Return to search

使用者導向研究:從工作脈絡與客戶痛點中 設計雲端安全的創新 -以趨勢科技使用者洞見計畫為例 / Protecting the cloud: Use the work practice and pain points to find customer insight

電腦病毒的演化瞬息萬變,特別是近年來,駭客在有利可圖的動機驅使下,逐漸形成了專業分工的產銷供應鏈,讓病毒的演化速度和變種數量以指數型成長。攻擊事件數量不斷竄升,資訊安全市場理應增加不少機會,但多數防毒廠商經常對這樣的市場機會望洋興嘆,每年花費數億金額,動員研發團隊提出新產品、新版本、新服務,使用者卻始終興趣缺缺。供需兩方認知差異讓防毒軟體廠商面臨龐大開發費用的損失,也讓企業持續存在於不定時資安風險的恐懼之中。

資安軟體公司在產品研發前,做足使用者需求蒐集流程工作,依照使用者描述所進行開發的產品,為什麼卻不是客戶需要的?本研究以質性研究法觀察國內一家電腦防毒廠商的新產品開發過程,更以為期一年的行動研究方式參與該公司使用者洞見計畫(Customer insight program),結合跨部門團隊的智慧和力量,以雲端運算的資安機會為主題進行客戶觀察和新產品構思。

經過一年的行動研究蒐證,本研究指出使用者導向設計的迷思,並強調瞭解工作脈絡對於系統性產品創新的重要性。由於系統性產品複雜程度較高,使用處於分工較細的系統運作流程之下,往往不自覺工作特殊之處,也難以確切表達總體需求。本研究的分析方式則透過使用者工作脈絡,即以客戶的商業模式和雲端運用的特殊情境,其次定義使用者於脈絡中獨特的痛點,進而找到創新機會。

使用者雖然是創新的來源,但是本研究發現,使用者不一定能知道自己的需求,唯有瞭解他們的工作實務,瞭解使用者在特定工作情境的痛點,才能化痛點為創新的亮點。研究貢獻上,補強現行使用者研究的三大方向,分別是使用者假設的不同、產品面設計的不同與創新來源不同。實務貢獻上,本研究提供複雜度較高的系統產品廠商在使用者導向設計流程之建議,以及企業中各部門如何透過使用者創新設計思維發揮價值所在。 / The rate of rapid evolution in computer virus results in an increase of computer crime and business attack incidents. Opportunities in the information security market began to grow and expected to exceed $125 billion USD by 2015, according to a new report by Global Industry Analysts.

In this situation, anti-virus company tried everything they can to launch high-technology, fancy, and more powerful product every year. But they found customer is always lack of interest in their new products. This not only makes the loss on large investment in software development for anti-virus company, and also makes enterprise customers continuously at the risk of data stolen and computer virus attacks.

By asking users what they want and trying really hard to listen to them before the development, however the product still hasn』t meet the customer needs?

This research is based on qualitative method and action research project to investigate an anti-virus company』s product development process and customer insight programs. The one year project was cooperated with company internal cross-functional team and focused on 『Protecting the cloud』 topic. There are three cases was selected in the final.

In order to know the user』s working context in the high-complexity information security product system. The analysis structure in three cases used four steps to find out. First of all, identify the enterprise user』s business model. Secondly, observe their local knowledge in cloud computing usage. Thirdly, clarify the organization's unique pain points. The last but not the least, find the potential security opportunities for innovation.

While user becomes a significant source of innovation, the study shows that users don』t necessarily know their own needs. Only to understand customer』s work practices, pain points under specific working situations, and use design thinking to make the pain points to transform into fit customer needs. The research emphasized the importance of local context in innovation theory and reinforced the inadequacy part of the lead user theory.

Key words: User-centric innovation, Product innovation, Service innovation, Cloud computing, Anti-virus software, Qualitative research, Action research

Identiferoai:union.ndltd.org:CHENGCHI/G0097359005
Creators劉宛婷, Liu, Wan Ting
Publisher國立政治大學
Source SetsNational Chengchi University Libraries
Language中文
Detected LanguageEnglish
Typetext
RightsCopyright © nccu library on behalf of the copyright holders

Page generated in 0.0026 seconds