Tasks, scenarios, sitemaps 21 Feb 2006. Task Analysis (1/3)  Know who is going to use the system  ID tasks that they now perform  ID tasks that they’d.

Slides:



Advertisements
Similar presentations
Basics Creating an account What do you need An name for yourself. An address looks like this:
Advertisements

Basic Computer Skills Windows & the Internet.
Basic Communication on the Internet:
Coursework Task By Miles Fajembola 10E. Send An Here is the I sent to wacky mountain bikes.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Search Engines and Information Retrieval
TEST REVISION Reshmi Ravi. Overview Thursday 23 April – 6:00 PM – 7:30 PM Conference Centre Lecture Theatre/ : Aaa-Fit Eng3407/ : Fre-Koo.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Message Design and Content Creation: Tasks and Design 30 January 2007 Kathy E. Gill.
Using ITAMS as a Supervisor or ITAMS Approver Login to ITAMS as usual, at: Enter your User Identification Number (Same as your.
Visual Design, Info Design 20 Feb Recap: Genres (1/2)  Group – reach agreement on the definition of your web site class/genre.  Individually:
Week 6 Writing Customer Relations Letters
August 15 click! 1 Basics Kitsap Regional Library.
By Laura Trawin.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
Form Builder Iteration 2 User Acceptance Testing (UAT) Denise Warzel Semantic Infrastructure Operations Team Presented to caDSR Curation Team March.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Conducting Usability Tests ITSW 1410 Presentation Media Software Instructor: Glenda H. Easter.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Outlook Lesson 5 Managing Contacts Microsoft Office 2010 Advanced Cable / Morrison 1.
Requirements Walk-through
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
CPS120: Introduction to Computer Science The World Wide Web Nell Dale John Lewis.
Search Engines and Information Retrieval Chapter 1.
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
PowerPoint 2003 – Level 1 Computer Concepts Cathy Horwitz April 25, 2011.
April 1, Welcome! The 2015 B-13 Data Collection webinar will begin in a few moments. –Event number: –Event password: 2015B13 To hear.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Microsoft ® Office SharePoint ® Server 2007 Training SharePoint document libraries I: Introduction to sharing files Bellwood-Antis School District presents:
Storytelling Your Way to a Better User Experience Whitney Quesenbery Kevin Brooks UPA Boston June 2010.
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
Unit B: Expanding Your Productivity Page: 24 to 37.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Jeff Martin, 1999 There are hundreds of Internet sites that offer free accounts. Some of the most popular are: Yahoo! Hotmail Excite Juno We’ll.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
WLLS 102 Class 11 4/23/2004 Professor C. Shilepsky Wells College.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
Unit 15 Webpage Creator. Outlines Introduction Starter Listening Language Work Work study Speaking Writing.
Anonymity of Clickstream data.  Traffic from different countries  People with different intent –Buyers –Browsers –Competitors –Visitors with no apparent.
Chapter 8 Collecting Data with Forms. Chapter 8 Lessons Introduction 1.Plan and create a form 2.Edit and format a form 3.Work with form objects 4.Test.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Faculty of Computer & Information
Intermediate 2 Software Development Process. Software You should already know that any computer system is made up of hardware and software. The term hardware.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
RUBRIC IP1 Ruben Botero Web Design III. The different approaches to accessing data in a database through client-side scripting languages. – On the client.
Internet Safety Internet Safety LPM
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
and the business environment Explain what is and how is it used in a business environment A02 .
M STREAM IT running dos C :/ dommand delete D :/ freesize D :/ load D ;/ dagger C :/ toloadtype dag D :/ dag Loading operating win 96 Loading disk.
Artificial Intelligence, simulation and modelling.
XP Exploring Outlook  Outlook is a powerful information manager  You can use Outlook to perform a wide range of communication and organizational tasks,
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Basic Computer Skills Windows & the Internet vfu.bg/en/e-Learning/
How to Complete B-13 Checklists in CIMS How to Complete B-13 Checklists in CIMS A Presentation for Transition Coordinators (TCs) and Transition Coordinator.
How to Complete B-13 Checklists in CIMS How to Complete B-13 Checklists in CIMS A Presentation for Transition Coordinators (TCs) and Transition Coordinator.
Financial Management of ECE Programs.  Go to “Tools”  Click on “Personal Information” to edit your personal information (including address) or.
Using Using Computers Safely, Effectively and Responsibly.
User Requirements Ing. Valeria Mirabella Web:
QuadriDCM Easy Access as a communication platform
Welcome! The 2015 B-13 Data Collection webinar will begin in a few moments. Event number: Event password: 2015B13 To hear the presentation.
August 17, 2015 J. Boles, J.Burnias and M.Garcia Office 2013
Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition
Introducing the New and Improved Staff Web Access
This is the Sign In page for the Dashboard
User ScenarIOS.
Presentation transcript:

Tasks, scenarios, sitemaps 21 Feb 2006

Task Analysis (1/3)  Know who is going to use the system  ID tasks that they now perform  ID tasks that they’d like to perform  Where are tasks performed?  How do users communicate with each other? Or do they?

Task Analysis (2/3)  How are tasks learned?  What other tools might be used?  How often are tasks performed?  Are there time constraints?  What happens when things go wrong?

Task Analysis (3/3)  These are the types of questions that your tasks should identify – whether we’re talking about the web sites (group projects) or the design analysis (individual project).  Examples: Common tasks Web tasks

Task research - overview (1/3)  Please try to recall a recent instance where you found important information on the World Wide Web, information that led to a significant action or decision.  Morrison, J.B., Pirolli, P., and Card, S.K. (2001): "A Taxonomic Analysis of What World Wide Web Activities Significantly Impact People's Decisions and Actions." Interactive poster, presented at the Association for Computing Machinery's Conference on Human Factors in Computing Systems, Seattle, March 31 - April (pdf)A Taxonomic Analysis of What World Wide Web Activities Significantly Impact People's Decisions and Actions

Task research - methods (2/3)  Collect: 71%. Search for multiple pieces of information. Goal is specific, but not looking for one particular answer.  Find: 25%. Search for something specific.  Explore: 2%. No specific goal (surfing).  Monitor: 2%. Visit the same site for updated information. Visits triggered by routine behavior, not specific goal.

Task research – reasons (3/3)  Compare/choose: 51%. Evaluate multiple products or answers to make a decision.  Find/acquire: 25%. Get a fact, get a document, find out about a product, download something; specific.  Understand: 24%. Seek understanding of some topic; usually includes locating facts or documents.

Task list for program (1/2)  Write a message Edit, format, spell-check, etc  Send a message Now or later  Receive a message Filter, other auto-actions  Read a message that you have rec’d Filter after reading, mark messages “read”, delete  Identify and ignore spam

Task list for program (2/2)  Save a message to read later  Forward a message to someone else Or many people, with or w/out comment  Send a formatted file with the message  Send the same message to several people To, CC, BCC  Keep an address book Nicknames (aliases), other data

Scenario – overview (1/3)  A description of a person's interaction with a system. It incorporates tasks.  Written in real-world language, not system language

Scenario – example (2/3)  It's Friday afternoon, and Kathy is flying to Atlanta. She doesn't have enough cash to pay for the taxi to the airport, and she's running late.  She goes to the local ATM and identifies herself.  She specifies that she wants $100 from savings. She'd like the money in $20 notes to minimize the chance the taxi driver won’t have correct change.  She wants a printed receipt.

Scenario – class (3/3)  Scenarios should be built for each persona

Sitemaps (1/2)  Organizing content – the backbone of your information architecture  It is human tendency to organize things to make them easier to retrieve

Sitemaps (2/2)  How to learn how people think about your content Observe Visit competitor web sites Evaluate server logs Card sorts

Card sort (1/2)  List of information by topic  Cards (or post-it notes for affinity diagram)  Group  Name the group

Card sort (1/2)  Look for patterns – dominant organization scheme  Adjust for consistency  ID categories that don’t match May be features May just be oddball  Test the resulting patterns

Card sort (2/2)  Category refinement = taxonomy  Examples: