distracting, embarrassing or even detrimental content
  • Shifting the community’s focus or value though manipulated rating and voting
  • Disincentive or even harass contributing members from continuing to engage with the community
  • Capture personal information for use from anything from masquerading or stealing members’ identities to using private information for personal gain or exploitation

Of course, I would never do this to. However, I am always happy to evaluate communities and share my insights on their invulnerabilities to make them safer (as this ultimately helps the entire movement to use of social media to foster engagement, collaboration and outreach).

Four MUST HAVE Tools for Safe a Community

Any community should be created with four “tools” (really four key design and administration attributes) to be safe. While these are “nice-to-have’s” for recreational communities, they are absolutely essential for mission-focused ones.

1. Authentication-based Attribution

6a00d83451586c69e201156fb4ed1a970c-400wiAuthentication is the process of verifying the identities of members of your community are when they visit. Attribution is the process of matching every contribution (from rating and voting to content creation and comment) to a member. When you combine these to together, you know which members are contributing what (and they know this as well). This simple action drives whole changes in behavior:

  • Members are more likely to contribute valuable content. (They are also far less likely to create damaging content.)
  • Members will be more polite to each other (as their interactions are no longer hidden by anonymity). This will foster a much more constructive dialog (ultimately creating more value for all).
  • You community manager is now able to recognize and reward constructive members—and penalize the opposite (see some of the other tools below to do this).

You do not necessarily have to publicize attribution to all members (this is critical when you want to encourage comments without fear of being ostracized by others—critical in many Government 2.0 communities). Simply attributing members’ contributions will result in the above behavioral benefits.

2. Privacy Controls

People will not join your community (or contribute) if they are afraid that their privacy will be violated (by you or other members). As such, you should follow the Golden Rule of Social Networking Privacy:

Keep all profile-related information private for any given person unless the member tells you otherwise.

When you do this, you build trust with your members by enabling them to maintain control of their identities. While this is highly valuable in any network, it is often a requirement for statutory compliance in communities that support regulated industries (see my prior post for more details on this).

privacy_SettingsIf you don’t believe this, look at how its use has affected the growth of consumer social communities. For all the complaints about the arcane nature of Facebook’s privacy controls, they are still some of the strongest out there. In addition, Facebook (at least initially) followed the Golden Rule of Social Networking Policy for its members. As a result, it was a safe environment for people to join. This is reflected in Facebook’s dominance (when compared to other recreational communities) not only in total membership size, but also in participation by people 25 and older (i.e., people with a higher interest in maintaining privacy).

3. Member-based Content Flagging

One of the key purposes in creating a business-focused social community in the first place is to tap the input and creative thought of your customers, employees and partners. You should not limit this engagement to simply getting input and insight from your members; you should extend to enable them to police the community themselves. This requires you to put several items in place:

  1. Hooks on every piece of member-generated content that enable members to “flag” and report content of concern for review by your community manager
  2. View rules that automatically hide content that has been deemed of concern by a sufficient number of distinct members (here is where attribution again comes to play) in a given period of time
  3. Automated workflows and administration tools to enable community managers to review and act upon reported content (see Tool #4 below)
Example of a Member Reporting
Example of a Member Reporting Copyrighted Material

You can optionally decide to hide any content that a member has deemed offensive from that given members (preventing further offensive as the member engages you community). The first company I saw do this was AOL, who enabled their members to effectively “stop listening to” offensive chat room members without infringing on their freedom of speech.

Letting members police themselves provides many benefits:

  • You empower your members, strengthening their trust and engagement
  • You get free 24×7 support for moderation: if a 14-year-old publishes offensive content at 2 a.m. other members may detect and force its suspension before your community manager even comes in the next morning
  • You tap the “collective intelligence” of your members to steer your community in a direction that is more welcoming to all.

4. Moderation Console

This is the tool that pulls everything together. The moderation console is where your community leaders will actually manage your community. The enable them to provide members a safe community it must provide them the following functionality:

  1. Promotion of members and their content. This is intrinsic to rewarding good members and featuring them as examples to others.
  2. Removal of bad or offensive content. Without, this you cannot project the message and mission of your community
  3. Management of which members can publish content immediately and which must have their content reviewed by a community leader before publication
  4. Banning or blocking of members who violate your terms of service. This is a key tool for protecting your community from being hijacked. (However, banning provides no safety if you do not require members to authenticate and attribute themselves before adding content.)
  5. Automated review of content reported as offensive (so you can respond to actions members have taken to police the community)
  6. Full editorial privileges to correct content that contains inaccuracies, false claims or simple typos and remove offensive or copy right-infringing media. (Depending on your terms of service, your community leaders may directly publish these changes or send them back to authoring members for review.)

The moderation console builds upon the three other tools to enable you to provide an environment that is safe for your enterprise, its mission and the members of your business community.

Is Your Social Network Safe?

Does your community have all the tools to make it safe? If not, it is simply a manner of time as to when something will happen (and degree as to how extensive this will be.)