


URSA
🏆 RedDot Award, Indigo Award, IDA Design Award,
European Product Design Award
Overview
When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.
My Role
UX Research Lead
Duration
10 Weeks
Tools
Figma, Illustrator
Team
Sejoon Kim, Team Lead, UX Research
Lucilla Fell, Visual Design Lead
Belle Duffner, UX Strategy, UI Design
Owen Hudock, Branding
WHY
🧐
25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.
HOW
Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.
🧠
WHAT
Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.
😮
URSA
🏆 RedDot Award, Indigo Award, IDA Design Award, European Product Design Award
UX Design
UI Design
Product Design
Overview
When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.
My Role
Visual Lead / UI Design Lead
Duration
26 Weeks
Tools
Figma, Illustrator
Team
Sejoon Kim, Team Lead, UX Research
Lucilla Fell, Visual Design Lead
Belle Duffner, UX Strategy, UI Design
Owen Hudock, Branding
WHY
🧐
25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.
Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.
HOW
🧠
Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.
WHAT
😮



Background
Background
Background
Why It Matters
Why It Matters
Why It Matters
As technology and AI evolve, securing personal information is more important than ever.
Phishing attacks use psychological tricks to exploit human vulnerability.
URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.
As technology and AI evolve, securing personal information is more important than ever. Phishing attacks use psychological tricks to exploit human vulnerability. URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.
As technology and AI evolve, securing personal information is more important than ever. Phishing attacks use psychological tricks to exploit human vulnerability. URSA was built to protect small businesses, who, despite basic cybersecurity, remain prime targets due to limited resources and high risk from loss.
324,000
324,000
324,000
cases a year
cases a year
cases a year
Sourced from PurpleSec
Sourced from PurpleSec
Sourced from PurpleSec
Phishing
Phishing
Phishing
Research
Research
Research
Secondary Research
Secondary Research
Secondary Research
In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.
In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.
In our secondary research, my team and I identified pain points, analyzed market trends, and defined our target audience. We examined similar platforms, compared their content with our goals, and explored audience needs. Small businesses struggle to protect against phishing, which targets individuals despite security measures. As frequent cyberattack victims, only 15% of cases are reported.
🔍
🔍
25% of the phishing attack is towards the small businesses
25% of the phishing attack is towards the small businesses
🔍
🔍
More than 70% of the small businesses are not prepared against the phishing attacks
More than 70% of the small businesses are not prepared against the phishing attacks
🔍
🔍
Over $1 million is lost from phishing attack in 2023, and it is rising.
Over $1 million is lost from phishing attack in 2023, and it is rising.
🔍
25% of the phishing attack is towards the small businesses
🔍
More than 70% of the small businesses are not prepared against the phishing attacks
🔍
Over $1 million is lost from phishing attack in 2023, and it is rising.
Target Audience
Target Audience
Target Audience
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.
Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.
Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.
Small businesses operate with slim margins, making them particularly vulnerable to any data or resource disruptions, that's why we made them the focus of our initiative.
Not every small business applies to our problem space. So, in this case, we defined our audience to be the archetype of “inquisitive”, those who function in a business that is more technology heavy and have higher level of concern for company safety.



Expert Interview
Expert Interview
Expert Interview
Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.
Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.
Interviews revealed gaps in cybersecurity tools and how users fall for phishing scams. Experts shared effective strategies, which we unified into a single platform to strengthen protection.

25 Survey Responses
25 Survey Responses
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.

25 Survey Responses
25 Survey Responses
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.

User Interview
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.

User Interview
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.
Expert Interview
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.

Expert Interview
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.



25 Survey Responses
While 60% of employees report having cybersecurity programs at work, only 40% of those participants find their training adequate.


User Interview
Through interviews with employees and owners, we gathered 100+ insights revealing urgent phishing vulnerabilities that require immediate action.
Expert Interview
Through affinity mapping and expert interviews, we identified key opportunities for improving employee education and security protections.


Ideation
Ideation
Ideation
Feature Ideation
Feature Ideation
Feature Ideation
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.
Before getting into lo-fi development, we had an ideation session to brainstorm every possible feature for our project.

Idea Dump
Our team ideated different ways to visually display different features.

Idea Dump
Our team ideated different ways to visually display different features.
Feature Feasibility
We reviewed our Feasibility map to help support which features to focus on.

Feature Feasibility
We reviewed our Feasibility map to help support which features to focus on.

Lo-fi Sketching
Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.

Lo-fi Sketching
Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.



Feature Feasibility
We reviewed our Feasibility map to help support which features to focus on.
Idea Dump
Our team ideated different ways to visually display different features.


Lo-fi Sketching


Team sketches evolved from low-fidelity concepts to refined mid-fi wireframes.
Navigation Bar
Navigation Bar
Navigation Bar
The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.
The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.
The expert interviews revealed two primary challenges: employees can often predict the timing of phishing emails used for training, and the lack of diversity in email contexts makes it easier for them to identify these test emails.



💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.
💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.
💬 The employee navigation bar is designed for simplicity, ensuring a user-friendly experience that helps employees quickly find what they need and stay focused on their work.



💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.
💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.
💬 The employer navigation bar tracks reporting progress and phishing emails, enabling randomized campaign launches for more realistic threat analysis.
User Flow: Email Widget
User Flow:
Email Widget
User Flow: Email Widget
Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.
Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.
Integrating security awareness into the email interface ensures constant accessibility. Placed within employees' peripheral vision, the widget enables seamless engagement without disrupting workflow.



Interface Design
Interface Design
Interface Design
To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.
To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.
To support seamless interaction, the team selected a semantic engine for matching ASL terms with English sentences. Sentiment analysis enhances emotional understanding, and gesture recognition links ASL terms to specific motion data.
Simple Design
Simple Design
Clear Userflow
Clear Userflow
Intuitive Information Architecture
Intuitive Information Architecture






Simple Design
Clear Userflow
Intuitive Information Architecture
Validation
Validation
Validation
Branding
Branding
Branding
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
We've reached a key milestone with our functional prototype, now ready for user testing. Usability testing and expert evaluations ensured a seamless experience, with feedback integrated into the design.
Conducted 15 of A/B Testing
6 Usability Testing
2 Expert Evaluation
Conducted 15 of A/B Testing
6 Usability Testing
2 Expert Evaluation
Final Design
Final Design
Final Design
Brand Development
Brand Development
Brand Development
We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.
We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.
We explored over 20 typefaces to find one that balanced clarity and flexibility across sizes and weights. Our color palette was refined to support readability and trust.
The logo, a simplified bear, was designed for clarity and recognition at any scale.









Employee Interface
Employee Interface
Employee Interface
To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.
To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.
To respect employees' time, we provide concise, strategically placed security insights. Our email reporting campaign ensures high visibility and effortless engagement without overwhelming users.
Employer Interface
Employer Interface
Employer Interface
Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.
Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.
Employers access key cybersecurity insights by tracking phishing email volume and employee progress, ensuring effective business protection.
Email Widget
Email Widget
Email Widget
Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.
Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.
Phishing monitoring is ineffective without reporting, so we introduced a visible, intuitive email widget for seamless suspicious message reporting.






Reflection
Reflection
Reflection
As a Research Lead…
As a Research Lead…
As a Research Lead…
Working on URSA reminded me that even small businesses deserve big protection.
As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.
Working on URSA reminded me that even small businesses deserve big protection.
As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.
Working on URSA reminded me that even small businesses deserve big protection. As the Research Lead, I helped turn research and user feedback into thoughtful, real-world solutions, making something as invisible as security feel clear, human, and trustworthy. This project deepened my belief that good design begins with listening, and that every insight, no matter how small, can lead to something meaningful.






Vision Video
Vision Video
Interested in exploring more? ✿˖°
Vision Video
Interested in exploring more? ✿˖°
URSA
UX Design
UX Research
Product Design
🏆 RedDot Award, Indigo Award, IDA Design Award,
European Product Design Award
Overview
When you receive an email marked as urgent or offering an incredible deal, it’s important to feel confident that it’s real, because that message might be the opportunity of a lifetime. URSA protects small businesses by screening emails, training employees, and simplifying phishing reports, ensuring safe and secure communication.
My Role
Visual Lead / UI Design Lead
Duration
26 Weeks
Tools
Figma, Rhino 3D, Keyshot, Blender, Adobe Suite, After Effect, DaVinci Resolve
Team
Sejoon Kim
Lukas Wiesner
Lara Kurt
WHY
25% of the phishing attacks are against the small businesses, and this causes so many damages when every resources matter in small businesses.
🧐
HOW
🧠
Monitor the phishing emails and empower employees by educate how to identify the phishing emails and encourage them to report the phishing email.
WHAT
😮
Monitoring with a desktop app will manage data, educate employees, and include an email widget to increase the accessibility of phishing email reports.
Let’s
Collaborate! ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
Let’s
Collaborate! ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
Let’s
Collaborate ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com
Let’s
Collaborate ✧˖°
Designing with users at the core, always. If you're ready to create something meaningful, let's make it happen together!
hysujikim@gmail.com