SlideShare a Scribd company logo
1 of 18
Conducting Research
Class 3 of 4
Kagonya Awori
UX Researcher
Nairobi, Kenya
Recap
Intro to UX part two
http://www.slideshare.net/kagonya/intro-to-ux-part-two
Defining Users
http://www.slideshare.net/kagonya/defining-users-18104455
Slideshare Account name: Kagonya Awori
Recap:
Three hunt statements from the teams
Team Farming
To find out how farmers in Kenya acquire
information on farm inputs, and how they
recommend retail prices and retail outlets.
Team Health
Explore ways of centralizing patient's records so
that it can be accessible from anywhere; but with
privacy considerations
To investigate how a patients information is stored
and accessed by the patient, medical
practitioners and the government; and to find out
how this information is protected.
Team Security
To investigate how Nairobians know find out
about and avoid security threats;
To investigate scenarios that expose visitors in
Nairobi to security threats.
Plethora of research methods to use
1. Literature Review/ Desk Research
Applies all the time
Sources of information include:
Newspapers
Magazines
Blogs
Government Publications
Academic papers
Case studies
List sources of information for each team
Team Farming
To find out how farmers in Kenya acquire information
on farm inputs, and how they recommend retail
prices & retail outlets.
Team Health
To investigate how a patients information is stored
and accessed by the patient, medical practitioners
and the government; and to find out how this
information is protected.
Team Security
To investigate how Nairobians find out about and
avoid security threats; To investigate scenarios that
expose visitors in Nairobi to security threats.
2. Competitor Analysis
“To know your Enemy, you must become your
Enemy.” Sun Tzu, The Art of War
Lets list competitors for each team
Team Farming
Which companies acquire information on farm inputs?
Which recommend retail prices & retail outlets?
Team Health
Which companies store patient information?
Where do patients, medical practitioners and the Govt. access patient
records from?
Which organisations protected client info? In or out of medical field
Team Security
Where do Nairobians go to to find out about security threats?
What do they read to know what avoid security threats to avoid?
What organisations inform the public/their employees on the danger areas in
Nairobi? How do they do it?
Methods to use
1. Competitor Analysis
Sign up for the product
Use it yourself
Interview current users
2. Bodystorming
Have your team test the product, then identify the gaps while testing it.
User Experience field research methods
1. Interviews
Prepare a set of questions targeted to your concept, and ask
users in a face-to-face setting. It is useful to have two
researchers per interview session, so one can guide the
discussion, and the other can take detailed notes.
Do Not ask these questions:
What do you want?
What would you add?
Instead,
What problems do you have with the current product/service?
What do you think about the product/service you use?
Tell me about the last time you were robbed?/ went to hospital/ bought
a farm tool
1. Interviews
Team Farming
To find out how farmers in Kenya acquire information on farm inputs, and how they
recommend retail prices & retail outlets.
e.g. Where do you buy farm inputs from? Why that shop and not others? What type of
farm inputs do you get from that shop?
Team Health
To investigate how a patients information is stored and accessed by the patient,
medical practitioners and the government; and to find out how this information is
protected.
e.g. Which hospital do you attend most? Are you registered there? Do you have access
to the your medical records? How do you keep track of your medical history?
Team Security
To investigate how Nairobians find out about and avoid security threats; To investigate
scenarios that expose visitors in Nairobi to security threats.
e.g. Which are the most dangerous areas in Nairobi? How did you know that? How do
you inform your friends about the dangerous areas? How do you know what areas to
avoid when you travel to a new town?
2. Contextual Inquiry
This is a rich observational research technique where users are
observed in their natural environment as they perform a task, or
use a product or service.
Done in order to get the clearest understanding of how users
perform the task under study, what technology and information
they use , who they work with, what outputs they create and
that inputs they need.
More about how to conduct a contextual inquiry:
Definition:
http://www.usabilitynet.org/tools/contextualinquiry.htm
Process:
http://www.webcredible.co.uk/user-friendly-resources/web-usability/contextual-inquiry.shtml
3. Knowledge mining
Leverage the experience of people who are uniquely qualified
to offer insights—early adopters, power users, wizened veterans.
Draw out their knowledge in surveys, interviews, or brainstorming
sessions.
Team Farming: farmers, fertiliser sellers, agriculture SACCOs
Team Health: medical practioners, hospitals, patients, NHIF
Team Security: police officers, watchmen, journalists, G4S,
Red Cross, radio stations
About the presenter
Kagonya Awori is a User Experience Researcher in
Nairobi, Kenya. She holds a Masters in Human-
Computer Interaction (MHCI) from Carnegie
Mellon University, the birthplace and world leader
in user experience studies. She is the first African
with an MHCI from Carnegie Mellon.
Kagonya is passionate about catalyzing the
knowledge and application of user experience
research in the burgeoning tech community in
Kenya.
Her interests include local content
generation, mobile user experience design, social
networks and designing for rural communities.
She currently works on projects with iHub Research
and iHub UX Lab.

More Related Content

Similar to Conducting Research: Methods for UX Teams

Co-Creating Health through Digital Technology
Co-Creating Health through Digital TechnologyCo-Creating Health through Digital Technology
Co-Creating Health through Digital TechnologySarah Amani
 
RES724 v6Observation GuideRES724 v6Page 2 of 2Analysis
RES724 v6Observation GuideRES724 v6Page 2 of 2AnalysisRES724 v6Observation GuideRES724 v6Page 2 of 2Analysis
RES724 v6Observation GuideRES724 v6Page 2 of 2Analysisanitramcroberts
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxcelenarouzie
 
Trust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptTrust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptAlexander Decker
 
Aurelie Cloix Dissertation
Aurelie Cloix DissertationAurelie Cloix Dissertation
Aurelie Cloix Dissertationcloixaurelie
 
Refresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and HealthcareRefresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and HealthcareSheetal Dube
 
Parry Ad Concept Testing
Parry Ad Concept TestingParry Ad Concept Testing
Parry Ad Concept TestingPrasant Patro
 
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)MART Knowledge Center
 
The intellectual property of the assessment resources reproduced.docx
The intellectual property of the assessment resources reproduced.docxThe intellectual property of the assessment resources reproduced.docx
The intellectual property of the assessment resources reproduced.docxjmindy
 
Iteration 11112011v4
Iteration 11112011v4Iteration 11112011v4
Iteration 11112011v4Starcham
 
Kus Pro: Module 1 - session 3 - Customers
Kus Pro: Module 1 - session 3 - CustomersKus Pro: Module 1 - session 3 - Customers
Kus Pro: Module 1 - session 3 - CustomersSoniaNaiba
 
Using Intercept Interviews to Survey Vulnerable Populations
Using Intercept Interviews to Survey Vulnerable PopulationsUsing Intercept Interviews to Survey Vulnerable Populations
Using Intercept Interviews to Survey Vulnerable PopulationsKhulisa Management Services
 
Outlier Analytics - Learning from Those on the Fringe
Outlier Analytics - Learning from Those on the FringeOutlier Analytics - Learning from Those on the Fringe
Outlier Analytics - Learning from Those on the FringeForte Consultancy Group
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...November Research Group
 
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docxCONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docxaidaclewer
 
Using behavioural science to save the rhino | Psychology of communications co...
Using behavioural science to save the rhino | Psychology of communications co...Using behavioural science to save the rhino | Psychology of communications co...
Using behavioural science to save the rhino | Psychology of communications co...CharityComms
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire OboeziAppeal
 

Similar to Conducting Research: Methods for UX Teams (20)

Co-Creating Health through Digital Technology
Co-Creating Health through Digital TechnologyCo-Creating Health through Digital Technology
Co-Creating Health through Digital Technology
 
RES724 v6Observation GuideRES724 v6Page 2 of 2Analysis
RES724 v6Observation GuideRES724 v6Page 2 of 2AnalysisRES724 v6Observation GuideRES724 v6Page 2 of 2Analysis
RES724 v6Observation GuideRES724 v6Page 2 of 2Analysis
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docx
 
Trust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptTrust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adopt
 
Aurelie Cloix Dissertation
Aurelie Cloix DissertationAurelie Cloix Dissertation
Aurelie Cloix Dissertation
 
Refresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and HealthcareRefresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and Healthcare
 
Ethnographic research a helpful technique to hear consumers' voice (compile...
Ethnographic research   a helpful technique to hear consumers' voice (compile...Ethnographic research   a helpful technique to hear consumers' voice (compile...
Ethnographic research a helpful technique to hear consumers' voice (compile...
 
Parry Ad Concept Testing
Parry Ad Concept TestingParry Ad Concept Testing
Parry Ad Concept Testing
 
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)
MART Research team (Dellhi based Rural Marketing Research & Consulting Firm)
 
REMI-Project proposal.
REMI-Project proposal.REMI-Project proposal.
REMI-Project proposal.
 
The intellectual property of the assessment resources reproduced.docx
The intellectual property of the assessment resources reproduced.docxThe intellectual property of the assessment resources reproduced.docx
The intellectual property of the assessment resources reproduced.docx
 
Iteration 11112011v4
Iteration 11112011v4Iteration 11112011v4
Iteration 11112011v4
 
Kus Pro: Module 1 - session 3 - Customers
Kus Pro: Module 1 - session 3 - CustomersKus Pro: Module 1 - session 3 - Customers
Kus Pro: Module 1 - session 3 - Customers
 
Using Intercept Interviews to Survey Vulnerable Populations
Using Intercept Interviews to Survey Vulnerable PopulationsUsing Intercept Interviews to Survey Vulnerable Populations
Using Intercept Interviews to Survey Vulnerable Populations
 
Outlier Analytics - Learning from Those on the Fringe
Outlier Analytics - Learning from Those on the FringeOutlier Analytics - Learning from Those on the Fringe
Outlier Analytics - Learning from Those on the Fringe
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...
OHSUG 2014: How to Detect Safety Reports in Social Media for Processing in Or...
 
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docxCONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
CONSUMERCONSUMER - ANY PARTY USING, OR POTENTIALLY USING,THE.docx
 
Using behavioural science to save the rhino | Psychology of communications co...
Using behavioural science to save the rhino | Psychology of communications co...Using behavioural science to save the rhino | Psychology of communications co...
Using behavioural science to save the rhino | Psychology of communications co...
 
Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire Do you know you the data you are wasting can make you a millionaire
Do you know you the data you are wasting can make you a millionaire
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Conducting Research: Methods for UX Teams

  • 1. Conducting Research Class 3 of 4 Kagonya Awori UX Researcher Nairobi, Kenya
  • 2. Recap Intro to UX part two http://www.slideshare.net/kagonya/intro-to-ux-part-two Defining Users http://www.slideshare.net/kagonya/defining-users-18104455 Slideshare Account name: Kagonya Awori
  • 4. Team Farming To find out how farmers in Kenya acquire information on farm inputs, and how they recommend retail prices and retail outlets.
  • 5. Team Health Explore ways of centralizing patient's records so that it can be accessible from anywhere; but with privacy considerations To investigate how a patients information is stored and accessed by the patient, medical practitioners and the government; and to find out how this information is protected.
  • 6. Team Security To investigate how Nairobians know find out about and avoid security threats; To investigate scenarios that expose visitors in Nairobi to security threats.
  • 7. Plethora of research methods to use
  • 8. 1. Literature Review/ Desk Research Applies all the time Sources of information include: Newspapers Magazines Blogs Government Publications Academic papers Case studies
  • 9. List sources of information for each team Team Farming To find out how farmers in Kenya acquire information on farm inputs, and how they recommend retail prices & retail outlets. Team Health To investigate how a patients information is stored and accessed by the patient, medical practitioners and the government; and to find out how this information is protected. Team Security To investigate how Nairobians find out about and avoid security threats; To investigate scenarios that expose visitors in Nairobi to security threats.
  • 10. 2. Competitor Analysis “To know your Enemy, you must become your Enemy.” Sun Tzu, The Art of War
  • 11. Lets list competitors for each team Team Farming Which companies acquire information on farm inputs? Which recommend retail prices & retail outlets? Team Health Which companies store patient information? Where do patients, medical practitioners and the Govt. access patient records from? Which organisations protected client info? In or out of medical field Team Security Where do Nairobians go to to find out about security threats? What do they read to know what avoid security threats to avoid? What organisations inform the public/their employees on the danger areas in Nairobi? How do they do it?
  • 12. Methods to use 1. Competitor Analysis Sign up for the product Use it yourself Interview current users 2. Bodystorming Have your team test the product, then identify the gaps while testing it.
  • 13. User Experience field research methods
  • 14. 1. Interviews Prepare a set of questions targeted to your concept, and ask users in a face-to-face setting. It is useful to have two researchers per interview session, so one can guide the discussion, and the other can take detailed notes. Do Not ask these questions: What do you want? What would you add? Instead, What problems do you have with the current product/service? What do you think about the product/service you use? Tell me about the last time you were robbed?/ went to hospital/ bought a farm tool
  • 15. 1. Interviews Team Farming To find out how farmers in Kenya acquire information on farm inputs, and how they recommend retail prices & retail outlets. e.g. Where do you buy farm inputs from? Why that shop and not others? What type of farm inputs do you get from that shop? Team Health To investigate how a patients information is stored and accessed by the patient, medical practitioners and the government; and to find out how this information is protected. e.g. Which hospital do you attend most? Are you registered there? Do you have access to the your medical records? How do you keep track of your medical history? Team Security To investigate how Nairobians find out about and avoid security threats; To investigate scenarios that expose visitors in Nairobi to security threats. e.g. Which are the most dangerous areas in Nairobi? How did you know that? How do you inform your friends about the dangerous areas? How do you know what areas to avoid when you travel to a new town?
  • 16. 2. Contextual Inquiry This is a rich observational research technique where users are observed in their natural environment as they perform a task, or use a product or service. Done in order to get the clearest understanding of how users perform the task under study, what technology and information they use , who they work with, what outputs they create and that inputs they need. More about how to conduct a contextual inquiry: Definition: http://www.usabilitynet.org/tools/contextualinquiry.htm Process: http://www.webcredible.co.uk/user-friendly-resources/web-usability/contextual-inquiry.shtml
  • 17. 3. Knowledge mining Leverage the experience of people who are uniquely qualified to offer insights—early adopters, power users, wizened veterans. Draw out their knowledge in surveys, interviews, or brainstorming sessions. Team Farming: farmers, fertiliser sellers, agriculture SACCOs Team Health: medical practioners, hospitals, patients, NHIF Team Security: police officers, watchmen, journalists, G4S, Red Cross, radio stations
  • 18. About the presenter Kagonya Awori is a User Experience Researcher in Nairobi, Kenya. She holds a Masters in Human- Computer Interaction (MHCI) from Carnegie Mellon University, the birthplace and world leader in user experience studies. She is the first African with an MHCI from Carnegie Mellon. Kagonya is passionate about catalyzing the knowledge and application of user experience research in the burgeoning tech community in Kenya. Her interests include local content generation, mobile user experience design, social networks and designing for rural communities. She currently works on projects with iHub Research and iHub UX Lab.

Editor's Notes

  1. Access to previous notes
  2. Must be done no matter the area you are investigating.
  3. Students can give examples of which magazines to look at and what questions they can answer from these.
  4. Must be done no matter the area you are investigating. You must know the current players in the market, to know what gap to fill. Picture source:
  5. Students can give examples of competitors according to the questions asked.
  6. Students can give examples of which magazines to look at and what questions they can answer from these.Read more here: http://boxesandarrows.com/competitive-analysis-understanding-the-market-context/Read more about cognitive walkthroughs here: http://www.pages.drexel.edu/~zwz22/CognWalk.htm
  7. Summary sourced from: www.thoughtformdesign.com) and DaedalusExcel (www.daed.com) 7944
  8. Students can give examples of competitors
  9. Students can give examples of which magazines to look at and what questions they can answer from these.Summary sourced from: www.thoughtformdesign.com) and DaedalusExcel (www.daed.com) 7944
  10. Students can give examples of which magazines to look at and what questions they can answer from these.Summary sourced from: www.thoughtformdesign.com) and DaedalusExcel (www.daed.com) 7944