PASSION PROJECT

Preventing & Protecting you from Scams

Ping is a mobile app aimed at preventing real-time scams via calls through AI and virtual assistant intervention and minimizing post scam impact through action plans. This is a passion project and it hits home as I have seen several of my dear ones become a victim of scams.

Role

Primary Research & Analysis
Conceptualization
Visual Design
User Testing

Timeline

November' 22

Team

2 Design Researchers
2 Product Designers

Problem

Any security-protected system's weakest link is people. Scammers, therefore, exploit the psychological aspects and idiosyncrasies of humans. So, even if people are aware, they fall for scams as the scammer manipulates and creates a sense of urgency to take action without giving them time.

How might we help people to support/not fall prey to scams?

Solution

A mobile application that aids the victim in identifying real-time scams that occur via phone calls and advising them on the mitigation measures that need to be taken based on the urgency of the situation after any scam has occurred.

View Final Design

Design Process

The design process followed was: discover - define - ideate - test - prototype - test. The approach taken at each stage depended on the goal and what was required at that stage.

Discover

SECONDARY RESEARCH
01 RESEARCH/ DESK

Understanding the scenario

Literary reviews were conducted to understand the current scenario and modes of scams, how it becomes successful, and what are the current solutions and technologies in the market. Due to the limited timeframe and inability to find survey participants, we decided to triangulate findings using surveys performed via government organizations.
Impact

2.8 M
consumers reported fraud
$5.8 B
lost in fraud
70%
increase over the last year

Current Solutions

Most solutions on the market cater to pre-scam precautions. However, this is ineffective as scammers come up with novel social engineering tricks. Solutions for during-scam are very limited and don't provide the required intervention that breaks the chain of thought of the victim. For post-scam actions, there are online resources providing the necessary information. However, it's widespread and a victim may not find the right information at the right time. There are no effective technologies in the market that understand human behavior and provide real-time support for social engineering attacks.

How are scammers successful?

Scammers exploit the psychological, influential, and emotional aspects and idiosyncrasies of humans. So, even if people are aware, they fall for scams as the scammer manipulates and creates a sense of urgency, and threatens the victim into taking action without giving them time to think properly.
TARGET AUDIENCE

For whom?

Based on the research conducted, the target audience was finalized. The solution shall be for Indian elders above 75 with limited knowledge of digital devices.

survey

Understanding & defining the customer base

To understand the customer base, their awareness, shopping, storage and wastage patterns, a survey was conducted. It received 38 responses. We understood that, contrary to our belief, the problem affects people from all age groups.

A quote that hit us most was

"I literally hate it so fucking much and want to cry every time I throw something away that gets wasted. There is a lot of guilt involved with it for me so I’m using that more now as motivation to change."
User interview
01 RESEARCH/ INTERVIEW

Getting into depth

We conducted user interviews (questions) of 8 people with diverse backgrounds (7 scammed victims and 1 ethical hacker) who have been scammed in order to understand their experience, emotions, loss and what led to them being scammed. The ethical hacker helped us to understand the current scenarios, the methods that are currently available and why scammers tend to be successful.

"I felt really helpless, and the scammer asked me to shut away from all my contacts. It was like..he was controlling each step and thought.

I lost 2000 USD in total..."
- Impersonation Scam Victim Interviewee, Immigrant

"I got a message from a supposedly "UPS" number, asking me to edit my details. Coincidentally, I was waiting for my UPS package at that time and thought this was legit. Even the page looked like a UPS website. Luckily, I checked the URL again and called the customer care...It was close!"
- Interviewee

KEY INSIGHTS
02 INSIGHTS

What was uncovered...

After completing the research, the team commenced the process of coding the interviews and key findings from secondary research, while identifying key themes through affinity mapping. It was followed by synthesizing research insights to translate to ideas.

Major insights were:

Exploiting Trust

Scammers take advantage of people's vulnerabilities such as psychological factors and exploit them by earning their trust leading to losing their valuables despite the strong digital security solutions employed.

Human Gap in Scam Tech

Several technologies are prevalent in the market to mitigate scams. However, there are no effective technologies in the market that understand human behavior and provide real-time support for scams.

Overload in Scam Responses

Victims often experience overwhelming emotions such as anger, regret etc. after being scammed. When trying to respond appropriately, they often face information overload, resulting in delays or incomplete actions against scams.

Define

ARCHETYPES

This is for...

Based on the insights, archetypes were created based on the customer’s awareness on the impact and the readiness to act upon. The project primarily focuses on the Essentialists and the Enthusiasts as they are willing to adopt new technology.

Hero
“I hate it because of the environmental impacts and the lack of food in other countries"
Ally
“I always try to never waste food as it is a lot of expenses, and time consuming"
Trickster
"I work long hours, and take care of my family. Being mindful of food is time consuming."
Ignorant
"Vegetables and food in general here are very cheap, so I don't mind if it goes bad"
FINALIZING GOAL
03 SCOPE

Which direction?

In the realm of human susceptibility to exploitation, existing technologies fall short in comprehending human behavior and offering real-time assistance against social engineering attacks. Consequently, our team decided to investigate three pivotal areas:

Pre-Scam
How can we raise awareness about scams?
During-Scam
How can we support victims while they are ensnared by scammers?
Post-Scam
How can we minimize the aftermath of a scam?

Given the prevalence of scams, it's noteworthy that 70% of scammers employ mobile phones as their primary means of contacting potential victims, as reported in the Consumer Sentinel Network Data Book. Consequently, we have chosen to concentrate our efforts on combating scams perpetrated through mobile devices.

Ideate

IDEATION & BRAINSTORMING
04 IDEATION

Exploring Ideas

How can we raise awareness about scams?
Enabling individuals to anonymously share their experiences and compile and tag scam-related information such as numbers and messages.

How can we support victims while they are ensnared by scammers?
Providing real-time assistance during ongoing scams while safeguarding user privacy.

How can we minimize the aftermath of a scam?
Offering a comprehensive solution for victims to quickly mitigate the consequences of a scam.

Based on the statements, 2 ideation sessions (with the team & with a subject-matter expert) were conducted. Further, the final idea was selected through an internal discussions and voting based on impact and effort.

Design

THE IDEA
05 SELECTED IDEA

Timely and Humanized Safeguarding Against Scams

The selected design solution prioritizes addressing both immediate and post-scam situations due to the persistent growth of scams, despite existing awareness solutions.  It will have two modules: one for detecting scams during phone calls and another for providing post-scam support and action plans for all types of scams.

A mobile application featuring virtual assistance for real-time scam assessment and assistance after falling victim to a scam.

Why Ping?

While a range of technologies is available for safeguarding consumers and digital systems, such as machine learning algorithms for predicting suspicious numbers, VPNs, intrusion detection systems, and advanced filtering mechanisms, there is currently a notable gap in the market. This gap pertains to the absence of effective technologies capable of comprehending human behavior and offering real-time assistance against social engineering attacks, which often exploit humans as the easiest and weakest link.

How it works?

Fraudsters exhibit a high level of adaptability, tailoring their conversational approach to match the targeted victim's responses. Despite their ability to adjust communication styles, they consistently adhere to a predefined script/pattern. The system leverages word embedding techniques from natural language processing to detect scam signatures within conversations, akin to how malware signatures function in antivirus software.

To implement call recording in our solution, we must address privacy rights. In the United States, 39 states require only one-party consent, meaning the person initiating the recording must consent. In the other 11 states, two-party consent is necessary, so we include a disclaimer to ensure compliance and respect privacy rights.

design explorations & iterations
06 DESIGN EXPLORATIONS

Wireframes

Once the idea and layout were finalized, various variations of the idea were explored through sketches. The following image shows the final sketch.

Task based cognitive walkthrough
07 COGNITIVE WALKTHROUGH

Understanding the learnability

A task based cognitive walkthrough was conducted as it helps to ensure that the app's interface aligns with user expectations and aids them in combating scams effectively, enhancing the overall user experience.

1. Revised User-Focused Alert Approach
Initially aiming for minimal interruptions, the 2–3-minute threshold proved ineffective due to scammers' ability to control conversation speed and delay malicious intent. Alert messages with haptic feedback now occur based on scam likelihood (e.g., 30%, 60%) reducing cognitive load. Users can also disable additional alerts enhancing autonomy.

Before and after design for scam alerts
WIREFRAMES AND FURTHER EXPLORATIONS
08 WIREFRAMES

Converting sketches to wireframes

USABILITY TESTING
09 USER TESTING

Improvising the product based on feedback

Think-aloud sessions were conducted for the application with 6 participants. 2 tasks were provided to the participants to perform:
1. Receive a call flagged by Ping as a potential scam from an unknown number. Utilize the app to protect yourself.
2. You've fallen victim to a Discover credit card scam. Use the app to discover the necessary steps for mitigating the loss.

1. Better user autonomy
Earlier, the on-call overlay initiated the "get assistance" option only after the analysis surpasses the 60% threshold. To enhance the user experience, it is vital to offer users control to access assistance at their discretion, rather than solely relying on an automatic trigger at the 60% mark.

2. Lack of proper feedback
Users previously experienced the need to repeatedly check the app for analysis completion, causing stress and frustration and there was also no visual indication if the analysis is still going on. To address this, haptic feedback during different levels as well as a visual indicator was added.

"Hm..is it still analyzing or is it only 40%?"

Introducing Ping!

FINAL DESIGN
10 FINAL DESIGN

Introducing Ping: Timely and Humanized Safeguarding Against Scams

Mobile App

Introducing the app to a new user

The app's "during scam" module presents an interaction experience uncommon in most apps. To ensure users are well-prepared, a brief "how-to" guide is provided during onboarding.

Impact:
Help users onboard quickly with minimal hassles and maximum impact and knowledge.

During a phone call scam

Scammers often induce urgency and panic through scripted actions. The app breaks this cycle by analyzing calls, delivering warning messages via haptic feedback at key intervals. Once the scam likelihood exceeds 60%, virtual assistant Harper intervenes to guide the user, promoting informed decisions and safeguarding personal information.

Impact:
Reduce scams, enhance user confidence, and ensure privacy while empowering users to make informed decisions during suspicious calls, potentially leading to cost savings and market differentiation.

Support post-scam

This module assists users who have fallen victim to scams by offering a time-sensitive, step-by-step action plan tailored to the nature of the scam.

Impact:
Immediate, concise guidance during overwhelming situations, reducing the stress and time required to research and determine the necessary steps for recovery.

Reflections
11 REFLECTION

Get inspiration, iterate & move fast!

1. Get inspiration
A significant challenge we faced was addressing privacy concerns when recording phone calls and obtaining consent from all parties involved. To overcome this obstacle, we examined how similar mass-audience recording applications handle these issues and tailored their approaches to our application's unique use case.

2. Iterate and update
We accomplished the project within a month, prioritizing swift iteration, regular updates, and actively seeking feedback from potential users.

Additionally, we had the opportunity to present the project at the CMD-IT/ACM Richard Tapia Celebration of Diversity in Computing Conference, where we received valuable insights and had interesting discussions regarding how we can protect the vulnerable population!

OverviewDiscoverKey InsightsDefineIdeateDesignUsability TestingFinal DesignReflections