60 likes | 266 Views
Workshop with Users. Lesson 4 Group 3 CCU ‘14/’15. Workshop. The Six H ats method 5 topics of discussion in the workshop 2 relative to the web security 2 relative to the game A “final round” 6 users to participate in workshop 6 students(LEIC and MEIC) 5 men, 1 woman
E N D
Workshop with Users Lesson 4 Group 3 CCU ‘14/’15
Workshop • The Six Hats method • 5 topics of discussion in the workshop • 2 relative to the web security • 2 relative to the game • A “final round” • 6 users to participate in workshop • 6 students(LEIC and MEIC) • 5 men, 1 woman • Ages between 20 and 22 • Lasted for approx. 1 hour. • Done in a familiar context (RNL)
Topics • 1st Topic • Game Genre • Users said RPG but were describing a point-and-click/Puzzle • Consensus that the best possible game would be a hacker simulator • 2nd Topic • Platform and longevity • PC is best compared to other platforms • Focus on the “message”, longevity after • Extra “hacking” challenges
Topics • 3rd Topic • Common security mistakes • People are too lazy to use authenticators • People have no sense of ownership for their accounts • 4thTopic • Privacy problems on the cloud • Lots of people don’t care about privacy settings. • Privacy can be compromised on friends content sharing
Topics – Final Round • Users asked to elate their own conclusions • Hats rotated at a higher rate • Everyone cycled each hat twice • Points of interest: • Game is a positive learning tool • Easy to kill balance between fun and learning • Should reach every major cloud service • But should not depend on them