Cyber Protect Product RecommendationCase Study

Design an interface for Cyber Protect product recommendation

Amit Bajaj
6 min readJun 25, 2023

Background

Everyone in today’s world has a smartphone. Thanks to the internet connectivity, online activities of users has increased multi-folds. We spend most of their online and practically do everything online — right from consuming news, spending time on Social Media to doing online shopping and managing our finances through online transactions. With every advantage of the online world, there are disadvantages that we cannot even imagine and hence are exposed to numerous cyber threats. India One Insurance Pvt. Ltd. provides comprehensive Cyber insurance and provides multiple options that the customer can choose from to protect himself/herself from Cyber risks.

We currently provide insurance plans from Bajaj Allianz and HDFC Ergo. We will be adding more insurance companies for this product in times to come.

How it works?
India One Insurance Pvt. Ltd. works on recommendatory model for corporate employees. Unlike other web aggregators, India One Insurance Pvt. Ltd. gives one recommendation basis the user’s requirement and recommends one insurance company. Obviously, there are other options given to the user if the user wants to choose another insurer.

Role: UI/UX Designer
Scope: Primary/Secondary Research, Design Thinking, User Flow, Wireframing & Design Style-guide
Timeline: Around 1week
Tools: Figma

Research

The research goals revolve around understanding the needs, behaviors, and preferences of the target users in order to create effective and satisfying digital experiences. These are my research goals:

Cybercrime most target victims

  1. Children and teenagers: Younger individuals who are active online may face cyberbullying, online harassment, exposure to inappropriate content, and grooming by online predators. They may also be targeted for identity theft, phishing scams, or social media-related crimes.
  2. Young adults: This age group, typically in their late teens to early 30s, may encounter various types of cybercrime. They are active on social media, online dating platforms, and e-commerce websites, making them vulnerable to scams, identity theft, financial fraud, and hacking attempts.
  3. Middle-aged adults: Working professionals and individuals in their 30s to 50s may be targeted for cybercrimes related to their financial activities. They could fall victim to online banking fraud, investment scams, phishing attacks, or identity theft.
  4. Older adults: Senior citizens, typically aged 50 and above, may face specific cybercrime risks. They might be targeted for scams such as lottery fraud, online romance scams, tech support scams, or phishing attempts exploiting their limited familiarity with technology or lack of cybersecurity awareness.

43.24% between 19 and 45 years fell prey to cyber fraud in 2022–23

Even 16.53 per cent teenagers (14 to 18 years) fell victim to cyber crime, the data showed.
About 36.31 per cent of people in the 46 to 55 years age group were duped by cyber frauds, followed by around 3.91 per cent of people in the 56 to 65 years group

Number of cyber crimes reported across India in 2021, by leading state(in 1,000s)

Most commonly reported cyber crime categories in 2022, by number of individuals affected

Research Questions
Some general questions will be asked to the respondent before the assignment begins. Here’s the question:

  • On which platforms do you usually shop (app/web/M-web)?
  • How they do transactions online.
  • How much time do they spend on social media?
  • Are you familiar with the Cyber risks?

DESIGN PROCESS

The design process in UI/UX involves a series of steps that are followed to create a user-centered and visually appealing digital product. Here are the steps that I used for this design :

Methodology

The method used in this process is combination between primary and secondary research using a design thinking approach.

Design Thinking

Design thinking is a human-centered approach to problem-solving that used to create innovative and effective solutions. It is a process that focuses on understanding the needs and perspectives of the users, identifying the underlying problems, and exploring and testing different solutions.

When it comes to UI UX design, it can help designers create products that are intuitive, engaging, and user-friendly. Design thinking in UI/UX design involves the following stages:

1. Emphatize

The first stage of design thinking is to empathize with the users. These involves understanding their needs, goals, and pain points. It can be done through user research, surveys, interviews, and observations. For this research I used zoom collect data from the respondents.

Secondary Research

Secondary research in UI/UX refers to the process of collecting and analyzing existing data and information that has been previously gathered by other sources. This can include published articles, academic research, industry reports, user feedback, and competitor analysis.

By looking at reviews of articles, case studies, etc, I found several problems.

Pain Points
Receiving phishing emails
Receiving fake job offers on WhatsApp
Receiving missed calls on WhatsApp from international numbers
His social media account hacked multiple times by unknown individuals.

From the data that has been obtained, I collect some pain points from every users.

2. Define

The next step is define the problem. This involves framing the problem statement, setting goals, and identifying the scope of the project. During this phase, I will conduct user interviews, surveys gather insights and feedback. Also analyze user data and behavior to identify patterns and pain points.

User Persona

The purpose of creating user personas is to better understand the users of a product or service. I also used this to inform my design decisions, considering how the persona would use the product or service, what features and functionality of user’s, and how they would interact with the interface.

Wireframes Due to time constraints, I will pass on the wireframes process.

Mockups

Victim story

40-year-old realtor from Panchkula got a call from someone saying that they are from ITBP. The “alert” businessman even asked for their picture and they sent their “fake” ID card. The fraudsters said that they want parts for their ITBP centre and want to place an order. To appear genuine, they even paid an advance of Rs 10,000. When the order was ready, they made the businessman download playstore application “Any desk” and shared a code. With the app, the fraudsters got control of his device and stole Rs 1.34 lakh.

Figma URL

https://www.figma.com/proto/V3Tju0Vk5T4HDEC5el4PTL/persona_template_-_game__yellow_?page-id=0%3A1&type=design&node-id=13-1218&viewport=-602%2C-158%2C0.13&scaling=min-zoom&starting-point-node-id=22%3A1949&mode=design

MP4 URL :-

https://drive.google.com/drive/u/1/folders/1jcBHi4j1N4Iw-kTboaDLwS9yFj-Aerae

WHAT I LEARNED
During this portfolio process, one of the things I learned was the user’s point of view such as how to find a good solution for them so their experience in using the product becomes more efficient also enjoyable.

I realized that there is much to be improved from this case study so I really appreciate any constructive criticism and suggestions from all of you who took the time to read this article.

Thank you in advance!

--

--