{"id":1826,"date":"2020-11-19T13:48:52","date_gmt":"2020-11-19T13:48:52","guid":{"rendered":"https:\/\/securancy.com\/labs\/smart-interface-design-patterns-the-checklists\/"},"modified":"2020-11-19T13:50:32","modified_gmt":"2020-11-19T13:50:32","slug":"smart-interface-design-patterns-the-checklists","status":"publish","type":"post","link":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/","title":{"rendered":"Smart Interface Design Patterns, The Checklists"},"content":{"rendered":"<p>Smashing Magazine got a little gift for you this week, they released their <a href=\"https:\/\/www.dropbox.com\/s\/ve6m3ngp5rmgu74\/interface-design-patterns-checklist-2020.pdf?dl=0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>\u201cSmart Interface Design Patterns Checklists\u201d<\/strong><\/a>. These&nbsp;<strong>free PDF checklists<\/strong> are based on the work Samshing Magazine has been doing for many years, exploring and examining examples of desktop and mobile interfaces. Learning what works and what doesn\u2019t in usability tests and user interviews.<\/p>\n<p>We hope you\u2019ll find them useful \u2014 let us know!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1827 size-full lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist.png\" alt=\"\" width=\"2004\" height=\"1122\" data-sizes=\"auto\" data-srcset=\"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist.png 2004w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-300x168.png 300w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-1024x573.png 1024w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-768x430.png 768w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-1536x860.png 1536w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-380x213.png 380w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-20x11.png 20w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-190x106.png 190w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-760x426.png 760w, https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/Hamburger-Design-Checklist-1140x638.png 1140w\" sizes=\"auto, (max-width: 2004px) 100vw, 2004px\" \/><\/p>\n<blockquote><p><em><a href=\"https:\/\/www.dropbox.com\/s\/ve6m3ngp5rmgu74\/interface-design-patterns-checklist-2020.pdf?dl=0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u201cSmart Interface Design Patterns\u201d<\/a>, a free PDF deck with 150+ questions to ask when designing and building any component.<\/em><\/p><\/blockquote>\n<p>If you have friends and colleagues who would find these checklists useful, we would love for you to kindly point them to&nbsp;<a href=\"https:\/\/www.smashingmagazine.com\/\" rel=\"nofollow\">this post<\/a>, so they can sign up and get their own copy.<\/p>\n<p><em>Take care!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smashing Magazine got a little gift for you this week, they released their \u201cSmart Interface Design Patterns Checklists\u201d. These&nbsp;free PDF checklists are based on the work Samshing Magazine has been doing for many years, exploring and examining examples of desktop and mobile interfaces. Learning what works and what doesn\u2019t in usability tests and user interviews.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1831,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[120],"tags":[],"class_list":["post-1826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks-nl"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blog: Smart Interface Design Patterns, The Checklists<\/title>\n<meta name=\"description\" content=\"&quot;Smart Interface Design Patterns, The Checklists&quot; is a great read-up and provides a fresh view on what should be considered by any web developing team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blog: Smart Interface Design Patterns, The Checklists\" \/>\n<meta property=\"og:description\" content=\"&quot;Smart Interface Design Patterns, The Checklists&quot; is a great read-up and provides a fresh view on what should be considered by any web developing team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/\" \/>\n<meta property=\"og:site_name\" content=\"Securancy Intelligence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/securancy\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T13:48:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-19T13:50:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Securancy\" \/>\n<meta name=\"twitter:site\" content=\"@Securancy\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/securancy.com\\\/#\\\/schema\\\/person\\\/0f72e791ab55b1ff52f06c38f6ff0998\"},\"headline\":\"Smart Interface Design Patterns, The Checklists\",\"datePublished\":\"2020-11-19T13:48:52+00:00\",\"dateModified\":\"2020-11-19T13:50:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/\"},\"wordCount\":129,\"publisher\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/download.png\",\"articleSection\":[\"Tips &amp; Tricks\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/\",\"url\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/\",\"name\":\"Blog: Smart Interface Design Patterns, The Checklists\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/download.png\",\"datePublished\":\"2020-11-19T13:48:52+00:00\",\"dateModified\":\"2020-11-19T13:50:32+00:00\",\"description\":\"\\\"Smart Interface Design Patterns, The Checklists\\\" is a great read-up and provides a fresh view on what should be considered by any web developing team.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#primaryimage\",\"url\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/download.png\",\"contentUrl\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/download.png\",\"width\":300,\"height\":168},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/smart-interface-design-patterns-the-checklists\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/securancy.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smart Interface Design Patterns, The Checklists\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/securancy.com\\\/#website\",\"url\":\"https:\\\/\\\/securancy.com\\\/\",\"name\":\"Securancy Intelligence\",\"description\":\"Digital Architects\",\"publisher\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/securancy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/securancy.com\\\/#organization\",\"name\":\"Securancy Intelligence\",\"url\":\"https:\\\/\\\/securancy.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/securancy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Securancy-logo_horizontal_color@2x-2.png\",\"contentUrl\":\"https:\\\/\\\/securancy.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Securancy-logo_horizontal_color@2x-2.png\",\"width\":270,\"height\":56,\"caption\":\"Securancy Intelligence\"},\"image\":{\"@id\":\"https:\\\/\\\/securancy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/securancy\",\"https:\\\/\\\/x.com\\\/Securancy\",\"https:\\\/\\\/www.instagram.com\\\/securancynl\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/securancy\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/securancy.com\\\/#\\\/schema\\\/person\\\/0f72e791ab55b1ff52f06c38f6ff0998\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/securancy.com\"],\"url\":\"https:\\\/\\\/securancy.com\\\/nl\\\/labs\\\/author\\\/supportsecurancy-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blog: Smart Interface Design Patterns, The Checklists","description":"\"Smart Interface Design Patterns, The Checklists\" is a great read-up and provides a fresh view on what should be considered by any web developing team.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/","og_locale":"nl_NL","og_type":"article","og_title":"Blog: Smart Interface Design Patterns, The Checklists","og_description":"\"Smart Interface Design Patterns, The Checklists\" is a great read-up and provides a fresh view on what should be considered by any web developing team.","og_url":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/","og_site_name":"Securancy Intelligence","article_publisher":"https:\/\/www.facebook.com\/securancy","article_published_time":"2020-11-19T13:48:52+00:00","article_modified_time":"2020-11-19T13:50:32+00:00","og_image":[{"width":300,"height":168,"url":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Securancy","twitter_site":"@Securancy","twitter_misc":{"Geschreven door":"admin","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#article","isPartOf":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/"},"author":{"name":"admin","@id":"https:\/\/securancy.com\/#\/schema\/person\/0f72e791ab55b1ff52f06c38f6ff0998"},"headline":"Smart Interface Design Patterns, The Checklists","datePublished":"2020-11-19T13:48:52+00:00","dateModified":"2020-11-19T13:50:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/"},"wordCount":129,"publisher":{"@id":"https:\/\/securancy.com\/#organization"},"image":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#primaryimage"},"thumbnailUrl":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","articleSection":["Tips &amp; Tricks"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/","url":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/","name":"Blog: Smart Interface Design Patterns, The Checklists","isPartOf":{"@id":"https:\/\/securancy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#primaryimage"},"image":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#primaryimage"},"thumbnailUrl":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","datePublished":"2020-11-19T13:48:52+00:00","dateModified":"2020-11-19T13:50:32+00:00","description":"\"Smart Interface Design Patterns, The Checklists\" is a great read-up and provides a fresh view on what should be considered by any web developing team.","breadcrumb":{"@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#primaryimage","url":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","contentUrl":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","width":300,"height":168},{"@type":"BreadcrumbList","@id":"https:\/\/securancy.com\/nl\/labs\/smart-interface-design-patterns-the-checklists\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securancy.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Smart Interface Design Patterns, The Checklists"}]},{"@type":"WebSite","@id":"https:\/\/securancy.com\/#website","url":"https:\/\/securancy.com\/","name":"Securancy Intelligence","description":"Digital Architects","publisher":{"@id":"https:\/\/securancy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securancy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/securancy.com\/#organization","name":"Securancy Intelligence","url":"https:\/\/securancy.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securancy.com\/#\/schema\/logo\/image\/","url":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/05\/Securancy-logo_horizontal_color@2x-2.png","contentUrl":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/05\/Securancy-logo_horizontal_color@2x-2.png","width":270,"height":56,"caption":"Securancy Intelligence"},"image":{"@id":"https:\/\/securancy.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/securancy","https:\/\/x.com\/Securancy","https:\/\/www.instagram.com\/securancynl\/","https:\/\/www.linkedin.com\/company\/securancy"]},{"@type":"Person","@id":"https:\/\/securancy.com\/#\/schema\/person\/0f72e791ab55b1ff52f06c38f6ff0998","name":"admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ba2eb17b8d4d8b8b3faefc7fc09d18031b42292e9dce06b55a6f0d4cd2a19b9b?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/securancy.com"],"url":"https:\/\/securancy.com\/nl\/labs\/author\/supportsecurancy-com\/"}]}},"jetpack_featured_media_url":"https:\/\/securancy.com\/wp-content\/uploads\/2020\/07\/download.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/posts\/1826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/comments?post=1826"}],"version-history":[{"count":1,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/posts\/1826\/revisions"}],"predecessor-version":[{"id":1842,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/posts\/1826\/revisions\/1842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/media\/1831"}],"wp:attachment":[{"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/media?parent=1826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/categories?post=1826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securancy.com\/nl\/wp-json\/wp\/v2\/tags?post=1826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}