SlideShare a Scribd company logo
1 of 50
Download to read offline
Jim Ross
Design Philadelphia: The Bleeding Edge of Design Research

October 16, 2013
Covert Naturalistic Observation

Jim Ross
Design Philadelphia: The Bleeding Edge of Design Research

October 16, 2013
User research is unnatural.

Covert Naturalistic Observation - Jim Ross

4
User research is unnatural.

Source: Flickr – Thomas Link

Covert Naturalistic Observation - Jim Ross

Source: Flickr – Thomas Link

5
User research is unnatural.

Covert Naturalistic Observation - Jim Ross

6
We get informed consent from participants.

Covert Naturalistic Observation - Jim Ross

7
But knowing that you’re being observed affects behavior.

Source: Flickr – Blue Oxen

Covert Naturalistic Observation - Jim Ross

8
Covert naturalistic observation

Source: Flickr – Sean Hobson
Covert Naturalistic Observation - Jim Ross

10
We usually use overt naturalistic observation.

Covert Naturalistic Observation - Jim Ross

11
It’s rare that we use covert naturalistic observation.

Source: Flickr – James Emery
Covert Naturalistic Observation - Jim Ross

12
Who uses covert naturalistic observation?

Covert Naturalistic Observation - Jim Ross

13
Who uses covert naturalistic observation?

Covert Naturalistic Observation - Jim Ross

14
Who uses covert naturalistic observation?

Covert Naturalistic Observation - Jim Ross

15
Covert naturalistic observation
It allows you to observe realistic, natural behavior.

Source: Flickr – David Hillowitz
Covert Naturalistic Observation - Jim Ross

17
Trying to remain covert makes observation more difficult.

Source: Flickr – Lars Plougmann
Covert Naturalistic Observation - Jim Ross

18
You can’t study interfaces or close up interactions.

Source: Flickr – Walter Lim
Covert Naturalistic Observation - Jim Ross

19
You can’t ask questions, so you rely on observation only.

Source: Flickr – Danielle Scott
Covert Naturalistic Observation - Jim Ross

20
Ethical concerns about consent, privacy, and deception

Source: Flickr – dustpuppy
Covert Naturalistic Observation - Jim Ross

21
Covert naturalistic observation
Studying behavior and interactions in a public place

Source: Flickr – Drew XXX
Source: Flickr – dustpuppy
Covert Naturalistic Observation - Jim Ross

23
Covert naturalistic observation
1. Plan what you want to observe.

Covert Naturalistic Observation - Jim Ross

25
2. Gather intelligence – do some research on:
•
•
•
•

The domain
User characteristics
Tasks and behaviors
Existing research

Covert Naturalistic Observation - Jim Ross

26
3. Scope out the location ahead of time: layout, people,
activity level.

Source: Flickr – Ben Salter
Covert Naturalistic Observation - Jim Ross

27
4. Consider notifying management and security.

Source: Flickr – Elvert Barnes
Covert Naturalistic Observation - Jim Ross

28
5. Observe with partners.

Source: Flickr – Carey Akin
Covert Naturalistic Observation - Jim Ross

29
6. Observe over several shorter sessions to see:
• More people
• Different situations
• Different time periods

Covert Naturalistic Observation - Jim Ross

30
6. Observe over several shorter sessions to avoid:
• Fatigue
• Information overload
• “Getting caught”

Covert Naturalistic Observation - Jim Ross

31
7. Blend in – dress like everyone else.

Source: Flickr – Michael Ocampo
Covert Naturalistic Observation - Jim Ross

32
7. Blend in – do what others are doing.

Source: Flickr – James Emery
Covert Naturalistic Observation - Jim Ross

33
7. Blend in – use a mobile device.

Source: Flickr – Elvert Barnes
Covert Naturalistic Observation - Jim Ross

Source: Flickr – Elvert Barnes
34
8. Don’t take obvious notes.

Source: Flickr – Geek Calendar
Covert Naturalistic Observation - Jim Ross

35
8. Don’t take obvious notes – use a phone or tablet.

Source: Flickr – Elvert Barnes
Covert Naturalistic Observation - Jim Ross

36
9. Treat recording as secondary – take photos or video
last.

Covert Naturalistic Observation - Jim Ross

37
9. Treat recording as secondary – use a phone or tablet.

Source: Flickr – Jesus Leon
Covert Naturalistic Observation - Jim Ross

38
9. Treat recording as secondary – don’t record audio.

Covert Naturalistic Observation - Jim Ross

39
10. Debrief after each observation session.

Source: Flickr – Sean MacEntee
Covert Naturalistic Observation - Jim Ross

40
10. Debrief after each observation session.

Covert Naturalistic Observation - Jim Ross

41
11. Do it ethically – observe in public places.

Source: Flickr – Dominic Alves
Covert Naturalistic Observation - Jim Ross

42
11. Do it ethically – focus on groups not individuals.

Source: Flickr – Alfonso Pierantonio
Covert Naturalistic Observation - Jim Ross

43
11. Do it ethically – protect privacy.

Source: Flickr – David Goehring
Covert Naturalistic Observation - Jim Ross

44
11. Do it ethically – don’t deceive.

Source: Flickr – Elvert Barnes
Covert Naturalistic Observation - Jim Ross

45
12. Combine it with other methods.

Covert Naturalistic Observation - Jim Ross

46
Covert naturalistic observation


Overt and covert methods each have
advantages and disadvantages.

Covert Naturalistic Observation - Jim Ross

48


With understanding of the advantages and
disadvantages, we can use overt and covert
methods as appropriate to best understand
the user experience.

Covert Naturalistic Observation - Jim Ross

49
Covert naturalistic observation

Jim Ross
Design Philadelphia: The Bleeding Edge of Design Research

October 16, 2013

More Related Content

Viewers also liked

Quantitative reasearch.
Quantitative reasearch.Quantitative reasearch.
Quantitative reasearch.Rabina Yesmin
 
Merriam ch 9 5.25.10
Merriam ch 9 5.25.10Merriam ch 9 5.25.10
Merriam ch 9 5.25.10Daberkow
 
Qualitiative data analysis: data triangulation
Qualitiative data analysis: data triangulationQualitiative data analysis: data triangulation
Qualitiative data analysis: data triangulationAgnieszka Szóstek
 
sampling in research methodology. qualitative and quantitative approach
sampling in research methodology. qualitative and quantitative approach sampling in research methodology. qualitative and quantitative approach
sampling in research methodology. qualitative and quantitative approach Samantha Jayasundara
 
Ethnographic Research for Design Innovation
Ethnographic Research for Design InnovationEthnographic Research for Design Innovation
Ethnographic Research for Design InnovationCHI*Atlanta
 
Observation in Qualitative Research
Observation in Qualitative ResearchObservation in Qualitative Research
Observation in Qualitative Researchsheroz_ramzan
 
Non probability sampling 2
Non probability sampling 2Non probability sampling 2
Non probability sampling 2Sanket Gaikwad
 
Sampling1[1]
Sampling1[1]Sampling1[1]
Sampling1[1]jilly17
 
Sampling in qualitative research
Sampling in qualitative researchSampling in qualitative research
Sampling in qualitative researchDr. V Vorvoreanu
 
Quantitative And Qualitative Research
Quantitative And Qualitative ResearchQuantitative And Qualitative Research
Quantitative And Qualitative Researchdoha07
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodologysh_neha252
 
Sampling and Sample Types
Sampling  and Sample TypesSampling  and Sample Types
Sampling and Sample TypesDr. Sunil Kumar
 
RESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLINGRESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLINGHafizah Hajimia
 
Qualitative and quantitative methods of research
Qualitative and quantitative methods of researchQualitative and quantitative methods of research
Qualitative and quantitative methods of researchJordan Cruz
 

Viewers also liked (20)

Quantitative reasearch.
Quantitative reasearch.Quantitative reasearch.
Quantitative reasearch.
 
Types of research
Types of researchTypes of research
Types of research
 
Merriam ch 9 5.25.10
Merriam ch 9 5.25.10Merriam ch 9 5.25.10
Merriam ch 9 5.25.10
 
Qualitiative data analysis: data triangulation
Qualitiative data analysis: data triangulationQualitiative data analysis: data triangulation
Qualitiative data analysis: data triangulation
 
sampling in research methodology. qualitative and quantitative approach
sampling in research methodology. qualitative and quantitative approach sampling in research methodology. qualitative and quantitative approach
sampling in research methodology. qualitative and quantitative approach
 
Qualitative data collection
Qualitative data collectionQualitative data collection
Qualitative data collection
 
Ethnographic Research for Design Innovation
Ethnographic Research for Design InnovationEthnographic Research for Design Innovation
Ethnographic Research for Design Innovation
 
Observation in Qualitative Research
Observation in Qualitative ResearchObservation in Qualitative Research
Observation in Qualitative Research
 
Non probability sampling 2
Non probability sampling 2Non probability sampling 2
Non probability sampling 2
 
Design of qualitative research
Design of qualitative researchDesign of qualitative research
Design of qualitative research
 
Triangulation
Triangulation Triangulation
Triangulation
 
Sampling1[1]
Sampling1[1]Sampling1[1]
Sampling1[1]
 
Nonprobability Sampling
Nonprobability SamplingNonprobability Sampling
Nonprobability Sampling
 
Sampling in qualitative research
Sampling in qualitative researchSampling in qualitative research
Sampling in qualitative research
 
Quantitative And Qualitative Research
Quantitative And Qualitative ResearchQuantitative And Qualitative Research
Quantitative And Qualitative Research
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
 
Sampling and Sample Types
Sampling  and Sample TypesSampling  and Sample Types
Sampling and Sample Types
 
RESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLINGRESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLING
 
Qualitative and quantitative methods of research
Qualitative and quantitative methods of researchQualitative and quantitative methods of research
Qualitative and quantitative methods of research
 
Types of Research
Types of ResearchTypes of Research
Types of Research
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Covert Naturalistic Observation

  • 1. Jim Ross Design Philadelphia: The Bleeding Edge of Design Research October 16, 2013
  • 2. Covert Naturalistic Observation Jim Ross Design Philadelphia: The Bleeding Edge of Design Research October 16, 2013
  • 3.
  • 4. User research is unnatural. Covert Naturalistic Observation - Jim Ross 4
  • 5. User research is unnatural. Source: Flickr – Thomas Link Covert Naturalistic Observation - Jim Ross Source: Flickr – Thomas Link 5
  • 6. User research is unnatural. Covert Naturalistic Observation - Jim Ross 6
  • 7. We get informed consent from participants. Covert Naturalistic Observation - Jim Ross 7
  • 8. But knowing that you’re being observed affects behavior. Source: Flickr – Blue Oxen Covert Naturalistic Observation - Jim Ross 8
  • 9.
  • 10. Covert naturalistic observation Source: Flickr – Sean Hobson Covert Naturalistic Observation - Jim Ross 10
  • 11. We usually use overt naturalistic observation. Covert Naturalistic Observation - Jim Ross 11
  • 12. It’s rare that we use covert naturalistic observation. Source: Flickr – James Emery Covert Naturalistic Observation - Jim Ross 12
  • 13. Who uses covert naturalistic observation? Covert Naturalistic Observation - Jim Ross 13
  • 14. Who uses covert naturalistic observation? Covert Naturalistic Observation - Jim Ross 14
  • 15. Who uses covert naturalistic observation? Covert Naturalistic Observation - Jim Ross 15
  • 17. It allows you to observe realistic, natural behavior. Source: Flickr – David Hillowitz Covert Naturalistic Observation - Jim Ross 17
  • 18. Trying to remain covert makes observation more difficult. Source: Flickr – Lars Plougmann Covert Naturalistic Observation - Jim Ross 18
  • 19. You can’t study interfaces or close up interactions. Source: Flickr – Walter Lim Covert Naturalistic Observation - Jim Ross 19
  • 20. You can’t ask questions, so you rely on observation only. Source: Flickr – Danielle Scott Covert Naturalistic Observation - Jim Ross 20
  • 21. Ethical concerns about consent, privacy, and deception Source: Flickr – dustpuppy Covert Naturalistic Observation - Jim Ross 21
  • 23. Studying behavior and interactions in a public place Source: Flickr – Drew XXX Source: Flickr – dustpuppy Covert Naturalistic Observation - Jim Ross 23
  • 25. 1. Plan what you want to observe. Covert Naturalistic Observation - Jim Ross 25
  • 26. 2. Gather intelligence – do some research on: • • • • The domain User characteristics Tasks and behaviors Existing research Covert Naturalistic Observation - Jim Ross 26
  • 27. 3. Scope out the location ahead of time: layout, people, activity level. Source: Flickr – Ben Salter Covert Naturalistic Observation - Jim Ross 27
  • 28. 4. Consider notifying management and security. Source: Flickr – Elvert Barnes Covert Naturalistic Observation - Jim Ross 28
  • 29. 5. Observe with partners. Source: Flickr – Carey Akin Covert Naturalistic Observation - Jim Ross 29
  • 30. 6. Observe over several shorter sessions to see: • More people • Different situations • Different time periods Covert Naturalistic Observation - Jim Ross 30
  • 31. 6. Observe over several shorter sessions to avoid: • Fatigue • Information overload • “Getting caught” Covert Naturalistic Observation - Jim Ross 31
  • 32. 7. Blend in – dress like everyone else. Source: Flickr – Michael Ocampo Covert Naturalistic Observation - Jim Ross 32
  • 33. 7. Blend in – do what others are doing. Source: Flickr – James Emery Covert Naturalistic Observation - Jim Ross 33
  • 34. 7. Blend in – use a mobile device. Source: Flickr – Elvert Barnes Covert Naturalistic Observation - Jim Ross Source: Flickr – Elvert Barnes 34
  • 35. 8. Don’t take obvious notes. Source: Flickr – Geek Calendar Covert Naturalistic Observation - Jim Ross 35
  • 36. 8. Don’t take obvious notes – use a phone or tablet. Source: Flickr – Elvert Barnes Covert Naturalistic Observation - Jim Ross 36
  • 37. 9. Treat recording as secondary – take photos or video last. Covert Naturalistic Observation - Jim Ross 37
  • 38. 9. Treat recording as secondary – use a phone or tablet. Source: Flickr – Jesus Leon Covert Naturalistic Observation - Jim Ross 38
  • 39. 9. Treat recording as secondary – don’t record audio. Covert Naturalistic Observation - Jim Ross 39
  • 40. 10. Debrief after each observation session. Source: Flickr – Sean MacEntee Covert Naturalistic Observation - Jim Ross 40
  • 41. 10. Debrief after each observation session. Covert Naturalistic Observation - Jim Ross 41
  • 42. 11. Do it ethically – observe in public places. Source: Flickr – Dominic Alves Covert Naturalistic Observation - Jim Ross 42
  • 43. 11. Do it ethically – focus on groups not individuals. Source: Flickr – Alfonso Pierantonio Covert Naturalistic Observation - Jim Ross 43
  • 44. 11. Do it ethically – protect privacy. Source: Flickr – David Goehring Covert Naturalistic Observation - Jim Ross 44
  • 45. 11. Do it ethically – don’t deceive. Source: Flickr – Elvert Barnes Covert Naturalistic Observation - Jim Ross 45
  • 46. 12. Combine it with other methods. Covert Naturalistic Observation - Jim Ross 46
  • 48.  Overt and covert methods each have advantages and disadvantages. Covert Naturalistic Observation - Jim Ross 48
  • 49.  With understanding of the advantages and disadvantages, we can use overt and covert methods as appropriate to best understand the user experience. Covert Naturalistic Observation - Jim Ross 49
  • 50. Covert naturalistic observation Jim Ross Design Philadelphia: The Bleeding Edge of Design Research October 16, 2013