SlideShare a Scribd company logo
Know the User John Kelleher IT Sligo
Designing for the user
Basic Activities of Interaction Design ,[object Object],[object Object],[object Object],[object Object]
Overview  of Needs Identification ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information Gathered from Task Analysis
Why do Requirements? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Gathered ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SharpReader Conceptual model derived from user ’ s knowledge of Outlook
Information Gathered ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Transcription of 6 minutes of an ATC exchanges with flights traversing a sector in the London area
Establishing requirements   ,[object Object],[object Object],[object Object],[object Object]
Different kinds of requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different kinds of requirements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Different kinds of requirements ,[object Object],[object Object],[object Object]
Kinds of requirements ,[object Object],[object Object],[object Object],[object Object]
Define goals for your application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Categories of Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Level of Expertise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Levels of Expertise (contd.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User categories ( anecdotal ) ,[object Object],[object Object],[object Object]
Data gathering techniques (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data gathering techniques (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data gathering techniques (3) ,[object Object],[object Object],[object Object]
Data gathering techniques (4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data gathering techniques (5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data gathering techniques (6)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1  Gaver et al (1999) Cultural probes.  ACM Interactions Magazine,  January and February, 21-29 Cultural  Probes
Task descriptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario for shared calendar Victoria is a bright young college student looking for a gift for her younger sister, who is turning 16 in two weeks. Like most college students, Victoria is on a tight budget, but wants to get something memorable and useful for her sister on this important birthday for a young girl.  She ’ s heard some of her friends talk about ebirthdayz.com, and so she decides to check it out. On the ebirthdayz.com homepage, she sees that the Web site has a gift recommendation feature. Victoria finds the recommendations screen and sees gifts based on her sister ’ s age and general interests, as well as her own limited finances.  The site shows some suggestions, and Victoria chooses a popular favourite and buys it, including gift-wrapping. Total time spent: 20 minutes. ”
Scenarios (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Storyboards
Task analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Task Analysis ,[object Object],[object Object],[object Object],[object Object]
Example Hierarchical Task Analysis 0. In order to borrow a book from the library   1. go to the library   2. find the required book 2.1  access library catalogue 2.2  access the search screen 2.3  enter search criteria 2.4  identify required book  2.5  note location 3. go to correct shelf and retrieve book 4. take book to checkout counter
Example: Hierarchical Task Analysis (plans) plan 0: do 1-3-4. If book isn ’ t on the shelf expected, do 2-3-4. plan 2: do 2.1-2.4-2.5. If book not identified do 2.2-2.3-2.4.
Example Hierarchical Task Analysis (graphical) Borrow a book from the library go to the library find required book retrieve book from shelf take book to counter 3 2 1 4 0 access catalogue access search screen enter search criteria identify required book note location plan 0:  do 1-3-4.  If book isn ’ t on the shelf expected, do 2-3-4. plan 2:  do 2.1-2.4-2.5. If book not identified from information available, do 2.2-2.3-2.4-2.5 2.1 2.2 2.3 2.4 2.5
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Affinity diagramming Reprinted by permission from  Contextual Design  by Hugh Beyer & Karen Holtzblatt, InContext Enterprises, http://www.incent.com,  © Morgan Kaufmann, 1998
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exercise ,[object Object],[object Object],[object Object],[object Object]
Automatic syringe 1 3 6 7 2 6 5 4 3 2 1 0 1  4  7  2 + + + - - - + - Before consulting users After consulting users 7 8 9
Further Reading ,[object Object]
Readings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
Saqib Raza
 
helbredte
helbredtehelbredte
helbredtebutest
 
Human Factors and Professional Issues
Human Factors and Professional IssuesHuman Factors and Professional Issues
Human Factors and Professional Issues
Reem Alattas
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software process
Alan Dix
 
Hci md exam
Hci md examHci md exam
Hci md exam
Desalegn Aweke
 
Human computer interaction - assignment presentation
Human computer interaction  - assignment presentationHuman computer interaction  - assignment presentation
Human computer interaction - assignment presentation
Nuraini Mohd Ghani
 
Connect activities
Connect  activitiesConnect  activities
Connect activitiesEMC-DE
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL
Um e Farwa
 
HMI Design Reviewed by Paul Gruhn
HMI Design Reviewed by Paul GruhnHMI Design Reviewed by Paul Gruhn
HMI Design Reviewed by Paul Gruhn
ISA Interchange
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
Prof.Dharmishtha R. Chaudhari
 
Software engg. pressman_ch-12
Software engg. pressman_ch-12Software engg. pressman_ch-12
Software engg. pressman_ch-12Dhairya Joshi
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
YogeshIJTSRD
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
Amir NikKhah
 
Artificial Intelligence and Expert Systems
Artificial Intelligence and Expert SystemsArtificial Intelligence and Expert Systems
Artificial Intelligence and Expert SystemsSiddhant Agarwal
 
Unit 7 performing user interface design
Unit 7 performing user interface designUnit 7 performing user interface design
Unit 7 performing user interface design
Preeti Mishra
 

What's hot (18)

User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
helbredte
helbredtehelbredte
helbredte
 
Human Factors and Professional Issues
Human Factors and Professional IssuesHuman Factors and Professional Issues
Human Factors and Professional Issues
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software process
 
Hci md exam
Hci md examHci md exam
Hci md exam
 
Human computer interaction - assignment presentation
Human computer interaction  - assignment presentationHuman computer interaction  - assignment presentation
Human computer interaction - assignment presentation
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Connect activities
Connect  activitiesConnect  activities
Connect activities
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL
 
HMI Design Reviewed by Paul Gruhn
HMI Design Reviewed by Paul GruhnHMI Design Reviewed by Paul Gruhn
HMI Design Reviewed by Paul Gruhn
 
Requirement analysis
Requirement analysisRequirement analysis
Requirement analysis
 
Software engg. pressman_ch-12
Software engg. pressman_ch-12Software engg. pressman_ch-12
Software engg. pressman_ch-12
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
 
Ce36484489
Ce36484489Ce36484489
Ce36484489
 
E3 chap-05
E3 chap-05E3 chap-05
E3 chap-05
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Artificial Intelligence and Expert Systems
Artificial Intelligence and Expert SystemsArtificial Intelligence and Expert Systems
Artificial Intelligence and Expert Systems
 
Unit 7 performing user interface design
Unit 7 performing user interface designUnit 7 performing user interface design
Unit 7 performing user interface design
 

Similar to Know the user

UX (User Experience) Process, May 2017
UX (User Experience) Process, May 2017UX (User Experience) Process, May 2017
UX (User Experience) Process, May 2017
Gary Coker
 
Ui Design And Usability For Everybody
Ui Design And Usability For EverybodyUi Design And Usability For Everybody
Ui Design And Usability For EverybodyEmpatika
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
Best Rahim
 
Lecture 4
Lecture 4Lecture 4
Lecture 49anm12
 
Understanding Stakeholder Needs
Understanding Stakeholder NeedsUnderstanding Stakeholder Needs
Understanding Stakeholder NeedsSandeep Ganji
 
Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...
Mekon Ltd.
 
SE2023 0201 Software Analysis and Design.pptx
SE2023 0201 Software Analysis and Design.pptxSE2023 0201 Software Analysis and Design.pptx
SE2023 0201 Software Analysis and Design.pptx
Bharat Chawda
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitationAbdul Basit
 
Cis 375 Education Redefined - snaptutorial.com
Cis 375    Education Redefined - snaptutorial.comCis 375    Education Redefined - snaptutorial.com
Cis 375 Education Redefined - snaptutorial.com
DavisMurphyC76
 
UCIDesign.ppt
UCIDesign.pptUCIDesign.ppt
UCIDesign.ppt
MrUmairKhan1
 
11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx
ZahirahZairul2
 
Cis 375 Enhance teaching / snaptutorial.com
Cis 375   Enhance teaching / snaptutorial.comCis 375   Enhance teaching / snaptutorial.com
Cis 375 Enhance teaching / snaptutorial.com
Davis105
 
User Research Techniques by Vikram Rao, RSA
User Research Techniques by Vikram Rao, RSAUser Research Techniques by Vikram Rao, RSA
User Research Techniques by Vikram Rao, RSA
STC India UX SIG
 
Usability methods to improve EMRs
Usability methods to improve EMRsUsability methods to improve EMRs
Usability methods to improve EMRs
Jeffery Belden
 
User Experience & Design…Designing for others…UED
User Experience & Design…Designing for others…UEDUser Experience & Design…Designing for others…UED
User Experience & Design…Designing for others…UED
Preeti Chopra
 
Requirement Engineering.pdf
Requirement Engineering.pdfRequirement Engineering.pdf
Requirement Engineering.pdf
Muhammad Imran
 
SE UNIT-2.pdf
SE UNIT-2.pdfSE UNIT-2.pdf
SE UNIT-2.pdf
Dr. Radhey Shyam
 
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
Carol Smith
 
Machine learning at b.e.s.t. summer university
Machine learning  at b.e.s.t. summer universityMachine learning  at b.e.s.t. summer university
Machine learning at b.e.s.t. summer university
László Kovács
 

Similar to Know the user (20)

UX (User Experience) Process, May 2017
UX (User Experience) Process, May 2017UX (User Experience) Process, May 2017
UX (User Experience) Process, May 2017
 
Ui Design And Usability For Everybody
Ui Design And Usability For EverybodyUi Design And Usability For Everybody
Ui Design And Usability For Everybody
 
Usecase
UsecaseUsecase
Usecase
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Understanding Stakeholder Needs
Understanding Stakeholder NeedsUnderstanding Stakeholder Needs
Understanding Stakeholder Needs
 
Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...
 
SE2023 0201 Software Analysis and Design.pptx
SE2023 0201 Software Analysis and Design.pptxSE2023 0201 Software Analysis and Design.pptx
SE2023 0201 Software Analysis and Design.pptx
 
Requirements elicitation
Requirements elicitationRequirements elicitation
Requirements elicitation
 
Cis 375 Education Redefined - snaptutorial.com
Cis 375    Education Redefined - snaptutorial.comCis 375    Education Redefined - snaptutorial.com
Cis 375 Education Redefined - snaptutorial.com
 
UCIDesign.ppt
UCIDesign.pptUCIDesign.ppt
UCIDesign.ppt
 
11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx11 - Evaluating Framework in Interaction Design_new.pptx
11 - Evaluating Framework in Interaction Design_new.pptx
 
Cis 375 Enhance teaching / snaptutorial.com
Cis 375   Enhance teaching / snaptutorial.comCis 375   Enhance teaching / snaptutorial.com
Cis 375 Enhance teaching / snaptutorial.com
 
User Research Techniques by Vikram Rao, RSA
User Research Techniques by Vikram Rao, RSAUser Research Techniques by Vikram Rao, RSA
User Research Techniques by Vikram Rao, RSA
 
Usability methods to improve EMRs
Usability methods to improve EMRsUsability methods to improve EMRs
Usability methods to improve EMRs
 
User Experience & Design…Designing for others…UED
User Experience & Design…Designing for others…UEDUser Experience & Design…Designing for others…UED
User Experience & Design…Designing for others…UED
 
Requirement Engineering.pdf
Requirement Engineering.pdfRequirement Engineering.pdf
Requirement Engineering.pdf
 
SE UNIT-2.pdf
SE UNIT-2.pdfSE UNIT-2.pdf
SE UNIT-2.pdf
 
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
Users are Losers! They’ll Like Whatever we Make! and Other Fallacies.
 
Machine learning at b.e.s.t. summer university
Machine learning  at b.e.s.t. summer universityMachine learning  at b.e.s.t. summer university
Machine learning at b.e.s.t. summer university
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Know the user

  • 1. Know the User John Kelleher IT Sligo
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. SharpReader Conceptual model derived from user ’ s knowledge of Outlook
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Scenario for shared calendar Victoria is a bright young college student looking for a gift for her younger sister, who is turning 16 in two weeks. Like most college students, Victoria is on a tight budget, but wants to get something memorable and useful for her sister on this important birthday for a young girl. She ’ s heard some of her friends talk about ebirthdayz.com, and so she decides to check it out. On the ebirthdayz.com homepage, she sees that the Web site has a gift recommendation feature. Victoria finds the recommendations screen and sees gifts based on her sister ’ s age and general interests, as well as her own limited finances. The site shows some suggestions, and Victoria chooses a popular favourite and buys it, including gift-wrapping. Total time spent: 20 minutes. ”
  • 30.
  • 32.
  • 33.
  • 34. Example Hierarchical Task Analysis 0. In order to borrow a book from the library 1. go to the library 2. find the required book 2.1 access library catalogue 2.2 access the search screen 2.3 enter search criteria 2.4 identify required book 2.5 note location 3. go to correct shelf and retrieve book 4. take book to checkout counter
  • 35. Example: Hierarchical Task Analysis (plans) plan 0: do 1-3-4. If book isn ’ t on the shelf expected, do 2-3-4. plan 2: do 2.1-2.4-2.5. If book not identified do 2.2-2.3-2.4.
  • 36. Example Hierarchical Task Analysis (graphical) Borrow a book from the library go to the library find required book retrieve book from shelf take book to counter 3 2 1 4 0 access catalogue access search screen enter search criteria identify required book note location plan 0: do 1-3-4. If book isn ’ t on the shelf expected, do 2-3-4. plan 2: do 2.1-2.4-2.5. If book not identified from information available, do 2.2-2.3-2.4-2.5 2.1 2.2 2.3 2.4 2.5
  • 37.
  • 38.
  • 39.
  • 40. Automatic syringe 1 3 6 7 2 6 5 4 3 2 1 0 1 4 7 2 + + + - - - + - Before consulting users After consulting users 7 8 9
  • 41.
  • 42.

Editor's Notes

  1. Ackroyd study of an expert system installed in a police department in Northern England. Purpose of system was to help them identify possible suspects in unsolved criminal cases. It allowed details of a crime to be entered at a special dedicated computer terminal and would then search through criminal records and suggest names of people to investigate further. System was not popular with detectives, and received very little use. This was an unexpected outcome, because the system performed reliably according to the specification drawn up for it. However, its design did not fit well with the organisation of the detective ’ s day. Detectives often interrupted 4 times during 90 minute period and can be see interrupting other members of the force at least once. Expert system required users to leave their desks and go to the terminal room, log in to the system, set up the details of the unsolved case, and then spend enough time at the terminal to scan the names it produced. Detectives however felt obliged to be at their desks, available to take messages and handle emergencies. Other study concerns the unexpected usefulness of a system for generating reports of crime statistics. In the police department where it was installed, its main purpose was to provide management with up-to-date statistics so that they could make strategic decisions about resource allocations according to crime trends. After some initial teething troubles had been resolved, it became a useful adjunct to the department ’ s information systems. One of its unexpected uses was in supporting detectives during certain kinds of interviews. From time to time, detectives encountered suspects who are confessing to crimes and willing to plea-bargain. Detectives used system to check the details of the confessed crimes. Often interview was moved to the data-entry room which itself was found conducive to confessing! Detectives weren ’ t concerned by their absence from their desks as they were getting rapid results.
  2. Users encounter difficulties of many kinds. Routing use of office software, for example, may involve problems such as these: The size of documents are measured in bytes, not pages or words. Finding a document involves remembering a file name such as jhb-8-29-94.txt, not a location in a file-cabinet drawer. Entering simple data, such as a date, may involve translation into an obscure format, for example, 29 th August 1994 may become 940829.
  3. University self-service cafeteria Functional: The system will calculate the total cost of purchases Data: The system must have access to the price of products in the cafeteria Environmental: Cafeteria users will be carrying a tray and will most likely be in a reasonable rush. The physical environment will be noisy and busy, and users may be talking with friends and colleagues while using the system. User: The majority of users are likely to be under 25 and comfortable dealing with technology. Usability: The system needs to be simple so that new users can use the system immediately, and memorable for more frequent user. Users won ’ t want to wait around for the system to finish processing, so it needs to be efficient and to be able to deal easily with user errors. Nuclear Power Plant Functional: The system will need access to temperature readings Data: The physical environment is likely to be uncluttered and to impose few restrictions on the console itself unless there is a need to wear protective clothing (depending on where the console is to be located. User: The user is likely to be a well-trained engineer or scientist who is competent to handle technology. Usability: Outputs from the system, especially warning signals and gauges, must be clear and unambiguous. Distributed Design Teams Functional: The system will be able to communicate information between remote sites. Data: The system must have access to design information that will be captured in a common file format. Environmental: Physically distributed over a wide area. Files and other electronic media need to be shared. The system must comply with available communication protocols and be compatible with network technologies. User: Professional designers, who may be worried about technology but who are likely to be prepared to spend time learning a system that will help them perform their jobs better. The design team is likely to be multi-lingual. Usability: Keeping transmission error rate low is likely to be of high priority.
  4. Gaver et al (1999) Three different groups: Oslo, Amsterdam, Pisa. Materials: 8-10 postcards: “ Tell us a piece of advice or insight that has been important to you ” ; “ What is your favourite device? ” ; “ What is the role of art in your life? ” 7 maps: Mark sites where they meet people; or to be alone; to daydream. Mark places they ’ d like to visit in the world Disposable camera: First person they see that day.; something desirable; photo album: tell stories with pictures media diary: record use of radio and tv Amsterdam: proposed network of computer displays for communication Oslo: community-wide conversation led by elders about social issues, with questions published in e-Kiosks for the public to answer Pisa: social and pastoral radio-scapes to create flexible comms networks. Side benefit: provoked elderly to consider their role and the pleasure they experience, hinting possible future roles. Contextual Enquiry Contextual Enquiry (CE) is a technique for examining and understanding users and their workplace, tasks, issues and preferences. CE can be used to produce user needs analyses and task analyses. The results of a CE feed directly into the design process. Although CE is time-consuming, it uncovers a wealth of invaluable data. When is CE appropriate? CE is appropriate whenever you need to develop or communicate an understanding of the users of an existing or proposed system. How is a CE conducted? A contextual enquiry consists of visiting several users on site, observing them carrying out their tasks, and analyzing and documenting the resultant data. How many people are needed? Two people should be involved in any site visits, if possible. It is not possible to capture all the available information, but using two people maximizes the data returned. At least two people should be involved in analyzing the data. Site visit materials When carrying out site visits, you will need the following materials: A list of representative users. Include both expert and novice users in your visits. Logging sheets. Expect to make copious notes. You may consider audio- or video-recording; however the unpredictable nature of the activity often makes this difficult. Demographic questionnaire for user profiling. User satisfaction questionnaire. How do you analyze the data? Immediately after each site visit you should enter your data into a word processing program. Your notes should be at the lowest possible level of granularity. Number each note, and print them out on labels or cards. Use a system that allows you to trace every individual note to its source (for example, 'User 1, Note 57'). Use the notes in sequence to construct sequence models of the tasks carried out.Use affinity diagramming to group all related issues. Site Visit guidelines Remember that the purpose of site visits is to learn from your users. Ensure you obtain appropriate approvals from management and employee organizations. Try to minimize disruption. However, try not to accept a time-slot that will not enable you to see the work being done in a typical fashion. Avoid preconceptions about the users and their tasks. Ensure that you do not give negative signals to the users, either verbally or by your body language. Do not prompt users to carry out tasks differently, or in an order other than the one they use normally. Do not rely on users' recollection of how they carry out tasks. Instead, ask them to carry out the actual tasks while you are on site. Listen and watch attentively. Remember that the users are the only domain experts. Be respectful of your users, their employers and colleagues. Be flexible. It is common to arrive on site to find that users' expectations do not match your plan, no matter how much effort you may have put into communicating your requirements. Be prepared to make the most of available resources. Guidelines for data analysis Avoid unsupported conclusions. If a conclusion appears to be correct but unsupported, re-examine the data and your method to see whether you have missed anything. As a rule of thumb, plan for four hours of analysis time for every one hour on site. Be prepared to contact users by phone to verify any observations which are doubtful.
  5. A scenario is a description of a person's interaction with a system. Scenarios help focus design efforts on the user's requirements, which are distinct from technical or business requirements. Scenarios may be related to 'use cases', which describe interactions at a technical level. Unlike use cases, however, scenarios can be understood by people who do not have any technical background. They are therefore suitable for use during participatory design activities. When are scenarios appropriate? Scenarios are appropriate whenever you need to describe a system interaction from the user's perspective. They are particularly useful when you need to remove focus from the technology in order to open up design possibilities, or when you need to ensure that technical or budgetary constraints do not override usability constraints without due consideration. Scenarios can help confine complexity to the technology layer (where it belongs), and prevent it from becoming manifest within the user interface. How do you write scenarios? To write a scenario, you need a basic understanding of the tasks to be supported by the system. You also need to have an understanding of the users and the context of use. Scenarios can be derived from data gathered during contextual enquiry activities. If you do not have access to such data, you can write scenarios based on prior knowledge or even 'best guess', provided the scenarios will be subject to review by users prior to being used as a basis for making design decisions. To write a scenario, describe in simple language the interaction that needs to take place. It is important to avoid references to technology, except where the technology represents a design constraint that must be acknowledged. Include references to all relevant aspects of the interaction, even where they are outside the current scope of the technology. Such references may include cultural and attitudinal issues. For example, the fact that Jane is continually interrupted by telephone calls may be just as relevant as the software platform she uses. After you have written a scenario, review it and remove any unwarranted references to systems or technologies. For example, the statement 'the customer identifies herself' is appropriate, whereas 'the customer types her 4-digit PIN' is not (unless the PIN is a non-negotiable system constraint). You should also have the scenario reviewed by users to ensure that it is representative of the real world. How do you use scenarios? Use scenarios during design to ensure that all participants understand and agree to the design parameters, and to specify exactly what interactions the system must support. Translate scenarios into tasks for conducting walk-through activities and usability tests. Example The following is a sample scenario describing a customer withdrawing money from an automated teller machine (ATM). It's Friday afternoon and Joe is flying to Sydney. He doesn't have enough money for a taxi to the airport, and he's running late. He goes to the local ATM and identifies himself. He specifies that he wants $100 from his savings account. He'd like the money in $20 notes so that he can give the taxi driver the correct change. He doesn't want a printed receipt, as he doesn't bother keeping track of transactions in this account. Note that this description specifically avoids references to transaction cards and PINs. This leaves open the possibility of considering a variety of identification and authorization regimes. Be prepared to review scenarios based on feedback from users. In particular, be prepared to modify or even abandon any unrealistic or unrepresentative scenarios.