User Modelling Teppo Räisänen

Slides:



Advertisements
Similar presentations
Design, prototyping and construction
Advertisements

Participant Observation: a Field Study APPROACH
The Management Process
Session # 2 SWE 211 – Introduction to Software Engineering Lect. Amanullah Quadri 2. Fact Finding & Techniques.
The Basics of Information Systems
Librarians and the Unauthorized Practice of Law.
CS 325: Software Engineering April 7, 2015 Software Configuration Management Task Scheduling & Prioritization Reporting Project Progress Configuration.
CAP 252 Lecture Topic: Requirement Analysis Class Exercise: Use Cases.
Identifying Needs and Establishing Requirements John Thiesfeld Jeff Morton Josh Edwards.
Principles and Methods
Understanding and Representing Users A.J. Brush cse490ra January 22, 2003.
© Lethbridge/Laganière 2001 Chapter 7: Focusing on Users and Their Tasks1 7.1 User Centred Design (UCD) Software development should focus on the needs.
Heuristic Evaluation of Usability Teppo Räisänen
Prototyping Teppo Räisänen
The aim of this part of the curriculum design process is to find the situational factors that will strongly affect the course.
Usability Teppo Räisänen
1 Computer Systems & Architecture Lesson 1 1. The Architecture Business Cycle.
To succeed in business today, you need to be flexible and have good planning and organizational skills. Many people start a business thinking that they'll.
Software Engineering Case Study Slide 1 Introductory case study.
Marketing Information Chapter 4 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Reflective practice Session 4 – Working together.
Copyright 2003, Christine L. Abela, M.Ed. Preparing for a career (gaining a competitive edge)
Usability Testing – Part II Teppo Räisänen
IDENTIFY AND MEET A MARKET NEED
Bank of Performance Assessment Tasks in English
DR. AHMAD SHAHRUL NIZAM ISHA
Business research methods: using questions and active listening
Usability Testing Teppo Räisänen
User Modeling Lecture # 5 Gabriel Spitz 1. User-Interface design - Steps/Goals.
Chapter 8: Systems analysis and design
User Modeling 1 Lecture # 7 Gabriel Spitz. Objective of Lecture Why model the user How do we build a user profile How to utilize the user profile 2 Gabriel.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
CSE323 การวิเคราะห์และออกแบบระบบ (Systems Analysis and Design) Lecture 03: Requirements Capture Requirements Analysis.
22C:082:001 Human-Computer Interaction. Fall Copyright © 2013 Juan Pablo Hourcade. 1 Group Project Phase 1.
Learning Teppo Räisänen
What is Usability? Usability Is a measure of how easy it is to use something: –How easy will the use of the software be for a typical user to understand,
Programming in Java Unit 3. Learning outcome:  LO2:Be able to design Java solutions  LO3:Be able to implement Java solutions Assessment criteria: 
Height Weight I.Q. Income Body mass index Age Testosterone Highest grade #years college Amount of hair Measures of Self-esteem Acceptance of Others Narcissism.
Chapter Fifteen The Research Report 15-2 Key Terms & Definitions Organizing the Report: 1.Title Page 2.Table of Contents 3.Executive Summary 4.Background.
CS2003 Usability Engineering Usability Evaluation Dr Steve Love.
IT Job Roles & Responsibilities Shannon Ciriaco Unit 2:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Writing Software Documentation A Task-Oriented Approach Thomas T. Barker Chapter 5: Analyzing Your Users Summary Cornelius Farrell Emily Werschay February.
Identifying needs and establishing requirements Data gathering for requirements.
Chapter 5:User Interface Design Concepts Of UI Interface Model Internal an External Design Evaluation Interaction Information Display Software.
UCI Expectation-Driven Event Monitoring (EDEM) David Hilbert, David Redmiles
TEACHING ELEMENTARY WORLD LANGUAGES October 31, 2011.
“The Role of Experience in Software Testing Practice” A Review of the Article by Armin Beer and Rudolf Ramler By Jason Gero COMP 587 Prof. Lingard Spring.
Planning AS 2.1 SUS 201 Plan, implement and evaluate a personal action that will contribute towards a sustainable future. 6 credits.
HOW TO INTERVIEW - SUPPLEMENT Read me first! This is a copy of a session from Toomas that was created by an HR consultancy (CVO) for an AIESEC conference;
A focus group is actually gathering of people who are customers or users representatives for a product to gain its feedback. The feedback can be collected.
CPSC 372 John D. McGregor Module 8 Session 1 Testing.
Observing People in Natural Setting Chapter 10. What is Field Research? Field research produces qualitative data. Field researchers directly observe and.
Technical Communication: Concepts and Features
Investigating System Requirements
How to define what you are actually looking for…
What is a CAT? What is a CAT?.
WEEK 1 – RESEARCH PROPOSAL
Research Methods RESEARCH PROPOSAL.
Appraising Performance
Designing a Game Concept
recommendations for new teachers
Different points of view in teaching Information Technology
The Value of Market Research
Curriculum 2.0: Standards-Based Grading and reporting
The Basics of Information Systems
User requirements modelling: Motivation
THE PROCESS OF INTERACTION DESIGN
Databases and Information Management
The Basics of Information Systems
Presentation transcript:

User Modelling Teppo Räisänen

General Information For achieving high degree of usability the target user must be analyzed There are plenty of techniques available for user modelling The least one can do is to visit users work environment and gather information

General Information When user is well known, it is possible to tailor UI according to users needs In practice, however, perfect modelling of user is impossible Often modelling is also difficult and costly It is still well advised to model user

General Information In the next part some of modelling techniques available are presented Techniques presented are lightweighted and should be easily adadpted It should be noted, that techniques are based on different worlds of ideas and may seem contradictory

Who Is the User? The one who is using the application? Actually, also many interest groups E.g. flight booking application Personnel of airport Flight personnel Customers attending to flights Customers’ families (?)

Who Is the User? CUSTOM: 3 user types Primary user uses the application Secondary user does not use the application, but gets feedback from the system Tertiary users are other interest groups, to which the system’s activity/inactivity has an effect

Who Is the User? E.g. ADP support application Users call/visit ADP support Member of support staff enters notice of defect into system Member of tehnicians recieves the notice trough system Member of tehnicians repairs the faulty computer Who is the user? How would you improve the system?

All Users Can Not Be Pleased Traditionally products have been designed so, that a product is good enough for all of the target users The most difficult cases are mass products It should often be considered, if a limited user group whould be better choice than designing for masses

All Users Can Not Be Pleased Mass customization is commonly utilized among other fields of industry E.g. car production The same components are used in sports cars and vans Specialized products are designed for different kinds of user groups

All Users Can Not Be Pleased MCV (Model Controller View) Enables use of the same application engine Different UIs for different needs Used in Java GUI technology and Symbian applications The goal is that applications, not users, must be flexible

User Personalites Traditionally users were defined using roles It is argued, that use of blurred roles leads into, at its best, medicore applications instead, accurate user profiles should be used

User Personalites Example of user profile John Smith 29 years old Computer technician, system analys Hobbies: travelling, roller-skating Lives in high-rise building Very conscious of products’ quality

User Personalites When profiles are used, the designers don’t have to think of groups Instead a designer can ask, if the person would, for example, be able to commit a spesific task User profiles are not actual but imaginary persons Actual persons can even have ’multiple personalities’’multiple personalities’

Etnographic Research The goal is to investigate foreign cultures Researchers live among the people of target culture Everyday life of target people is observed

Etnographic Research E.R. is seldom used in actual product development Instead it can be used to, for example, gather information about ways of users’ interacting The downside of E.R. is that it is costly and time-consuming

USTM/CUSTOM USTM = Matching User’s Skill and Task The goal is to thoroughly understand and to be able to document user’s requirements CUSTOM is a lighter USTM-based technique aimed for small organizations’ systems

USTM/CUSTOM CUSTOM divides users into three categories (see slide #6) In addition to the users systems have faciliating persons, who are responsible of designing and maintaining systems CUSTOM is based on 6 steps, which include questions to be answered

USTM/CUSTOM 1. Describe products use context and context organization’s goals and values 2. Recognize and describe interested parties. Locate them under one of the four user categories

USTM/CUSTOM 3. Recognize and describe groups of workers + their positions in the organization 4. Recognize and describe tasks and objects Tasks are things that need to be done Objects are either means or targets of tasks

USTM/CUSTOM 5. Recognize the needs of interested parties Desribe things described during steps 2 – 4, when Existing system is used New system would be used Needs are described as differences between existing and new version of system

USTM/CUSTOM 6. Prepare a summary of the requirements. Compare the summary against earlier defined requirements

Use Cases takes a narrow view compared to aforementioned techniques is a lightweight cost-effective technique Knowledge of system’s context might not be as complete as with using heavier methods Use cases are individual tasks leading to the completion of a spesific goal

Use Cases E.g. sending a SMS message could be a single use case Use cases can be divided into substeps UML notification is often used, but also textual descriptions are possible Use cases can be prioritized, e.g. emergency call over SMS messages

Conclusion There does not exist an universal method suitable for all situations Plenty of other methods in addition to those described here are available Traditional methods are still widely used, but especially use cases are becoming more utilzed