SlideShare a Scribd company logo
Kristyn Greenwood
Role: Researcher & UX Lead
Methodology for Real-Time Data Collection
for High-Security Environments:
Observational Data Logging
Typical Observational
Methodologies
Real Time Data Collection for High Security Environments
Contextual Inquiry
Naturalistic Observation
The Problem
Real Time Data Collection for High Security Environments
Problem(s)
Drawbacks to typical Ethnographic Methodology
• Developers:
o Prefer Numbers / Statistics
o Don’t trust ‘anecdotal’ evidence
o Feel that their ‘observations’ have equal validity to researcher’s
‘observations’
• Data Collection
• Security Restrictions: No recording (voice or video) allowed.
• Volume of data to record is too high for paper and pencil records
• Computer users frequently multitask
• Computer users frequently use multiple tools simultaneosly
The Solution
Real Time Data Collection for High Security Environments
Observational Data Logging
Real Time
Observation
Time
Data
Accurate
Logs
Coding
Scheme
•Familiarization
•Setup Data Log
Tool
Pre
Observation
•Conduct
Observations
Observation
•Interview
•Collect
Artifacts
Post
Observation
Procedure
Coding Scheme
Task
Action
Object
Tool
Data Logging Utility
Data Reporting Options
Available
Real Time Data Collection for High Security Environments
Example: Percentage Data
• Pie Charts: % of Time
• Bar Charts: Top 5
Example: Duration Data
8 EmailVoicemail
Paper
Telephone
Employee
Directory
Local
Address
Book
Calendar
Informational
Web Page
Remote
Files
Local
Files
13
12
12
167
9
9
8
8
6
7
Example: Interaction Diagrams
Example: Swim Lane
Diagrams
In Conclusion
• Why use this Methodology
o Satisfy Number Driven Product Teams
o Accommodate Restrictions on recording.
o Collect LOTS of data
• 3 Attributes of an Observation
o Time Data
o Accuracy
o Components
• Data Logging Tool (for a copy contact me:
kristyngreenwood@gmail.com

More Related Content

Similar to Real Time Data Collection for High Security Envirnments

Digital forensics
Digital forensicsDigital forensics
Digital forensics
Nicholas Davis
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
Infosec
 
File000117
File000117File000117
File000117
Desmond Devendran
 
Behind the scenes of data science
Behind the scenes of data scienceBehind the scenes of data science
Behind the scenes of data science
Loïc Lejoly
 
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
aceas13tern
 
Optique presentation
Optique presentationOptique presentation
Optique presentation
DBOnto
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
Tzar Umang
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
Gnanavi2
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
OkviNugroho1
 
Network Forensics Basic lecture for Everyone
Network Forensics Basic lecture for EveryoneNetwork Forensics Basic lecture for Everyone
Network Forensics Basic lecture for Everyone
BurhanKhan774154
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
PrabithGupta1
 
CS426_forensics_tools to analyse and deve
CS426_forensics_tools to analyse and deveCS426_forensics_tools to analyse and deve
CS426_forensics_tools to analyse and deve
vikashagarwal874473
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
 
Cyber Security and Data Science
Cyber Security and Data Science Cyber Security and Data Science
Cyber Security and Data Science
Ania Wieczorek
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Big Data Analytics for connected home
Big Data Analytics for connected homeBig Data Analytics for connected home
Big Data Analytics for connected home
Héloïse Nonne
 
Computer Vision for Measurement & FR
Computer Vision for Measurement & FRComputer Vision for Measurement & FR
Computer Vision for Measurement & FR
RekaNext Capital
 
Data Stewardship for SPATIAL/IsoCamp 2014
Data Stewardship for SPATIAL/IsoCamp 2014Data Stewardship for SPATIAL/IsoCamp 2014
Data Stewardship for SPATIAL/IsoCamp 2014
Carly Strasser
 

Similar to Real Time Data Collection for High Security Envirnments (20)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
File000117
File000117File000117
File000117
 
Behind the scenes of data science
Behind the scenes of data scienceBehind the scenes of data science
Behind the scenes of data science
 
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
Developing an Australian phenology monitoring network, Tim Brown, ACEAS Grand...
 
Optique presentation
Optique presentationOptique presentation
Optique presentation
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
computerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdfcomputerforensicppt-160201192341.pdf
computerforensicppt-160201192341.pdf
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
 
Network Forensics Basic lecture for Everyone
Network Forensics Basic lecture for EveryoneNetwork Forensics Basic lecture for Everyone
Network Forensics Basic lecture for Everyone
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
 
CS426_forensics_tools to analyse and deve
CS426_forensics_tools to analyse and deveCS426_forensics_tools to analyse and deve
CS426_forensics_tools to analyse and deve
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Cyber Security and Data Science
Cyber Security and Data Science Cyber Security and Data Science
Cyber Security and Data Science
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Big Data Analytics for connected home
Big Data Analytics for connected homeBig Data Analytics for connected home
Big Data Analytics for connected home
 
Computer Vision for Measurement & FR
Computer Vision for Measurement & FRComputer Vision for Measurement & FR
Computer Vision for Measurement & FR
 
Data Stewardship for SPATIAL/IsoCamp 2014
Data Stewardship for SPATIAL/IsoCamp 2014Data Stewardship for SPATIAL/IsoCamp 2014
Data Stewardship for SPATIAL/IsoCamp 2014
 

More from Kristyn Greenwood

Hiring the-best-presentation for-ux_2017_portfolio
Hiring the-best-presentation for-ux_2017_portfolioHiring the-best-presentation for-ux_2017_portfolio
Hiring the-best-presentation for-ux_2017_portfolio
Kristyn Greenwood
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
Kristyn Greenwood
 
User Story vs. UseCase : Introductory Primer
User Story vs. UseCase : Introductory PrimerUser Story vs. UseCase : Introductory Primer
User Story vs. UseCase : Introductory Primer
Kristyn Greenwood
 
Installation Framework Redesign
Installation Framework RedesignInstallation Framework Redesign
Installation Framework Redesign
Kristyn Greenwood
 
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
Kristyn Greenwood
 
Remote Usability Testing: Note Remotely Expensive
Remote Usability Testing: Note Remotely ExpensiveRemote Usability Testing: Note Remotely Expensive
Remote Usability Testing: Note Remotely Expensive
Kristyn Greenwood
 

More from Kristyn Greenwood (6)

Hiring the-best-presentation for-ux_2017_portfolio
Hiring the-best-presentation for-ux_2017_portfolioHiring the-best-presentation for-ux_2017_portfolio
Hiring the-best-presentation for-ux_2017_portfolio
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
User Story vs. UseCase : Introductory Primer
User Story vs. UseCase : Introductory PrimerUser Story vs. UseCase : Introductory Primer
User Story vs. UseCase : Introductory Primer
 
Installation Framework Redesign
Installation Framework RedesignInstallation Framework Redesign
Installation Framework Redesign
 
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
CustomerRecruitment_Ethicsl_Practical_Issues_ConferencePaper2013
 
Remote Usability Testing: Note Remotely Expensive
Remote Usability Testing: Note Remotely ExpensiveRemote Usability Testing: Note Remotely Expensive
Remote Usability Testing: Note Remotely Expensive
 

Recently uploaded

Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
Bianca Woods
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
Virtual Real Design
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
GOWSIKRAJA PALANISAMY
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
contactproperweb2014
 
PDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in NoidaPDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in Noida
PoojaSaini954651
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
Knight Moves
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
k7nm6tk
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
lunaemel03
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
TE Studio
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
peuce
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
talaatahm
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
Kyungeun Sung
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NishantRathi18
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
pmgdscunsri
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
PabloMartelLpez
 
Revolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in IndiaRevolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in India
amrsoftec1
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
eloprejohn333
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 

Recently uploaded (20)

Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
 
Graphic Design Tools and Software .pptx
Graphic Design Tools and Software   .pptxGraphic Design Tools and Software   .pptx
Graphic Design Tools and Software .pptx
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
 
PDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in NoidaPDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in Noida
 
ARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdfARENA - Young adults in the workplace (Knight Moves).pdf
ARENA - Young adults in the workplace (Knight Moves).pdf
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
 
Revolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in IndiaRevolutionizing the Digital Landscape: Web Development Companies in India
Revolutionizing the Digital Landscape: Web Development Companies in India
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 

Real Time Data Collection for High Security Envirnments

Editor's Notes

  1. As the name implies the Core of the Methodology is the Observation But – Three Key Attributes to the successTime Data – specifically DurationNot just Frequency Duration is the data that can be turned into graphsExplain more about how we capture duration data and analyze it laterComponent Parts – Observations can be vague. You need a coding scheme that ensure consistency in what is reported for each observation. Accurate Recording: Need to be able to quickly and exactly record Exact Start & Stop Times Unique Observations may be recorded every 5 seconds or the User may multitask.Need to have a high degree of consistency between observations sessions and observersSo how
  2. PreObservation – Surveys, Interviews & Training. Need to become very familiar with the materials & Setup Observation - Start Time, Components, & Notes (e.g. for asking clarification on an activity later)Post ObservationInterview (for asking about unclear acitvities – what was that script or why did you do that thing with the squiggly)Imporant to interview RIGHT AWAY and Fix items in data log. “(e.g. ‘unclear task’ & ‘unknown tool’ can be replaced by ‘Check System Load’ and ‘personal script’). Collect stuff that illustrates work (screenshots of webpages referenced during job, flow charts from walls, sticky notes)
  3. ComponentsFor us each observation, information is collected on the task that the user is attempting to accomplish, the specific action that the user is performing, the object to which the action or actions pertain, and the tool used to perform that action. You don’t have to use these 4 component, you don’t even have to use just 4. These are the ones that work best for us.You develop your coding scheme via – Surveys, Interviews & Training. Need to become very familiar with the materials & Setup VALIDATE ITSetup the ToolAnd PRACTICE