IS 425 Enterprise Information LECTURE 4 Winter 2006-2007.
-
date post
20-Dec-2015 -
Category
Documents
-
view
220 -
download
2
Transcript of IS 425 Enterprise Information LECTURE 4 Winter 2006-2007.
IS 425
Enterprise Information LECTURE 4
Winter 2006-2007
2
Agenda
Review/Discussion Exercise HCI / Usability Engineering Data Mining Quiz
3
Pulling It Together
1. What kind of aptitude does a security engineer need?
2. What skills does a security engineer need?
3. What kind of aptitude does a software engineer need?
4. What skills does a software architect need?
5. Are they different?
4
Exercise
1. Each team debates and comes up with the tradeoffs between doing the risk analysis in the management inception phase and doing it in the deployment phase of a large scale IT project.
2. Is it possible to do risk analysis on different security threats at different times? If so, then indicate which view/phase is best for threat.
5
HCI – Usability Engineering HCI –
Grew out of shared interest between Cognitive scientists Computer scientists
Learning challenges of interactive systems Using them Designing them
Usability – The quality of a system with respect to: Ease of learning Ease of use User satisfactionScope expands to cover social/organizational aspects of systems development/use
6
Usability
Three distinct, complementary perspectives contribute: Human performance
time and error Learning and cognition
mental models of plans and actions
Collaborative activitydynamics and workplace context
7
Usability Engineering
Focus on Design of the user interface Requirements analysis Envisioning the system
Relies on use of: Iterative development Tradeoff analysis resulting in design rationale User Interaction Scenarios
8
User Interaction Scenario
Describes behaviors and experiences of actors
Has a plot – sequences of Actions Events
Task goals: High-level is the primary goal of the scenario Sub-goals are the lower-level goals
9
User Interaction Scenarios
Stories about people and their activities Elements
Setting –details that motivate/explain or starting state Actors – humans interacting Task goals – motivate actions Plans – mental activity directed at converting goal into a
behavior Evaluation – mental activity directed at interpreting features
of the situation Actions – observable behavior Events – external actions or reactions
10
User Interaction Scenario Analysis is to find those things that affect goal
achievement by Aiding Obstructing Being irrelevant
Is type of Use Case which is: More general Includes multiple responses (not just one) Intended to describe what system will do Can specify the user-system exchanges for scenario
examination Useful in Tradeoff analysis
11
Tradeoffs Addressed by scenarios 5 mentioned in text
12
Scenario-Based Usability Engineering
Overview Iterative Interleaved Idealized
progression
13
Scenario Based Analysis Phase
Used to evoke reflection / discussion Claims
Stimulate analysis and refinement Lists important features of a situation Lists impacts on users experiences Organize / documents “what-ifs” for prioritizing
alternatives
14
Scenario Based Design Phase
3 sub-stages of scenarios Activities
narratives of typical or critical services Information
details about info provided Interaction
details of user action and feedback
15
Scenario Based Prototyping/Evaluation
Assumption – design ideas in scenarios continually evaluated using prototyping
Evaluation Formative – guides redesign Summative – system verification
“go/no-go” test
16
Summary
Combination of structured development and prototyping thru scenarios
Scenarios organize analysis of user needs Scenarios help in uncovering tradeoffs Major focus of development are tradeoff
analysis Thru scenarios can develop measurable
usability objectives
17
Data Mining
Definition – process by which analysts apply technology to historical date (mining) to determine statistically reliable relationships between variables.
This lets data tell what is happening rather than testing the validity of rigorous theory against samples of data.
18
Data Mining
Required – data warehouses with huge volumes of information to access for finding hidden relationships patterns, affiliations.
Utilize tools of mathematics and statistical testing
19
Major Data Mining Technologies
20
Data Mining Approaches & Aims Directed – identify relationships between drivers and targets (DIR) Undirected – tools unleashed on data with no guidance (UDIR) Strategic Insight – tools that reduce data into a few key perceptions (HESI) Just-In-Time – tools that analyze data as it arrives at the organization (JIT)
21
Data Mining Technologies in Use Clustering algorithms – group data on basis of similarity -- UDIR Association analysis – used to assist sales –JIT Visualization – graphical representation for easy digestion – JIT Slice & dice – extract summary data quickly “on the fly” – DIR Segmentation algorithms – group data by target – DIR Forecasting algorithms – probability of future actions – DIR Regression – finding the relationship between variables – HESI Neural Nets – AI – more intensive analysis using linear,
nonlinear and patterned relationships to identify relationships – HESI
Optimization – uses output from other DM to find best strategy given – HESI
22
Personalization
Uses information from tracking, mining and data analysis to customize a person’s interactions with a company’s products, services, Web site and employees
Collaborative filtering (Recommender System) Compare a present user’s interests with those of past
users to offer recommendations Rules-based personalization : based on the subjection of
a user’s profile to set rules or assumptions. Excite.com (My excite start page
23
Insights
Who will HCI professionals interact with? Who will DM professionals interact with? What aptitudes are required of HCI
professionals? What aptitudes are required of data mining
professionals?