human behavior & cyber security
18 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Lindsley Boiney from Qualitative & Quantitative Data Analysis & Management
Scoop.it!

Qualitative Data Analysis Tools

Qualitative Data Analysis Tools | human behavior & cyber security | Scoop.it

Computer Assisted/Aided Qualitative Data AnalysiS (CAQDAS) is the use of computer software to aid qualitative research such as transcription analysis, coding and text interpretation, recursive abstraction, ...


Via DrHariri
more...
No comment yet.
Scooped by Lindsley Boiney
Scoop.it!

Seven Tips for Writing Usability Task Scenarios

Seven Tips for Writing Usability Task Scenarios | human behavior & cyber security | Scoop.it

The core idea behind usability testing is having real people trying to accomplish real tasks on software, websites, cell phones or hardware.  

Identifying what users are trying to do is a key first step. Once you know what tasks you want to test, you'll want to create realistic task scenarios for participants to attempt.

more...
No comment yet.
Rescooped by Lindsley Boiney from Usability Testing
Scoop.it!

Why you only need to test with five users (explained): Measuring Usability

Why you only need to test with five users (explained): Measuring Usability | human behavior & cyber security | Scoop.it

by Jeff Sauro


Via Eva Kaniasty
more...
Eva Kaniasty's curator insight, January 31, 2013 11:33 AM

A comprehensive treatment of the most controversial question in usability testing. 

Rescooped by Lindsley Boiney from Usability Testing
Scoop.it!

Qualitative is not the opposite of Quantitative Data | Johnny Holland

Qualitative is not the opposite of Quantitative Data | Johnny Holland | human behavior & cyber security | Scoop.it

We’ve all heard the word “fluffy” associated with qualitative knowledge. If quantitative research is seen as producing reliable, incontrovertible facts, then qualitative research is seen as the opposite—the soft, made-up, inapplicable knowledge. You’ve probably observed this tacit “definition” a few times. How do we convince people it isn’t true?


Via Eva Kaniasty
more...
Eva Kaniasty's curator insight, April 16, 2013 6:46 PM

Only once you start doing qualitative research do you realize what a huge value it delivers!

Scooped by Lindsley Boiney
Scoop.it!

US shuts down Guantanamo Wi-Fi in response to Anonymous threats - The Verge

US shuts down Guantanamo Wi-Fi in response to Anonymous threats - The Verge | human behavior & cyber security | Scoop.it
ABC15.com (KNXV-TV)
US shuts down Guantanamo Wi-Fi in response to Anonymous threats
The Verge
The US military has shut down Wi-Fi access at the Guantanamo Bay Naval Base in Cuba, after receiving threats from the hacktivist collective Anonymous.
more...
No comment yet.
Scooped by Lindsley Boiney
Scoop.it!

Cyber security programs should be on the alert for insider threats

Cyber security programs should be on the alert for insider threats | human behavior & cyber security | Scoop.it
While most enterprisewide cyber security programs focus on threats to high-tech intellectual property posed by outsiders, they also should examine any insider threats that may be lurking within organizations, cyber security experts advise.Organizations...
more...
No comment yet.
Scooped by Lindsley Boiney
Scoop.it!

Cyber security experts call for Indian networking site to counter Facebook ... - Times of India

Cyber security experts call for Indian networking site to counter Facebook ... - Times of India | human behavior & cyber security | Scoop.it
Times of India
Cyber security experts call for Indian networking site to counter Facebook ...
more...
No comment yet.
Rescooped by Lindsley Boiney from The MarTech Digest
Scoop.it!

Why Big Data Isn't the End-All for Content Marketing - ClickZ

Why Big Data Isn't the End-All for Content Marketing - ClickZ | human behavior & cyber security | Scoop.it

Summary...

 

While big data will drastically improve marketing strategies (and, yes, persona development), relying on that information alone can be very risky for your marketing efforts. Big data usage within marketing teams has its faults, including:

Ineffective sharing and organization of dataUsing data as an end-all performance report

Ultimately, big data can show you what is, but personas have the ability to show you what could be, as they can be used to determine future behavior. In order to create a successful marketing plan for the long term, you need both the what is and the what could be aspects incorporated into your strategy.

 

As Forbes contributor Jonathan Salem Baskin said, "big data insights will never substitute for imagining little souls."

Qualitative research gives insight into behavior.Personas (including qualitatively gathered stories) are easier to understand.Qualitative research allows for brand-customer interaction and new information.Qualitative research enables information gathering on topics big data can't deliver.

 


Via marketingIO
more...
marketingIO's curator insight, March 27, 2013 4:19 PM

Definitely worthwhile to remind ourselves that good research is a combination of quantitative and qualitative, as this article suggests (excluding focus groups!).


  • See the article at www.clickz.com
  • Receive a daily summary of The Marketing Automation Alert directly to your inbox. Subscribe here (your privacy is protected).
  • If you like this scoop, PLEASE share by using the links below.
  • iNeoMarketing merges marketing automation with content marketing for a powerful lead management solution, configured and managed by our knowledgeable, experienced staff.  Contact us.
Jerry W. Burt's curator insight, March 28, 2013 1:35 PM

WHake up and learn about Big Data and how it allows your business to analyze customer behavior. Register for the;


The Social Media Collaborative

May 15th

http://www.startmyhomebizunivsrsity.com

Rescooped by Lindsley Boiney from Usability Testing
Scoop.it!

Capturing User Research :: UXmatters

“It’s like drinking from a fire hose with a straw, with another smaller straw inside it.”


Via Eva Kaniasty
more...
No comment yet.
Rescooped by Lindsley Boiney from Usability Testing
Scoop.it!

Strength of User Research Evidence

Usability findings derived from a broad base of diverse studies have higher credibility than those based on many users with a single stimulus.

Via Eva Kaniasty
more...
Eva Kaniasty's curator insight, April 16, 2013 6:44 PM

I've said it before, and I'll say it again: triangulate your research findings!

Ferhat's comment, November 21, 4:06 PM
Slö
Ferhat's comment, November 21, 4:06 PM
Sizle tanismak istom
Scooped by Lindsley Boiney
Scoop.it!

NIST begins process of choosing nonprofit group to run National Cybersecurity ... - Military & Aerospace Electronics

NIST begins process of choosing nonprofit group to run National Cybersecurity ... - Military & Aerospace Electronics | human behavior & cyber security | Scoop.it
Military & Aerospace Electronics
NIST begins process of choosing nonprofit group to run National Cybersecurity ...
Military & Aerospace Electronics
GAITHERSBURG, Md., 21 May 2013. Leaders of the U.S.
more...
No comment yet.
Scooped by Lindsley Boiney
Scoop.it!

How to change human behavior through Cognitive dissonance theory?

How to change human behavior through Cognitive dissonance theory? | human behavior & cyber security | Scoop.it
How to change human behavior through Cognitive dissonance theory? http://t.co/N7UIDCcF6b
more...
No comment yet.
Rescooped by Lindsley Boiney from Designing service
Scoop.it!

Five Techniques for Moderating Usability Tests: Measuring Usability

Five Techniques for Moderating Usability Tests: Measuring Usability | human behavior & cyber security | Scoop.it

You don't need to be a trained psychotherapist to conduct effective usability sessions, but it always helps to refine the art of understanding human behavior and intentions when looking to improve the customer experience.


Via yannick grenzinger, Fred Zimny
more...
No comment yet.