SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Running head: INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 1
Information Architecture Techniques and Best Practices
Christopher Furton
Syracuse University
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 2
Abstract
Developing information structures, such as websites or systems, involves a complex set
of processes with the goal of making information usable, findable, and organized. Information
Architecture tools, techniques, and best practices provide the building blocks to achieving the
end state. With hundreds and possibly thousands of tools and techniques available, this paper
explores five specific options: card sorting, free-listing, perspective-based inspection, personas,
and content value analysis. These five techniques span the breadth of the information
architecture project and provide insight into the constantly evolving and developing information
architecture field.
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 3
Information Architecture Techniques and Best Practices
This paper explores the tools, techniques, and best practices for Information Architecture.
However, it would be impossible to discuss every possible tool or technique. Instead, this paper
focuses on five different techniques: card sorting, free-listing, perspective-based inspection,
personas, and content value analysis. These five techniques were chosen as a subset of the
hundreds of options because, when combined, they span the entire length of a project lifecycle.
The paper is split into two major sections. The first provides a brief overview of
information architecture as background and to develop context. The second section provides
information on the five tools and techniques. Lastly, the figure provides a chronological view of
the information structure design and development project showing the recommended relationship
between each technique and the associated phase of the project.
Information Architecture Overview
Information Architecture is a constantly evolving discipline transposing elements of
traditional architectural into the digital frontier. According to Morville & Rosenfeld’s (2006)
definition, IA is composed of four elements:
1) The structural design of shared information elements.
2) The combination of organization, labeling, searching, and navigation systems within web
sites and intranets.
3) The art and science of shaping information products and experiences to support usability
and findability.
4) An emerging discipline and community of practice focused on bringing principles of
design and architecture to the digital landscape. (p. 4)
The field of information architecture is still relatively young and developing. As Nathaniel
Davis (2010) described, “information architects have an opportunity to begin an era of
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 4
methodical practice that enables a discipline as well as the transference of acquired knowledge to
address the real qualitative effects of information.” As the field of study and practice grows,
tools, techniques, and best practices surface to aid architects in accomplishing their
groundbreaking efforts. Ultimately, the architect should focus efforts on the user experience
when making decisions about how to organize and present the content of a site (Chapman, 2010).
Tools & Techniques Analysis
This section will explore several tools and techniques available to information architects.
Each sub-section will consist of a description of the technique, review advantages and
disadvantages, and provide insight into the best usage of the technique during the design and
development process.
Card Sorting
The first technique discussed is the card sorting technique. Card sorting is a “user-
centered design method for increasing a system’s findability. The process involves sorting a
series of cards, each labeled with a piece of content or functionality, into groups that make sense
of users or participants” (Spencer & Warfel, 2004). Depending on the method of card sorting,
the participants may or may not be given a set of pre-defined groups to place the content cards
into. If groups are provided, the method of card sorting is considered closed; conversely, if no
groups are provided, then the method is of card sorting is considered open (Spencer & Warfel,
2004).
Executing the card sort technique involves three simple steps. First, the practitioner
creates cards where each card identifies a single piece of existing or desired content. Second, the
participants place the cards into groups based on similarities. Additionally, groups can be based
off statistical factors derived from cluster analysis and tree graphs. Some cards may fit into
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 5
multiple groups whereas others don’t seem to fit into any. The practitioner may duplicate cards
that fit into multiple groups or review labels for those that don’t fit at all. Lastly, the participants
determine names for each of the newly created groups by identifying keywords, commonalities,
or re-occurring themes (Ooi, 2011).
This technique has several advantages and disadvantages. The advantages relate to the
ease of use and low cost of execution. Since the technique is performed using the real users, the
resulting information structure does not rely on those less intimate with the content such as
designers or architects. However, one significant criticism is that the technique is inherently
content-centric. This can cause problems as the resulting information structure does not take into
consideration the users’ tasks (Spencer & Warfel, 2004). Combining the card sorting process
with a non-content centric technique such as a needs analysis or task analysis can ensure user
views are considered in the design and development effort.
The card sorting technique is best used early in the design or redesign of a site. The
technique is not intended to be an evaluation technique. Once the content inventory and
assessments are conducted, the practitioner will have the prerequisite information needed
(Spencer & Warfel, 2004). If new content is going to be added to the structure, the open card
sorting technique can be used on the new content to establish appropriate groupings. See figure
1 for a diagram depicting where this technique fits into the overall design and development
process.
Free-listing
The next technique discussed is the free-listing technique. The purpose of free-listing is
to help the architect gather data about topics by asking people to list all the related items that
they can think of. The data gathered can then be analyzed and used to explore user
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 6
categorizations (Sinha, 2003). For example, the architect can ask a group of users to list all the
tasks that they perform on a project. The resulting lists are compared and analyzed noting the
frequency and order of answers which provide a sense of “coherency” of the domain. Once
complete, the architect can create a frequency diagram showing the items collected most
frequently (Wilson, Method 3 of 100: Freelisting, 2011).
Free-listing has advantages and disadvantages. One advantage of free-listing is that it is
highly cost effective. Large amounts of data can be collected quickly without the need to train
participants or facilitators (Wilson, Methods - Free Listing, 2009). Additionally, the technique
can be used in many different ways such as Internet based, face-to-face interviews, or in a group
setting. However, one disadvantage is that analyzing for patterns can be time consuming
especially with large sample sizes (Wilson, Method 3 of 100: Freelisting, 2011).
The free-listing technique is best used early in the design process. The technique can be
combined with brainstorming and card sorting to help form categories of content (Sinha, 2003).
Also, the technique can be used when short on time with the user communities. The process can
take a few minutes and still collect a significant amount of information. For example, using this
technique at a large meeting with hundreds of users can provide a substantial amount of data in
just minutes if all contributors write their responses down on paper. See figure 1 for a diagram
depicting where this technique fits into the overall design and development process.
Perspective-Based Inspection
The next technique discussed is the perspective-based inspection. This technique can be
performed by the design and architecture staff without the user involvement. Each member of
the staff is given a perspective in which they assume while reviewing a website or information
structure. The resulting observations can provide a wide range of critiques that would not have
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 7
normally been identified. The following perspectives were identified by Chauncey Wilson
(Wilson, Method 10 of 100: Perspective-Based Inspection, 2011):
 Consistency czar – this person looks for any consistency issues with the product.
 Disabled user – this person would role play a person with specific disabilities and note
where the product is not accessible.
 Psychologist – this person would look for violations of psychological principles related
to memory, learning, attention, fatigue, interruption, persuasion, etc.
 Super power user – this person would look at issues of efficiency, shortcuts, and aspects
of the product to support the very expert and frequent user.
 Error expert – this person would focus on areas where users might make errors and in
places where the system could support error prevention.
 Artist – this person would look for problems with aesthetics like clutter, poor use of
color, graphics that look amateurish, and ugly icons.
 The Keyboarder – this person does not use the mouse and evaluates a product for
complete keyboard access. (p. 1)
The use of perspectives in usability inspection has proved to be beneficial; those using
perspectives have higher success than those that did not. An experiment conducted at the
University of Maryland showed a 30% improvement by perspective inspectors in detection of
usability problems compared to heuristic inspectors (Zhang, Basili, & Shneiderman, 1998).
As with many of the techniques discussed so far, this technique has an advantage of being
relatively inexpensive. Additionally, this technique can be implemented at different sites using a
variety of online tools. However, a significant disadvantage lies in the inspector’s ability to
assume a perspective that he or she may know very little about (Wilson, Method 3 of 100:
Freelisting, 2011). For example, it may be difficult for an inspector to assume the perspective of
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 8
“The Keyboarder” if that person normally uses a mouse. Some people are not as adept to role-
playing activities as others.
Perspective-based inspections can be used later in the design process to identify usability
problems. Once a prototype is developed, these inspections will broaden the problem-finding
ability of inspectors or testers (Wilson, Method 10 of 100: Perspective-Based Inspection, 2011).
This technique can also be used earlier in the design process by assigning perspectives during
review of architecture products or content maps. See figure 1 for a diagram depicting where this
technique fits into the overall design and development process.
Personas
The next technique can assist architects by ensuring the information architecture and
design meets the demands of the expected typical user. This technique involves creation of
personas based on the user research conducted early in the design and development. Use of
personas falls within a user-centered design process and provides a link between development
efforts and the user’s behavior, attitudes and needs. Personas can be a fun way to communicate
user research to the designers in a simple and accessible manner which will ensure the research is
taken into account throughout the project (Gray, 2010).
Using personas involves creating made-up examples of people that fit each of the major
segments of the site’s user base. Typically, the site would have three to five personas to prevent
overwhelming the development and design team (Gray, 2010). Too many personas may result in
blurring several into one losing the effectiveness of the technique. The information that goes
into each persona can be unique to each organization or project. According to Gray (2010), the
following information may be helpful for the design/development team:
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 9
 Pictures – makes the persona feel real and helps designers/developers empathize with
the persona.
 A description – demographic information including job, their technology, and the
pressures or situation they are in when they use the system or site.
 Needs, goals, & features – either a straight list or a table which helps define a priority
list for features before development starts.
 A ‘quote’ from the persona – this gives the persona more personality while also
summarizing their needs and goals into a single sentence.
 Frustrations – these are the problems that the user encounters in using the system or
website and focuses the designers/developers to the biggest issues
 Ideal features – these features may be impossible to produce but help designers and
developers think of alternative approaches.
 ‘Need to know’ – this is information the persona needs when trying to accomplish
tasks on the system or site.
 Behaviors – these are the typical behaviors the persona exhibits that directly relate to
the needs or requirements of the system or site.
 Scenarios – these are sample use cases that the persona might do and can clarify how
the system will be used (p. 1).
The key to successfully use of personas depends on the adaptation during design and
development. Some organizations find it useful to display the personas on posters within the
workspace to help keep the development team focused on the user-centric design process (Gray,
2010).
The personas technique offers several advantages and disadvantages. The main
advantage is that the personas provide a vehicle to represent user research in a tangible and
workable medium. Conversely, one of the disadvantages is that the very realism that makes
personas effective may complicate and potentially distract the designer because of extra fluff and
mere artistic concoctions (Constantine).
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 10
The persona exists throughout the lifecycle of the design and development project. The
personas should be created early in the research phases and exist throughout the testing and ‘go
live’ events. See figure 1 for a diagram depicting where this technique fits into the overall
design and development process.
Content Value Analysis
The final technique discussed in this paper is a Content Value Analysis (CVA). The role
of a CVA is to provide quantitative feedback on content value for a current system or website.
This technique aims to provide a mechanism for analyzing and assigning a value based on
heuristics to a subset of the content. Furthermore, this technique then uses statistics to back the
notion that the arrived upon value is representative of the entire collection of content (Walsh,
2008).
To accomplish a content value analysis, Walsh (2008) developed an activity flowchart
outlining a six step process:
1) Scope the site – for accurate results, the size of the site to be assessed should be
determined based off number of pages.
2) Select the sample size –a statistical sampling table to define the Acceptable Quality Level
(AQL) should help the practitioner develop the required sample size for statistical
relevancy. Military Standard 105E provides a statistical sampling table which can be
used in CVA calculations.
3) Select the pages to assess – to select pages, Walsh recommends using a random set of
pages selected through an online tool at random.org.
4) Select the heuristics to be used – value indicators are assigned to each page from the
sample set. One set of heuristics described by Walsh is a 0 to 1 scale based on content
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 11
value. For example, of the page has obsolete or no content, the practitioner should assign
a value of 0. If the page has good content, the practitioner should assign a value of 1.
5) Record the findings and scores – the practitioner should record each page visited and the
corresponding score.
6) Analyze the findings for patterns and produce a report – the practitioner should then
develop charts or graphs to represent the value of the current content. For example, 48%
of pages have content that is irrelevant or outdated.
The content value analysis has advantages and disadvantages. Specifically, the CVA has
the ability to provide quantitative feedback to the site owner about the content using statistical
modeling. This technique is relatively inexpensive to implement and requires only one person.
However, the quality of the heuristic can be debated which still leaves an element of human
opinion in the analysis. For example, one practitioner may feel that a page is irrelevant while
another feels that the same page has adequate content.
The ideal use of this technique is before the start of a website renovation effort or as a
check and balance during the final testing stages. Use of this technique early will develop a
quality baseline as well as identify whether a significant content problems exists. Conducting
the same technique during final testing will measure the growth in content quality from the initial
baseline. Unfortunately, identifying content problems late in the project may create substantial
costs to fix compared to finding the problem early.
Conclusion
The evolving field of information architecture is bursting with endless tools and
techniques to help architects develop effective solutions. Some tools are user-based while some
are content-based, but all tools are aimed at providing an architecture solution that keeps up with
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 12
technology. As technology changes, the tools and techniques used by architects will continue to
adapt. This paper only scratches the surface on the variety of tools and techniques available to
create a positive user experience.
The card sorting technique describes a method to cluster content into logical groupings
based on user input. The free-listing provides a mechanism to gather ideas and brainstorm
(which could be a tool within itself) by asking people to list as many aspects as they can about
topic X. Perspective-based inspection describes a method of evaluating a prototype site by role
playing a certain perspective. Similarly, the personas technique involves usage of realistic
potential examples of customers or visitors to a site. Lastly, the content value analysis allows
architects to obtain quantitative measures of content effectiveness based of sample sizing and
statistical analysis.
Along with descriptions of several tools, this paper reviewed advantages and
disadvantages for each technique and offered suggestions on when to use each technique.
Ultimately, there is not a regulated or mandated usage of any tool set; rather, the tools can be
used as needed dependent on the situation at hand. Similar to a plumber’s toolbox, the
information architect’s tool box contains hundreds of techniques which can help organizations
develop usable, findable, and organized information.
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 13
References
Chapman, C. (2010, October 18). Information Architecture 101: Techniques and Best Practices.
Retrieved March 18, 2012, from Six Revisions: Useful Information for Web Developers
& Designers: http://sixrevisions.com/usabilityaccessibility/information-architecture-101-
techniques-and-best-practices/
Constantine, L. (n.d.). Users, Roles, and Personas. Constantine & Lockwood, Ltd.
Davis, N. (2010). Information Architecture, Black Holes and Discipline; On Developing a
Framework for a Practice of Information Architecture. Bulletin of the American Society
for Information Science and Technology, 25-29.
Gray, A. (2010, April). Personas - the definitive guide. Retrieved March 18, 2012, from
Webcredible: http://www.webcredible.co.uk/user-friendly-resources/web-
usability/personas.shtml
Malone, E. (2003, September). The Information Architecture Institute. Retrieved March 18,
2012, from Learning IA - Process Maps:
http://aifia.org/tools/download/ExperienceDesignFlow_bw.pdf
Morville, P., & Rosenfeld, L. (2006). Information Architecture for the World Wide Web.
Sebastopol, CA: O'Reilly Media Inc.
Ooi, Y. (2011, February). Methods for analysing card sort results. Retrieved March 18, 2012,
from Webcredible: http://www.webcredible.co.uk/user-friendly-resources/ucd/methods-
card-sorting.shtml
Sinha, R. (2003, 02 24). Beyond cardsorting: Free-listing methods to explore user
categorizations. Retrieved 03 16, 2012, from boxesandarrows:
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 14
http://www.boxesandarrows.com/view/beyond_cardsorting_free_listing_methods_to_exp
lore_user_categorizations
Spencer, D., & Warfel, T. (2004, 04 07). Card sorting: a definitive guide. Retrieved 03 16, 2012,
from boxesandarrows:
http://www.boxesandarrows.com/view/card_sorting_a_definitive_guide
Walsh, P. C. (2008, October 08). Content Value Analysis for Intranets. Part 2 - a methodology.
Retrieved March 18, 2012, from ManIA:
http://patrickcwalsh.wordpress.com/2008/10/08/content-value-analysis-for-intranets-part-
2-a-methodology/
Wilson, C. (2009, 06). Methods - Free Listing. Retrieved 03 16, 2012, from Preview of the
Usability Body of Knowledge: http://www.usabilitybok.org/methods/free-listing
Wilson, C. (2011, 03 24). Method 10 of 100: Perspective-Based Inspection. Retrieved 03 16,
2012, from Designing the User Experience at Autodesk:
http://dux.typepad.com/dux/2011/03/method-10-of-100-perspective-based-
inspection.html
Wilson, C. (2011, 01 13). Method 3 of 100: Freelisting. Retrieved 03 16, 2012, from Designing
the User Experience at Autodesk: http://dux.typepad.com/dux/2011/01/this-is-the-third-
in-a-series-of-100-short-articles-about-ux-design-and-evaluation-methods-todays-
method-is-called-freeli.html
Zhang, Z., Basili, V., & Shneiderman, B. (1998). An empirical study of perspective-based
usability inspection. Proceedings of the Human Factors and Ergonomics Society 42nd
Annual Meeting (pp. 1346-1350). College Park, MD: University of Maryland.
INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 15
Figures
Figure 1: Phases of Web Design Process (Malone, 2003)
About the author
Author: Christopher Furton
Website: Http://christopher.furton.net
Certified professional with over 12 years of Information Technology experience and 8 years of
hands-on leadership. An expert in cyber security with both managerial and technical skills
proven throughout a career with increasing responsibility and performance expectations. Known
ability to translate complex information for universal understanding. Detail-driven, results-
focused leader with superior analytical, multitasking, and communication skills. Well-versed in
industry best practices including Project Management and IT Service Management. Currently
holding active CISSP, CEH, ITIL Foundations, Security+, and Network+ certifications.
Visit the auhor’s blog:
IT Management Perspectives - https://christopherfurton.wordpress.com/
Social Sphere:
LinkedIn Twitter Google+ Quora Wordpress Flavors.me
Slide Share Tumblr YouTube Pinterest About.me Vimeo

Weitere ähnliche Inhalte

Andere mochten auch

The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information ArchitectureChristina Wodtke
 
The Architecture of Understanding
The Architecture of UnderstandingThe Architecture of Understanding
The Architecture of UnderstandingPeter Morville
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information ArchitecturePeter Morville
 
Principles of Taxonomies
Principles of TaxonomiesPrinciples of Taxonomies
Principles of TaxonomiesTheresa Putkey
 
Best Practice Information Architecture
Best Practice Information ArchitectureBest Practice Information Architecture
Best Practice Information ArchitecturePatrick Kennedy
 
Buzzword Information Architecture
Buzzword Information ArchitectureBuzzword Information Architecture
Buzzword Information ArchitectureKirstenSchelper
 

Andere mochten auch (7)

The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information Architecture
 
The Architecture of Understanding
The Architecture of UnderstandingThe Architecture of Understanding
The Architecture of Understanding
 
The Future of Information Architecture
The Future of Information ArchitectureThe Future of Information Architecture
The Future of Information Architecture
 
Principles of Taxonomies
Principles of TaxonomiesPrinciples of Taxonomies
Principles of Taxonomies
 
Best Practice Information Architecture
Best Practice Information ArchitectureBest Practice Information Architecture
Best Practice Information Architecture
 
Buzzword Information Architecture
Buzzword Information ArchitectureBuzzword Information Architecture
Buzzword Information Architecture
 
Inhaltsstrategien
InhaltsstrategienInhaltsstrategien
Inhaltsstrategien
 

Ähnlich wie Information Architecture Techniques and Best Practices

Km knowledge application.11
Km  knowledge application.11Km  knowledge application.11
Km knowledge application.11leilajannati
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture DevelopmentAchmad Solichin
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...Grial - University of Salamanca
 
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...Editor IJCATR
 
Masters Project - FINAL - Public
Masters Project - FINAL - PublicMasters Project - FINAL - Public
Masters Project - FINAL - PublicMichael Hay
 
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...IJEACS
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...Amy Isleb
 
Information Architecture Intro
Information Architecture IntroInformation Architecture Intro
Information Architecture Introhapy
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docxrtodd599
 
A Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And AnalysisA Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And AnalysisMichele Thomas
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...Hendrik Drachsler
 

Ähnlich wie Information Architecture Techniques and Best Practices (20)

Km knowledge application.11
Km  knowledge application.11Km  knowledge application.11
Km knowledge application.11
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture Development
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
 
S180304116124
S180304116124S180304116124
S180304116124
 
Masters Project - FINAL - Public
Masters Project - FINAL - PublicMasters Project - FINAL - Public
Masters Project - FINAL - Public
 
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
Stacked Generalization of Random Forest and Decision Tree Techniques for Libr...
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
 
Information Architecture Intro
Information Architecture IntroInformation Architecture Intro
Information Architecture Intro
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Useful interactions
Useful interactionsUseful interactions
Useful interactions
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
A Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And AnalysisA Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And Analysis
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...
 
Sirtel Workshop
Sirtel WorkshopSirtel Workshop
Sirtel Workshop
 

Mehr von Chris Furton

Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering HolesChristopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering HolesChris Furton
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Chris Furton
 
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...Chris Furton
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementChris Furton
 
Analysis of Enterprise Risk Management of Two Retail Industry Competitors
Analysis of Enterprise Risk Management of Two Retail Industry CompetitorsAnalysis of Enterprise Risk Management of Two Retail Industry Competitors
Analysis of Enterprise Risk Management of Two Retail Industry CompetitorsChris Furton
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChris Furton
 
Mock Panel debate on hate speech
Mock Panel debate on hate speechMock Panel debate on hate speech
Mock Panel debate on hate speechChris Furton
 
DARPA Project Memex Erodes Privacy
DARPA Project Memex Erodes PrivacyDARPA Project Memex Erodes Privacy
DARPA Project Memex Erodes PrivacyChris Furton
 
IT Strategy in Airlines Industry
IT Strategy in Airlines IndustryIT Strategy in Airlines Industry
IT Strategy in Airlines IndustryChris Furton
 

Mehr von Chris Furton (9)

Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering HolesChristopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
Christopher Furton - Cybersecurity Threat Brief: Malvertising and Watering Holes
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...
 
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
 
Analysis of Enterprise Risk Management of Two Retail Industry Competitors
Analysis of Enterprise Risk Management of Two Retail Industry CompetitorsAnalysis of Enterprise Risk Management of Two Retail Industry Competitors
Analysis of Enterprise Risk Management of Two Retail Industry Competitors
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
Mock Panel debate on hate speech
Mock Panel debate on hate speechMock Panel debate on hate speech
Mock Panel debate on hate speech
 
DARPA Project Memex Erodes Privacy
DARPA Project Memex Erodes PrivacyDARPA Project Memex Erodes Privacy
DARPA Project Memex Erodes Privacy
 
IT Strategy in Airlines Industry
IT Strategy in Airlines IndustryIT Strategy in Airlines Industry
IT Strategy in Airlines Industry
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Information Architecture Techniques and Best Practices

  • 1. Running head: INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 1 Information Architecture Techniques and Best Practices Christopher Furton Syracuse University
  • 2. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 2 Abstract Developing information structures, such as websites or systems, involves a complex set of processes with the goal of making information usable, findable, and organized. Information Architecture tools, techniques, and best practices provide the building blocks to achieving the end state. With hundreds and possibly thousands of tools and techniques available, this paper explores five specific options: card sorting, free-listing, perspective-based inspection, personas, and content value analysis. These five techniques span the breadth of the information architecture project and provide insight into the constantly evolving and developing information architecture field.
  • 3. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 3 Information Architecture Techniques and Best Practices This paper explores the tools, techniques, and best practices for Information Architecture. However, it would be impossible to discuss every possible tool or technique. Instead, this paper focuses on five different techniques: card sorting, free-listing, perspective-based inspection, personas, and content value analysis. These five techniques were chosen as a subset of the hundreds of options because, when combined, they span the entire length of a project lifecycle. The paper is split into two major sections. The first provides a brief overview of information architecture as background and to develop context. The second section provides information on the five tools and techniques. Lastly, the figure provides a chronological view of the information structure design and development project showing the recommended relationship between each technique and the associated phase of the project. Information Architecture Overview Information Architecture is a constantly evolving discipline transposing elements of traditional architectural into the digital frontier. According to Morville & Rosenfeld’s (2006) definition, IA is composed of four elements: 1) The structural design of shared information elements. 2) The combination of organization, labeling, searching, and navigation systems within web sites and intranets. 3) The art and science of shaping information products and experiences to support usability and findability. 4) An emerging discipline and community of practice focused on bringing principles of design and architecture to the digital landscape. (p. 4) The field of information architecture is still relatively young and developing. As Nathaniel Davis (2010) described, “information architects have an opportunity to begin an era of
  • 4. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 4 methodical practice that enables a discipline as well as the transference of acquired knowledge to address the real qualitative effects of information.” As the field of study and practice grows, tools, techniques, and best practices surface to aid architects in accomplishing their groundbreaking efforts. Ultimately, the architect should focus efforts on the user experience when making decisions about how to organize and present the content of a site (Chapman, 2010). Tools & Techniques Analysis This section will explore several tools and techniques available to information architects. Each sub-section will consist of a description of the technique, review advantages and disadvantages, and provide insight into the best usage of the technique during the design and development process. Card Sorting The first technique discussed is the card sorting technique. Card sorting is a “user- centered design method for increasing a system’s findability. The process involves sorting a series of cards, each labeled with a piece of content or functionality, into groups that make sense of users or participants” (Spencer & Warfel, 2004). Depending on the method of card sorting, the participants may or may not be given a set of pre-defined groups to place the content cards into. If groups are provided, the method of card sorting is considered closed; conversely, if no groups are provided, then the method is of card sorting is considered open (Spencer & Warfel, 2004). Executing the card sort technique involves three simple steps. First, the practitioner creates cards where each card identifies a single piece of existing or desired content. Second, the participants place the cards into groups based on similarities. Additionally, groups can be based off statistical factors derived from cluster analysis and tree graphs. Some cards may fit into
  • 5. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 5 multiple groups whereas others don’t seem to fit into any. The practitioner may duplicate cards that fit into multiple groups or review labels for those that don’t fit at all. Lastly, the participants determine names for each of the newly created groups by identifying keywords, commonalities, or re-occurring themes (Ooi, 2011). This technique has several advantages and disadvantages. The advantages relate to the ease of use and low cost of execution. Since the technique is performed using the real users, the resulting information structure does not rely on those less intimate with the content such as designers or architects. However, one significant criticism is that the technique is inherently content-centric. This can cause problems as the resulting information structure does not take into consideration the users’ tasks (Spencer & Warfel, 2004). Combining the card sorting process with a non-content centric technique such as a needs analysis or task analysis can ensure user views are considered in the design and development effort. The card sorting technique is best used early in the design or redesign of a site. The technique is not intended to be an evaluation technique. Once the content inventory and assessments are conducted, the practitioner will have the prerequisite information needed (Spencer & Warfel, 2004). If new content is going to be added to the structure, the open card sorting technique can be used on the new content to establish appropriate groupings. See figure 1 for a diagram depicting where this technique fits into the overall design and development process. Free-listing The next technique discussed is the free-listing technique. The purpose of free-listing is to help the architect gather data about topics by asking people to list all the related items that they can think of. The data gathered can then be analyzed and used to explore user
  • 6. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 6 categorizations (Sinha, 2003). For example, the architect can ask a group of users to list all the tasks that they perform on a project. The resulting lists are compared and analyzed noting the frequency and order of answers which provide a sense of “coherency” of the domain. Once complete, the architect can create a frequency diagram showing the items collected most frequently (Wilson, Method 3 of 100: Freelisting, 2011). Free-listing has advantages and disadvantages. One advantage of free-listing is that it is highly cost effective. Large amounts of data can be collected quickly without the need to train participants or facilitators (Wilson, Methods - Free Listing, 2009). Additionally, the technique can be used in many different ways such as Internet based, face-to-face interviews, or in a group setting. However, one disadvantage is that analyzing for patterns can be time consuming especially with large sample sizes (Wilson, Method 3 of 100: Freelisting, 2011). The free-listing technique is best used early in the design process. The technique can be combined with brainstorming and card sorting to help form categories of content (Sinha, 2003). Also, the technique can be used when short on time with the user communities. The process can take a few minutes and still collect a significant amount of information. For example, using this technique at a large meeting with hundreds of users can provide a substantial amount of data in just minutes if all contributors write their responses down on paper. See figure 1 for a diagram depicting where this technique fits into the overall design and development process. Perspective-Based Inspection The next technique discussed is the perspective-based inspection. This technique can be performed by the design and architecture staff without the user involvement. Each member of the staff is given a perspective in which they assume while reviewing a website or information structure. The resulting observations can provide a wide range of critiques that would not have
  • 7. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 7 normally been identified. The following perspectives were identified by Chauncey Wilson (Wilson, Method 10 of 100: Perspective-Based Inspection, 2011):  Consistency czar – this person looks for any consistency issues with the product.  Disabled user – this person would role play a person with specific disabilities and note where the product is not accessible.  Psychologist – this person would look for violations of psychological principles related to memory, learning, attention, fatigue, interruption, persuasion, etc.  Super power user – this person would look at issues of efficiency, shortcuts, and aspects of the product to support the very expert and frequent user.  Error expert – this person would focus on areas where users might make errors and in places where the system could support error prevention.  Artist – this person would look for problems with aesthetics like clutter, poor use of color, graphics that look amateurish, and ugly icons.  The Keyboarder – this person does not use the mouse and evaluates a product for complete keyboard access. (p. 1) The use of perspectives in usability inspection has proved to be beneficial; those using perspectives have higher success than those that did not. An experiment conducted at the University of Maryland showed a 30% improvement by perspective inspectors in detection of usability problems compared to heuristic inspectors (Zhang, Basili, & Shneiderman, 1998). As with many of the techniques discussed so far, this technique has an advantage of being relatively inexpensive. Additionally, this technique can be implemented at different sites using a variety of online tools. However, a significant disadvantage lies in the inspector’s ability to assume a perspective that he or she may know very little about (Wilson, Method 3 of 100: Freelisting, 2011). For example, it may be difficult for an inspector to assume the perspective of
  • 8. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 8 “The Keyboarder” if that person normally uses a mouse. Some people are not as adept to role- playing activities as others. Perspective-based inspections can be used later in the design process to identify usability problems. Once a prototype is developed, these inspections will broaden the problem-finding ability of inspectors or testers (Wilson, Method 10 of 100: Perspective-Based Inspection, 2011). This technique can also be used earlier in the design process by assigning perspectives during review of architecture products or content maps. See figure 1 for a diagram depicting where this technique fits into the overall design and development process. Personas The next technique can assist architects by ensuring the information architecture and design meets the demands of the expected typical user. This technique involves creation of personas based on the user research conducted early in the design and development. Use of personas falls within a user-centered design process and provides a link between development efforts and the user’s behavior, attitudes and needs. Personas can be a fun way to communicate user research to the designers in a simple and accessible manner which will ensure the research is taken into account throughout the project (Gray, 2010). Using personas involves creating made-up examples of people that fit each of the major segments of the site’s user base. Typically, the site would have three to five personas to prevent overwhelming the development and design team (Gray, 2010). Too many personas may result in blurring several into one losing the effectiveness of the technique. The information that goes into each persona can be unique to each organization or project. According to Gray (2010), the following information may be helpful for the design/development team:
  • 9. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 9  Pictures – makes the persona feel real and helps designers/developers empathize with the persona.  A description – demographic information including job, their technology, and the pressures or situation they are in when they use the system or site.  Needs, goals, & features – either a straight list or a table which helps define a priority list for features before development starts.  A ‘quote’ from the persona – this gives the persona more personality while also summarizing their needs and goals into a single sentence.  Frustrations – these are the problems that the user encounters in using the system or website and focuses the designers/developers to the biggest issues  Ideal features – these features may be impossible to produce but help designers and developers think of alternative approaches.  ‘Need to know’ – this is information the persona needs when trying to accomplish tasks on the system or site.  Behaviors – these are the typical behaviors the persona exhibits that directly relate to the needs or requirements of the system or site.  Scenarios – these are sample use cases that the persona might do and can clarify how the system will be used (p. 1). The key to successfully use of personas depends on the adaptation during design and development. Some organizations find it useful to display the personas on posters within the workspace to help keep the development team focused on the user-centric design process (Gray, 2010). The personas technique offers several advantages and disadvantages. The main advantage is that the personas provide a vehicle to represent user research in a tangible and workable medium. Conversely, one of the disadvantages is that the very realism that makes personas effective may complicate and potentially distract the designer because of extra fluff and mere artistic concoctions (Constantine).
  • 10. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 10 The persona exists throughout the lifecycle of the design and development project. The personas should be created early in the research phases and exist throughout the testing and ‘go live’ events. See figure 1 for a diagram depicting where this technique fits into the overall design and development process. Content Value Analysis The final technique discussed in this paper is a Content Value Analysis (CVA). The role of a CVA is to provide quantitative feedback on content value for a current system or website. This technique aims to provide a mechanism for analyzing and assigning a value based on heuristics to a subset of the content. Furthermore, this technique then uses statistics to back the notion that the arrived upon value is representative of the entire collection of content (Walsh, 2008). To accomplish a content value analysis, Walsh (2008) developed an activity flowchart outlining a six step process: 1) Scope the site – for accurate results, the size of the site to be assessed should be determined based off number of pages. 2) Select the sample size –a statistical sampling table to define the Acceptable Quality Level (AQL) should help the practitioner develop the required sample size for statistical relevancy. Military Standard 105E provides a statistical sampling table which can be used in CVA calculations. 3) Select the pages to assess – to select pages, Walsh recommends using a random set of pages selected through an online tool at random.org. 4) Select the heuristics to be used – value indicators are assigned to each page from the sample set. One set of heuristics described by Walsh is a 0 to 1 scale based on content
  • 11. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 11 value. For example, of the page has obsolete or no content, the practitioner should assign a value of 0. If the page has good content, the practitioner should assign a value of 1. 5) Record the findings and scores – the practitioner should record each page visited and the corresponding score. 6) Analyze the findings for patterns and produce a report – the practitioner should then develop charts or graphs to represent the value of the current content. For example, 48% of pages have content that is irrelevant or outdated. The content value analysis has advantages and disadvantages. Specifically, the CVA has the ability to provide quantitative feedback to the site owner about the content using statistical modeling. This technique is relatively inexpensive to implement and requires only one person. However, the quality of the heuristic can be debated which still leaves an element of human opinion in the analysis. For example, one practitioner may feel that a page is irrelevant while another feels that the same page has adequate content. The ideal use of this technique is before the start of a website renovation effort or as a check and balance during the final testing stages. Use of this technique early will develop a quality baseline as well as identify whether a significant content problems exists. Conducting the same technique during final testing will measure the growth in content quality from the initial baseline. Unfortunately, identifying content problems late in the project may create substantial costs to fix compared to finding the problem early. Conclusion The evolving field of information architecture is bursting with endless tools and techniques to help architects develop effective solutions. Some tools are user-based while some are content-based, but all tools are aimed at providing an architecture solution that keeps up with
  • 12. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 12 technology. As technology changes, the tools and techniques used by architects will continue to adapt. This paper only scratches the surface on the variety of tools and techniques available to create a positive user experience. The card sorting technique describes a method to cluster content into logical groupings based on user input. The free-listing provides a mechanism to gather ideas and brainstorm (which could be a tool within itself) by asking people to list as many aspects as they can about topic X. Perspective-based inspection describes a method of evaluating a prototype site by role playing a certain perspective. Similarly, the personas technique involves usage of realistic potential examples of customers or visitors to a site. Lastly, the content value analysis allows architects to obtain quantitative measures of content effectiveness based of sample sizing and statistical analysis. Along with descriptions of several tools, this paper reviewed advantages and disadvantages for each technique and offered suggestions on when to use each technique. Ultimately, there is not a regulated or mandated usage of any tool set; rather, the tools can be used as needed dependent on the situation at hand. Similar to a plumber’s toolbox, the information architect’s tool box contains hundreds of techniques which can help organizations develop usable, findable, and organized information.
  • 13. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 13 References Chapman, C. (2010, October 18). Information Architecture 101: Techniques and Best Practices. Retrieved March 18, 2012, from Six Revisions: Useful Information for Web Developers & Designers: http://sixrevisions.com/usabilityaccessibility/information-architecture-101- techniques-and-best-practices/ Constantine, L. (n.d.). Users, Roles, and Personas. Constantine & Lockwood, Ltd. Davis, N. (2010). Information Architecture, Black Holes and Discipline; On Developing a Framework for a Practice of Information Architecture. Bulletin of the American Society for Information Science and Technology, 25-29. Gray, A. (2010, April). Personas - the definitive guide. Retrieved March 18, 2012, from Webcredible: http://www.webcredible.co.uk/user-friendly-resources/web- usability/personas.shtml Malone, E. (2003, September). The Information Architecture Institute. Retrieved March 18, 2012, from Learning IA - Process Maps: http://aifia.org/tools/download/ExperienceDesignFlow_bw.pdf Morville, P., & Rosenfeld, L. (2006). Information Architecture for the World Wide Web. Sebastopol, CA: O'Reilly Media Inc. Ooi, Y. (2011, February). Methods for analysing card sort results. Retrieved March 18, 2012, from Webcredible: http://www.webcredible.co.uk/user-friendly-resources/ucd/methods- card-sorting.shtml Sinha, R. (2003, 02 24). Beyond cardsorting: Free-listing methods to explore user categorizations. Retrieved 03 16, 2012, from boxesandarrows:
  • 14. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 14 http://www.boxesandarrows.com/view/beyond_cardsorting_free_listing_methods_to_exp lore_user_categorizations Spencer, D., & Warfel, T. (2004, 04 07). Card sorting: a definitive guide. Retrieved 03 16, 2012, from boxesandarrows: http://www.boxesandarrows.com/view/card_sorting_a_definitive_guide Walsh, P. C. (2008, October 08). Content Value Analysis for Intranets. Part 2 - a methodology. Retrieved March 18, 2012, from ManIA: http://patrickcwalsh.wordpress.com/2008/10/08/content-value-analysis-for-intranets-part- 2-a-methodology/ Wilson, C. (2009, 06). Methods - Free Listing. Retrieved 03 16, 2012, from Preview of the Usability Body of Knowledge: http://www.usabilitybok.org/methods/free-listing Wilson, C. (2011, 03 24). Method 10 of 100: Perspective-Based Inspection. Retrieved 03 16, 2012, from Designing the User Experience at Autodesk: http://dux.typepad.com/dux/2011/03/method-10-of-100-perspective-based- inspection.html Wilson, C. (2011, 01 13). Method 3 of 100: Freelisting. Retrieved 03 16, 2012, from Designing the User Experience at Autodesk: http://dux.typepad.com/dux/2011/01/this-is-the-third- in-a-series-of-100-short-articles-about-ux-design-and-evaluation-methods-todays- method-is-called-freeli.html Zhang, Z., Basili, V., & Shneiderman, B. (1998). An empirical study of perspective-based usability inspection. Proceedings of the Human Factors and Ergonomics Society 42nd Annual Meeting (pp. 1346-1350). College Park, MD: University of Maryland.
  • 15. INFORMATION ARCHITECTURE TECHNIQUES AND BEST PRACTICES 15 Figures Figure 1: Phases of Web Design Process (Malone, 2003)
  • 16. About the author Author: Christopher Furton Website: Http://christopher.furton.net Certified professional with over 12 years of Information Technology experience and 8 years of hands-on leadership. An expert in cyber security with both managerial and technical skills proven throughout a career with increasing responsibility and performance expectations. Known ability to translate complex information for universal understanding. Detail-driven, results- focused leader with superior analytical, multitasking, and communication skills. Well-versed in industry best practices including Project Management and IT Service Management. Currently holding active CISSP, CEH, ITIL Foundations, Security+, and Network+ certifications. Visit the auhor’s blog: IT Management Perspectives - https://christopherfurton.wordpress.com/ Social Sphere: LinkedIn Twitter Google+ Quora Wordpress Flavors.me Slide Share Tumblr YouTube Pinterest About.me Vimeo