🍱 How To Organize 1250+ Design Screens in Figma (+ File examples) (https://lnkd.in/e7X4fKcj), a practical case study of how to organize design screens in user flows — to reduce repetitive work and still cover all user journeys. Via Lorenzo Palacios Venin. ✅ Divide the product into files based on navigation. ✅ Each navigation section will get its own Figma file. ✅ List user flows for each of these navigation sections. ✅ Divide each file into pages based on these user flows. ✅ Each starting point will get a separate page. ✅ Each flow that departs from it will get a page. ✅ Break heavy, long user flows into separate files. 🚫 Flows rarely exist alone: they redirect to other flows. ✅ Each flow has exactly 1 entry point, but many exit points. ✅ Screens are ordered from left to right for progression. ✅ Screens are vertically stacked (top to bottom) for variations. ✅ Specify each interaction only the first time it appears. ✅ Variations are displayed with conditional blocks. File example (Route search): https://lnkd.in/ezfY5G2x Full workflow in Figma (flowchart): https://lnkd.in/e7V8nEi3 I absolutely love the idea of using color coding for file covers to communicate states. The team uses blue 🔵 to indicate work in progress, green 🟢 for the latest validated version and grey ⚪ for older, archived versions. Once a version’s cover is switched to green, this file can no longer be modified. What the team describes is a very systematic process to something that many of us do instinctively, but perhaps not rigorously enough. Of course we define user journeys and then design screens for them, but often we do so for just a few paths at a time — and that results in redundant flows to cover other paths. In the case above, we organize all design work in nothing but flows. All component variations are designed on the level of the design system, and all screen variations are designed within user flows. An interesting approach to keep designs well-organized, while exploring both happy and unhappy paths — and keeping them where they belong. Useful resources: DoctoLib Design System Figma Organization, by Jérôme Benoit https://lnkd.in/eK7bhQeS Booking.com Figma Organization, by Nicole Saidy https://lnkd.in/edueYQPG “How We Organize Design Files in Figma” (+ Figma Kits), via Lee Munroe https://lnkd.in/e4Dt4sC3 How To Organize A Design System (Figma), by Saurav Rastogi https://lnkd.in/dWV-Y6vv Spotify Ways Of Working in Figma (Kit) https://lnkd.in/ek9ZzZQg #ux #figma
Testing Ecommerce Site Usability
Explore top LinkedIn content from expert professionals.
-
-
🚨 AI Privacy Risks & Mitigations Large Language Models (LLMs), by Isabel Barberá, is the 107-page report about AI & Privacy you were waiting for! [Bookmark & share below]. Topics covered: - Background "This section introduces Large Language Models, how they work, and their common applications. It also discusses performance evaluation measures, helping readers understand the foundational aspects of LLM systems." - Data Flow and Associated Privacy Risks in LLM Systems "Here, we explore how privacy risks emerge across different LLM service models, emphasizing the importance of understanding data flows throughout the AI lifecycle. This section also identifies risks and mitigations and examines roles and responsibilities under the AI Act and the GDPR." - Data Protection and Privacy Risk Assessment: Risk Identification "This section outlines criteria for identifying risks and provides examples of privacy risks specific to LLM systems. Developers and users can use this section as a starting point for identifying risks in their own systems." - Data Protection and Privacy Risk Assessment: Risk Estimation & Evaluation "Guidance on how to analyse, classify and assess privacy risks is provided here, with criteria for evaluating both the probability and severity of risks. This section explains how to derive a final risk evaluation to prioritize mitigation efforts effectively." - Data Protection and Privacy Risk Control "This section details risk treatment strategies, offering practical mitigation measures for common privacy risks in LLM systems. It also discusses residual risk acceptance and the iterative nature of risk management in AI systems." - Residual Risk Evaluation "Evaluating residual risks after mitigation is essential to ensure risks fall within acceptable thresholds and do not require further action. This section outlines how residual risks are evaluated to determine whether additional mitigation is needed or if the model or LLM system is ready for deployment." - Review & Monitor "This section covers the importance of reviewing risk management activities and maintaining a risk register. It also highlights the importance of continuous monitoring to detect emerging risks, assess real-world impact, and refine mitigation strategies." - Examples of LLM Systems’ Risk Assessments "Three detailed use cases are provided to demonstrate the application of the risk management framework in real-world scenarios. These examples illustrate how risks can be identified, assessed, and mitigated across various contexts." - Reference to Tools, Methodologies, Benchmarks, and Guidance "The final section compiles tools, evaluation metrics, benchmarks, methodologies, and standards to support developers and users in managing risks and evaluating the performance of LLM systems." 👉 Download it below. 👉 NEVER MISS my AI governance updates: join my newsletter's 58,500+ subscribers (below). #AI #AIGovernance #Privacy #DataProtection #AIRegulation #EDPB
-
Isabel Barberá: "This document provides practical guidance and tools for developers and users of Large Language Model (LLM) based systems to manage privacy risks associated with these technologies. The risk management methodology outlined in this document is designed to help developers and users systematically identify, assess, and mitigate privacy and data protection risks, supporting the responsible development and deployment of LLM systems. This guidance also supports the requirements of the GDPR Article 25 Data protection by design and by default and Article 32 Security of processing by offering technical and organizational measures to help ensure an appropriate level of security and data protection. However, the guidance is not intended to replace a Data Protection Impact Assessment (DPIA) as required under Article 35 of the GDPR. Instead, it complements the DPIA process by addressing privacy risks specific to LLM systems, thereby enhancing the robustness of such assessments. Guidance for Readers > For Developers: Use this guidance to integrate privacy risk management into the development lifecycle and deployment of your LLM based systems, from understanding data flows to how to implement risk identification and mitigation measures. > For Users: Refer to this document to evaluate the privacy risks associated with LLM systems you plan to deploy and use, helping you adopt responsible practices and protect individuals’ privacy. " >For Decision-makers: The structured methodology and use case examples will help you assess the compliance of LLM systems and make informed risk-based decision" European Data Protection Board
-
A new ICS/OT vulnerability? PATCH NOW! Wait... scratch that... Reverse it. Vulnerability management is VERY different in the ICS/OT world. In the IT world, a new patch comes out and it's off to the races! - We're patching servers. - We're rebooting servers. - We're patching workstations. - We're rebooting workstations. - We're patching everything we can get our hands on. You get the idea. In ICS/OT, just because a new vulnerability is announced, it does not mean we have to patch right away. We might not even have an option to patch a system until the next maintenance window. In six months. Or a year. If ever. When that new ICS/OT vulnerability is announced, we still have to take action though. It's just a different action than in IT. When a new ICS/OT vulnerability is announced: 1. Determine if it affects your environment. This is why having a current asset register is essential. 2. If the vulnerability exists in your environment, perform a risk assessment. Consider questions including, but not limited to: -> Which systems are impacted? -> Where do the impacted systems live? -> Do compensating controls exist to reduce the risk? -> Does the vulnerability put lives/physical safety at risk? -> Could the vulnerability affect the operations of the facility? -> What would be the impact if the vulnerability was exploited? NOTE: When assessing risk, get all of the right people in the room to help make an informed decision. Engineering, operations, maintenance, cyber security, etc. 3. Based on the risk assessment, and the owners risk tolerance: -> Do you need to take action? -> If so, how soon? IT and OT can have MANY similarities. But IT and OT can also be VERY different. Vulnerability management is one of the ways where they are very different. And each requires a different approach to maintain secure, and SAFE, environment. P.S. How does your vulnerability management process work?
-
5-Minute Website Audit: Check Your Mobile Friendliness Why Mobile-Friendliness Matters in SEO With Google’s mobile-first indexing, your site’s mobile version is the main focus for rankings. Mobile-friendliness impacts page speed, user experience, and accessibility, making it crucial for engagement, better rankings, and a broader reach. Using the Mobile-Friendly Test Tool Google’s Mobile-Friendly Test is free and easy to use. By entering your URL, you get a report on mobile usability issues, including text readability, tap target size, page speed, and design responsiveness—all key for mobile interactions. Key Mobile Optimization Concepts -Responsive Design: Adjusts layout to fit all screen sizes, improving accessibility. -Page Load Speed: Faster loading enhances retention and SEO; optimize images, scripts, and servers. -Tap Targets & Navigation: Easy-to-tap buttons and intuitive navigation prevent misclicks. -Text Readability: Fonts should adjust for clarity without needing zoom. -Challenges in Mobile Optimization -Responsive Design Complexity: Converting to responsive design may require significant changes. -Load Speed Optimization: Mobile networks are slower, so optimizing speed is challenging. -Aesthetic vs. Functionality: Balancing visuals with fast performance. -Cross-Device Testing: Testing on multiple devices and browsers is crucial but time-intensive. Running the Mobile-Friendly Test -Visit the Tool: Enter your URL on Google’s Mobile-Friendly Test page. -Run the Test: Click “Test URL.” -Review Results: View mobile-friendliness and address any issues, like small text or crowded elements. Strategies for Mobile Optimization -Responsive Frameworks: Use Bootstrap or Foundation for adaptable layouts. -Image Compression: TinyPNG and similar tools reduce image sizes for faster loads. -Simplified Navigation: Large, clear buttons and straightforward menus. -Prioritize Key Content: Show critical info above the fold for visibility. -Optimized Font & Spacing: Use at least 16px font with ample spacing. Benefits of Mobile Optimization -Higher SEO Rankings: Google rewards mobile-friendly sites. -Better User Experience: Smooth navigation lowers bounce rates. -Higher Conversions: Improved mobile experience encourages actions. -Broader Reach: Mobile optimization expands accessibility. -Competitive Edge: A seamless mobile experience sets you apart. Conclusion Optimizing for mobile is essential. Regularly run Google’s Mobile-Friendly Test to catch issues early and keep your site competitive. NEXT STEPS -Test mobile-friendliness regularly -Implement responsive design for flexibility -Monitor mobile performance. Consider professional audits if challenges persist. #MobileSEO #MobileFriendly #WebsiteOptimization
-
💡User Journey Map vs User Flow: When and how to use tools 🍎 User Journey Map A user journey map visualizes the user's experiences and emotions while interacting with a product or service. It highlights pain points, motivations, and touchpoints across the entire journey, from awareness to post-conversion. Components of user journey map: ✔ Stages: Different phases a user goes through (e.g., awareness, consideration, decision, purchase, retention). ✔ Touchpoints: Interactions between the user and the product or service (e.g., visiting a website, contacting support). ✔ Actions: Steps the user takes at each stage. ✔ Emotions: User feelings and experiences at each touchpoint. ✔ Pain Points: Challenges or issues faced by the user. ✔ Opportunities: Potential areas for improvement. Use cases for user journey maps: ✔ Identifying user pain points and areas for improvement. ✔ Understanding the overall user experience. ✔ Aligning teams on user-centric strategies. Example: A journey map for an online shopping experience with stages like discovering a product, comparing options, making a purchase, receiving the product, and post-purchase support. 🍏 User Flow A user flow diagram focuses on the specific steps and interactions a user takes to complete a particular task within a product or service. It aims to ensure a smooth and efficient path for the user to achieve their goals. Components of user flow: ✔ Entry point: How the user begins the flow (e.g., landing on the homepage of an online shop). ✔ Steps: Sequential actions the user takes to complete the task (e.g., browsing products, adding to cart, checking out). ✔ Decision points: Moments where the user must make a choice (e.g., selecting a payment method). ✔ Exit point: The end of the flow where the user accomplishes their goal (e.g., order confirmation). Use cases: ✔ Designing and optimizing specific user tasks. ✔ Ensuring a logical and efficient user interface. ✔ Facilitating usability testing and feedback for end users. 3 Key differences between user journey and user flow: 1️⃣ Scope: User journey map: Broad, covers the entire user experience across multiple touchpoints and stages. User flow: Narrow, focuses on specific tasks and interactions within a product. 2️⃣ Focus: User journey map: Emphasizes user emotions, pain points, and overall experience. User flow: Emphasizes efficiency and logical progression of particular user tasks. 3️⃣ Aim: User journey map: Ideal for understanding the user's holistic experience and identifying strategic opportunities for improvement. User flow: Ideal for designing and refining specific features or processes within a product. 📕 Tutorials: ✔ User journey mapping in FigJam (YouTube): https://lnkd.in/djJR6by8 ✔ User flow design in FigJam (YouTube): https://lnkd.in/dcCnAH6R 🖼 User flow for the music application by Outcrowd. Creative Design Agency #UX #design #UI #uxdesign #userexperience #userjourney #customerjourney #userjourneymap #userflow
-
A client came to us frustrated. They had thousands of website visitors per day, yet their sales were flat. No matter how much they spent on ads or SEO, the revenue just wasn’t growing. The problem? Traffic isn’t the goal - conversions are. After diving into their analytics, we found several hidden conversion killers: A complicated checkout process – Too many steps and unnecessary fields were causing visitors to abandon their carts. Lack of trust signals – Customer reviews missing on cart page, unclear shipping and return policies, and missing security badges made potential buyers hesitate. Slow site speeds – A few-second delay was enough to make mobile users bounce before even seeing a product page. Weak calls to action – Generic "Buy Now" buttons weren’t compelling enough to drive action. Instead of just driving more traffic, we optimized their Conversion Rate Optimization (CRO) strategy: ✔ Simplified the checkout process - fewer clicks, faster transactions. ✔ Improved customer testimonials and trust badges for credibility. ✔ Improved page load speeds, cutting bounce rates by 30%. ✔ Revamped CTAs with urgency and clear value propositions. The result? A 28% increase in sales - without spending a dollar more on traffic. More visitors don’t mean more revenue. Better user experience and conversion-focused strategies do. Does your ecommerce site have a traffic problem - or a conversion problem? #EcommerceGrowth #CRO #DigitalMarketing #ConversionOptimization #WebsiteOptimization #AbsoluteWeb
-
70% of shopping carts get abandoned in 2025. (as per Wikipedia and SellersCommerce) Highest drop-offs seen in: – Luxury and jewelry (82%) – Home and furniture (79%) – Fashion and apparel (76%) When someone adds something to cart, they've mentally "claimed" it. But then checkout hits them with: → Surprise shipping costs → Mandatory account creation → Forms that feel like tax documents The average checkout has 23 different choices. When your brain gets overwhelmed, the default response is delay. Delay becomes.. "I'll come back later." And later never comes. The fix: → Keep decision points under 10 → Make guest checkout the default option → Add trust signals at checkout → Show total cost upfront Pro tip: Consider payment options like PayPal, Apple Pay, where the user doesn't manually need to enter their details. In India, there are apps that help shoppers do a quick checkout (like Shopflo, GoKwik, Razorpay Magic Checkout). Both these options have proven to increase conversion rate. Have you tried them on your store?
-
Crowning a New Term: “Iceberg Metrics” 🧊 ✨ I’m calling it: Iceberg Metrics represent KPIs that only reveal the tip of what’s really happening below the surface. Metrics like abandoned carts seem simple but often mask much more—checkout friction, hidden costs, trust issues, and more. To truly understand and optimize, we need to dig deeper. Here’s how to dive into the “iceberg” of abandoned cart rates: 1. Establish Baseline Metrics: Start by gathering data on current abandoned cart rates, session times, and bounce rates using heat maps and session recordings to see where users drop off. 2. Segment the Audience: Analyze users by behavior (first-time vs. repeat visitors, mobile vs. desktop) and traffic source (organic, paid, email). 3. Experiment Hypotheses: Develop hypotheses for abandonment reasons—shipping costs, checkout friction, distractions, or lack of trust signals—and test them. 4. Run A/B Tests: Test variations like simplifying the checkout process, showing shipping costs earlier, adding trust badges, or retargeting abandoned cart emails. 5. Use Heat Maps & Session Recordings: Examine user behavior in real time. Look for confusion or hesitation, where users hover, and whether they engage with key information. 6. Contextualize Results: Analyze how changes impact overall user flow. Did simplifying checkout help, or did other metrics like bounce rate increase? 7. Ecosystem Approach: Examine how tweaks affect the full journey—from product discovery to checkout—balancing short-term improvements with long-term goals like lifetime value. 8. Iterate: Refine solutions based on experiment findings and continuously optimize the customer journey. This one’s mine, folks! #IcebergMetrics #OwnIt #DataDriven #EcommerceOptimization #NewMetricAlert Cheers, Your cross-legged CAC and CLV buddy 🤗
-
🚨 Mastering IT Risk Assessment: A Strategic Framework for Information Security In cybersecurity, guesswork is not strategy. Effective risk management begins with a structured, evidence-based risk assessment process that connects technical threats to business impact. This framework — adapted from leading standards such as NIST SP 800-30 and ISO/IEC 27005 — breaks down how to transform raw threat data into actionable risk intelligence: 1️⃣ System Characterization – Establish clear system boundaries. Define the hardware, software, data, interfaces, people, and mission-critical functions within scope. 🔹 Output: System boundaries, criticality, and sensitivity profile. 2️⃣ Threat Identification – Identify credible threat sources — from external adversaries to insider risks and environmental hazards. 🔹 Output: Comprehensive threat statement. 3️⃣ Vulnerability Identification – Pinpoint systemic weaknesses that can be exploited by these threats. 🔹 Output: Catalog of potential vulnerabilities. 4️⃣ Control Analysis – Evaluate the design and operational effectiveness of current and planned controls. 🔹 Output: Control inventory with performance assessment. 5️⃣ Likelihood Determination – Assess the probability that a given threat will exploit a specific vulnerability, considering existing mitigations. 🔹 Output: Likelihood rating. 6️⃣ Impact Analysis – Quantify potential losses in terms of confidentiality, integrity, and availability of information assets. 🔹 Output: Impact rating. 7️⃣ Risk Determination – Integrate likelihood and impact to determine inherent and residual risk levels. 🔹 Output: Ranked risk register. 8️⃣ Control Recommendations – Prioritize security enhancements to reduce risk to acceptable levels. 🔹 Output: Targeted control recommendations. 9️⃣ Results Documentation – Compile the process, findings, and mitigation actions in a formal risk assessment report for governance and audit traceability. 🔹 Output: Comprehensive risk assessment report. When executed properly, this process transforms IT threat data into strategic business intelligence, enabling leaders to make informed, risk-based decisions that safeguard the organization’s assets and reputation. 👉 Bottom line: An organization’s resilience isn’t built on tools — it’s built on a disciplined, repeatable approach to understanding and managing risk. #CyberSecurity #RiskManagement #GRC #InformationSecurity #ISO27001 #NIST #Infosec #RiskAssessment #Governance