SlideShare a Scribd company logo
Information
Architecture
-The Basics-
Presented by KeroYu
Friday, 2 August, 13
About Kero
• Digital Art Design, Donghua University, China
• New Media Design and Web Development
Senior Management Certificate, BCIT, Canada
• Worked at: Sharp Point Press, Gamebase. eBay
Taiwan, Electronic Arts
• Now owns a column at TechOrange.com
Friday, 2 August, 13
What is I.A.?
• The structural design of shared information
environments.
• The combination of organization, labeling, search, and
navigation systems within Websites, intranets and
interactive media.
• The art and science of shaping information products
and experiences to support usability and findability.
• An emerging discipline and community of practice
focused on bringing principles of design and
architecture to the digital landscape.
Friday, 2 August, 13
Structuring
Organizing
Labeling
Friday, 2 August, 13
Finding and Managing
Friday, 2 August, 13
Art and Science
Friday, 2 August, 13
Why I.A. matters?
• The cost of finding information
• The cost of not finding information
• The value of education
• The cost of construction
• The cost of maintenance
• The cost of training
• The value of brand
Friday, 2 August, 13
In short, I.A. will save your
time & money, and make
people love your site.
Friday, 2 August, 13
Basic Model
Friday, 2 August, 13
Context
•Business goals, funding, politics,
culture, technology, resources, and
constraints
Friday, 2 August, 13
Users
•Audience, tasks, needs,
information seeking behaviour,
experience
Friday, 2 August, 13
Content
•Document/data types, content
objects, volume, existing structure
Friday, 2 August, 13
Practice:
Explain IA to Others
Friday, 2 August, 13
User Needs and
Behaviours
Friday, 2 August, 13
All websites serves
information.
All users come to a site for
information needs.
Friday, 2 August, 13
The Too-Simple
Information Model
• User asks a question.
• Black Magic! (Something happens.)
• User receives the answer.
• Finish!
Friday, 2 August, 13
Things are not
always that simple.
And, prior to all...
Friday, 2 August, 13
When studying IA,
we need to know
the motivations behind
every behaviour.
Friday, 2 August, 13
If we don’t think about it, we’re
just wasting time to make
something that no one cares.
Friday, 2 August, 13
Users’ Questions
• Where am I? (What is this site about?)
• Is there anything I need?
• Why I should be here?
Friday, 2 August, 13
What do users want?
Let’s use the metaphor of
fishing to get at the answer.
Friday, 2 August, 13
Known-item seeking
The too-simple model would solve it.
The Perfect Catch
Friday, 2 August, 13
Exploratory seeking
You hope that whatever ambles in will be useful.
Lobster Trapping
Friday, 2 August, 13
Exhaustive research
You try to drag up everything you can.
Indiscriminate
Drift Netting
Friday, 2 August, 13
Need-it-again re-finding
I’ve seen you before.
White Shark
Friday, 2 August, 13
Information-Seeking
Behaviours
Friday, 2 August, 13
Major Seeking Behaviours
•Searching
•Browsing
•Asking
Friday, 2 August, 13
And we know how to
approach.
(Search engine, list, email or forum)
Friday, 2 August, 13
More Complex Models
•Berry-picking
•Pearl-growing
Friday, 2 August, 13
Berry-picking
Keep picking bits of information
along the way and modify the requests.
Friday, 2 August, 13
Pearl-growing
You want “more like this one”.
Friday, 2 August, 13
Figure out what’s the best
way for your users to find
information, and apply it.
Friday, 2 August, 13
Be sure they
really need it.
Friday, 2 August, 13
So, which model
should we choose?
Friday, 2 August, 13
There’s no correct answer.
Just stick to
“two-step”model.
Friday, 2 August, 13
... and keep
“User Needs”
in mind.
Friday, 2 August, 13
Tons of IA options
• Organization Systems
• Navigation Systems
• Search Systems
• Labeling Systems
• Browsing/Searching Aids
Friday, 2 August, 13
80/20 Principle
Only 20% of IA options fit user needs.
Your job is to figure it out.
Friday, 2 August, 13
Practice
• Imagine the browsing experience on
a travel agent website.
• Give examples of all 4 seeking
motivations and describe about
when and how integrations/
iterations happen.
Friday, 2 August, 13
THANKYOU!
• Tell me you how you think about the
first lecture, what your favourite
part is, and how I can improve it.
• E-Mail: kero.yu@spring-trees.com
Friday, 2 August, 13

More Related Content

Similar to Information Architecture the Basics - User Needs

Designing For Transparency
Designing For TransparencyDesigning For Transparency
Designing For Transparency
macurak
 
Collaborative technology round table NESTA 11th may 2011
Collaborative technology round table NESTA 11th may 2011Collaborative technology round table NESTA 11th may 2011
Collaborative technology round table NESTA 11th may 2011
Carla Ross
 
An Introduction to DevOps with Chef
An Introduction to DevOps with ChefAn Introduction to DevOps with Chef
An Introduction to DevOps with ChefJulian Dunn
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
Ram Parthasarathy
 
Drupal: Internet Lego - What is Drupal?
Drupal: Internet Lego - What is Drupal?Drupal: Internet Lego - What is Drupal?
Drupal: Internet Lego - What is Drupal?
Eric Aitala
 
Icse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineeringIcse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineeringCS, NcState
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
Cherlowe Reinard Ramirez, MCTS
 
Responsive Design & the Business Analyst
Responsive Design & the Business AnalystResponsive Design & the Business Analyst
Responsive Design & the Business Analyst
Ted Hardy, MBA, CBAP
 
Lean isn't lean
Lean isn't leanLean isn't lean
Lean isn't lean
Lean Teams Consultancy
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
Thinkful
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
Thinkful
 
Educational Technologies
Educational TechnologiesEducational Technologies
Educational Technologies
Jason Zagami
 
Design zen presentation, fall 2012
Design zen presentation, fall 2012Design zen presentation, fall 2012
Design zen presentation, fall 2012Graham Garner
 
Ojala "The Sophisticated User"
Ojala "The Sophisticated User"Ojala "The Sophisticated User"
Data science and visualization lab presentation
Data science and visualization lab presentationData science and visualization lab presentation
Data science and visualization lab presentation
iHub Research
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
bhavesh lande
 
Serving the DIY Patron
Serving the DIY PatronServing the DIY Patron
Serving the DIY PatronALATechSource
 
Information Architecture - A Primer
Information Architecture - A PrimerInformation Architecture - A Primer
Information Architecture - A Primer
Rajarajan Radhakrishnan
 

Similar to Information Architecture the Basics - User Needs (20)

Designing For Transparency
Designing For TransparencyDesigning For Transparency
Designing For Transparency
 
Info arch
Info archInfo arch
Info arch
 
Collaborative technology round table NESTA 11th may 2011
Collaborative technology round table NESTA 11th may 2011Collaborative technology round table NESTA 11th may 2011
Collaborative technology round table NESTA 11th may 2011
 
An Introduction to DevOps with Chef
An Introduction to DevOps with ChefAn Introduction to DevOps with Chef
An Introduction to DevOps with Chef
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
 
Drupal: Internet Lego - What is Drupal?
Drupal: Internet Lego - What is Drupal?Drupal: Internet Lego - What is Drupal?
Drupal: Internet Lego - What is Drupal?
 
Icse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineeringIcse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineering
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Responsive Design & the Business Analyst
Responsive Design & the Business AnalystResponsive Design & the Business Analyst
Responsive Design & the Business Analyst
 
Lean isn't lean
Lean isn't leanLean isn't lean
Lean isn't lean
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
 
Educational Technologies
Educational TechnologiesEducational Technologies
Educational Technologies
 
Design zen presentation, fall 2012
Design zen presentation, fall 2012Design zen presentation, fall 2012
Design zen presentation, fall 2012
 
Ojala "The Sophisticated User"
Ojala "The Sophisticated User"Ojala "The Sophisticated User"
Ojala "The Sophisticated User"
 
Data science and visualization lab presentation
Data science and visualization lab presentationData science and visualization lab presentation
Data science and visualization lab presentation
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
 
Serving the DIY Patron
Serving the DIY PatronServing the DIY Patron
Serving the DIY Patron
 
Information Architecture - A Primer
Information Architecture - A PrimerInformation Architecture - A Primer
Information Architecture - A Primer
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Information Architecture the Basics - User Needs