Filter your results
Results 11 - 20 of 29. To narrow results enter search keywords or select filters.
Please RSVP at: https://attendee.gotowebinar.com/register/1547812603269806605
Presenters Names, Titles, and Company
Bryan Babcock - Information Technology, Volunteer Legal Services Project
John Banning - National Community Lead, TechBridge
Rick Rose - Sr. Salesforce Product Architect, TechBridge
Exploratory or Formative Usability Testing
Scenario: In the initial phases of development you want to judge users reactions to the design.What/Why: Exploratory usability tests are done early in the design phase, often using paper prototypes*. This type of test requires a lot of interaction between the moderators and the testers. It can help surface
In-person testing
In person testing allows you to see and interact with users in real time, with minimal barriers. If you choose to test your site with in-person testers (where you monitor and your testers share a physical space) there are a few options:
Mediated vs. Unmediated Testing
Below are some of the differences between mediated and unmediated user testing.
Mediated
Unmediated
Staff person walks the tester(s)through a series of tests and follows a script
Less structured allowing the user to act naturally with minimal input
Script describes the test, handles user questions, and concludes the test
The legal services community has not been immune to cybersecurity incidents over the past years. Indeed, a significant number of programs have been compromised and significantly impacted by cyber attacks each year. As with the broader non-profit, business, and government communities, the incident rates and stakes are growing within our community.
LSNTAP hosted a webinar series called Season of Security: Enhancing Security in the Legal Aid Community. The series focused on different aspects of security and how programs can take steps to improve their security practices. Each webinar was aimed at a specific audience.
This is a template to get organizations started on drafting an Incident Response Policy. It includes important questions that must be discussed within the organization to prepare for a cyber security incident.
The attached policies are starting points in developing mobile device policies for your organization.
Make sure to periodically check back as we are continuously striving to update and make more resources available.
Pagination
Close
Filter your results
Type
Topics