User Experience Strategy Model - A Methodology to drive User Experiencesushmita_dutt_123
Strategic User experience is redefining the way we design user interface and user interactivity for today’s user-driven technologies – web, mobile, touch-screen, and digital applications. This article presents a structured methodology approach, a model, which illustrates a systematic process in strategizing user experience....Read more
Help through demonstration and automation for interactive computing systems: ...IJECEIAES
Usability is very important however, it is still difficult to develop interactive computing systems that meet all user’s specificities. Help systems should be a way of bridging this gap. This paper presents a general survey on recent works (building upon previous surveys) related to improving applications’ help through demonstration and automation and, identifies which technologies are acting as enablers. The main contributions are, identifying: i) which are the recent existing solutions; ii) which aspects must be investigated further; and iii) which are the main difficulties that are preventing a faster progress.
LOAD DISTRIBUTION COMPOSITE DESIGN PATTERN FOR GENETIC ALGORITHM-BASED AUTONO...ijsc
Current autonomic computing systems are ad hoc solutions that are designed and implemented from the
scratch. When designing software, in most cases two or more patterns are to be composed to solve a bigger
problem. A composite design patterns shows a synergy that makes the composition more than just the sum
of its parts which leads to ready-made software architectures. As far as we know, there are no studies on
composition of design patterns for autonomic computing domain. In this paper we propose pattern-oriented
software architecture for self-optimization in autonomic computing system using design patterns
composition and multi objective evolutionary algorithms that software designers and/or programmers can
exploit to drive their work. Main objective of the system is to reduce the load in the server by distributing
the population to clients. We used Case Based Reasoning, Database Access, and Master Slave design
patterns. We evaluate the effectiveness of our architecture with and without design patterns compositions.
The use of composite design patterns in the architecture and quantitative measurements are presented. A
simple UML class diagram is used to describe the architecture.
ML Times: Mainframe Machine Learning Initiative- June newsletter (2018)Leslie McFarlin
I contributed the featured article in the June 2018 newsletter: Structure and Complexity- Algorithms, Data, and User Experience. In it, I untangle the link between data and algorithms, and how that might limit what design options we have.
EFFICIENT AND RELIABLE PERFORMANCE OF A GOAL QUESTION METRICS APPROACH FOR RE...ecijjournal
Some of the literature survey have been made on the small scale transaction, only few of the transactions
are build on Enterprise Resource Planning and till dated there is not such a methodology or an approach
implemented on the small scale transaction. Several implementations are mainly focus on the large scale
transaction and hence they are handles huge business volume. This paper proposed an approach for reengineering
a small scale transaction by implementing GQM approach. Even though, web technology is most popular and reliable but these paper prove that re-engineering of small scale transaction on standalone application will be effective and reliable than web technology.
A Two Stage Classification Model for Call Center Purchase PredictionTELKOMNIKA JOURNAL
In call center [1] product recommendation field, call center as an organization between users and telecom operator, doesn’t have permission to access users’ specific information and the detailed products information. Accordingly, rule-based selection method is common used to predict user purchase behavior by the call center. Unfortunately, rule-based approach not only ignores the user’s previous behavior information entirely, and it is difficult to make use of the existing interaction records between users and products. Consequently, it will not get desired results if we just use the basic selection method to predict user purchase behavior directly, because the problem is that the features straightly extracted from the interaction data records are limited. In order to solve the problem above, this paper proposes a two-stage algorithm that based on K-Means Clustering Algorithm [2] and SVM [3, 4] Classification Algorithm. Firstly, we get the potential category information of products by K-Means Clustering Algorithm, and then use SVM Classification Model to predict users purchasing behavior. This two-stage prediction model not only solves the feature shortage problem, but also gives full consideration to the potential features between users and product categories, which can help us to gain significant performance in call center product recommendation field.
Computer literacy and competitive pressures among end users is increasing day by day due to whichthe
need for End-User Programming in software packages is also increasing for rapid, flexible, and user
driven information processing solutions. End User Development out-sources development effort to the end
user by enabling softwaredevelopers to create information systems that can even be adapted by technically
inexperienced endusers and hence are in great demand. If end user decides to pay the price and add
significant programmability to their system, there are additional costs to consider before end user can start
to enjoy the payoff. It is important to calculate accurateand early estimation of software size forcalculating
effort and cost estimation of software systems incorporating EUD features. With the evolution of object
orientation, use cases emerged as a dominant method for structuring requirements. Use cases were
integrated into the Unified Modeling Language (UML) and Unified Process and became the standard for
Software Engineering requirements modelling. The Use Case Point (UCP)methodestimates project size by
assigning points to use cases in the same way that Function Point Analysis (FPA) assigns points to
functions. This paper discusses the concept of end-user programming and Advancement of UCP by adding
end-user development/programming as an additional Effort Estimation Factor (EEF).
User Experience Strategy Model - A Methodology to drive User Experiencesushmita_dutt_123
Strategic User experience is redefining the way we design user interface and user interactivity for today’s user-driven technologies – web, mobile, touch-screen, and digital applications. This article presents a structured methodology approach, a model, which illustrates a systematic process in strategizing user experience....Read more
Help through demonstration and automation for interactive computing systems: ...IJECEIAES
Usability is very important however, it is still difficult to develop interactive computing systems that meet all user’s specificities. Help systems should be a way of bridging this gap. This paper presents a general survey on recent works (building upon previous surveys) related to improving applications’ help through demonstration and automation and, identifies which technologies are acting as enablers. The main contributions are, identifying: i) which are the recent existing solutions; ii) which aspects must be investigated further; and iii) which are the main difficulties that are preventing a faster progress.
LOAD DISTRIBUTION COMPOSITE DESIGN PATTERN FOR GENETIC ALGORITHM-BASED AUTONO...ijsc
Current autonomic computing systems are ad hoc solutions that are designed and implemented from the
scratch. When designing software, in most cases two or more patterns are to be composed to solve a bigger
problem. A composite design patterns shows a synergy that makes the composition more than just the sum
of its parts which leads to ready-made software architectures. As far as we know, there are no studies on
composition of design patterns for autonomic computing domain. In this paper we propose pattern-oriented
software architecture for self-optimization in autonomic computing system using design patterns
composition and multi objective evolutionary algorithms that software designers and/or programmers can
exploit to drive their work. Main objective of the system is to reduce the load in the server by distributing
the population to clients. We used Case Based Reasoning, Database Access, and Master Slave design
patterns. We evaluate the effectiveness of our architecture with and without design patterns compositions.
The use of composite design patterns in the architecture and quantitative measurements are presented. A
simple UML class diagram is used to describe the architecture.
ML Times: Mainframe Machine Learning Initiative- June newsletter (2018)Leslie McFarlin
I contributed the featured article in the June 2018 newsletter: Structure and Complexity- Algorithms, Data, and User Experience. In it, I untangle the link between data and algorithms, and how that might limit what design options we have.
EFFICIENT AND RELIABLE PERFORMANCE OF A GOAL QUESTION METRICS APPROACH FOR RE...ecijjournal
Some of the literature survey have been made on the small scale transaction, only few of the transactions
are build on Enterprise Resource Planning and till dated there is not such a methodology or an approach
implemented on the small scale transaction. Several implementations are mainly focus on the large scale
transaction and hence they are handles huge business volume. This paper proposed an approach for reengineering
a small scale transaction by implementing GQM approach. Even though, web technology is most popular and reliable but these paper prove that re-engineering of small scale transaction on standalone application will be effective and reliable than web technology.
A Two Stage Classification Model for Call Center Purchase PredictionTELKOMNIKA JOURNAL
In call center [1] product recommendation field, call center as an organization between users and telecom operator, doesn’t have permission to access users’ specific information and the detailed products information. Accordingly, rule-based selection method is common used to predict user purchase behavior by the call center. Unfortunately, rule-based approach not only ignores the user’s previous behavior information entirely, and it is difficult to make use of the existing interaction records between users and products. Consequently, it will not get desired results if we just use the basic selection method to predict user purchase behavior directly, because the problem is that the features straightly extracted from the interaction data records are limited. In order to solve the problem above, this paper proposes a two-stage algorithm that based on K-Means Clustering Algorithm [2] and SVM [3, 4] Classification Algorithm. Firstly, we get the potential category information of products by K-Means Clustering Algorithm, and then use SVM Classification Model to predict users purchasing behavior. This two-stage prediction model not only solves the feature shortage problem, but also gives full consideration to the potential features between users and product categories, which can help us to gain significant performance in call center product recommendation field.
Computer literacy and competitive pressures among end users is increasing day by day due to whichthe
need for End-User Programming in software packages is also increasing for rapid, flexible, and user
driven information processing solutions. End User Development out-sources development effort to the end
user by enabling softwaredevelopers to create information systems that can even be adapted by technically
inexperienced endusers and hence are in great demand. If end user decides to pay the price and add
significant programmability to their system, there are additional costs to consider before end user can start
to enjoy the payoff. It is important to calculate accurateand early estimation of software size forcalculating
effort and cost estimation of software systems incorporating EUD features. With the evolution of object
orientation, use cases emerged as a dominant method for structuring requirements. Use cases were
integrated into the Unified Modeling Language (UML) and Unified Process and became the standard for
Software Engineering requirements modelling. The Use Case Point (UCP)methodestimates project size by
assigning points to use cases in the same way that Function Point Analysis (FPA) assigns points to
functions. This paper discusses the concept of end-user programming and Advancement of UCP by adding
end-user development/programming as an additional Effort Estimation Factor (EEF).
Agile development methodologies are very promising in the software industry. Agile development techniques are very realistic n understanding the fact that requirement in a business environment changes constantly. Agile development processes optimize the opportunity provided by cloud computing by doing software release iteratively and getting user feedback more frequently. The research work, a study on Agile Methods and cloud computing. This paper analyzes the Agile Management and development methods and its benefits with cloud computing. Combining agile development methodology with cloud computing brings the best of both worlds. A business strategy, the outcomes of which optimize profitability revenue and customer satisfaction by organizing around customer segments, fostering customer-satisfying behaviors, and implementing customer-centric processes
Selected work presented in this Portfolio include User Experience Research, User Experience Architecture, and User Journey and User Experience Designs for Corporate Clients
Agile software development and challengeseSAT Journals
Abstract Loyal and steady customer base alone can keep the organizations successful in the current turbulent business environment. In the current era of software engineering, the success of a business process is measured in terms of „customer satisfaction‟ rather than any other criteria like meeting deadlines for delivery, optimization of data, architecture etc. Day by day, customers are turning out to be more demanding, as their expectations from the software are growing. In order to achieve customer satisfaction in a meaningful way, software engineers are looking for more effective development models. “Agile” is one such model, that fits the bill and therefore industry is looking at with interest .Is agile better than traditional waterfall model will agile work effectively with distributed teams which is most common in the current software engineering Phenomenon. This paper highlights a few challenges with Agile->scrum and gives an insight to the user whether the agile is THE SILVER BULLET . Index Terms: waterfall, Agile, Scrum, XP, distributed teams
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...Eswar Publications
In today’s dynamic marketplace, telecommunication organizations, both private and public, are increasingly leaving antiquated marketing philosophies and strategies to the adoption of more customer-driven initiatives that seek to understand, attract, retain and build intimate long term relationship with profitable customers. This paradigm shift has undauntedly led to the growing interest in Customer Relationship Management (CRM) initiatives that aim at ensuring customer identification and interactions. The urgent market requirement is to identify automated methods that can assist businesses in the complex task of predicting customer churning.
The immediate requirement of the market is to have systems that can perform accurate
(i) identification of loyal customers (so that companies can offer more services to retain them)
(ii) prediction of churners to ensure that only the customers who are planning to switch their service
providers are being targeted for retention
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Software development field is becoming more
productive day by day with the wonderful model name Agile. Agile
is the main focus of research now a days. It is because of its
abilities of handling changes in efficient way through iterative and
incremental practices. Although it became famous because of its
capabilities still there are some issues in it, which is ignorance of
usability engineering in different phases of agile that is an
important aspect to understand the software. Usability has deep
roots in software quality and is a core construct of HCI. To develop
interactive and usable systems there is a need of such a model
which can integrate HCI with Agile. To address this issue. To solve
this issue we have proposed a model which will work with both
User Centered (main focus of HCI) and Agile by assembling
different practices from both fields which will result useable
products. It will enhance software life with user satisfaction by
giving them running software with usability.
Majority of agile projects currently involve interactive user interface designs, which can only be possible by following UCD in agile software model. But the integration of UCD is not clear in the current agile models. Both Agile models and UCD have iterative nature but agile models focus on coding and development of software; whereas, UCD focuses on user interface of the software. Similarly, both of them have testing features where the agile model involves automated tested code while UCD involves an expert or a user to test the user interface. In this paper, a new agile usability model is presented and tested in companies and are presented. Key results from these projects clearly shows: the proposed agile model incorporates usability evaluation methods, improve the relationship between usability experts to work with agile software experts; in addition, allows agile developers to incorporate the result from UCD into subsequent interactions.
Customer relationship management (CRM) is an important element in all forms of industry. This process involves ensuring that the customers of a business are satisfied with the product or services that they are paying for. Since most businesses collect and store large volumes of data about their customers; it is easy for the data analysts to use that data and perform predictive analysis. One aspect of this includes customer retention and customer churn. Customer churn is defined as the concept of understanding whether or not a customer of the company will stop using the product or service in future. In this paper a supervised machine learning algorithm has been implemented using Python to perform customer churn analysis on a given data-set of Telco, a mobile telecommunication company. This is achieved by building a decision tree model based on historical data provided by the company on the platform of Kaggle. This report also investigates the utility of extreme gradient boosting (XGBoost) library in the gradient boosting framework (XGB) of Python for its portable and flexible functionality which can be used to solve many data science related problems highly efficiently. The implementation result shows the accuracy is comparatively improved in XGBoost than other learning models.
Predicted the customer churn rate at Criteo using data of about 550 MB in size. I performed the initial data exploration using Tableau, Python and built the churn models on Python.
Online dating system management project report.pdfKamal Acharya
The objective of our project is to develop an application that offers online dating services where individuals or users can find and contact each other over the internet to arrange a date usually with the objective of developing a romantic, personal and sexual relationship.
Users of an online dating service would currently provide personal information, to enable them to search the service provider's database for other individuals. Members use grade other members set, such as age range, gender and location.
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxchristinemaritza
CHAPTER 8 User Interface
Design
Chapter 8 is the first of three chapters in the systems design phase of the SDLC. This chapter explains how to design an effective user interface, and how to handle data security and control issues. The chapter stresses the importance of user feedback and involvement in all design decisions.
OBJECTIVES
When you finish this chapter, you will be able to:
· Explain the concept of user interface design and human-computer interaction, including basic principles of user-centered design
· Explain how experienced interface designers perform their tasks
· Describe rules for successful interface design
· Discuss input and output technology issues
· Design effective source documents and forms
· Explain printed output guidelines
· Describe output and input controls and security
· Explain modular design and prototyping techniques
INTRODUCTION
User interface design is the first task in the systems design phase of the SDLC. Designing the interface is extremely important because everyone wants a system that is easy to learn and use.
After discussing the user interface, human-computer interaction, and interface design rules, the chapter describes output, data security and control issues, prototyping, and the next steps in the systems design process.
PREVIEW CASE: Mountain View College Bookstore
Background: Wendy Lee, manager of college services at Mountain View College, wants a new information system that will improve efficiency and customer service at the three college bookstores.
In this part of the case, Tina Allen (systems analyst) and David Conroe (student intern) are talking about user interface design issues.
Participants:
Tina and David
Location:
Mountain View College Cafeteria, Monday afternoon, November 25, 2013
Project status:
Tina and David have examined development strategies for the new bookstore system. After performing cost-benefit analysis, they recommended in-house development of the new bookstore system. Now they are ready to begin the systems design phase by working on user interface design for the new system.
Discussion topics:
User interface design concepts and principles
Tina:
Hi, David. Ready to start work on user interface design?
David:
Sure. Will we start with output because it’s important to users?
Tina:
Output is very important, but the most important issue for users is the interface itself. For example, is it easy to learn? Is it easy to work with? We’ll try to design everything — output, input, and all the other elements — from a user’s point of view.
David:
How do we do that?
Tina:
Well, many sources of information about effective design concepts and principles are available. We’ll study those, and then ask our own users for their input and suggestions.
David:
What about input and data entry?
Tina:
Good question, You’ve heard the old saying, “garbage in, garbage out.” User interface principles apply to user input generally, but repetitive data entry deserves special attention. We need to creat ...
Agile development methodologies are very promising in the software industry. Agile development techniques are very realistic n understanding the fact that requirement in a business environment changes constantly. Agile development processes optimize the opportunity provided by cloud computing by doing software release iteratively and getting user feedback more frequently. The research work, a study on Agile Methods and cloud computing. This paper analyzes the Agile Management and development methods and its benefits with cloud computing. Combining agile development methodology with cloud computing brings the best of both worlds. A business strategy, the outcomes of which optimize profitability revenue and customer satisfaction by organizing around customer segments, fostering customer-satisfying behaviors, and implementing customer-centric processes
Selected work presented in this Portfolio include User Experience Research, User Experience Architecture, and User Journey and User Experience Designs for Corporate Clients
Agile software development and challengeseSAT Journals
Abstract Loyal and steady customer base alone can keep the organizations successful in the current turbulent business environment. In the current era of software engineering, the success of a business process is measured in terms of „customer satisfaction‟ rather than any other criteria like meeting deadlines for delivery, optimization of data, architecture etc. Day by day, customers are turning out to be more demanding, as their expectations from the software are growing. In order to achieve customer satisfaction in a meaningful way, software engineers are looking for more effective development models. “Agile” is one such model, that fits the bill and therefore industry is looking at with interest .Is agile better than traditional waterfall model will agile work effectively with distributed teams which is most common in the current software engineering Phenomenon. This paper highlights a few challenges with Agile->scrum and gives an insight to the user whether the agile is THE SILVER BULLET . Index Terms: waterfall, Agile, Scrum, XP, distributed teams
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer ...Eswar Publications
In today’s dynamic marketplace, telecommunication organizations, both private and public, are increasingly leaving antiquated marketing philosophies and strategies to the adoption of more customer-driven initiatives that seek to understand, attract, retain and build intimate long term relationship with profitable customers. This paradigm shift has undauntedly led to the growing interest in Customer Relationship Management (CRM) initiatives that aim at ensuring customer identification and interactions. The urgent market requirement is to identify automated methods that can assist businesses in the complex task of predicting customer churning.
The immediate requirement of the market is to have systems that can perform accurate
(i) identification of loyal customers (so that companies can offer more services to retain them)
(ii) prediction of churners to ensure that only the customers who are planning to switch their service
providers are being targeted for retention
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Software development field is becoming more
productive day by day with the wonderful model name Agile. Agile
is the main focus of research now a days. It is because of its
abilities of handling changes in efficient way through iterative and
incremental practices. Although it became famous because of its
capabilities still there are some issues in it, which is ignorance of
usability engineering in different phases of agile that is an
important aspect to understand the software. Usability has deep
roots in software quality and is a core construct of HCI. To develop
interactive and usable systems there is a need of such a model
which can integrate HCI with Agile. To address this issue. To solve
this issue we have proposed a model which will work with both
User Centered (main focus of HCI) and Agile by assembling
different practices from both fields which will result useable
products. It will enhance software life with user satisfaction by
giving them running software with usability.
Majority of agile projects currently involve interactive user interface designs, which can only be possible by following UCD in agile software model. But the integration of UCD is not clear in the current agile models. Both Agile models and UCD have iterative nature but agile models focus on coding and development of software; whereas, UCD focuses on user interface of the software. Similarly, both of them have testing features where the agile model involves automated tested code while UCD involves an expert or a user to test the user interface. In this paper, a new agile usability model is presented and tested in companies and are presented. Key results from these projects clearly shows: the proposed agile model incorporates usability evaluation methods, improve the relationship between usability experts to work with agile software experts; in addition, allows agile developers to incorporate the result from UCD into subsequent interactions.
Customer relationship management (CRM) is an important element in all forms of industry. This process involves ensuring that the customers of a business are satisfied with the product or services that they are paying for. Since most businesses collect and store large volumes of data about their customers; it is easy for the data analysts to use that data and perform predictive analysis. One aspect of this includes customer retention and customer churn. Customer churn is defined as the concept of understanding whether or not a customer of the company will stop using the product or service in future. In this paper a supervised machine learning algorithm has been implemented using Python to perform customer churn analysis on a given data-set of Telco, a mobile telecommunication company. This is achieved by building a decision tree model based on historical data provided by the company on the platform of Kaggle. This report also investigates the utility of extreme gradient boosting (XGBoost) library in the gradient boosting framework (XGB) of Python for its portable and flexible functionality which can be used to solve many data science related problems highly efficiently. The implementation result shows the accuracy is comparatively improved in XGBoost than other learning models.
Predicted the customer churn rate at Criteo using data of about 550 MB in size. I performed the initial data exploration using Tableau, Python and built the churn models on Python.
Online dating system management project report.pdfKamal Acharya
The objective of our project is to develop an application that offers online dating services where individuals or users can find and contact each other over the internet to arrange a date usually with the objective of developing a romantic, personal and sexual relationship.
Users of an online dating service would currently provide personal information, to enable them to search the service provider's database for other individuals. Members use grade other members set, such as age range, gender and location.
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxchristinemaritza
CHAPTER 8 User Interface
Design
Chapter 8 is the first of three chapters in the systems design phase of the SDLC. This chapter explains how to design an effective user interface, and how to handle data security and control issues. The chapter stresses the importance of user feedback and involvement in all design decisions.
OBJECTIVES
When you finish this chapter, you will be able to:
· Explain the concept of user interface design and human-computer interaction, including basic principles of user-centered design
· Explain how experienced interface designers perform their tasks
· Describe rules for successful interface design
· Discuss input and output technology issues
· Design effective source documents and forms
· Explain printed output guidelines
· Describe output and input controls and security
· Explain modular design and prototyping techniques
INTRODUCTION
User interface design is the first task in the systems design phase of the SDLC. Designing the interface is extremely important because everyone wants a system that is easy to learn and use.
After discussing the user interface, human-computer interaction, and interface design rules, the chapter describes output, data security and control issues, prototyping, and the next steps in the systems design process.
PREVIEW CASE: Mountain View College Bookstore
Background: Wendy Lee, manager of college services at Mountain View College, wants a new information system that will improve efficiency and customer service at the three college bookstores.
In this part of the case, Tina Allen (systems analyst) and David Conroe (student intern) are talking about user interface design issues.
Participants:
Tina and David
Location:
Mountain View College Cafeteria, Monday afternoon, November 25, 2013
Project status:
Tina and David have examined development strategies for the new bookstore system. After performing cost-benefit analysis, they recommended in-house development of the new bookstore system. Now they are ready to begin the systems design phase by working on user interface design for the new system.
Discussion topics:
User interface design concepts and principles
Tina:
Hi, David. Ready to start work on user interface design?
David:
Sure. Will we start with output because it’s important to users?
Tina:
Output is very important, but the most important issue for users is the interface itself. For example, is it easy to learn? Is it easy to work with? We’ll try to design everything — output, input, and all the other elements — from a user’s point of view.
David:
How do we do that?
Tina:
Well, many sources of information about effective design concepts and principles are available. We’ll study those, and then ask our own users for their input and suggestions.
David:
What about input and data entry?
Tina:
Good question, You’ve heard the old saying, “garbage in, garbage out.” User interface principles apply to user input generally, but repetitive data entry deserves special attention. We need to creat ...
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
Draft document to present findings of exploratory work on the incorporation of machine learning and AI into an existing data security product. The project was abandoned due to conflicting work done by product management.
Research Proposal- Integrating Need for CognitionLeslie McFarlin
A proposal for a major retailer who wanted to better understand aspects of users' attitudes and how they related to people's responsiveness to email campaigns.
An example of a custom survey I created for a previous employer in the healthcare industry. The goal was to understand how product use was impacted by social variables of the work environment.
Machine Learning/Artificial Intelligence Strategy: Developing a Trust-Focused...Leslie McFarlin
In order to create a vision for the development of machine learning and AI within CA Technologies' Design Organization, this presentation outlines a 3-part strategy for creating trust in ML/AI products the company develops.
Created in response to the introduction of machine learning into my value stream at CA Technologies, this presentation served as an introduction to machine learning and AI for CA's Design Organization.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Draft Strategy- DCD UX Strategy FY19
1. UX Strategy
CA Data Content Discovery FY19
Leslie A. McFarlin, Sr. UX Architect
EDP Value Stream
1
2. Table of Contents
Introduction Slide 3
Support Shifting to Automation Slide 6
Strengthen Information Presentation Slide 26
Create a Product Narrative Slide 33
Advance Ongoing Usability Efforts Slide 37
2
3. Introduction
This document outlines a UX strategy for Data Content Discovery (DCD) for the
2019 fiscal year.
UX strategy arises out of feedback from product stakeholders, customers, and
recommendations from assigned UX resources.
Each fiscal year, UX strategy will be revisited and revised to ensure support for
changing business goals and customer needs.
3
4. Introduction
FY19’s UX Strategy contains 4 objectives.
1. Support shifting to automation.
2. Strengthen information presentation.
3. Create a product narrative.
4. Advance ongoing usability efforts.
Where appropriate, wireframes will depict examples of solutions.
** Wireframes illustrate the concept, not the final design direction, and may not use the exact icons, fonts, and colors from the product.
4
5. Introduction
Based upon the items in this UX strategy document, two long-term goals for
DCD have been defined:
5
Positively Motivate DCD Usage Help Users Build Trust in DCD
By demonstrating to users that DCD
can help them achieve key tasks in
their data security plan, they will…
...willingly use DCD as intended.
...explore its fit for the future.
By consistently providing valuable
support to users as they perform tasks,
and by providing accurate and valuable
data as the output of those tasks, users
will…
...explore other ways to apply DCD.
...advocate for DCD use.
...collaborate on future feature work.
MOTIVATION → USE → TRUST
7. Initiative Overview
Based upon customer feedback, DCD is shifting from manual activities to
automated activities.
Automation forces a shift in user engagement in terms of what users do,
when they do it, and how.
UX work must support the user through these changes to mitigate the
psychological trade offs automation introduces into workflows.
7
8. Where Does Automation Occur?
8
Autodiscovery Autoscan
● Acts as a user-directed spotlight on
mainframe data.
● Provides an overview of the mainframe data
landscape.
● Populates the data set repository that fuels
Autoscan.
● Policy-governed scanning that executes
based upon a combination of time and
importance.
● Policies may generate one or multiple scans,
though users may still manually create scans.
● FUTURE: Users may provide input on
individual match results to DCD.
9. Automation and User Engagement
Automation reduces cognitive load by performing two types of tasks:
1. Highly repetitive tasks.
a. High user engagement, low cognitive effort- users have to perform every aspect of a
task, but their performance declines over time due to boredom causing a loss of vigilance.
2. Cognitively complex tasks.
a. High user engagement, high cognitive effort- creates mental fatigue because of
sustained mental engagement.
9
10. Automation and User Psychology
Regardless of the automation implementation, users can exhibit any of the
following:
10
Automation Bias
Believing that a user should
not question the output of an
automated system as it can
do the job better than they
can.
Automation Complacency
Ignoring output of an
automated system because it
has a track record of
accuracy.
Automation Irony
Inability to return to evaluate
an automated system’s output
because automation has
enabled a user to engage in
other activities.
11. Automation Bias in DCD
Automation bias will become most evident when requiring input from users.
Users exhibiting automation bias defer to the judgments of the algorithm,
discounting their own knowledge and judgment.
A second form of automation bias exists: Refusing to use automated features
because of the perception that the automation is limited.
This could also appear, but results from either a failure of the product to
produce useful output, or from a mix of other cognitive biases acting on
the situation.
11
12. Mitigating Automation Bias
Automation bias arises from a misunderstanding of automation within a
product, specifically what are its limitations.
Two debiasing methods can be applied to counteract automation bias:
Education, informing users on the strengths and limitations of
automation in DCD.
Nudges, defaulting to a recommended response with supporting
information for the default.
12
13. Debiasing through Education
Educating users on the intended use of automation within DCD will erode the
foundation for automation bias.
Narratives to demonstrate use cases can serve as educational tools.
UX and Information Engineering have a cross-functional group developing best practices
for narrative strategies.
In-application content and help documentation can also educate users.
UX and Information Engineering are already working toward a content strategy for
delivering supplemental information.
13
14. Debiasing through Nudges
Nudges direct users to an ideal response, but still allow them to choose
something different.
Successful nudges pair an ideal response with supporting information.
Engineering, UX, and Information Engineering need to work together to determine:
Lists of possible responses
When to default to a particular response
How to access supporting information
How to communicate supporting information (depth of explanation, tone)
14
15. Nudge Example: Recommended Defaults
15
Recommended defaults
based on match levels for
agreement and actions
Access to
reasons for
recommendations
16. Nudge Example: Supporting Information
16
Visual cues for which row
the user is viewing.
Presents the match level
with the reasons why.
Presents the
recommendations and
the reasons for them.
Note that the reasons
indicate the product
owner can influence the
recommendations via the
scan policy.
17. Automation Complacency in DCD
Automation complacency will also appear once DCD requires input from users
on match results.
Automation complacency usually has a pattern:
Users are engaged with the feature.
Use lessens over time once some internal criteria for behavior is met.
Use picks up again once something unexpected occurs.
17
18. Reducing Automation Complacency
Automation complacency results from automation consistently producing
acceptable results.
Complacency indicates overreliance, misuse due to users’ inattention.
Education can discourage overreliance, but it is not enough because it does
not encourage behavioral change from the user.
Mechanisms for prompting engagement and shaping actions need to be
designed into DCD.
18
19. Prompting & Shaping Example
19
Soft prompt example:
Hard prompt example:
Indicates the scope of information
needing evaluation.
Provides users a way to go
directly to the items needing
feedback.
Messaging clearly indicating the importance of obtaining
feedback.
20. Automation Irony in DCD
Autoscan will be the primary cause of automation irony in DCD:
Autoscan eliminates the need for users to set up individual data scan,
instead requiring a one-time policy creation in order to execute 1 or more
scans.
Automation irony arises from a predictable internal process:
As users learn to trust an automated feature, they will disengage from it,
and focus their attention elsewhere. Returning to the feature becomes
difficult over time due to the change in focus.
20
21. Addressing Automation Irony
Automation irony arises because the automation was designed correctly for
its intended purpose.
Automation irony is a symptom of a busy work environment.
Reducing automation irony follows the same design principles for reducing
automation complacency (prompting and shaping).
Environmental factors are harder for UX to directly impact, making it
harder to design solutions for automation irony.
21
22. Addressing Automation Irony
To increase the odds of successfully combating automation irony, DCD can
add extra functionality:
Email alerts triggered by a time threshold for items needing user input.
Reporting on required user inputs (response counts per sensitive data
type, rate of response).
Any additional features for reducing automation irony should help manage
the user input workflow.
22
23. Prompting & Shaping for Automation Irony
23
Language resembles the hard prompt example:
● “requiring”, to convey the necessity of feedback.
● “critical to maintaining accuracy”, to indicate usefulness
of the feedback.
Banner cannot be closed, and will remain sticky
at the top of all pages until the user clicks the
‘View Items’ link.
24. Email Alerts Example
24
Email alerts can be set according to a time threshold in a
location such as System Settings, or even within individual scan
policies.
Multiple email contacts for providing input
can be set along with the time frame for
email alerts.
**This example assumes email addresses for
users (Autoscan Policy Creator, DCD
Administrator) are held somewhere in the UI. This
is one option for an email alert feature, but not the
only one.
27. Initiative Overview
Content strategy is needed to address multiple content issues in DCD.
Feedback from user testing and insights from a heuristic evaluation have
identified 3 major opportunities:
1. Improving the quality of information within DCD, specifically the
information architecture and terminology used.
2. Adding supplemental information to the UI, such as tutorials and
contextual help.
3. Evaluating the tone of in-application communication.
27
28. Improving Information Quality
As DCD adopts more automation, information content within DCD needs to
change in the following ways:
1. Terminology must shift from indicating manual activities, to signaling
automated activities.
2. Messaging should prioritize plain language over technical language.
3. Information architecture should prioritize major functionality that
supports the intent of the product over secondary functionality.
28
29. Improving Information Quality
Multiple initiatives are needed to address the issue of information quality in
DCD:
Content analysis to address feedback on terminology and messaging
from the recent usability testing and heuristic evaluation.
Card sorting, for creating a useful and usable information architecture
(navigation structure, classifier categorization).
29
30. Adding Supplemental Information
Automating features leads to less user engagement, which means users have
less opportunity to learn how the product functions.
Less knowledge about function makes it easier for users to make errors,
and harder for them to recover from errors.
Supplemental information within DCD serves two purposes:
1. Stop errors before they happen.
2. Enable error recovery.
30
31. Adding Supplemental Information
Tutorials and contextual help need to be monitored periodically via user
testing for depth and fidelity.
Depth refers to level of detail- overcomplication provides too much
detail, while oversimplification does not provide enough. Both leave
users unable to build an accurate mental model of the product.
Fidelity refers to accuracy of detail- low fidelity creates
inaccurate mental models, which ultimately lead to lower user satisfaction
and underutilization when the product does not function as expected.
31
32. Tone of Communication
Tone of in-application messaging conveys attitude, and it influences how
people think about products and use them.
Automated products must pay special attention to tone in the following
circumstances:
Learning and recovery- users respond better to content with an
encouraging tone when they are learning or resolving errors.
Prompting user interaction- where user input is required for the output
of automated tasks, persuasive language can motivate users.
32
34. Initiative Overview
Product narratives serve multiple functions for DCD:
1. Demonstrate product capabilities to new and existing clients.
2. Educate users on how to use the product. [Related to reducing
automation bias.]
3. Provide an internal rallying point for product development.
4. Support the development and maintenance of personas.
UX is currently working with Information Engineering resources to determine
best practices for creating narratives.
**An example of successful narrative creation is from DCD’s “flashy demo”.
34
35. Implementing a Narrative Strategy
35
Phase I
Gather Stakeholder Perspectives
Phase II
Write & Refine
Phase III
Finalize & Release
Identify and interview internal
stakeholders for their insights on
what they are trying to solve, and
for whom.
Stretch goal: Identify and interview
customers for the issues they need
solved, what they expect from the
product, and who would be using
the product for those issues.
Based upon feedback, identify the
key issues and draft narratives for
each.
Validate narratives internally.
Validate narratives externally.
Adjust narratives based upon the
feedback from validation sessions.
Begin using the narratives
internally among the product
teams, and externally with
customers.
36. Current Progress: Phase I
Narrative strategy is a newer concept at CA, and the intent is to use DCD for
setting the standard on implementation.
In-progress items for Phase I include:
● Finalizing interview questions.
● Obtaining additional interview resources across multiple time zones.
● Finalizing available interview time slots.
● Stretch goal: Identifying customers who could potentially give feedback.
**Please come see Leslie for detailed documentation on narrative strategy at CA.
36
38. Initiative Overview
Customer feedback and internal reviews have led to the creation of many
stories for usability improvements that cover content and interaction design.
For details on feedback, see the usability testing report and heuristic
evaluation report.
Product Management, UX, and Engineering must work together to match
business objectives with prioritized UX findings to address usability items in
the backlog.
UX will recommend a schedule of activity to monitor product usability.
38
39. Usability Evaluation Program
As DCD customer adoption improves, more opportunity for customer
validations will present themselves, making this an opportune time to propose
a UX research program comprised of:
● Formative and summative usability testing.
● Inspection methods, such as heuristic evaluations and cognitive
walkthroughs.
● Inclusion of metrics (industry-standard metrics) and development of
custom metrics to baseline the product experience and users’ attitudes
and perceptions.
39
40. Formative and Summative Usability Testing
Usability testing reveals issues that might otherwise go undetected before
users begin interacting with features.
Formative Usability Testing evaluates smaller chunks of a product and
may not include metrics.
Summative Usability Testing considers the larger product and is more
formal, involving metrics and requiring a more detailed analysis.
Both leverage participant screening, task analyses, and retrospective
questioning.
40
41. Inspection Methods
Before conducting usability tests, inspection methods can be conducted to
identify any obvious usability issues and resolve them.
Inspection methods involve usability experts and/or product team members
walking through a product and evaluating it against dimensions of usability.
Cognitive walkthroughs pair usability experts and product team
members in a walkthrough of individual features.
Heuristic evaluations require a minimum of 2 usability experts to
evaluate a product against usability principles.
41
42. Inclusion of Metrics
Metrics provide an easy way to summarize subjective perceptions and
objective measures of usability.
Several industry standard metrics exist that may apply to evaluating
perceptions of usability.
UX will work with product management to decide which metrics meet
DCD’s needs.
Custom metrics will be created to assess users’ attitudes and perceptions of
EDP products.
42
43. Inclusion of Metrics: Custom Metrics
To begin with, a Semantic Differential Scale (SDS), will be created based upon
how product management hopes for EDP products to be perceived by users.
Product management will receive a request to participate in a multi-part
research activity to inform SDS creation.
SDS can assist with improving motivation for DCD usage, as well as acceptance
of DCD within our customers’ work environments.
** To learn about the SDS, visit this site: https://www.fieldboom.com/semantic-differential-scale.
43
44. Improving Design
DCD currently follows the outdated EDL design style, which includes a mix of
interaction design patterns and visual design recommendations.
Within CA’s design community, an effort is underway to standardize
interaction design patterns, but the visual design standards have proven
more challenging.
Visual design experts within the EDP value stream are working on a style guide
to provide a vision for the look and feel of EDP products going forward.
For style guide inquiries, please reach out to Mauricio Silva.
44
46. Future Workflows
Feedback from DCD Product Owners highlighted 2 major workflows related to
the automation support objective:
Reporting, the summary and analysis of policy-related findings.
Remediation, the pathways to remain compliant with data security
regulations.
To maximize usefulness, reporting workflows should link to remediation
workflows.
46
47. Reporting
As a long-term goal, DCD reporting will transition away from summarizing
scan matches to presenting opportunities to improve sensitive data security.
Example wireframes for a regulation-based (PCI-DSS) report created in
2017 can be found here.
Existing wireframes can be evaluated for fit, and then reworked as necessary
before being validated with customers.
** A clickable prototype based on the wireframes linked above was created by a former team member, but the location of that file is
unknown.
47
48. Remediation
Remediation in DCD could allow deletion, archiving, securing, and encrypting
based upon scan results.
At the moment, understanding how the data can be acted upon via DCD
presents a challenge for determining the user flows for each activity.
To begin designing and validating a solution, UX will need the following for
each activity:
Permissions Potential system errors Any limitations by data source
Any external programs needed to complete remediation flows.
48
49. User Motivation
For product use dictated by the work environments, motivation tends to be
driven by external forces (extrinsic motivation).
Externally-motivated actions fall into two categories:
Compliance activities, performed to avoid punitive measures.
Willing activities, performed because of perceived benefits.
For DCD, we should focus on building willingness to use, as it offers users the
greatest benefits.
49
50. User Motivation: Compliance vs. Willingness
Compliance actions can result in underutilization as users do just enough to
avoid punishment for inaction.
For DCD users, underutilization risks failure to comply with data security
regulations and data breaches.
Willingness actions lead to intended use, and exploration of how to use
beyond what was intended.
Marks user acceptance and recognition of the technology’s benefits.
50
51. Technological Trust
Users develop technological trust through demonstrated benefits of use.
Use requires motivation to start, and motivation to persist.
Via continued use, users progress from rules-based trust to knowledge-based
trust.
Rules-based trust focuses on risk-benefit ratios: If benefits outweigh risks,
usage will continue. If not, usage ends.
Knowledge-based trust focuses on understanding what the product
delivers, and how: More knowledge can make it harder to lose trust.
51
52. Technological Trust: Knowledge-Based Trust
Knowledge-based technological trust builds in two ways:
Knowledge of the maker (CA)
Knowledge of the product
Strategic narratives provide direct knowledge of the product through the use
of accurate task scenarios.
Well written narratives create the impression that the maker is
knowledgeable and cares about their customers.
52