Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Lecture Notes on Miscellanea - Energy Security and Climate Change Program | CSIS 360, Study notes of Civil Engineering

Material Type: Notes; Professor: Hanks; Class: Software Engn 1: Syst Analysis; Subject: Computer Science Info Systems; University: Fort Lewis College; Term: Fall 2007;

Typology: Study notes

Pre 2010

Uploaded on 08/05/2009

koofers-user-zm8
koofers-user-zm8 🇺🇸

4

(1)

10 documents

1 / 2

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CSIS 360 – Lecture 10
Miscellanea
Project Status?
Client meeting?
What day is each group going to submit status reports?
User Stories Chapters 3 and 5
What is the main theme here?
What were the key ideas?
Why does the author think that identifying user roles is important? What do you think?
What do you think about this process for identifying user roles?
- Brainstorming roles
- Consolidating the roles
- Determine role attributes
What do you think about the idea of personas?
How do the ideas of user roles and user proxies relate?
- Can you find real users for the BigMoneyJobs web site?
What are some issues to watch out for with user proxies?
- It’s hard to see the important issues from someone else’s viewpoint
- Often, proxies tend to focus on things that are important to them, so too much
emphasis is put on features that are not relevant to most actual users.
- Domain experts – resulting system may be too complex for targeted users, who
are not as experienced
- “Analysis Paralysis” – see page 61 re business analysts
- Customer != User
Best to have more than 1 proxy – get different viewpoints.
Sometimes there are subtle ways of getting users involved:
- user task force
- beta releases
oanother motivation for “releasing early and often”
Why can’t you use yourself as a user proxy? “You are not your user.”
Exercise:
Get together in your groups. Imagine you are developing a new web site, college.com,
that is aimed at prospective college students. Here are some ‘epics’ about college.com:
pf2

Partial preview of the text

Download Lecture Notes on Miscellanea - Energy Security and Climate Change Program | CSIS 360 and more Study notes Civil Engineering in PDF only on Docsity!

CSIS 360 – Lecture 10

Miscellanea Project Status? Client meeting? What day is each group going to submit status reports? User Stories Chapters 3 and 5 What is the main theme here? What were the key ideas? Why does the author think that identifying user roles is important? What do you think? What do you think about this process for identifying user roles?

  • Brainstorming roles
  • Consolidating the roles
  • Determine role attributes What do you think about the idea of personas? How do the ideas of user roles and user proxies relate?
  • Can you find real users for the BigMoneyJobs web site? What are some issues to watch out for with user proxies?
  • It’s hard to see the important issues from someone else’s viewpoint
  • Often, proxies tend to focus on things that are important to them, so too much emphasis is put on features that are not relevant to most actual users.
  • Domain experts – resulting system may be too complex for targeted users, who are not as experienced
  • “Analysis Paralysis” – see page 61 re business analysts
  • Customer != User Best to have more than 1 proxy – get different viewpoints. Sometimes there are subtle ways of getting users involved:
  • user task force
  • beta releases o another motivation for “releasing early and often” Why can’t you use yourself as a user proxy? “You are not your user.” Exercise: Get together in your groups. Imagine you are developing a new web site, college.com, that is aimed at prospective college students. Here are some ‘epics’ about college.com:
  • A student can search for a college
  • A student can learn about financial aid and scholarships
  • A student can post information about him/herself
  • A college can post information about itself
  • A college can search for potential students who meet specific criteria Using the techniques described in the book, identify user roles for this system. Consolidate the roles, and identify role attributes. Be prepared to present and discuss your roles. Next time – low fidelity prototypes