Granville Miller and Laurie William Microsoft Corp and North Carolina State University(2006) Presented.

Slides:



Advertisements
Similar presentations
Trademark and Unfair Comp.
Advertisements

User Modelling ID 405 Human-Computer Interaction.
Requirements Elicitation Techniques
Use-case Modeling.
CLAReT PERSONAS AND SCENARIOS. When? Personas were used in the CLAReT workshops as a role play activity. Participants were required to assume a persona.
User Personas Assignment IS 485, Professor Matt Thatcher.
User Engineering | Sept 2004 | Dave Roberts © 2004 IBM Corporation Coping With Complexity Creating a solution with User Engineering.
Knowsley Associates. CREATEL Feb Business centre of Knowsley Community College Flexible training –For industry –Commerce Throughout North West.
The Scenario. Open source software goes large in India, especially Linux. Linux has now seen great profit after it has entered the Indian market. Linux.
What is an Expert System?
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
Author: G. Miller and L. Williams Internet manuscript, circa 2006, 10 pp.[Online].
Information Architecture And the “Application Abyss”
Contd. Assign responsibilities Structure team Clarify roles & authority Collect internal, information Select processes.
Requirements Engineering Requirements Elicitation Process Lecture-8.
Integrating Usability Engineering and Agile Software Development: A Literature Review 陳振炎教授 楊哲豪
Module 5 Week 11 Supplement 12. SPEAKING TRUTH EFFECTIVELY How to provide insightful and effective peer reviews.
Assignment 2 Tal Mizrachi Journalism 333 April 14, 2013 Nike Blog vs. Adidas Blog.
Software Engineering Saeed Akhtar The University of Lahore Lecture 7 Originally shared for: mashhoood.webs.com.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Interview Techniques (Hand-in partner preferences) Thursday In-class Interviewing.
Computers in Police Cruisers Article in Pervasive Computing FIRST RESPONSE Authors: Andrew L. Kun, W. Thomas Miller III, and William H. Lenharth ECE in.
LITEBI 2011 © Company Overview. Who are we? Business Intelligence providers since 2007 Leading Cloud Computing Platform Customer and Partners in 24 countries.
® IBM Software Group © 2006 IBM Corporation Writing Good Use Cases Module 1: Introduction to Use-Case Modeling.
Requirements Engineering Southern Methodist University CSE 7316 – Chapter 3.
Chapter 4 Requirements Engineering (3/3) Yonsei University 2 nd Semester, 2015 Sanghyun Park.
Testing words K-PREP.
Computing Fundamentals Module Lesson 6 — Using Technology to Solve Problems Computer Literacy BASICS.
Get Your Hands on a Good Book Due Monday, December 15, 2014.
Requirement Engineering
Information Systems in Organizations 1.2 What’s in it for you? 1.3 Ethics of analysis and use of systems, data and information.
Computer/Human Interaction Fall 2015 Northeastern University1 Name of Interface Tagline if you have one Team member names and schools/years Team member.
WSI DIGITAL WEB SOLUTIONS - Contact No : Gillett Drive, Ajax, Ontario, L1Z 0C1 -
Audience Profiling with Personae and Use-Case Scenarios User Scenarios combine User Personas/Personae with User Tasks remember.
CIS 170 MART Teaching Effectively/cis170mart.com FOR MORE CLASSES VISIT HCS 350 ASSIST Inspiring Minds/hcs350assist.com FOR MORE CLASSES.
SEC 440 OUTLET The learning interface/sec440outletdotcom.
Databases – Part 1 Databases– Part 1 Lesson 3 & 4.
1104B – Dr. Jackie. Copyright © 2010 Certification Partners, LLC -- All Rights Reserved  Remember we are driving toward a complete, cohesive e-Commerce.
SEC 440 Entire Course (UOP) For more course tutorials visit  SEC 440 Week 1 Organizational Information Security System Analysis.
English for Engineering Management ( 1 ) Detail 1-1 Fill out the missing words on the drawing (5 are missing) Where is the detail located on the building?
HCS 449 Week 5 Learning Team Case Study Analysis To purchase this material click below link 5-Learning-Team-Case-Study-Analysis.
Overview of E-Learning Authoring Software
CIS 500 Slingshot Academy / cis500.com
Niki Vandersteen 08/10/2015 SAP Fiori unleashed: take your mobile apps to the next level using TheValueChain’s development.
Stakeholder Engagement Plan: Background to Roles and Responsibilities
BIG DATA ANALYTICS Training at GoLogica Technologies
HCS 589 Possible Is Everything/tutorialrank.com
SEC 440 Competitive Success/snaptutorial.com
BIS 221 Education for Service-- snaptutorial.com.
ENG 437 Innovative Education- -snaptutorial.com
SEC 440 Education for Service-- snaptutorial.com.
BIS 221 MENTOR Education for Service- -bis221mentor.com.
BIS 221 Teaching Effectively- snaptutorial.com
CSS 422 Teaching Effectively-- snaptutorial.com
BIS 221 Education for Service-- tutorialrank.com
SEC 440 Teaching Effectively-- snaptutorial.com
MGT 334 RANK Education for Service-- mgt334rank.com.
Informatics 121 Software Design I
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
Unit 2 Computer Systems HND in Computing and Systems Development
Beth Smith IST 126 Assignment #7
BIS 221 Great Wisdom/tutorialrank.com. BIS 221 All Assignments For more course tutorials visit BIS 221 Week 2 Assignment Business.
Using the Cloud App Marketplace Monitoring cloud app migrations
IPS Academy, Institute of Engineering and Science, Indore
Шаттық шеңбері.
Customizations vs Extensions
FastTrack for Microsoft 365
Management Levels Business Essentials
Commenting on Artifacts
BIS 221 RANK best future education / bis221rank.com.
Presentation transcript:

Granville Miller and Laurie William Microsoft Corp and North Carolina State University(2006) Presented by: Faheem Mushreef

 Determining the significance of Personas  Understanding Role-Based Engineering  Analyzing the effects of Personas at Microsoft and its outcome

 Persona is an archetype of a fictional user representing a specific group of typical users  Personas have a hypothetical name, occupation and other specific personal data.  They present themselves as a ‘proxy’ within the development team

 Each requirement in the development team is assigned a value for each persona:  -1: This suggests that the persona is confused, annoyed or harmed by the environment  0:The persona does not care about the requirement  1:The feature provides some value to persona  2:The persona loves the feature.

 Scenarios are narrations that put a persona in action where customers may use a product.

 Development teams at microsoft have been using Personas since mid 1990s.  There were 3 personas representing the developer role  When missing steps were discovered during development, personas helped Program Managers(PM) find the needed functionality.  MSF(Agile+Formal) use both scenario as well as persona in development process.

This paper:  Gave a new approach to Requirement engineering from scenario-based techniques  Gave the details of IT giant like Microsoft having implemented it in mid 90s  More recently IBM has also started using Personas

This paper should have had:  Given more appropriate distinction between Use-cases and Persona since both of them sound SAME!!

Although the authors explain about Personas,  In a world of real-time Cloud computing and mobile technology, do we really need something like Personas hung on our office Walls ? ?