SlideShare a Scribd company logo
Making IA Real Planning an Information  Architecture Strategy Chiara Fox Internet Librarian 2001 November 6, 2001
What We’ll Cover ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is Information Architecture? ,[object Object]
An Ecological Approach
IA From Top to Bottom ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Object X Name: Product Category: Topic: Stale Date: Author: Security: portal local subsites (HR, Engineering, R&D…)
Components of IA ,[object Object],[object Object],[object Object]
Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Navigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Labeling ,[object Object],[object Object],[object Object],[object Object]
Websites Need an IA Strategy ,[object Object],[object Object],[object Object]
Know What You Have ,[object Object],[object Object],[object Object],[object Object]
Content Analysis & Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Content Audit Example
Content Map Example ,[object Object],[object Object]
Classification Scheme Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification Scheme Analysis Example
Search & Server Log Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Get a Second Opinion ,[object Object],[object Object],[object Object]
“Points of Pain” Exercise ,[object Object],[object Object],Users complain that they can’t find things on the site. Everyone has different ideas about what the site should do. Hard to cross-sell products and services since they are so separate. Takes too long for the pages to load, especially on a modem.
User Test, User Test, User Test ,[object Object],[object Object],[object Object],[object Object]
Card Sorting & Affinity Diagrams ,[object Object],[object Object],[object Object],[object Object],[object Object]
Affinity Diagram Example
Task Analysis & Mental Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mental Model Example ,[object Object],[object Object]
Bring It All Together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blueprint Example
Wireframe Example
Metadata Schemes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Metadata Schema Example Relevant to …person  …product  …process Subject Keywords Review Date Architectural Placement Title Attribute Name Manual Text – Controlled Vocab Engineers, Semiconductor, Fabrication Process Descriptive Manual Text – Controlled Vocab Dry Etch Technology; Transistor Descriptive Automatic Date 01-01-2002 8:00AM GMT Workflow Manual Text -Controlled Vocab My X-Zone, Product Catalog Workflow Manual Free Text My X-Zone Identity Tagging Process Value Type Examples Type of Attribute
Levels of Control
Ways to Leverage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlled Vocabulary in XML <SVTerm UID=&quot;SVCS::8099&quot;> <label>Document Management Systems</label> <alt>Document Delivery Systems</alt> <alt>Document Management</alt> <alt>Document Delivery</alt> <parent UREF=&quot;SVCS::80&quot;/> <child UREF=&quot;SVCS::8099129&quot;/> <child UREF=&quot;SVCS::8099130&quot;/> <child UREF=&quot;SVCS::8099131&quot;/> <child UREF=&quot;SVCS::8099132&quot;/> <child UREF=&quot;SVCS::8099133&quot;/> </SVTerm> Rapid Implementation Methodology Enterprise Document Archive
Next Step: Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How To Learn More ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
Seccuris Inc.
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
John Macasio
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
Marius FAILLOT DEVARRE
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
Maganathin Veeraragaloo
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
develop security policy
develop security policydevelop security policy
develop security policy
Info-Tech Research Group
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind mapDavid Kennedy
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHanaysha
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
CSSRL PUNE
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
ijcsit
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Kris Kimmerle
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
Leo de Sousa
 

What's hot (20)

Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind map
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Effective IT Security Governance
Effective IT Security GovernanceEffective IT Security Governance
Effective IT Security Governance
 

Viewers also liked

Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
Jesus Rodriguez
 
Understanding Information Architecture: A Workshop
Understanding Information Architecture: A WorkshopUnderstanding Information Architecture: A Workshop
Understanding Information Architecture: A Workshop
Abby Covert
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
OptiRisk India
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journeyAbinav Munshi
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for DevelopersBrandon West
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
Andrea L. Ames
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
Salmon Limited
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
inoday Consultancy Services Pvt. Ltd
 
UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.Debdattaa Saha
 
Logistics and supply chain in rural india the opportunity
Logistics and supply chain in rural india the opportunityLogistics and supply chain in rural india the opportunity
Logistics and supply chain in rural india the opportunity
Amarwaha
 
Calculating ROI with Innovative eCommerce Platforms
Calculating ROI with Innovative eCommerce PlatformsCalculating ROI with Innovative eCommerce Platforms
Calculating ROI with Innovative eCommerce PlatformsMongoDB
 
Gati Logistics and Supply Chain Presentation
Gati Logistics and Supply Chain PresentationGati Logistics and Supply Chain Presentation
Gati Logistics and Supply Chain Presentation
Ningsang Jamir
 
Information architecture bottom up
Information architecture bottom upInformation architecture bottom up
Information architecture bottom up
Mark Baker
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Priyanka Aash
 
Marico: Supply Chain Management
Marico: Supply Chain ManagementMarico: Supply Chain Management
Marico: Supply Chain Management
Shivesh Ranjan
 
Information Architecture & Content Strategy
Information Architecture & Content StrategyInformation Architecture & Content Strategy
Information Architecture & Content Strategy
Andy Fitzgerald
 
E commerce businnes plan
E  commerce businnes planE  commerce businnes plan
E commerce businnes plantobybear30
 

Viewers also liked (19)

Solving data discovery in the enterprise
Solving data discovery in the enterpriseSolving data discovery in the enterprise
Solving data discovery in the enterprise
 
Understanding Information Architecture: A Workshop
Understanding Information Architecture: A WorkshopUnderstanding Information Architecture: A Workshop
Understanding Information Architecture: A Workshop
 
TDD in Zend Framework 2
TDD in Zend Framework 2TDD in Zend Framework 2
TDD in Zend Framework 2
 
Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12Leveraging technology in supply chain logistica12
Leveraging technology in supply chain logistica12
 
Learnings @WalmartLabs - Agile journey
Learnings @WalmartLabs  - Agile journeyLearnings @WalmartLabs  - Agile journey
Learnings @WalmartLabs - Agile journey
 
(API) Docs for Developers
(API) Docs for Developers(API) Docs for Developers
(API) Docs for Developers
 
Modeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent ArchitectureModeling Information Experiences: A Recipe for Consistent Architecture
Modeling Information Experiences: A Recipe for Consistent Architecture
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Navision with ecommerce Services
Navision with ecommerce ServicesNavision with ecommerce Services
Navision with ecommerce Services
 
UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.UMT eCommerce Practice Deck - TechM.
UMT eCommerce Practice Deck - TechM.
 
Logistics and supply chain in rural india the opportunity
Logistics and supply chain in rural india the opportunityLogistics and supply chain in rural india the opportunity
Logistics and supply chain in rural india the opportunity
 
Calculating ROI with Innovative eCommerce Platforms
Calculating ROI with Innovative eCommerce PlatformsCalculating ROI with Innovative eCommerce Platforms
Calculating ROI with Innovative eCommerce Platforms
 
Gati Logistics and Supply Chain Presentation
Gati Logistics and Supply Chain PresentationGati Logistics and Supply Chain Presentation
Gati Logistics and Supply Chain Presentation
 
Information architecture bottom up
Information architecture bottom upInformation architecture bottom up
Information architecture bottom up
 
Gati
GatiGati
Gati
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Marico: Supply Chain Management
Marico: Supply Chain ManagementMarico: Supply Chain Management
Marico: Supply Chain Management
 
Information Architecture & Content Strategy
Information Architecture & Content StrategyInformation Architecture & Content Strategy
Information Architecture & Content Strategy
 
E commerce businnes plan
E  commerce businnes planE  commerce businnes plan
E commerce businnes plan
 

Similar to Making IA Real: Planning an Information Architecture Strategy

User-Driven Taxonomies
User-Driven TaxonomiesUser-Driven Taxonomies
User-Driven Taxonomies
Christine Connors
 
SharePoint Jumpstart #2 Making Basic SharePoint Search Work
SharePoint Jumpstart #2 Making Basic SharePoint Search WorkSharePoint Jumpstart #2 Making Basic SharePoint Search Work
SharePoint Jumpstart #2 Making Basic SharePoint Search Work
Earley Information Science
 
2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final
Hallie Wilfert
 
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
Christian Buckley
 
Ferraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information ArchitectureFerraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information Architecturemferraz
 
11 Strategic Considerations & Davinci Demo
11 Strategic Considerations & Davinci Demo11 Strategic Considerations & Davinci Demo
11 Strategic Considerations & Davinci Demo
Christian Buckley
 
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
Jonathan Ralton
 
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
Christian Buckley
 
Information Architecture
Information ArchitectureInformation Architecture
Information ArchitectureOlivier Tripet
 
RDVO - Building UX Pattern Libraries
RDVO - Building UX Pattern LibrariesRDVO - Building UX Pattern Libraries
RDVO - Building UX Pattern Libraries
Ben Zipkin
 
Process And Methodology Research
Process And Methodology ResearchProcess And Methodology Research
Process And Methodology ResearchMiles Price
 
11 Strategic Considerations for SharePoint Migrations #SPSVB
11 Strategic Considerations for SharePoint Migrations #SPSVB11 Strategic Considerations for SharePoint Migrations #SPSVB
11 Strategic Considerations for SharePoint Migrations #SPSVB
Christian Buckley
 
KnowIT, semantic informatics knowledge base
KnowIT, semantic informatics knowledge baseKnowIT, semantic informatics knowledge base
KnowIT, semantic informatics knowledge baseLaurent Alquier
 
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval Experiences
Joe Lamantia
 
SharePoint Overview
SharePoint OverviewSharePoint Overview
SharePoint Overview
Amy Phillips
 
Search Analytics for Fun and Profit
Search Analytics for Fun and ProfitSearch Analytics for Fun and Profit
Search Analytics for Fun and Profit
Louis Rosenfeld
 
Redesigning TCS.com with Remote Research
Redesigning TCS.com with Remote ResearchRedesigning TCS.com with Remote Research
Redesigning TCS.com with Remote Research
Chris Farnum
 
SharePoint Connections Coast to Coast Overview of Enterprise Content Management
SharePoint Connections Coast to Coast Overview of Enterprise Content ManagementSharePoint Connections Coast to Coast Overview of Enterprise Content Management
SharePoint Connections Coast to Coast Overview of Enterprise Content Management
Ivan Sanders
 
Looking Under the Hood -- Australia SharePoint Conference
Looking Under the Hood -- Australia SharePoint ConferenceLooking Under the Hood -- Australia SharePoint Conference
Looking Under the Hood -- Australia SharePoint Conference
Christian Buckley
 
SharePoint Jumpstart #1 Creating a SharePoint Strategy
SharePoint Jumpstart #1 Creating a SharePoint StrategySharePoint Jumpstart #1 Creating a SharePoint Strategy
SharePoint Jumpstart #1 Creating a SharePoint Strategy
Earley Information Science
 

Similar to Making IA Real: Planning an Information Architecture Strategy (20)

User-Driven Taxonomies
User-Driven TaxonomiesUser-Driven Taxonomies
User-Driven Taxonomies
 
SharePoint Jumpstart #2 Making Basic SharePoint Search Work
SharePoint Jumpstart #2 Making Basic SharePoint Search WorkSharePoint Jumpstart #2 Making Basic SharePoint Search Work
SharePoint Jumpstart #2 Making Basic SharePoint Search Work
 
2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final2008 web-managers-hwilfert-final
2008 web-managers-hwilfert-final
 
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
Strategies for Involving End Users in Your Migration -- GraceHunt Webinar 012...
 
Ferraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information ArchitectureFerraz Ia252 Developing An Information Architecture
Ferraz Ia252 Developing An Information Architecture
 
11 Strategic Considerations & Davinci Demo
11 Strategic Considerations & Davinci Demo11 Strategic Considerations & Davinci Demo
11 Strategic Considerations & Davinci Demo
 
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSNYC14 - Must Love Term Sets: The New and Improved Managed Metadata Service...
 
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
Don't Just Migrate: Transform Your SharePoint Environment - DevConnections Or...
 
Information Architecture
Information ArchitectureInformation Architecture
Information Architecture
 
RDVO - Building UX Pattern Libraries
RDVO - Building UX Pattern LibrariesRDVO - Building UX Pattern Libraries
RDVO - Building UX Pattern Libraries
 
Process And Methodology Research
Process And Methodology ResearchProcess And Methodology Research
Process And Methodology Research
 
11 Strategic Considerations for SharePoint Migrations #SPSVB
11 Strategic Considerations for SharePoint Migrations #SPSVB11 Strategic Considerations for SharePoint Migrations #SPSVB
11 Strategic Considerations for SharePoint Migrations #SPSVB
 
KnowIT, semantic informatics knowledge base
KnowIT, semantic informatics knowledge baseKnowIT, semantic informatics knowledge base
KnowIT, semantic informatics knowledge base
 
Search Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval ExperiencesSearch Me: Designing Information Retrieval Experiences
Search Me: Designing Information Retrieval Experiences
 
SharePoint Overview
SharePoint OverviewSharePoint Overview
SharePoint Overview
 
Search Analytics for Fun and Profit
Search Analytics for Fun and ProfitSearch Analytics for Fun and Profit
Search Analytics for Fun and Profit
 
Redesigning TCS.com with Remote Research
Redesigning TCS.com with Remote ResearchRedesigning TCS.com with Remote Research
Redesigning TCS.com with Remote Research
 
SharePoint Connections Coast to Coast Overview of Enterprise Content Management
SharePoint Connections Coast to Coast Overview of Enterprise Content ManagementSharePoint Connections Coast to Coast Overview of Enterprise Content Management
SharePoint Connections Coast to Coast Overview of Enterprise Content Management
 
Looking Under the Hood -- Australia SharePoint Conference
Looking Under the Hood -- Australia SharePoint ConferenceLooking Under the Hood -- Australia SharePoint Conference
Looking Under the Hood -- Australia SharePoint Conference
 
SharePoint Jumpstart #1 Creating a SharePoint Strategy
SharePoint Jumpstart #1 Creating a SharePoint StrategySharePoint Jumpstart #1 Creating a SharePoint Strategy
SharePoint Jumpstart #1 Creating a SharePoint Strategy
 

More from Chiara Fox Ogan

The Semantic Web: What IAs Need to Know About Web 3.0
The Semantic Web: What IAs Need to Know About Web 3.0The Semantic Web: What IAs Need to Know About Web 3.0
The Semantic Web: What IAs Need to Know About Web 3.0
Chiara Fox Ogan
 
Peoplesoft.com Case Study: Enterprise Information Architecture
Peoplesoft.com Case Study: Enterprise Information ArchitecturePeoplesoft.com Case Study: Enterprise Information Architecture
Peoplesoft.com Case Study: Enterprise Information Architecture
Chiara Fox Ogan
 
Understanding Your Content
Understanding Your ContentUnderstanding Your Content
Understanding Your Content
Chiara Fox Ogan
 
Understanding Your Content
Understanding Your ContentUnderstanding Your Content
Understanding Your Content
Chiara Fox Ogan
 
Content Analysis: Methods and Mentoring
Content Analysis: Methods and MentoringContent Analysis: Methods and Mentoring
Content Analysis: Methods and Mentoring
Chiara Fox Ogan
 
Content Analysis: Methods and Mentoring
Content Analysis: Methods and MentoringContent Analysis: Methods and Mentoring
Content Analysis: Methods and Mentoring
Chiara Fox Ogan
 
Search: The Purest Form of Interaction Design
Search: The Purest Form of Interaction DesignSearch: The Purest Form of Interaction Design
Search: The Purest Form of Interaction Design
Chiara Fox Ogan
 
Content Analysis: The Hows and Whys to Understanding Your Content
Content Analysis: The Hows and Whys to Understanding Your ContentContent Analysis: The Hows and Whys to Understanding Your Content
Content Analysis: The Hows and Whys to Understanding Your Content
Chiara Fox Ogan
 

More from Chiara Fox Ogan (8)

The Semantic Web: What IAs Need to Know About Web 3.0
The Semantic Web: What IAs Need to Know About Web 3.0The Semantic Web: What IAs Need to Know About Web 3.0
The Semantic Web: What IAs Need to Know About Web 3.0
 
Peoplesoft.com Case Study: Enterprise Information Architecture
Peoplesoft.com Case Study: Enterprise Information ArchitecturePeoplesoft.com Case Study: Enterprise Information Architecture
Peoplesoft.com Case Study: Enterprise Information Architecture
 
Understanding Your Content
Understanding Your ContentUnderstanding Your Content
Understanding Your Content
 
Understanding Your Content
Understanding Your ContentUnderstanding Your Content
Understanding Your Content
 
Content Analysis: Methods and Mentoring
Content Analysis: Methods and MentoringContent Analysis: Methods and Mentoring
Content Analysis: Methods and Mentoring
 
Content Analysis: Methods and Mentoring
Content Analysis: Methods and MentoringContent Analysis: Methods and Mentoring
Content Analysis: Methods and Mentoring
 
Search: The Purest Form of Interaction Design
Search: The Purest Form of Interaction DesignSearch: The Purest Form of Interaction Design
Search: The Purest Form of Interaction Design
 
Content Analysis: The Hows and Whys to Understanding Your Content
Content Analysis: The Hows and Whys to Understanding Your ContentContent Analysis: The Hows and Whys to Understanding Your Content
Content Analysis: The Hows and Whys to Understanding Your Content
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Making IA Real: Planning an Information Architecture Strategy

  • 1. Making IA Real Planning an Information Architecture Strategy Chiara Fox Internet Librarian 2001 November 6, 2001
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 28.
  • 29. Metadata Schema Example Relevant to …person …product …process Subject Keywords Review Date Architectural Placement Title Attribute Name Manual Text – Controlled Vocab Engineers, Semiconductor, Fabrication Process Descriptive Manual Text – Controlled Vocab Dry Etch Technology; Transistor Descriptive Automatic Date 01-01-2002 8:00AM GMT Workflow Manual Text -Controlled Vocab My X-Zone, Product Catalog Workflow Manual Free Text My X-Zone Identity Tagging Process Value Type Examples Type of Attribute
  • 31.
  • 32. Controlled Vocabulary in XML <SVTerm UID=&quot;SVCS::8099&quot;> <label>Document Management Systems</label> <alt>Document Delivery Systems</alt> <alt>Document Management</alt> <alt>Document Delivery</alt> <parent UREF=&quot;SVCS::80&quot;/> <child UREF=&quot;SVCS::8099129&quot;/> <child UREF=&quot;SVCS::8099130&quot;/> <child UREF=&quot;SVCS::8099131&quot;/> <child UREF=&quot;SVCS::8099132&quot;/> <child UREF=&quot;SVCS::8099133&quot;/> </SVTerm> Rapid Implementation Methodology Enterprise Document Archive
  • 33.
  • 34.
  • 35.