SlideShare a Scribd company logo
!
                                       !"                    #"
                                                              $                   !
                                   !          %!                                  &" '!                       %
                                                                                                              !



                                                        !                       !                   #"
                                                                                                     $            !
                                   (   %            &" '!                       %
                                                                                !




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       1
)                     !            '!
        * '
                                   "
             –
             –
             –
             –
             –
                                       "                   "




Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   2
+                          '!




             '!                           '                               !                       !                      '       ,
     !                                                       !%

                      "!            "              +                    -        ,               !
                             +          " !                      " ,                      (        "                !,       !
     !                             '!                                           !                                                "
     +                       "            +                        ""                           %

Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                    3
.                 '!
                                                            ! #
                                                             "                   $
                                   %& (
                                     ')                              ')
                                                                     )*
                                   +                              ,-  .                                  /
                                        "                                                            0
                                       1                                ,( )
                                                                          )

                                   "
                                   !                  2)
                                                       )3                                ')
                                                                                          )*
                                                                                        4    .

                                   5                                     6                               4
                                    4




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       4
/




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   5
0 !                           1    + .
  "                                 , "




Copyright © 2009 Perficient, Inc      PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   6
"




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   7
2                                    '"
                                   /4                /

             7                          8
                                        / 9             :
             4
                                    ;
                                   <
             7

                                   4




             4 /




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   8
.                                                $"                         !


             =                                              >          ?

             ,@
              @@                   /


             A                     .     B
                –
                            C
                            C


                –

                                                                   1
                –            4
                                   ; 4




Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   9
*                           "                '

                           4
                                       <




          –
          –
          –     D
          –     7
          –     A
          –     "
          –                   1    /
          –




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   10
3             (                                   ,%
 "


        5 / !                                                                        "
        C   E                      >                                                 C   E
                                                                                                             /
        C   =

                                                                                     C   =




                          (                                   "
                          '



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       11
.                                   "                                  (



                                   <

        7




        7                              /

                                       4

                                           /
              .
                                                                                                                 Cisco Personas
                                                <




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                12
'       !                 !                   4,
   " "                                 4   (                 ""




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   13
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   14
'                      "




                  Todd Warfel
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   15
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   16
'                           ,




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   17
"
                                                                                                                 /
                                                          <

        D                                                                                                            6
                   8

                                                                    8                                                    4
                                       4                            8

        0                                                                 /           4
        4

                                   4




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED               18
!   ,                                   '
                                                                           '


        "

            8

        =




        5 /

        !




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   19
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   20
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   21
"


          –!                       .
          –
          –                                4                         1
          –
          –
          –
          –0




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   22
2" '


                   4
                                          <

        F                          84 F
                                     <

        !             4                                        .




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   23
3                         "

                      +                                                               5
                              "        " 6!
        ,<
                     – D
                     – D
                     –
                     –     "
                     –                          4                              4

        '<                             G         G                                            <

        (<                                 >                                                         4               <

        H<                         /       4                                      <




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       24
5      !                               "


                                                                                               +               !

      =                                I ;   .                                                                 D                   /
                                                   4 ;
                                                                     / 4<
                                                   1                                                                           <
                                       4                             D
                                   <                                                                                               /

                                                        <
                                                                                                                       <
                                                                                         ;              <
                                                                     9 <:                                                                  8
                                                                                                                               J
                                                                                                               4
                                                                                                                           <


                                                                                                                                       <

Copyright © 2009 Perficient, Inc                 PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                           25
3                         "

                                       7   "         8"


                  "                4

                  E


                  E                                                       ; / 4

                  5                                             4

                  E                                >

                                                                                            8




Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   26
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   27
.                               "

                                   .                                         4                               <

          – K                                                       4                         /                  .
                                                         <



        D

          –                         /                        !50                  4 /
          – !                      4 /
          –                                                  1




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           28
3$                       " '


                "                                                      "




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   29
*
        Analysis                                                                                                        Data Oriented
        focuses on
        patterns




                                   Design Oriented

        Analysis is
        drawn to
        unique and
        extreme
        cases
                            Less Structured in                                                                           Very Structured in
                            Research Plans                                                                               Research Plans
                            and Data Collection                                                                          and Data Collection



Copyright © 2009 Perficient, Inc                  PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                          30
'                                                (


          "

          C




          C
                               4



          C                        .




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   31
,                  '      ! " '

                          *        /                                                                *        /



           A                                                                      0




                                                                                  5
                                                                                                                 4



      The design-oriented approach                                           The data-oriented approach taught
         enabled the team to recognize                                          the team to carefully weigh their
         new learning opportunities, and to                                     judgments against the evidence
         trust their instincts.

Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED           32
Getting started
                                   Forming the team
                                   Collecting and analyzing data to
                                   drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   33
!

        $
          – $
          – +
          – L



        5
          –                    1     7>                                 1              7                     4
          – $                  4          1                             9
                                                                               /8                                   :
          – !
          – "                      8. /
          – 7                       4 4                 4            4 /                                 4




Copyright © 2009 Perficient, Inc              PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED       34
*




                                                                                                         35
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        35
2                               (                         ' ,




                                                                                                             36
Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED        36
1

        A .                        !


          – D




          –




        $
          – 7                      4                4
          –



Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   37
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: the elements
                                   of a good persona
                                   Validating the personas




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   38
2                               '                        "

 Archetype name

 Identifying
 details

 Short,
 memorable story

 Goals,
 motivations

 Context,
 environment

 Values and
 attitudes




Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   39
"




Copyright © 2009 Perficient, Inc       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   40
Getting started
                                   Forming the team
                                   Collecting and analyzing data to drive the personas
                                   Creating personas: elements of a good persona
                                   Validating the personas



Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   41
7,                            "                                8


     !                                   /    P                                                                #
      MI                                       MO                                                                  K           ;
       1                                       4
                           4       4 /                                    <N
              ;                          /                                                                                 4       >
                  /                  ;         7;                                                                      <

              ;
              / <N




                                                                                                                                       42
Copyright © 2009 Perficient, Inc             PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                            42
,


                                   /   /4                                                                                 <
                 ! 4                                                          /
                 ! 4                                                                          /

                                                                                                                      4
                 >
                    – E4                    >
                 !




                                                                                                                              43
Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                43
,

             Candidates                                         Considerations                                               Participants
        !                                      B              E4                        B                                         4     4
                                                              E      4                                  B
                                   B                          –      $
                                                              –      !                            I                          01    4
                  8                        4
                                       B                      –      +
                                                              –      0                                                            < <
                .                  /               B
                                                              –

                            < <
                                   B
                                                              01
        D                              4 /8                      –
               B
                                                                 – $
                                                              !                             8
                                                                                        6         I
                                                                                                                                            44
Copyright © 2009 Perficient, Inc                       PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                       44
2" ' ,                                         "

                 7                     />                                         /,                 '<
                    –              1        I                                         -                               B
                                   7                    7          /                                              4
                                       <
                              C
                              C
                                   7                                                  7                                           /
                                                                  1                   <
                                                     4                                                                            <
                 K            4                                                                                   <
                 K            4                                                                                               <
                 $                          4                                 4
                 4                          4           4                                                 /               4   4
                                                                                  <
                                                                                                                                  45
Copyright © 2009 Perficient, Inc            PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                        45
)'                              '                 '

                 A                                                                                           4
                                               BI                                                                B

                                   4       /
                                                                   <



                                                                                                  <
                                                                         4
                                                            <7                                                   4
                                                             /                                             4              4
                                                                               <

     2                                 ,                           '                     "
      !!                           '                                                                   +             +
                                       "                    +                 !!                                         ( %   46
Copyright © 2009 Perficient, Inc           PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                      46
Copyright © 2009 Perficient, Inc   PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   47
2                               "   " !


        0>

        D
                     8                 .

        7
                     4                                   4                           4


          – 7
          – "                              4
          –
          – 0                              4




Copyright © 2009 Perficient, Inc               PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED   48
<                                                                                     < ! 5!
         ,@<
          @@
            4                      P <
                                                                                       !            <I                 ')
                                                                                                                       )@
         5                         !       QK        R <                     "
         #                                           "                                                                $ %<     4$
         ')<
          )-
                             L         Q                             <                                     &                  '
                                   (                                                                       <5                P
         ')<
          )2




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED                   49
$ 3
                             )             3                                  #        "

                                    2           * ! + 9 ; <
                                                        : < =
                                             9 < - 9< 3
                                              ; <    <   2
Identity management and governance has become a focal point for companies trying to meet regulatory and industry
expectations around information integrity and accountability. Information is power and information security is more crucial
now than ever.

And whether it is the protection of proprietary technology, customer information or financial data, identity management
should be a key component of any corporate security strategy.

In December’s Perficient Perspectives we’ll look at Identity Management:

      • What is it?
      • The three keys to an effective identity management strategy:
              • Business alignment
              • Executive involvement
              • Measurable results
      • Identity management solutions
      • Where does technology fit in?
      • Why technology alone is not the answer
      • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
.                                   '!




                                                            <             6         ! 3
                                   "        >
                                    1
                                                                                                                      <




                                   4    <   6       '!                                            /<           6          '!




Copyright © 2009 Perficient, Inc                PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED            51

More Related Content

Similar to Using Personas in User Experience Design

Royal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksRoyal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinks
Gert Steens
 
U of U Undergraduate IMC Class
U of U Undergraduate IMC ClassU of U Undergraduate IMC Class
U of U Undergraduate IMC Class
Chris Carlston
 
6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computingCangpt
 
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42  boycott of virani moti's shantidas bapu for pro satpanth activitiesOE 42  boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
Satpanth Dharm
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgKheirEddine Tolba
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningTakashi Iba
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012VillaAlhambra
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallEverTrue
 
2011mayo Profesorado
2011mayo Profesorado2011mayo Profesorado
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12Lwala
 
EB-85 A
EB-85 AEB-85 A
Social Media and IMC
Social Media and IMCSocial Media and IMC
Social Media and IMC
Chris Carlston
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Texxi Global
 
Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09
Cambra de Comerç de Barcelona
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social MediaLiza Doyle
 

Similar to Using Personas in User Experience Design (20)

Royal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinksRoyal Ten Cate: Faster, cheaper and better than the market thinks
Royal Ten Cate: Faster, cheaper and better than the market thinks
 
Zayda sierra esp
Zayda sierra espZayda sierra esp
Zayda sierra esp
 
U of U Undergraduate IMC Class
U of U Undergraduate IMC ClassU of U Undergraduate IMC Class
U of U Undergraduate IMC Class
 
6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing6102 db us_en_wp_grid computing
6102 db us_en_wp_grid computing
 
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42  boycott of virani moti's shantidas bapu for pro satpanth activitiesOE 42  boycott of virani moti's shantidas bapu for pro satpanth activities
OE 42 boycott of virani moti's shantidas bapu for pro satpanth activities
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Les bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sgLes bdd relationnelles et leurs sg
Les bdd relationnelles et leurs sg
 
Learning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative LearningLearning 3.0: The Age of Creative Learning
Learning 3.0: The Age of Creative Learning
 
Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012Villa Alhambra Financials Sept. 2012
Villa Alhambra Financials Sept. 2012
 
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana HallWhat's Hot & What's Not in Alumni/ae Relations - Dana Hall
What's Hot & What's Not in Alumni/ae Relations - Dana Hall
 
2011mayo Profesorado
2011mayo Profesorado2011mayo Profesorado
2011mayo Profesorado
 
workshop lca board 11.1.12
workshop lca board 11.1.12workshop lca board 11.1.12
workshop lca board 11.1.12
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Social Media and IMC
Social Media and IMCSocial Media and IMC
Social Media and IMC
 
Quranic therapy booklet 2
Quranic therapy booklet 2Quranic therapy booklet 2
Quranic therapy booklet 2
 
Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling Nokia - Empty Seats Travelling
Nokia - Empty Seats Travelling
 
Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09Nota mensual d'actualitat econòmica Maig09
Nota mensual d'actualitat econòmica Maig09
 
GaMPI - The Value of Social Media
GaMPI - The Value of Social MediaGaMPI - The Value of Social Media
GaMPI - The Value of Social Media
 

More from Perficient, Inc.

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
Perficient, Inc.
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
Perficient, Inc.
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
Perficient, Inc.
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Perficient, Inc.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
Perficient, Inc.
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
Perficient, Inc.
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
Perficient, Inc.
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Perficient, Inc.
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Perficient, Inc.
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
Perficient, Inc.
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
Perficient, Inc.
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
Perficient, Inc.
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
Perficient, Inc.
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
Perficient, Inc.
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
Perficient, Inc.
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
Perficient, Inc.
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
Perficient, Inc.
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
Perficient, Inc.
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
Perficient, Inc.
 

More from Perficient, Inc. (20)

Driving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season ResultsDriving Strong 2020 Holiday Season Results
Driving Strong 2020 Holiday Season Results
 
Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation Transforming Pharmacovigilance Workflows with AI & Automation
Transforming Pharmacovigilance Workflows with AI & Automation
 
The Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial ServicesThe Secret to Acquiring and Retaining Customers in Financial Services
The Secret to Acquiring and Retaining Customers in Financial Services
 
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
Oracle Strategic Modeling Live: Defined. Discussed. Demonstrated.
 
Content, Commerce, and... COVID
Content, Commerce, and... COVIDContent, Commerce, and... COVID
Content, Commerce, and... COVID
 
Centene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success StoryCentene's Financial Transformation Journey: A OneStream Success Story
Centene's Financial Transformation Journey: A OneStream Success Story
 
Automate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug KodaAutomate Medical Coding With WHODrug Koda
Automate Medical Coding With WHODrug Koda
 
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration ProjectPreparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
Preparing for Your Oracle, Medidata, and Veeva CTMS Migration Project
 
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
Accelerating Partner Management: How Manufacturers Can Navigate Covid-19
 
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand FishkinThe Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
The Critical Role of Audience Intelligence with Eric Enge and Rand Fishkin
 
Cardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM CloudCardtronics Future Ready with Oracle EPM Cloud
Cardtronics Future Ready with Oracle EPM Cloud
 
Teams Summit - What is New and Coming
Teams Summit -  What is New and ComingTeams Summit -  What is New and Coming
Teams Summit - What is New and Coming
 
Empower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis ManagementEmpower Your Organization with Teams & Remote Work Crisis Management
Empower Your Organization with Teams & Remote Work Crisis Management
 
Adoption & Change Management Overview
Adoption & Change Management OverviewAdoption & Change Management Overview
Adoption & Change Management Overview
 
Microsoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from HomeMicrosoft Teams: Measuring Activity of Employees Working from Home
Microsoft Teams: Measuring Activity of Employees Working from Home
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Infrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote WorkersInfrastructure Best Practices for Teams Remote Workers
Infrastructure Best Practices for Teams Remote Workers
 
Accelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft TeamsAccelerate Adoption for Microsoft Teams
Accelerate Adoption for Microsoft Teams
 
Preparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge ManagementPreparing for Project Cortex and the Future of Knowledge Management
Preparing for Project Cortex and the Future of Knowledge Management
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Using Personas in User Experience Design

  • 1. ! !" #" $ ! ! %! &" '! % ! ! ! #" $ ! ( % &" '! % ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 1
  • 2. ) ! '! * ' " – – – – – " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 2
  • 3. + '! '! ' ! ! ' , ! !% "! " + - , ! + " ! " , ( " !, ! ! '! ! " + " + "" % Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 3
  • 4. . '! ! # " $ %& ( ') ') )* + ,- . / " 0 1 ,( ) ) " ! 2) )3 ') )* 4 . 5 6 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 4
  • 5. / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 5
  • 6. 0 ! 1 + . " , " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 6
  • 7. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 7
  • 8. 2 '" /4 / 7 8 / 9 : 4 ; < 7 4 4 / Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 8
  • 9. . $" ! = > ? ,@ @@ / A . B – C C – 1 – 4 ; 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 9
  • 10. * " ' 4 < – – – D – 7 – A – " – 1 / – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 10
  • 11. 3 ( ,% " 5 / ! " C E > C E / C = C = ( " ' Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 11
  • 12. . " ( < 7 7 / 4 / . Cisco Personas < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 12
  • 13. ' ! ! 4, " " 4 ( "" Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 13
  • 14. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 14
  • 15. ' " Todd Warfel Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 15
  • 16. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 16
  • 17. ' , Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 17
  • 18. " / < D 6 8 8 4 4 8 0 / 4 4 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 18
  • 19. ! , ' ' " 8 = 5 / ! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 19
  • 20. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 20
  • 21. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 21
  • 22. " –! . – – 4 1 – – – –0 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 22
  • 23. 2" ' 4 < F 84 F < ! 4 . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 23
  • 24. 3 " + 5 " " 6! ,< – D – D – – " – 4 4 '< G G < (< > 4 < H< / 4 < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 24
  • 25. 5 ! " + ! = I ; . D / 4 ; / 4< 1 < 4 D < / < < ; < 9 <: 8 J 4 < < Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 25
  • 26. 3 " 7 " 8" " 4 E E ; / 4 5 4 E > 8 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 26
  • 27. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 27
  • 28. . " . 4 < – K 4 / . < D – / !50 4 / – ! 4 / – 1 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 28
  • 29. 3$ " ' " " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 29
  • 30. * Analysis Data Oriented focuses on patterns Design Oriented Analysis is drawn to unique and extreme cases Less Structured in Very Structured in Research Plans Research Plans and Data Collection and Data Collection Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 30
  • 31. ' ( " C C 4 C . Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 31
  • 32. , ' ! " ' * / * / A 0 5 4 The design-oriented approach The data-oriented approach taught enabled the team to recognize the team to carefully weigh their new learning opportunities, and to judgments against the evidence trust their instincts. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 32
  • 33. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 33
  • 34. ! $ – $ – + – L 5 – 1 7> 1 7 4 – $ 4 1 9 /8 : – ! – " 8. / – 7 4 4 4 4 / 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 34
  • 35. * 35 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 35
  • 36. 2 ( ' , 36 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 36
  • 37. 1 A . ! – D – $ – 7 4 4 – Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 37
  • 38. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: the elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 38
  • 39. 2 ' " Archetype name Identifying details Short, memorable story Goals, motivations Context, environment Values and attitudes Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 39
  • 40. " Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 40
  • 41. Getting started Forming the team Collecting and analyzing data to drive the personas Creating personas: elements of a good persona Validating the personas Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 41
  • 42. 7, " 8 ! / P # MI MO K ; 1 4 4 4 / <N ; / 4 > / ; 7; < ; / <N 42 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 42
  • 43. , / /4 < ! 4 / ! 4 / 4 > – E4 > ! 43 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 43
  • 44. , Candidates Considerations Participants ! B E4 B 4 4 E 4 B B – $ – ! I 01 4 8 4 B – + – 0 < < . / B – < < B 01 D 4 /8 – B – $ ! 8 6 I 44 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 44
  • 45. 2" ' , " 7 /> /, '< – 1 I - B 7 7 / 4 < C C 7 7 / 1 < 4 < K 4 < K 4 < $ 4 4 4 4 4 / 4 4 < 45 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 45
  • 46. )' ' ' A 4 BI B 4 / < < 4 <7 4 / 4 4 < 2 , ' " !! ' + + " + !! ( % 46 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 46
  • 47. Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 47
  • 48. 2 " " ! 0> D 8 . 7 4 4 4 – 7 – " 4 – – 0 4 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 48
  • 49. < < ! 5! ,@< @@ 4 P < ! <I ') )@ 5 ! QK R < " # " $ %< 4$ ')< )- L Q < & ' ( <5 P ')< )2 Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 49
  • 50. $ 3 ) 3 # " 2 * ! + 9 ; < : < = 9 < - 9< 3 ; < < 2 Identity management and governance has become a focal point for companies trying to meet regulatory and industry expectations around information integrity and accountability. Information is power and information security is more crucial now than ever. And whether it is the protection of proprietary technology, customer information or financial data, identity management should be a key component of any corporate security strategy. In December’s Perficient Perspectives we’ll look at Identity Management: • What is it? • The three keys to an effective identity management strategy: • Business alignment • Executive involvement • Measurable results • Identity management solutions • Where does technology fit in? • Why technology alone is not the answer • How to assess your own level of corporate exposure to identity abuse and infrastructure vulnerabilities
  • 51. . '! < 6 ! 3 " > 1 < 4 < 6 '! /< 6 '! Copyright © 2009 Perficient, Inc PROPRIETARY AND CONFIDENTIAL – UNAUTHORIZED REPRODUCTION PROHIBITED 51