URSA

🏆 RedDot Award, Indigo Award, IDA Design Award,

European Product Design Award

Overview

When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.

My Role

UX Research Lead

Duration

10 Weeks

Tools

Figma, Illustrator

Team

Sejoon Kim, Team Lead, UX Research

Lucilla Fell, Visual Design Lead

Belle Duffner, UX Strategy, UI Design

Owen Hudock, Branding

WHY

🧐

25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.

HOW

Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.

🧠

WHAT

Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.

😮

URSA

🏆 RedDot Award, Indigo Award, IDA Design Award, European Product Design Award

UX Design

UI Design

Product Design

Overview

When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.

My Role

Visual Lead / UI Design Lead

Duration

26 Weeks

Tools

Figma, Illustrator

Team

Sejoon Kim, Team Lead, UX Research

Lucilla Fell, Visual Design Lead

Belle Duffner, UX Strategy, UI Design

Owen Hudock, Branding

WHY

🧐

25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.

Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.

HOW

🧠

Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.

WHAT

😮

Background

Background

Background

Why It Matters

Why It Matters

Why It Matters

As technology and AI evolve, securing personal information is more important than ever.
Phishing attacks use psychological tricks to exploit human vulnerability.
URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.

As technology and AI evolve, securing personal information is more important than ever. Phishing attacks use psychological tricks to exploit human vulnerability. URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.

As technology and AI evolve, securing personal information is more important than ever. Phishing attacks use psychological tricks to exploit human vulnerability. URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.

324,000

324,000

324,000

cases a year

cases a year

cases a year

Sourced from PurpleSec

Sourced from PurpleSec

Sourced from PurpleSec

Phishing

Phishing

Phishing

Research

Research

Research

Secondary Research

Secondary Research

Secondary Research

In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.

In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.

In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.

🔍

🔍

25% of the phishing attack is towards the small businesses

25% of the phishing attack is towards the small businesses

🔍

🔍

More than 70% of the small businesses are not prepared against the phishing attacks

More than 70% of the small businesses are not prepared against the phishing attacks

🔍

🔍

Over $1 million is lost from phishing attack in 2023, and it is rising.

Over $1 million is lost from phishing attack in 2023, and it is rising.

🔍

25% of the phishing attack is towards the small businesses

🔍

More than 70% of the small businesses are not prepared against the phishing attacks

🔍

Over $1 million is lost from phishing attack in 2023, and it is rising.

Target Audience

Target Audience

Target Audience

Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.


Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.

Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.


Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.

Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.


Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.

Expert Interview

Expert Interview

Expert Interview

Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.

Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.

Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.

25 Survey Responses

25 Survey Responses

While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.

25 Survey Responses

25 Survey Responses

While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.

User Interview

Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.

User Interview

Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.

Expert Interview

Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

Expert Interview

Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

25 Survey Responses

While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.

User Interview

Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.

Expert Interview

Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

Ideation

Ideation

Ideation

Feature Ideation

Feature Ideation

Feature Ideation

Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.

Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.

Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.

Idea Dump

Our team ideated different ways to visually display different features.

Idea Dump

Our team ideated different ways to visually display different features.

Feature Feasibility

We reviewed our Feasibility map to help support which features to focus on.

Feature Feasibility

We reviewed our Feasibility map to help support which features to focus on.

Lo-fi Sketching

Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Lo-fi Sketching

Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Feature Feasibility

We reviewed our Feasibility map to help support which features to focus on.

Idea Dump

Our team ideated different ways to visually display different features.

Lo-fi Sketching

Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Navigation Bar

Navigation Bar

Navigation Bar

The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.

The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.

The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.

💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.

💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.

💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.

💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.

💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.

💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.

User Flow: Email Widget

User Flow:

Email Widget

User Flow: Email Widget

Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.

Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.

Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.

Interface Design

Interface Design

Interface Design

To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.

To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.

To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.

Simple Design

Simple Design

Clear Userflow

Clear Userflow

Intuitive Information Architecture


Intuitive Information Architecture


Simple Design

Clear Userflow

Intuitive Information Architecture


Validation

Validation

Validation

Branding

Branding

Branding

We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.

We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.

We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.

Conducted 15 of A/B Testing

6 Usability Testing

2 Expert Evaluation

Conducted 15 of A/B Testing

6 Usability Testing

2 Expert Evaluation

Final Design

Final Design

Final Design

Brand Development

Brand Development

Brand Development

We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.

We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.

We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.

Employee Interface

Employee Interface

Employee Interface

To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.

To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.

To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.

Employer Interface

Employer Interface

Employer Interface

Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.

Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.

Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.

Email Widget

Email Widget

Email Widget

Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.

Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.

Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.

Reflection

Reflection

Reflection

As a Research Lead…

As a Research Lead…

As a Research Lead…

Working on URSA reminded me that even small businesses deserve big protection.
As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.

Working on URSA reminded me that even small businesses deserve big protection.
As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.

Working on URSA reminded me that even small businesses deserve big protection. As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.

Vision Video

Vision Video

Vision Video

URSA

UX Design

UX Research

Product Design

🏆 RedDot Award, Indigo Award, IDA Design Award,

European Product Design Award

Overview

When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.

My Role

Visual Lead / UI Design Lead

Duration

26 Weeks

Tools

Figma, Rhino 3D, Keyshot, Blender, Adobe Suite, After Effect, DaVinci Resolve

Team

Sejoon Kim

Lukas Wiesner

Lara Kurt

WHY

25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.

🧐

HOW

🧠

Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.

WHAT

😮

Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.