This document outlines an agenda for a usability workshop on heuristic evaluations and usability testing. The workshop will begin with a focus on heuristic evaluations, exploring both traditional heuristic methods as well as more modern approaches. Nielsen's 10 heuristics will be discussed as a traditional starting point. However, the presentation will note that expert reviewers have moved away from strict adherence to heuristics and instead focus more on user experience and directly addressing users' needs through methods like persona-based scenario reviews. The goal is to help attendees understand both established and evolving methods for identifying opportunities to improve the usability of a product or service.
Storytelling the Results of Heuristic EvaluationUXPA Boston
This interactive talk focuses on the UX tool of heuristic evaluation (or expert review) and best practices for designing and reporting the results of this review. Audience members will be prompted to share their experiences in conducting reviews and reporting them. A straw poll will indicate how many follow a standard set of heuristics and how many do something else. Discussion of the whys and why nots will set the stage for focusing on how to report the results. A brief walk through the evolution of reporting from the checklist to the narrative will be reviewed with examples from reports to prompt audience stories of their process and its effectiveness. New UX practitioners and students, as well as seasoned veterans, will have the chance to defend their approach or perhaps be persuaded to change.
Storytelling the Results of Heuristic EvaluationUXPA Boston
This interactive talk focuses on the UX tool of heuristic evaluation (or expert review) and best practices for designing and reporting the results of this review. Audience members will be prompted to share their experiences in conducting reviews and reporting them. A straw poll will indicate how many follow a standard set of heuristics and how many do something else. Discussion of the whys and why nots will set the stage for focusing on how to report the results. A brief walk through the evolution of reporting from the checklist to the narrative will be reviewed with examples from reports to prompt audience stories of their process and its effectiveness. New UX practitioners and students, as well as seasoned veterans, will have the chance to defend their approach or perhaps be persuaded to change.
A Linked Knowledge Base for Simulation LearningIrene Celino
Simulation Learning is a frequent practice to conduct near-real, immersive and engaging training sessions. AI Planning and Scheduling systems are used to automatically create and supervise learning sessions; to this end, they need to manage a large amount of knowledge about the simulated situation, the learning objectives, the participants’ behaviour, etc.
In this paper, we explain how Linked Data and Semantic Web technologies can help the creation and management of knowledge bases for Simulation Learning. We also present our experience in building such a knowledge base in the context of Crisis Management Training.
Prats Interpretation Of Geometric Shapes An Eye Movement StudyKalle
This paper describes a study that seeks to explore the correlation between eye movements and the interpretation of geometric shapes. This study is intended to inform the development of an eye tracking interface for computational tools to support and enhance the natural interaction required in creative design. A common criticism of computational design tools is that they do not enable manipulation of designed shapes according to all perceived features. Instead the manipulations afforded are limited by formal structures of shapes. This research examines the potential for eye movement data to be used to recognise and make available for manipulation the perceived features in shapes. The objective of this study was to analyse eye movement data with the intention of recognising moments in which an interpretation of shape is made. Results suggest that fixation duration and saccade amplitude prove to be consistent indicators of shape interpretation.
Growth Hacking meets UX - Introductory Presentation at our Growth Hacking Ind...Growth Hacking Asia
This presentation explains the importance of an optimized UX in the context of growth hacking. It shows how successful user activation is directly tied to good UX and stresses the need to develop a
Slide deck from Growth Hacking Asia's 'Growth hacking meets UX' workshop on Saturday, May 16 in Kuala Lumpur. Slide deck prepared by Mac Jake - Founder of Reparkapp, UX/UI Designer and our workshop instructor.
Growth Hacking Asia's presentation on Facebook Advertising. Learn how to set up a landing page to direct your ads to, plus the specifics of ads like lookalike and custom audiences.
Discover the list of tools that startups can use (mostly for free) to make their ideas come alive quickly. The tools solve problems from designing, marketing, sales, team work, fulfillment to financials. Products that help from the idea stage to the product stage are included.
Developing by SalesQualia, The Sales Model Canvas provides a complete view of the sales process for enterprise sales opportunities. By utilizing the Sales Model Canvas, individual salespeople and teams quickly identify key risks and information gaps in their sales process with a specific sales opportunity.
By focusing on Customer Needs as the central point of each sales opportunity, following the Sales Model Canvas enables sales professionals consider strengths and gaps in their prospect relationships.
Contact Scott Sambucci with questions or suggestions:
scott [at] salesqualia [dot] com
Learn a 3 step process that will make people looking at your website, turn into actual paying customers. Despite what they may think, startups don't have an exposure problem, they have a conversion problem.
New to UX? Check out this short presentation to get a basic understanding of what you can do to your website to make sure browsers will convert to buyers.
A Linked Knowledge Base for Simulation LearningIrene Celino
Simulation Learning is a frequent practice to conduct near-real, immersive and engaging training sessions. AI Planning and Scheduling systems are used to automatically create and supervise learning sessions; to this end, they need to manage a large amount of knowledge about the simulated situation, the learning objectives, the participants’ behaviour, etc.
In this paper, we explain how Linked Data and Semantic Web technologies can help the creation and management of knowledge bases for Simulation Learning. We also present our experience in building such a knowledge base in the context of Crisis Management Training.
Prats Interpretation Of Geometric Shapes An Eye Movement StudyKalle
This paper describes a study that seeks to explore the correlation between eye movements and the interpretation of geometric shapes. This study is intended to inform the development of an eye tracking interface for computational tools to support and enhance the natural interaction required in creative design. A common criticism of computational design tools is that they do not enable manipulation of designed shapes according to all perceived features. Instead the manipulations afforded are limited by formal structures of shapes. This research examines the potential for eye movement data to be used to recognise and make available for manipulation the perceived features in shapes. The objective of this study was to analyse eye movement data with the intention of recognising moments in which an interpretation of shape is made. Results suggest that fixation duration and saccade amplitude prove to be consistent indicators of shape interpretation.
Growth Hacking meets UX - Introductory Presentation at our Growth Hacking Ind...Growth Hacking Asia
This presentation explains the importance of an optimized UX in the context of growth hacking. It shows how successful user activation is directly tied to good UX and stresses the need to develop a
Slide deck from Growth Hacking Asia's 'Growth hacking meets UX' workshop on Saturday, May 16 in Kuala Lumpur. Slide deck prepared by Mac Jake - Founder of Reparkapp, UX/UI Designer and our workshop instructor.
Growth Hacking Asia's presentation on Facebook Advertising. Learn how to set up a landing page to direct your ads to, plus the specifics of ads like lookalike and custom audiences.
Discover the list of tools that startups can use (mostly for free) to make their ideas come alive quickly. The tools solve problems from designing, marketing, sales, team work, fulfillment to financials. Products that help from the idea stage to the product stage are included.
Developing by SalesQualia, The Sales Model Canvas provides a complete view of the sales process for enterprise sales opportunities. By utilizing the Sales Model Canvas, individual salespeople and teams quickly identify key risks and information gaps in their sales process with a specific sales opportunity.
By focusing on Customer Needs as the central point of each sales opportunity, following the Sales Model Canvas enables sales professionals consider strengths and gaps in their prospect relationships.
Contact Scott Sambucci with questions or suggestions:
scott [at] salesqualia [dot] com
Learn a 3 step process that will make people looking at your website, turn into actual paying customers. Despite what they may think, startups don't have an exposure problem, they have a conversion problem.
New to UX? Check out this short presentation to get a basic understanding of what you can do to your website to make sure browsers will convert to buyers.
Empathy Mapping and the business of understanding Taylor Wallace
I was invited by Hillsborough Community College to give a lecture on Empathy Mapping and the importance of empathizing with customers in business to a group of veterans studying entrepreneurship. I began the lecture by pretending I understood what it meant to be a vet, then told the group how full of it I was, and used the stunt to illustrate how in business we are normally not our customers.
Introduction to Growth Hacking and the Growth Hacking ProcessGrowth Hacking Asia
What is growth hacking? Why is growth hacking important for startups? How to run growth hacking experiments? All these questions are answered in detail in our slideshow. Please feel free to get in touch with us for questions anytime at anna@growthhackingasia.com or check out our website at http://growthhackingasia.com
I was invited by the Teen Business Challenge to give a presentation on creating minimum viable products. The exercise forced me to utilize objects the students would be familiar with and illustrate how prototyping has been integral in business for the last 100 years. I then lead the group in a workshop to help them create paper prototypes.
2 hours training on Mobile UX with Farah Nuraini, Interaction Designer at Traveloka, Indonesia
45 min theory: Research, Analysis, Design solutions and Testing
+ 1h15 min of hands-on exercises with the 5 facilitators from Traveloka.
Standards Based Assessment for the CTE Classroomccpc
Karen Nelson
Assistant Director, Curriculum & Instruction
Los Angeles County ROP
Downey, CA
Sarah Vielma
Consultant, Business Occupations
Los Angeles County ROP
Downey, CA
Herb Smith
Graphics Instructor
La Crescenta High School
La Crescenta, CA
Linking teaching and learning to test scores is of critical importance as career technical education demonstrates standards based instruction and support of academic standards through assessment. This workshop will provide an overview of a process to increase student achievement through instructional change.
Basic Instructional Design Principles - A PrimerMike Kunkle
This is a very basic primer I once created to teach a staff of technical writers about instructional design. It was not designed for non-verbal delivery, but it will give you an idea of basic ISD concepts.
The Value of Critique and Integrating it into Your Design ProcessAdam Connor
Slides from my presentation with Alla Zollers at Boston UPA's 2010 Conference
Foe an updated version of this presentation please see: http://www.slideshare.net/adamconnor/ready-set-critique
Assessment Program Alignment: Making Essential Connections Between Assessment...NWEA
Presented by Mark Kessler at the Arizona Assessment Summit.
This session introduces a processes to assist educators in building data literacy district-wide. Aligning the use of current school and district assessments and understanding the interrelationships of assessment, curriculum, and instruction are emphasized. Participants collaborate in establishing priorities for assessment practices and appropriate use of resulting data.
Simulating a PhD: My journey and future research directionsmilesweaver
Research presented to the Department and Strategy and Management
By Dr. Miles Weaver, Senior Lecturer in Strategic Management
It discusses the PhD journey and the contributions made in the thesis.
Some useful comments are made on the PhD viva (for business students)
LRT Talks 2013-03-27 HEA Social MobilityMark Stubbs
Some slides to accompany participation on a panel at the 2013 HEA Social Mobility conference on using data to support student retention, attainment and progression
Career Development In a Box GDC Online 2011Joshua Howard
An introduction to a freely available Career Development toolkit for video game development studios, called The THUD. Find more information at http://thethud.wordpress.com.
Presented at GDC Online 2011 by Joshua Howard.
Storytelling results of heuristic evaluationUX Firm, LLC
Presents the traditional way of reporting results from a heuristic evaluation and then a better way that uses storytelling to tell the user's experience.
Presents the way we use the System Usability Scale and Microsoft's Product Reaction Cards to get both qualitative and quantitative feedback from study usability study participants.
Content strategy - How to get it, how to testUX Firm, LLC
Keynote presentation at ConveyUX. Reviews the background of content strategy, what it is, who does it, and why everyone should test the content as part of user experience research.
UX 5 Ws and H: User Experience DemystifiedUX Firm, LLC
A talk I gave to a group of C-level executives on getting started with usability testing, using the journalistic approach of 5 Ws and H. The aim was to demystify the process.
Users Play Cards, We Keep Score, Magic Results!UX Firm, LLC
These are the slides from our STC2011 presentation on using Microsoft's product reaction cards in our usability testing sessions. We are making a shorter version of this talk at UPA in June.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
9. Tradition—Nielsen’s 10 heuristics
1. Visibility of system status
2. Match between system and real world
3. User control and freedom
4. Consistency and standards
5. Error prevention
6. Recognition rather than recall
7. Flexibility and efficiency of use
8. Aesthetic and minimalist design
9. Help users recognize, diagnose, and recover from errors
10. Help and documentation
J. Nielsen and R. Mack, eds. Usability Inspection Methods, 1994
Slide 9
10. The Nielsen Method
• Small set of evaluators
– 3 to 5 optimal cost-benefit
– Single evaluator finds 35% of problems
• Each evaluator inspects alone
– 1 to 2 hours
– Several passes through interface
– Inspection based on heuristics
– If evaluators are not SME’s, hints can be given
– Evaluator writes notes or report
11. The Nielsen Method
After individual evaluations are
done, evaluators:
– Talk to each other, often with a facilitator
– Share reports/notes
– Collate findings
– Rank issues by severity
– Write compiled report
12. Nielsen variations on method
• Supply a typical usage scenario, listing the
steps a user would take to perform tasks
• Hold a design debrief with designers
• Use brainstorming to focus on possible
solutions
• Include positive findings
13. And the method is called…
“Discount Usability
Engineering“
14. So, what do you get?
• A list of potential problems
• Also (sometimes) the positive findings
• Tied to a heuristic or rule of practice
• A ranking of findings by severity
• (Sometimes) recommendations for fixing
problems
• A report of findings
Slide 14
18. CUE 4 Hotel Pennsylvania 2003
• Comparative evaluation of reservation process
• 17 teams
– 8 did expert review/heuristic evaluation
– Only 1 team used Nielsen’s heuristics
• Rolf’s conclusions
– Findings “overly sensitive“—too many to manage
– Need to improve classification schemes
– Need more precise and usable recommendations
CHI 2003
Results available at Rolf Molich’s DialogDesign http://www.dialogdesign.dk/CUE-4.htm
Slide 18
21. Phase 2: Loose interpretation of
Nielsen
dropped his heuristics
kept severity ratings
added screen captures
added callouts
added recommendations
22. Hyperspace, Shock, and Cardiac Arrest all require more clearly defined goals and objectives.
H = Hyperspace; C = Cardiac Arrest; S = Shock
Severity
Finding Description of problem Recommendation H C S
Rating
Objectives/goals Unclear reason content Develop a consistent 3
for the modules is being presented structure that defines what’s
not clear Lack of conciseness of noted in the bulleted points.
presentation Avoid generic statements that
Definitions are required don’tdefines what’s noted in the
Objectives/goals for Reason content is being
the modules presented
Develop a consistent structure
that
focus users on what 3
to work with the of
Conciseness they will be accomplishing.
bulleted points, above.
module/content required to Advisegeneric statements that
presentation
Definitions
Avoid
that there is an
don’t focus users on what they
Evaluation criteria and
work with the assessment used for
will be accomplishing.
module/content Advise that there is an
methods unclearcriteria and evaluation and indicate if it’s
Evaluation assessment used for evaluation
Direct tie between
methods at and indicate ifor interspersed in
the end it’s at the end or
Direct tie between interspersed in the module
content and assessment the module. the goals and
content and assessment Connect ideas in
measure unclear
measure Connect ideas in the the
objectives with outcomes in goals
Sequence of presentation assessment
Sequencefollows logically from and objectives presentation
of Follow the order of with outcomes
introduction
presentation does not
Quizzes challenge users
in defined at the beginning
the assessment.
Develop interesting and
follow logically from Follow the order of
challenging questions
introduction. presentation definedthe the
Re-frame goals/objectives at
end of the module
at
Quizzes do not beginning.
challenge users. Develop interesting and
challenging quiz questions.
Re-frame goals/objectives at
the end of the module.
Slide 22
28. A unique password between 6 and 16 characters was
required. “Unique” is not defined. This is a problem
with terminology.
Usually, passwords must be a combination of
letters and numbers for higher security. An all-
letter password—Heuristics—was accepted. A
dictionary term is not a secure password and
contradicts accepted conventions. The ability to
input a dictionary word may be a component of
trust for users.
The username and security question answer were
rejected on submit.
This result is confusing as the name was
confirmed on the previous screen. This relates
to establishing conventions for the form of
names/passwords on the input screen. Input
formats need to be defined on the relevant
page.
Differences in spelling “username” vs. “user
name” are subtle but are consistency issues.
The red banner is confusing as the user chose the
gold (Free Edition). This is a consistency issue.
28
32. Strategy—Persona-based
scenario review
• Ginny Redish and Dana Chisnell
• AARP report—58 pages, 50 websites
– Two personas—Edith and Matthew
– Evaluators “channel“ the user via persona and
tasks/goals
– The users’ stories emerge
Available from Redish &Associates http://www.redish.net/images/stories/PDF/AARP-50Sites.pdf
Slide 32
33. While the clickable
area is very large
in the navigation
blocks, Edith
expected to click
on the labels, so
she was surprised
when the menu
appeared
When trying to
click an item in
the menu
above, Edith had
trouble selecting
because her
mouse hovered
close enough to
the choices
below to open
that
menu, obscuring
the item she
wanted to click
Chisnell and Redish, Designing Web Sites for Older Adults: Expert Review of Usability for Older Adults at 50 Web Sites (for AARP)
34. Engage in conversation with your reader
Ginny Redish
“Every use of every Letting Go of the Words
Morgan Kaufmann, 2007 (new edition coming)
website is a
conversation started
by the site visitor.”
35. Tell the story of your user’s experience
Whitney Quesenbery and Kevin Brooks
“Stories organize Storytelling for User Experience
Rosenfeld Media 2010
facts in
memorable
ways.”
36. Options for report deliverables
No deliverable
Quick findings
Presentation
Detailed report
Slide 36
37. Steve Krug’s approach
• All sites have usability problems
• All organizations have limited resources
• You’ll always find more problems than you have
resources to fix
• It’s easy to get distracted by less serious problems
that are easier to solve . . .
• Which means that the worst ones often persist
• Therefore, you have to be intensely focused on
fixing the most serious problems first
Rocket Surgery Made Easy, New Riders, 2010
Slide 37
38. “Focus ruthlessly on a
small number of the
most important
problems.”
Steve Krug
Slide 38
44. Your turn. Expert review.
• Scenario. You want to do user testing in Atlanta.
– You heard there might be a lab at Southern
Polytechnic State University www.spsu.edu
– See if you can find whether they have a lab and can
rent the lab to you
• Your task for this review:
– Work independently
– Jot down findings
– Then meet with a few others to organize findings
– Discuss how you will report the top findings
54. RITE method
• Rapid iterative testing and evaluation
• Developed by Microsoft’s Game Studios
• Requires full team commitment
– Observe
– Analyze findings immediately
– Change immediately
– Retest
– Do it again
59. Your turn. Option 1
• Goal—ease of use for finding an online graduate program
that supports UX interests
• Create post-task questions
• Select one person in your group to be the user
– User task: search for an online program in UX or related field at
www.spsu.edu
– What are the requirements for admission?
– What are the fees?
– What is the next application deadline?
• Observers take notes
• Discuss findings
• Determine top findings
60. Your turn. Option 2
• New device for mobile phone user
• Create a few tasks
• Write a few post-task questions
• Select a “new“ user to be participant
• Observers take notes
• Discuss findings
• Determine top findings
67. How to deal the cards
• Spread them out on table
• Instruct user to
– walk along the table and pick up cards that express the user’s
experience
– Share the meaning of the cards
– User’s story emerges
• In remote testing, provide a table or Excel spreadsheet
– User highlights selections
– Explains choices
• Collate the results in clusters of similar/same cards
68.
69.
70. 3 TV weather websites
40
35
30
25
20
15
10
5
0
Positive
Negative
Positive
Negative
Station A Positive
Negative
Station B
Station C
26/13 39/5 24/17
70
71.
Easy-to-use
Helpful
Straightforward
Fast
Relevant
Reliable
Useful
Repeated positive card selections focused
on ease of use, relevance, and speed
73. “But the light bulb
has to want to
change”
Why do the most serious
usability problems
we uncover often go unfixed?
Steve Krug and Caroline Jarrett
#upa2012 Las Vegas
74. Survey says…
Conflicted with decision maker's belief or opinion
Not enough resources
Deferred until next major update/redesign
Not enough time
Too much else to do
No effective decision maker
Team did not have enough power to make it happen
Required too big a change to a business process
Technical team said it couldn't be done
Other events intervened before change could happen
Disagreements emerged later
Legal department objected
0 10 20 30 40 50 60 70
Number of times this reason was chosen
from 131 total usable responses
76. Jarrett/Krug theme:
Do basic UX better
• Do testing earlier
• Make stakeholders watch the sessions
• Present results better
– More explanations
– Use video clips
76