SlideShare a Scribd company logo
1 of 51
!
                                       !"                    #"
                                                              $                   !
                                   !          %!                                  &" '!                       %
                                                                                                              !



                                                        !                       !                   #"
                                                                                                     $            !
                                   (   %            &" '!                       %
                                                                                !




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       1
)                     !            '!
        * '
                                   "
             –
             –
             –
             –
             –
                                       "                   "




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   2
+                          '!




             '!                           '                               !                       !                      '       ,
     !                                                       !%

                      "!            "              +                    -        ,               !
                             +          " !                      " ,                      (        "                !,       !
     !                             '!                                           !                                                "
     +                       "            +                        ""                           %

Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                    3
.                 '!
                                                            ! #
                                                             "                   $
                                   %& (
                                     ')                              ')
                                                                     )*
                                   +                              ,-  .                                  /
                                        "                                                            0
                                       1                                ,( )
                                                                          )

                                   "
                                   !                  2)
                                                       )3                                ')
                                                                                          )*
                                                                                        4    .

                                   5                                     6                               4
                                    4




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       4
/




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   5
0 !                           1    + .
  "                                 , "




Copyright © 2009 Perficient, Inc      PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   6
"




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   7
2                                    '"
                                   /4                /

             7                          8
                                        / 9             :
             4
                                    ;
                                   <
             7

                                   4




             4 /




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   8
.                                                $"                         !


             =                                              >          ?

             ,@
              @@                   /


             A                     .     B
                –
                            C
                            C


                –

                                                                   1
                –            4
                                   ; 4




Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   9
*                           "                '

                           4
                                       <




          –
          –
          –     D
          –     7
          –     A
          –     "
          –                   1    /
          –




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   10
3             (                                   ,%
 "


        5 / !                                                                        "
        C   E                      >                                                 C   E
                                                                                                             /
        C   =

                                                                                     C   =




                          (                                   "
                          '



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       11
.                                   "                                  (



                                   <

        7




        7                              /

                                       4

                                           /
              .
                                                                                                                 Cisco Personas
                                                <




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                12
'       !                 !                   4,
   " "                                 4   (                 ""




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   13
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   14
'                      "




                  Todd Warfel
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   15
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   16
'                           ,




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   17
"
                                                                                                                 /
                                                          <

        D                                                                                                            6
                   8

                                                                    8                                                    4
                                       4                            8

        0                                                                 /           4
        4

                                   4




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED               18
!   ,                                   '
                                                                           '


        "

            8

        =




        5 /

        !




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   19
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   20
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   21
"


          –!                       .
          –
          –                                4                         1
          –
          –
          –
          –0




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   22
2" '


                   4
                                          <

        F                          84 F
                                     <

        !             4                                        .




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   23
3                         "

                      +                                                               5
                              "        " 6!
        ,<
                     – D
                     – D
                     –
                     –     "
                     –                          4                              4

        '<                             G         G                                            <

        (<                                 >                                                         4               <

        H<                         /       4                                      <




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       24
5      !                               "


                                                                                               +               !

      =                                I ;   .                                                                 D                   /
                                                   4 ;
                                                                     / 4<
                                                   1                                                                           <
                                       4                             D
                                   <                                                                                               /

                                                        <
                                                                                                                       <
                                                                                         ;              <
                                                                     9 <:                                                                  8
                                                                                                                               J
                                                                                                               4
                                                                                                                           <


                                                                                                                                       <

Copyright © 2009 Perficient, Inc                 PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                           25
3                         "

                                       7   "         8"


                  "                4

                  E


                  E                                                       ; / 4

                  5                                             4

                  E                                >

                                                                                            8




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   26
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   27
.                               "

                                   .                                         4                               <

          – K                                                       4                         /                  .
                                                         <



        D

          –                         /                        !50                  4 /
          – !                      4 /
          –                                                  1




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           28
3$                       " '


                "                                                      "




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   29
*
        Analysis                                                                                                        Data Oriented
        focuses on
        patterns




                                   Design Oriented

        Analysis is
        drawn to
        unique and
        extreme
        cases
                            Less Structured in                                                                           Very Structured in
                            Research Plans                                                                               Research Plans
                            and Data Collection                                                                          and Data Collection



Copyright © 2009 Perficient, Inc                  PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                          30
'                                                (


          "

          C




          C
                               4



          C                        .




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   31
,                  '      ! " '

                          *        /                                                                *        /



           A                                                                      0




                                                                                  5
                                                                                                                 4



      The design-oriented approach                                           The data-oriented approach taught
         enabled the team to recognize                                          the team to carefully weigh their
         new learning opportunities, and to                                     judgments against the evidence
         trust their instincts.

Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           32
Getting started
                                   Forming the team
                                   Collecting and analyzing data to
                                   drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   33
!

        $
          – $
          – +
          – L



        5
          –                    1     7>                                 1              7                     4
          – $                  4          1                             9
                                                                               /8                                   :
          – !
          – "                      8. /
          – 7                       4 4                 4            4 /                                 4




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       34
*




                                                                                                         35
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        35
2                               (                         ' ,




                                                                                                             36
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        36
1

        A .                        !


          – D




          –




        $
          – 7                      4                4
          –



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   37
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: the elements
                                   of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   38
2                               '                        "

 Archetype name

 Identifying
 details

 Short,
 memorable story

 Goals,
 motivations

 Context,
 environment

 Values and
 attitudes




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   39
"




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   40
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas



Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   41
7,                            "                                8


     !                                   /    P                                                                #
      MI                                       MO                                                                  K           ;
       1                                       4
                           4       4 /                                    <N
              ;                          /                                                                                 4       >
                  /                  ;         7;                                                                      <

              ;
              / <N




                                                                                                                                       42
Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                            42
,


                                   /   /4                                                                                 <
                 ! 4                                                          /
                 ! 4                                                                          /

                                                                                                                      4
                 >
                    – E4                    >
                 !




                                                                                                                              43
Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                43
,

             Candidates                                         Considerations                                               Participants
        !                                      B              E4                        B                                         4     4
                                                              E      4                                  B
                                   B                          –      $
                                                              –      !                            I                          01    4
                  8                        4
                                       B                      –      +
                                                              –      0                                                            < <
                .                  /               B
                                                              –

                            < <
                                   B
                                                              01
        D                              4 /8                      –
               B
                                                                 – $
                                                              !                             8
                                                                                        6         I
                                                                                                                                            44
Copyright © 2009 Perficient, Inc                       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                       44
2" ' ,                                         "

                 7                     />                                         /,                 '<
                    –              1        I                                         -                               B
                                   7                    7          /                                              4
                                       <
                              C
                              C
                                   7                                                  7                                           /
                                                                  1                   <
                                                     4                                                                            <
                 K            4                                                                                   <
                 K            4                                                                                               <
                 $                          4                                 4
                 4                          4           4                                                 /               4   4
                                                                                  <
                                                                                                                                  45
Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                        45
)'                              '                 '

                 A                                                                                           4
                                               BI                                                                B

                                   4       /
                                                                   <



                                                                                                  <
                                                                         4
                                                            <7                                                   4
                                                             /                                             4              4
                                                                               <

     2                                 ,                           '                     "
      !!                           '                                                                   +             +
                                       "                    +                 !!                                         ( %   46
Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                      46
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   47
2                               "   " !


        0>

        D
                     8                 .

        7
                     4                                   4                           4


          – 7
          – "                              4
          –
          – 0                              4




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   48
<                                                                                     < ! 5!
         ,@<
          @@
            4                      P <
                                                                                       !            <I                 ')
                                                                                                                       )@
         5                         !       QK        R <                     "
         #                                           "                                                                $ %<     4$
         ')<
          )-
                             L         Q                             <                                     &                  '
                                   (                                                                       <5                P
         ')<
          )2




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                   49
$ 3
                             )             3                                  #        "

                                    2           * ! + 9 ; <
                                                        : < =
                                             9 < - 9< 3
                                              ; <    <   2
Identity management and governance has become a focal point for companies trying to meet regulatory and industry
expectations around information integrity and accountability. Information is power and information security is more crucial
now than ever.

And whether it is the protection of proprietary technology, customer information or financial data, identity management
should be a key component of any corporate security strategy.

In December’s Perficient Perspectives we’ll look at Identity Management:

      • What is it?
      • The three keys to an effective identity management strategy:
              • Business alignment
              • Executive involvement
              • Measurable results
      • Identity management solutions
      • Where does technology fit in?
      • Why technology alone is not the answer
      • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
.                                   '!




                                                            <             6         ! 3
                                   "        >
                                    1
                                                                                                                      <




                                   4    <   6       '!                                            /<           6          '!




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED            51

More Related Content

Similar to Using Personas in User Experience Design

6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing
Cangpt
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
KheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
KheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
KheirEddine Tolba
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative Learning
Takashi Iba
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012
VillaAlhambra
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
EverTrue
 
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12
Lwala
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling
Texxi Global
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social Media
Liza Doyle
 

Similar to Using Personas in User Experience Design (20)

Royal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksRoyal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinks
 
Zayda sierra esp
Zayda sierra espZayda sierra esp
Zayda sierra esp
 
U of U Undergraduate IMC Class
U of U Undergraduate IMC ClassU of U Undergraduate IMC Class
U of U Undergraduate IMC Class
 
6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing
 
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42  boycott of virani moti's shantidas bapu for pro satpanth activitiesOE 42  boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative Learning
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
 
2011mayo Profesorado
2011mayo Profesorado2011mayo Profesorado
2011mayo Profesorado
 
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Social Media and IMC
Social Media and IMCSocial Media and IMC
Social Media and IMC
 
Quranic therapy booklet 2
Quranic therapy booklet 2Quranic therapy booklet 2
Quranic therapy booklet 2
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling
 
Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social Media
 

More from Perficient, Inc.

More from Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Using Personas in User Experience Design

  • 1. ! !" #" $ ! ! %! &" '! % ! ! ! #" $ ! ( % &" '! % ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 1
  • 2. ) ! '! * ' " – – – – – " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 2
  • 3. + '! '! ' ! ! ' , ! !% "! " + - , ! + " ! " , ( " !, ! ! '! ! " + " + "" % Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 3
  • 4. . '! ! # " $ %& ( ') ') )* + ,- . / " 0 1 ,( ) ) " ! 2) )3 ') )* 4 . 5 6 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 4
  • 5. / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 5
  • 6. 0 ! 1 + . " , " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 6
  • 7. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 7
  • 8. 2 '" /4 / 7 8 / 9 : 4 ; < 7 4 4 / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 8
  • 9. . $" ! = > ? ,@ @@ / A . B – C C – 1 – 4 ; 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 9
  • 10. * " ' 4 < – – – D – 7 – A – " – 1 / – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 10
  • 11. 3 ( ,% " 5 / ! " C E > C E / C = C = ( " ' Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 11
  • 12. . " ( < 7 7 / 4 / . Cisco Personas < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 12
  • 13. ' ! ! 4, " " 4 ( "" Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 13
  • 14. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 14
  • 15. ' " Todd Warfel Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 15
  • 16. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 16
  • 17. ' , Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 17
  • 18. " / < D 6 8 8 4 4 8 0 / 4 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 18
  • 19. ! , ' ' " 8 = 5 / ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 19
  • 20. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 20
  • 21. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 21
  • 22. " –! . – – 4 1 – – – –0 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 22
  • 23. 2" ' 4 < F 84 F < ! 4 . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 23
  • 24. 3 " + 5 " " 6! ,< – D – D – – " – 4 4 '< G G < (< > 4 < H< / 4 < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 24
  • 25. 5 ! " + ! = I ; . D / 4 ; / 4< 1 < 4 D < / < < ; < 9 <: 8 J 4 < < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 25
  • 26. 3 " 7 " 8" " 4 E E ; / 4 5 4 E > 8 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 26
  • 27. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 27
  • 28. . " . 4 < – K 4 / . < D – / !50 4 / – ! 4 / – 1 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 28
  • 29. 3$ " ' " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 29
  • 30. * Analysis Data Oriented focuses on patterns Design Oriented Analysis is drawn to unique and extreme cases Less Structured in Very Structured in Research Plans Research Plans and Data Collection and Data Collection Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 30
  • 31. ' ( " C C 4 C . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 31
  • 32. , ' ! " ' * / * / A 0 5 4 The design-oriented approach The data-oriented approach taught enabled the team to recognize the team to carefully weigh their new learning opportunities, and to judgments against the evidence trust their instincts. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 32
  • 33. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 33
  • 34. ! $ – $ – + – L 5 – 1 7> 1 7 4 – $ 4 1 9 /8 : – ! – " 8. / – 7 4 4 4 4 / 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 34
  • 35. * 35 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 35
  • 36. 2 ( ' , 36 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 36
  • 37. 1 A . ! – D – $ – 7 4 4 – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 37
  • 38. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: the elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 38
  • 39. 2 ' " Archetype name Identifying details Short, memorable story Goals, motivations Context, environment Values and attitudes Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 39
  • 40. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 40
  • 41. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 41
  • 42. 7, " 8 ! / P # MI MO K ; 1 4 4 4 / <N ; / 4 > / ; 7; < ; / <N 42 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 42
  • 43. , / /4 < ! 4 / ! 4 / 4 > – E4 > ! 43 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 43
  • 44. , Candidates Considerations Participants ! B E4 B 4 4 E 4 B B – $ – ! I 01 4 8 4 B – + – 0 < < . / B – < < B 01 D 4 /8 – B – $ ! 8 6 I 44 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 44
  • 45. 2" ' , " 7 /> /, '< – 1 I - B 7 7 / 4 < C C 7 7 / 1 < 4 < K 4 < K 4 < $ 4 4 4 4 4 / 4 4 < 45 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 45
  • 46. )' ' ' A 4 BI B 4 / < < 4 <7 4 / 4 4 < 2 , ' " !! ' + + " + !! ( % 46 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 46
  • 47. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 47
  • 48. 2 " " ! 0> D 8 . 7 4 4 4 – 7 – " 4 – – 0 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 48
  • 49. < < ! 5! ,@< @@ 4 P < ! <I ') )@ 5 ! QK R < " # " $ %< 4$ ')< )- L Q < & ' ( <5 P ')< )2 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 49
  • 50. $ 3 ) 3 # " 2 * ! + 9 ; < : < = 9 < - 9< 3 ; < < 2 Identity management and governance has become a focal point for companies trying to meet regulatory and industry expectations around information integrity and accountability. Information is power and information security is more crucial now than ever. And whether it is the protection of proprietary technology, customer information or financial data, identity management should be a key component of any corporate security strategy. In December’s Perficient Perspectives we’ll look at Identity Management: • What is it? • The three keys to an effective identity management strategy: • Business alignment • Executive involvement • Measurable results • Identity management solutions • Where does technology fit in? • Why technology alone is not the answer • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
  • 51. . '! < 6 ! 3 " > 1 < 4 < 6 '! /< 6 '! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 51