SlideShare a Scribd company logo
Human With Machine:
Harnessing the power of
UX for Securing Data
Ranjeet Tayi
Segment UX lead - Data Security & Catalog Products
Informatica, USA
@ranzeeth
Dealing with fear and badly
managed risk
and many more data breaches…
Data 3.0
Data 2.0Data 1.0
Specific business
applications
Enterprise wide
business processes
Digital Transformation
Machine
Learning/AI
1 billion workers
will be assisted by
machine learning
or AI
15.3 zettabytes
per year
in global data
center traffic
Explosion
in Data Volume
20 billion
connected devices
New Data Types
(mobile, social, IoT)
325 million
business data
users and growing
New
Users
Over 92% of data
center traffic
will come from
the Cloud
Data in
the Cloud
Data 3.0 – Trending by 2020
Regulations
Growing regulations
Security is more important than ever
Perimeter Defense Isolated Data Security Data Centric
10 Years ago 5 Years ago Current & Future
Social:
155-120-2189
DOB:
05-04-1985
Visa
1232 8232 4389Exp: 10May 2020
Where is your sensitive data?
Discover Detect Protect
UX Challenges
• New Market Category
• No users / limited access to users
• Unsolved problem
• Dealing with Fear Factor
• Designing Intelligence
Security Challenges
• Lack of Visibility
• Slow inaccurate detection
• Inability to prioritization
• In-adequate Protection
• Managing policies
UXSecurity
Security vs UX
Security
Privacy
User
Experience
Challenges are ingredients of UX
4 UX Super Powers
• UX Research & Co-Design
• Art of Data & Intelligence
• Design-Led Innovation
• Dealing with rapid UX
UX
DevPM
QA
Doc
Seller
Buyer
User
9
Everyone is a designer.
Actively involve all stakeholders in the design process
Data Visual
Story
Actionable
Insights
UX is all about telling powerful actionable
stories with trust worthy data.
Automation
?
Risk of deskilling skills
AI +Human
Fully automated had high risk of failure of machine critical
Mixed Initiative
AI-driven Data Privacy & Protection
Data Discovery
Data Parsing
Data Classification
Data Matching
Anomaly DetectionRecommendations
Structure Discovery
User Behavior Analytics
Sensitive Records
Observed: 6.2K | Expected 120
Sensitive Fields
Observed: 113 | Expected 20
Data Domains
Observed: 17 | Expected 3
Location
Observed: Boston, USA
Sensitive Events
Observed: 28 | Expected 1
Time of Day
Observed: 10:10PM
Day of Week
Observed: Sunday
Data Stores
Observed: 2 | Expected 1
Adam Smith
Director, Sales
Redwood City, USA
80 Unexpected Data Store
Observed: Oracle_CRM
Risk Score: Anomaly Detection:80
Jan Feb Mar Apr May Jun Jly Aug Sept Oct Nov Dec 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
User behavior analytics
20%
80%
Hidden Risk
Production
Non Production
Sensitive
Data
Hidden Risk
Dynam
ic Masking
***-**-1120
JOHN DOE
912-67-6345
ADAM SMITH
Persistent Masking
bgfassrasdk
133wert562t
Encryption
SOCIAL SECURITY
081-05-1120
JOHN DOE
Protection Method
Design-led innovation
Novel Innovations
Risk Simulation Plan
Human in the loop.
Tell me what to Protect?
Creating concept UX using AI by Design
The rapid UX… Quickly Build, Land and Expand
Think
Make
Check
Discover
Detect
Protect
Privacy and Protect
1+ 2+ 3+ 4+
Version / Time
Its ok to do new mistakes
Don’t jump into design solution without knowing
where these user stories are coming from.
?
Everyone is a designer.
Engage all stakeholders and facilitate.
UX should take a front seat to drive
innovation, don’t hide behind monitors.
Useful
Credible
DesirableUseable
AccessibleFindable
UXValuable
Security is a new design principle not a requirement.
Secure
Security + Privacy
We always design for
user persons, why not
an evil persona?
Evil Persona Name:
Occupation:
Location:
Age:
Goals:
Unknown
Hacker
Unknown
25-45 Years
Hack the systems to
steal the sensitive information.
Look for loopholes so that he can break
things easily.
Fear:
Motivation:
Get arrested and go to Jail
To remain anonymous and illegally access
confidential systems to make money or
defame organizations
Skills: Expert in hacking complex systems
Experiments on various systems and
technologies.
Expert in hiding his identity & being
anonymous.
Tools: Multiple computers, hacking tools, debug
tools, cheat code, virus generators, etc.
Ranjeet Tayi
www.ranjeeth.com
@ranzeeth
Thanks!
Lets design this world secure...
Images:Pexels

More Related Content

What's hot

How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018
Tyrone Systems
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresSheloeloe
 
Emerging Technologies for Experiential and Immersive Learning
Emerging Technologies for Experiential and Immersive LearningEmerging Technologies for Experiential and Immersive Learning
Emerging Technologies for Experiential and Immersive Learning
Training Industry Conference & Expo
 
Future of IT
Future of ITFuture of IT
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Cognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligenceCognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligence
IBM Watson
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security NCC Group
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365
Beyondkey
 
CIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric FutureCIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric Future
CloudIDSummit
 
The BYOD Dilemma
The BYOD DilemmaThe BYOD Dilemma
The BYOD Dilemma
Dell World
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Thanh-Vy Hua
 
Applied AI Use Cases
Applied AI Use Cases Applied AI Use Cases
Applied AI Use Cases
Swathi Young
 
To Sink or Swim? That is the Question!
To Sink or Swim? That is the Question!To Sink or Swim? That is the Question!
To Sink or Swim? That is the Question!
Jesper Lowgren
 
Big Data Analytics [UTC]
Big Data Analytics [UTC]Big Data Analytics [UTC]
Big Data Analytics [UTC]
Matouš Havlena
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
Software Park Thailand
 
Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the CloudDATAVERSITY
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
Alfred V Gilbert
 
Intelligent enterprise: Cognitive Business Presentation from World of Watson
Intelligent enterprise: Cognitive Business Presentation from World of WatsonIntelligent enterprise: Cognitive Business Presentation from World of Watson
Intelligent enterprise: Cognitive Business Presentation from World of Watson
Nancy Pearson
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
IDC Italy
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
IndianAppDevelopers
 

What's hot (20)

How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids Countermeasures
 
Emerging Technologies for Experiential and Immersive Learning
Emerging Technologies for Experiential and Immersive LearningEmerging Technologies for Experiential and Immersive Learning
Emerging Technologies for Experiential and Immersive Learning
 
Future of IT
Future of ITFuture of IT
Future of IT
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Cognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligenceCognitive Business: Where digital business meets digital intelligence
Cognitive Business: Where digital business meets digital intelligence
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365
 
CIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric FutureCIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric Future
 
The BYOD Dilemma
The BYOD DilemmaThe BYOD Dilemma
The BYOD Dilemma
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Applied AI Use Cases
Applied AI Use Cases Applied AI Use Cases
Applied AI Use Cases
 
To Sink or Swim? That is the Question!
To Sink or Swim? That is the Question!To Sink or Swim? That is the Question!
To Sink or Swim? That is the Question!
 
Big Data Analytics [UTC]
Big Data Analytics [UTC]Big Data Analytics [UTC]
Big Data Analytics [UTC]
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
Big Data & the Cloud
Big Data & the CloudBig Data & the Cloud
Big Data & the Cloud
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Intelligent enterprise: Cognitive Business Presentation from World of Watson
Intelligent enterprise: Cognitive Business Presentation from World of WatsonIntelligent enterprise: Cognitive Business Presentation from World of Watson
Intelligent enterprise: Cognitive Business Presentation from World of Watson
 
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsNuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 

Similar to Human With Machine: Harnessing the power of UX for Securing Data

Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperativeTrillium Software
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
venkatvajradhar1
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
LaLaBlaGhvgT
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage risk
Karan Sachdeva
 
The UX of Data Security Intelligence
The UX of Data Security IntelligenceThe UX of Data Security Intelligence
The UX of Data Security Intelligence
Ranjeet Tayi
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
RapidValue
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
- Mark - Fullbright
 
Shadow IT
Shadow ITShadow IT
Shadow IT
PriyaPandey162
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Avinash Ramineni
 
Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...
LeMeniz Infotech
 
Future of Big Data
Future of Big DataFuture of Big Data
Future of Big Data
IRJET Journal
 
Opportunities derived by AI
Opportunities derived by AIOpportunities derived by AI
Opportunities derived by AI
Amazon Web Services
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
Positive Hack Days
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
 
The computing age
The computing ageThe computing age
The computing age
Didier Mamma
 

Similar to Human With Machine: Harnessing the power of UX for Securing Data (20)

Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperative
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage risk
 
The UX of Data Security Intelligence
The UX of Data Security IntelligenceThe UX of Data Security Intelligence
The UX of Data Security Intelligence
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
 
Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...Anonymous two factor authentication in distributed systems certain goals are ...
Anonymous two factor authentication in distributed systems certain goals are ...
 
Future of Big Data
Future of Big DataFuture of Big Data
Future of Big Data
 
Opportunities derived by AI
Opportunities derived by AIOpportunities derived by AI
Opportunities derived by AI
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
The computing age
The computing ageThe computing age
The computing age
 

More from Ranjeet Tayi

Creating products for customer delight using KANO
Creating products for customer delight using KANOCreating products for customer delight using KANO
Creating products for customer delight using KANO
Ranjeet Tayi
 
Humanizing privacy with power of user experience (UX)
Humanizing privacy with power of user experience (UX)Humanizing privacy with power of user experience (UX)
Humanizing privacy with power of user experience (UX)
Ranjeet Tayi
 
Make thins smart and connect it with internet
Make thins smart and connect it with internetMake thins smart and connect it with internet
Make thins smart and connect it with internet
Ranjeet Tayi
 
Designing your UX Career
Designing your UX CareerDesigning your UX Career
Designing your UX Career
Ranjeet Tayi
 
Impact of Design Lanagauge
Impact of Design LanagaugeImpact of Design Lanagauge
Impact of Design Lanagauge
Ranjeet Tayi
 
Event Management as Hobby
Event Management as HobbyEvent Management as Hobby
Event Management as Hobby
Ranjeet Tayi
 
Responsive, Scalable and Liquid Design
Responsive, Scalable and Liquid DesignResponsive, Scalable and Liquid Design
Responsive, Scalable and Liquid Design
Ranjeet Tayi
 
BitCoining Experience
BitCoining ExperienceBitCoining Experience
BitCoining Experience
Ranjeet Tayi
 
"INTERNET OF THINGS" - The Changing Face of Digital Marketing.
"INTERNET OF THINGS" - The Changing Face of Digital Marketing."INTERNET OF THINGS" - The Changing Face of Digital Marketing.
"INTERNET OF THINGS" - The Changing Face of Digital Marketing.
Ranjeet Tayi
 
Future of user interface design
Future of user interface designFuture of user interface design
Future of user interface designRanjeet Tayi
 
Facebook for OBAMA & Face book for ME
Facebook for OBAMA & Face book for MEFacebook for OBAMA & Face book for ME
Facebook for OBAMA & Face book for ME
Ranjeet Tayi
 
Upa2010 u xcamp_europe_overview
Upa2010 u xcamp_europe_overviewUpa2010 u xcamp_europe_overview
Upa2010 u xcamp_europe_overviewRanjeet Tayi
 
UPA 2010 Munich & UX Camp Europe - Overview
UPA 2010 Munich & UX Camp Europe - OverviewUPA 2010 Munich & UX Camp Europe - Overview
UPA 2010 Munich & UX Camp Europe - Overview
Ranjeet Tayi
 

More from Ranjeet Tayi (14)

Creating products for customer delight using KANO
Creating products for customer delight using KANOCreating products for customer delight using KANO
Creating products for customer delight using KANO
 
Humanizing privacy with power of user experience (UX)
Humanizing privacy with power of user experience (UX)Humanizing privacy with power of user experience (UX)
Humanizing privacy with power of user experience (UX)
 
Make thins smart and connect it with internet
Make thins smart and connect it with internetMake thins smart and connect it with internet
Make thins smart and connect it with internet
 
Designing your UX Career
Designing your UX CareerDesigning your UX Career
Designing your UX Career
 
Impact of Design Lanagauge
Impact of Design LanagaugeImpact of Design Lanagauge
Impact of Design Lanagauge
 
Event Management as Hobby
Event Management as HobbyEvent Management as Hobby
Event Management as Hobby
 
Responsive, Scalable and Liquid Design
Responsive, Scalable and Liquid DesignResponsive, Scalable and Liquid Design
Responsive, Scalable and Liquid Design
 
Usability ranjeet
Usability ranjeetUsability ranjeet
Usability ranjeet
 
BitCoining Experience
BitCoining ExperienceBitCoining Experience
BitCoining Experience
 
"INTERNET OF THINGS" - The Changing Face of Digital Marketing.
"INTERNET OF THINGS" - The Changing Face of Digital Marketing."INTERNET OF THINGS" - The Changing Face of Digital Marketing.
"INTERNET OF THINGS" - The Changing Face of Digital Marketing.
 
Future of user interface design
Future of user interface designFuture of user interface design
Future of user interface design
 
Facebook for OBAMA & Face book for ME
Facebook for OBAMA & Face book for MEFacebook for OBAMA & Face book for ME
Facebook for OBAMA & Face book for ME
 
Upa2010 u xcamp_europe_overview
Upa2010 u xcamp_europe_overviewUpa2010 u xcamp_europe_overview
Upa2010 u xcamp_europe_overview
 
UPA 2010 Munich & UX Camp Europe - Overview
UPA 2010 Munich & UX Camp Europe - OverviewUPA 2010 Munich & UX Camp Europe - Overview
UPA 2010 Munich & UX Camp Europe - Overview
 

Recently uploaded

Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
ameli25062005
 
Mohannad Abdullah portfolio _ V2 _22-24
Mohannad Abdullah  portfolio _ V2 _22-24Mohannad Abdullah  portfolio _ V2 _22-24
Mohannad Abdullah portfolio _ V2 _22-24
M. A. Architect
 
Top Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdfTop Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdf
PlanitIsrael
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
boryssutkowski
 
7 Alternatives to Bullet Points in PowerPoint
7 Alternatives to Bullet Points in PowerPoint7 Alternatives to Bullet Points in PowerPoint
7 Alternatives to Bullet Points in PowerPoint
Alvis Oh
 
White wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva TschoppWhite wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva Tschopp
Mansi Shah
 
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
7sd8fier
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
h7j5io0
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
jyz59f4j
 
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
708pb191
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
ameli25062005
 
projectreportnew-170307082323 nnnnnn(1).pdf
projectreportnew-170307082323 nnnnnn(1).pdfprojectreportnew-170307082323 nnnnnn(1).pdf
projectreportnew-170307082323 nnnnnn(1).pdf
farazahmadas6
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
garcese
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
9a93xvy
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
一比一原版(毕业证)长崎大学毕业证成绩单如何办理
一比一原版(毕业证)长崎大学毕业证成绩单如何办理一比一原版(毕业证)长崎大学毕业证成绩单如何办理
一比一原版(毕业证)长崎大学毕业证成绩单如何办理
taqyed
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
smpc3nvg
 
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Mansi Shah
 

Recently uploaded (20)

Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
 
Mohannad Abdullah portfolio _ V2 _22-24
Mohannad Abdullah  portfolio _ V2 _22-24Mohannad Abdullah  portfolio _ V2 _22-24
Mohannad Abdullah portfolio _ V2 _22-24
 
Top Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdfTop Israeli Products and Brands - Plan it israel.pdf
Top Israeli Products and Brands - Plan it israel.pdf
 
Borys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior designBorys Sutkowski portfolio interior design
Borys Sutkowski portfolio interior design
 
7 Alternatives to Bullet Points in PowerPoint
7 Alternatives to Bullet Points in PowerPoint7 Alternatives to Bullet Points in PowerPoint
7 Alternatives to Bullet Points in PowerPoint
 
White wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva TschoppWhite wonder, Work developed by Eva Tschopp
White wonder, Work developed by Eva Tschopp
 
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
 
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
一比一原版(LSE毕业证书)伦敦政治经济学院毕业证成绩单如何办理
 
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
一比一原版(UAL毕业证书)伦敦艺术大学毕业证成绩单如何办理
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
 
projectreportnew-170307082323 nnnnnn(1).pdf
projectreportnew-170307082323 nnnnnn(1).pdfprojectreportnew-170307082323 nnnnnn(1).pdf
projectreportnew-170307082323 nnnnnn(1).pdf
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
一比一原版(毕业证)长崎大学毕业证成绩单如何办理
一比一原版(毕业证)长崎大学毕业证成绩单如何办理一比一原版(毕业证)长崎大学毕业证成绩单如何办理
一比一原版(毕业证)长崎大学毕业证成绩单如何办理
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
 
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
 

Human With Machine: Harnessing the power of UX for Securing Data