VORTEX Platform "Snooze Alarm" Feature

VORTEX Platform "Snooze Alarm" Feature
Diagnosed critical issues through user interviews and redesigned the Snooze mechanism to restore client trust.

Diagnosed critical issues through user interviews and redesigned the Snooze mechanism to restore client trust.

*PRIVATE PORTFOLIO ASSET: This content is for interview review only. Please do not copy or distribute. Thank you.*

*PRIVATE PORTFOLIO ASSET: This content is for interview review only. Please do not copy or distribute. Thank you.*
Overview

Environmental factors cause frequent false alarms on the VORTEX cloud surveillance platform. This not only leads to alert fatigue for clients, but also results in costly unnecessary security dispatches, creating a serious trust crisis and customer churn risk. This project aimed to design an "Alert Snooze" mechanism that accounts for different role permissions and workflows, reducing false alarm disruption while keeping missed-alert risk within an acceptable range.

Key Results

Key Results

0+ $

0+ $

Operational Savings per Incident

0+ $

0+ $

Operational Savings per Incident

0

0

Key client trust restored

0

0

Key client trust restored

Time

2024.05 - 2024.08

My Role

UIUX Designer

Responsible for
  • User Interview

  • UI Design

  • Prototyping & Design Demo

Platform

Web & App

| Background Context
| Defining Objectives
| Defining Objectives

When AI Detection Meets Uncontrollable Real-World Environments

Our Client:

American Veterans Security (AVS) specializes in providing 24/7 security solutions for commercial buildings, retail, and factories. Their business model involves providing security to property owners through managed surveillance in exchange for service fees. VIVOTEK's cloud surveillance system, VORTEX, serves as the core monitoring platform currently used by AVS.

*Relationship Chain: VIVOTEK (Software/Hardware Provider) > AVS (Service Provider) > End Customer (Protected Entity)

Real-World Scenario & Pain Points

Key Site:

AVS is responsible for monitoring the outdoor new car lot at the well-known dealership, MINI of Portland, managing and protecting vehicle safety.

The Crisis:

Since the surveillance site is outdoors, environmental factors such as wind, rain, or lighting changes easily trigger VORTEX AI's motion detection. For AVS, every alarm triggered represents a cost incurred (requiring manual verification or dispatching patrol vehicles).

Data showed that a single site averaged 400+ false alarms per week.

Frequent False Alarms forced AVS to incur high compensation fees and costs for unnecessary dispatches, severely eroding their profits. This inefficient operational model caused AVS to lose confidence in the VORTEX product, and we faced the severe risk of losing this key account.

| Initial Assumptions
| Initial Assumptions

Project Constraints

1

Indirect user access & cross-timezone collaboration

Due to the Marketing-Led Growth (MLG) strategy and geographical barriers (US market vs. TW design team), direct access to end-users was limited. Requirements were primarily relayed through the US marketing team.
In the early stages, we had to decode "second-hand feedback" and validate design assumptions in the absence of direct user interviews.

2

Immediate mitigation for technical limitations

Root cause analysis revealed that optimizing the hardware detection algorithm was not feasible within the urgent timeline.
After evaluating trade-offs and consulting with clients, we pivoted to a provisional mitigation strategy: "Smart Snooze". This empowers users to instantly manage false alarms, bridging the technical gap until algorithm maturity.

Why didn't we adjust "AI Sensitivity"?

Why didn't we adjust "AI Sensitivity"?

  • Most VORTEX users are general security personnel. Adjusting sensitivity settings imposes a cognitive load that is too high for this group. Furthermore, it is difficult for users to intuitively judge whether a specific sensitivity level meets surveillance requirements. (We prioritized maintaining consistent detection capabilities over risking security gaps caused by improper adjustments.)

  • Additionally, adjusting sensitivity does not effectively solve environmental issues, as seasonal weather changes and varying daylight hours all impact detection accuracy.

Derived User Story

As a site manager, I want to temporarily pause alarms when I identify a false alarm to avoid triggering unnecessary security dispatches, thereby saving on extra service fees.

Prerequisites for Triggering VORTEX Alarms

First, detection conditions and zones must be set on the device (camera). Next, the user must go to Alarm Management to configure the Alarm (including detection schedules and subsequent notification actions). Finally, the user can passively receive alarms.

Analyzing Requirements & Formulating Assumptions

Since the essence of Snooze is to pause an Alarm Rule, placing it within Alarm Management was the most logically consistent choice within the system architecture. We also assumed this would be a global setting — one with broad organizational impact — and therefore should only be accessible to users with system-level admin permissions.

  1. First, define the detection zone on each individual camera.

  2. Then, go to Alarm Management to configure the trigger conditions, notification methods, and scheduling.

In VORTEX's product architecture, creating an Alarm requires two steps:

UI Screen

Users could snooze an alarm by clicking on the "problematic Alarm." (This would only "mute" subsequent notifications triggered by the alarm, while still retaining the trigger log). Users could then input their desired pause duration based on their needs.

However, after releasing this feature to users, we received complaints expressing their dissatisfaction...

| Pivots
| Pivots

Our Key Account – AVS Didn't Buy It

After launching the V1 feature, we expected to resolve the false alarm issue, but instead received strong negative feedback from our key client, AVS.

This dissatisfaction alarmed the CPO, who mandated that the design team assist the PM and Sales in resolving this crisis. This situation also led to the approval of our proposal for user interviews.

An Interview with AVS CEO John Broke Through Our Blind Spots

The PM, Sales, and I conducted a cross-time zone interview with the client lead. This conversation completely overturned our original assumptions and revealed three critical design gaps:

Insight 01: Workflow Mismatch

Insight 01: Workflow Mismatch

AVS operators do not stare at a video wall like traditional security guards; instead, they stand by at the Message Center.

VORTEX AI automatically captures anomalies and generates event cards that feed into the Message Center. For security personnel, this page acts as their "Task Inbox." They spend 90% of their time here reviewing events.

V1 forced users to leave this "inbox" and navigate to deep backend system settings. This not only disrupted their workflow but increased the risk of missing other urgent events. Furthermore, since AVS relies mostly on Supervisors for monitoring, they didn't even have access to these backend settings.

Insight 02: The Granularity Trap

Insight 02: The Granularity Trap

While pausing an "Alarm Rule" makes sense from a system logic perspective, a single rule often binds dozens of cameras. Disabling an entire Alarm just to handle a few malfunctioning cameras creates a massive security blind spot.

Insight 03: The Privilege Gap

Insight 03: The Privilege Gap

In VORTEX's existing settings, only Admin-level users could access the backend System to configure critical organizational settings.

However, within AVS's organizational structure, it is the Supervisors who actually monitor the screens 24/7. They had no access to the System page, leaving frontline staff with their hands tied and unable to address false alarms in real-time.

| Design Decisions
| Design Decisions

Balancing Crisis Management with Long-Term Product Growth

Facing AVS's urgent requirements, I realized we were confronting a classic product dilemma: While we had to resolve the client's pain points immediately, building a customized solution for a single client risked Feature Creep. This could compromise the product's universality and architecture, creating technical and design debt for the future.

Proposed Solution:
To balance "salvaging client trust" with "maintaining product integrity," I proposed a parallel strategy to the PM, dividing our approach into short-term and long-term goals.

Short-Term Goal: Embedding Snooze into the User Workflow

1

Rationalizing the Snooze Placement & Workflow

By embedding the Snooze function directly within the Message Center, Supervisors can now act on specific events in real time — dramatically shortening the path from "identifying a false alarm" to "resolving it."

Rather than targeting an entire Alarm group, the new design scopes down to a single detection rule on a single camera. For example, pausing Camera A's "Line Crossing Detection" without affecting its "Motion Detection" or any other cameras. This prevents the overly coarse coverage granularity that made V1 ineffective.

Users can trigger a Snooze via the action button at the end of a table row, or through the side panel menu, giving them flexible entry points based on their workflow preference.

2

Designing Permission Granularity Around Organizational Workflows

We referenced a competitor's "Snooze for Only Me vs. Everyone" mechanism and recognized that this granularity aligned well with AVS's organizational structure. When a frontline operator encounters repeated false alarms, they can immediately snooze for themselves — without waiting for approval to escalate through the chain of command. Meanwhile, upper-level management retains the authority to decide whether to extend the snooze across the entire organization.

Beyond this, we recognized that "Snooze Everyone" is inherently a decision that carries security risk. To enforce accountability, we introduced a signature system: whenever a user triggers a "Snooze Everyone" action, their signature is automatically stamped onto the snooze schedule — creating a clear, traceable record of who made the decision at every organizational level.

When a user activates "Snooze Everyone," their signature stamp is recorded on the snooze schedule.

3

Visualizing the Snooze Schedule

We introduced a "Manage Snoozed Schedule" panel within the Message Center, giving all collaborators across the organization a clear, at-a-glance view of which cameras and detection rules have been intentionally paused by a human operator — ensuring that snoozed events are never mistaken for system misses.

Manage snoozed schedule panel

To verify if this design change contributes to product growth, we implemented data tracking to monitor the usage frequency of both V1 and V2 paths. This data will serve as the foundation for evaluating design effectiveness.

Long-term Goal: Permission system optimization (Launched March 2026)

The VORTEX platform's previous User Privilege architecture (Owner/Admin for management + Supervisor/Viewer for execution) proved too rigid in this case. The client's organizational structure and operational workflows far exceeded our initial planning and assumptions.

Therefore, I proposed that we push for Customizable Roles in the future. This would allow enterprise clients to configure granular functional permissions based on their specific organizational needs.

We plan to use AVS as a pilot for this feature to validate demand and refine the requirements, aiming to solve the management issue at its root.

| Project Outcomes
| Project Outcomes
| Final Results

The Impact of V2 Design

Client Feedback from AVS

The Snooze V2 redesign was the key turning point in restoring AVS's trust in VORTEX. After the design demo, John responded with strong positive feedback: "This is great! These changes will genuinely make a difference for us." Beyond that, the client committed to expanding their camera purchases in that same meeting.

$2,000+ Est. Savings Per Incident

Based on AVS operational data, avoiding a single unnecessary security dispatch and potential liability costs saves approximately $2,000 USD per incident. This significantly protects the client's profit margins from being eroded by false alarms.

| Data Insights
| Data Insights
| 最終成果

Following the feature launch, we observed several key patterns through event tracking:

Snooze usage metrics for AVS (May 2024 – Apr 2026). Data tracks the transition from the V1 legacy path (System > Alarm Management, shown in purple) to the V2 entry points within the Message Center (Snooze for Only Me / Everyone, shown in orange).

1

Validation of Permission Hierarchy

Data from AVS shows that V2 usage is exclusively concentrated in "Snooze for Only Me," with zero instances of "Snooze for Everyone." Even across all paid organizations, the latter was used very rarely. This validates our initial hypothesis: Front-line operators prefer localized control and are hesitant to make high-stakes decisions that affect the entire organization.

2

V1 Persistence: Usage Remains 2x Higher than V2

Despite the granular control offered by V2, V1 remains the dominant path across all paid organizations. Users are still defaulting to the legacy workflow, even though V2 was designed to be more intuitive.

Hypotheses & Future Validation

The high retention of V1 suggests several possibilities that require further investigation:

  • Operational Efficiency: V1 mutes the entire Alarm Rule. In scenarios with multiple false alarms, this may be faster than V2’s per-camera approach.

  • Behavioral Inertia: Users may be sticking to long-term habits or might not be fully aware of the new V2 entry point.

  • Next Steps: Quantitative data alone cannot weight these factors; we need user interviews to uncover the "why" behind the persistence of V1.

| Reflections
| Reflections
1

Snooze is a Patch; Algorithms are the Cure

Snooze relies on subjective judgment, which carries the inherent risk of missing real security events. This is why I proposed "Decreased Snooze Frequency" as the long-term success metric. Every "Snooze" is essentially negative feedback for our AI. By introducing "Reason for False Alarm" into the workflow, we could feed this data back to R&D to optimize the core detection algorithms.

2

"User Approval" ≠ "User Adoption"

The tracking data revealed a disconnect: while qualitative feedback was positive, quantitative behavior showed V1 usage at double the rate of V2. This taught me that qualitative insights and quantitative behavior can point to different truths. Relying solely on interviews would have suggested total success; behavioral data provided the necessary reality check.

3

Balancing Bespoke Needs with Scalability

This project originated from an urgent request by a single client (AVS). While it solved their immediate pain point, the post-launch validation remained siloed. In the future, I would incorporate a "Generality Validation Plan" earlier in the process to ensure that solutions for one client provide scalable value for the entire platform.

If you like my works - We could have a cup of coffee and chat!

© Mike Wu 2026 Copyright. All Rights Reserved.

If you like my works - We could have a cup of coffee and chat!

© Mike Wu 2026 Copyright. All Rights Reserved.

If you like my works - We could have a cup of coffee and chat!

© Mike Wu 2026 Copyright. All Rights Reserved.

  • MIKE IN THE SPOTLIGHT

    SHOWCASING MY ALL

  • MIKE IN THE SPOTLIGHT

    SHOWCASING MY ALL