End User Trust Outlives Consent Forms
In my last post, I talked about ways that research consent can be more nuanced than “yes” or “no”. This second and final part explores scenarios in which consent can get complicated and trust may be endangered.
In my last post, I talked about ways that research consent can be more nuanced than “yes” or “no”. This second and final part explores scenarios in which consent can get complicated and trust may be endangered.
This will be the first in a short series on ways to protect end-user identities when collecting feedback or testing products. As many of us become more proficient in cybersecurity best practices, it’s crucial that we don’t forget some of the low-tech ways that we can keep identities secure and maintain trust.