


URSA
URSA
URSA
Class Project
Class Project
Class Project
Fall 2023
Fall 2023
Fall 2023
RedDot Award, Indigo Award
RedDot Award, Indigo Award
RedDot Award, Indigo Award
Overview
Overview
Overview
Ursa is a desktop security solution for small businesses, designed to detect phishing threats, educate employees, and simplify reporting. By proactively scanning emails and fostering cybersecurity awareness, Ursa strengthens digital safety and empowers teams to navigate online communications with confidence.
Ursa is a desktop security solution for small businesses, designed to detect phishing threats, educate employees, and simplify reporting. By proactively scanning emails and fostering cybersecurity awareness, Ursa strengthens digital safety and empowers teams to navigate online communications with confidence.
Ursa is a desktop security solution for small businesses, designed to detect phishing threats, educate employees, and simplify reporting. By proactively scanning emails and fostering cybersecurity awareness, Ursa strengthens digital safety and empowers teams to navigate online communications with confidence.
Role: UX Research Lead
Role: UX Research Lead
Specifications
Specifications
Team:
Team:
Sejoon Kim, Team Lead, UX Research
Sejoon Kim, Team Lead, UX Research
Lucilla Fell, Visual Design Lead
Lucilla Fell, Visual Design Lead
Belle Duffner, UX Strategy, UI Design
Belle Duffner, UX Strategy, UI Design
Owen Hudock, Branding
Owen Hudock, Branding
Duration: 10 Weeks
Duration: 10 Weeks
Tools: Figma, Illustrator
Tools: Figma, Illustrator
Role: UX Research Lead
Specifications
Belle Duffner, UX Strategy, UI Design
Owen Hudock, Branding
Team:
Lucilla Fell, Visual Design Lead
Sejoon Kim, Team Lead, UX Research
Duration: 10 Weeks
Tools: Figma, Illustrator



Problem Space
Problem Space
Problem Space
As AI advances, protecting personal data is crucial. Small businesses, often lacking cybersecurity resources, are vulnerable to phishing. Ursa bridges this gap, strengthening their digital security.
As AI advances, protecting personal data is crucial. Small businesses, often lacking cybersecurity resources, are vulnerable to phishing. Ursa bridges this gap, strengthening their digital security.
324,000
324,000
324,000
cases a year
cases a year
Sourced from PurpleSec
Sourced from PurpleSec
Phishing
Phishing
Phishing
Secondary Research
Secondary Research
Secondary Research
In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs.
In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs.




Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.
Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.
Target Audience
Target Audience
Target Audience
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions – that's why we made them the focus of our initiative.
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions – that's why we made them the focus of our initiative.
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions – that's why we made them the focus of our initiative.



Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”– those who function in a business that is more technology heavy and have higher level of concern for company safety.
Our target audience consists of tech-driven small businesses with a strong focus on security, specifically those with an inquisitive mindset toward safeguarding company data.
Our target audience consists of tech-driven small businesses with a strong focus on security, specifically those with an inquisitive mindset toward safeguarding company data.
Expert Interview
Expert Interview
Expert Interview

25 Survey Responses
25 Survey Responses
25 Survey Responses
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.


User Interview
User Interview
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.
User Interview
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.
Expert Interview
Expert Interview
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

Expert Interview
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.
Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.
Feature Ideation
Feature Ideation
Feature Ideation
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.

Idea Dump
Idea Dump
Idea Dump
Our team ideated different ways to visually display different features.
Our team ideated different ways to visually display different features.
Our team ideated different ways to visually display different features.
Feature Feasibility
Feature Feasibility
Feature Feasibility
We reviewed our Feasibility map to help support which features to focus on.
We reviewed our Feasibility map to help support which features to focus on.
We reviewed our Feasibility map to help support which features to focus on.

Lo-fi Sketching
Lo-fi Sketching
Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.
Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Lo-fi Sketching
Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Navigation Bar
Navigation Bar
Navigation Bar
The employer navigation bar focuses on tracking the business's reporting progress and monitoring phishing emails. By analyzing this progress, employers can introduce randomness in campaign launches, resulting in more realistic data for identifying phishing emails.
The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.



The employer navigation bar focuses on tracking the business's reporting progress and monitoring phishing emails. By analyzing this progress, employers can introduce randomness in campaign launches, resulting in more realistic data for identifying phishing emails.


> The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.
The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.
The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.
> The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.
> The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.
> The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.
> The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.

The employee navigation bar is designed to minimize unnecessary complexity, ensuring a user-friendly and less intimidating experience. This streamlined design enables employees to quickly find what they need, complete tasks efficiently, and return to work without distractions.
The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.



The employee navigation bar is designed to minimize unnecessary complexity, ensuring a user-friendly and less intimidating experience. This streamlined design enables employees to quickly find what they need, complete tasks efficiently, and return to work without distractions.

> The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.
User Flow: Email Widget
User Flow: Email Widget
User Flow: Email Widget
Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.
Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.



Interface Developing
Interface Developing
Interface Developing
To effectively convey a large amount of data, our interface prioritized three key factors.
To effectively convey a large amount of data, our interface prioritized three key factors.
To effectively convey a large amount of data, our interface prioritized three key factors.
Simple Design
Simple Design
Simple Design
Clear Userflow
Clear Userflow
Clear Userflow
Intuitive Information Architecture
Intuitive Information Architecture
Intuitive Information Architecture






Usability Testing
Usability Testing
Usability Testing
Conducted 15 of A/B Testing
Conducted 15 of A/B Testing
Conducted 15 of A/B Testing
6 Usability Testing
6 Usability Testing
6 Usability Testing
2 Expert Evaluation
2 Expert Evaluation
2 Expert Evaluation
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
Brand Development
Brand Development
Brand Development









Hi-Fi — Employee Interface
Hi-Fi — Employee Interface
Hi-Fi — Employee Interface
To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.
To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.
Hi-Fi — Employer Interface
Hi-Fi — Employer Interface
Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.
Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.




Hi-Fi — Email Widget
Hi-Fi — Email Widget
Hi-Fi — Email Widget
Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.
Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.










Vision Video
Vision Video
Vision Video
Interested in exploring more? ✿˖°
Interested in exploring more? ✿˖°
Let’s
Collaborate! ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
(912) - 482 - 8104
Let’s
Collaborate ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
(912) - 482 - 8104
Let’s
Collaborate ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
(912) - 482 - 8104