Page 1 of 1

should describe the technologies

Posted: Tue Dec 10, 2024 4:59 am
by pilide2813
that the antipersona can use to achieve their goal. If a thief could covertly break a safe lock using a tool such as a paper clip, then it will depend more on the design and technology of the lock than the material of the safe.

Needs
When assessing needs, product designers might ask themselves: What does the antipersona need to achieve its goal(s)? These factors will usually be very contextual. In our safe example, thieves might need hotels without security guards or extensive surveillance technology. Hotels might also need multiple entrances open to the public and cars. These needs are very specific to successfully executing antipersona behavior.

Consequences
How would the target users and indonesia telemarketing the business be affected if the antipersona achieved its goal? If a thief were to successfully steal valuables from a safe, the target users would lose their valuables and their trust in hotel safes. Hotels could lose customers when they learn that their safes are vulnerable to break-ins, and they might no longer buy safes from the same places they used to buy them, which would mean a loss of revenue for the safe manufacturing company. In addition, the company might increase the prices of its most secure safes and decide to sell higher-security safes to hotels at a lower price.

Image

Example of a thief antipersona
Who is responsible for creating the antipersona?

User researchers and product designers use insights from persona-related research and studies to guide the creation of an antipersona. They should involve product partners and stakeholders throughout the antipersona creation process to increase the likelihood of its adoption.

Antipersona creation method: threat identification

A simple way to create an antipersona is to start with the critical threats with the highest consequences first. This approach works especially well if the team is new to creating antipersonas. Your team should tailor these threats to the context of your product, but here are a few common threats you can use as a starting point:

Thief
There are two common types of theft to anticipate:

Information theft, which concerns any product working with sensitive information, where there are actors who would like to obtain this information without permission

Physical theft, which includes any product that could be physically stolen.

Illegal Content Creator or Sharer
If your product allows people to communicate freely, it is possible for all types of illegal content to be created, including hate speech, sexually explicit material, and content that depicts or promotes extreme violence. These forms of content are not only illegal, but can also seriously damage the intended user's experience.