1 / 11

High Tech Product Innovation Password Manager (Phase II)

High Tech Product Innovation Password Manager (Phase II). KelechiAjagba | Ritesh Sharma | Colin Raymond | Sichen Sun | Lubna Merchant. Agenda. Product Opportunity Gap Restatement Stakeholder Analysis Value Opportunity Analysis Value Based Product Specification.

elroy
Download Presentation

High Tech Product Innovation Password Manager (Phase II)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. High Tech Product Innovation Password Manager (Phase II) KelechiAjagba | Ritesh Sharma | Colin Raymond | Sichen Sun | Lubna Merchant

  2. Agenda • Product Opportunity Gap Restatement • Stakeholder Analysis • Value Opportunity Analysis • Value Based Product Specification

  3. Product Opportunity Gap Restatement • With the increase in use of password protected applications, with different security policies, on the internet it is becoming difficult for the consumers to remember their security combinations for various applications. We see an opportunity to assist customers with remembering their password and user name combinations in a safe and reliable manner for all of their internet accounts. This will allow the consumer to more efficiently access the internet without the hassle of trying to remember various security combinations.

  4. Key Stakeholders

  5. Scenarios • Adam | Business UserAdam is a web developer for a medium-sized database management company serving large retail clients. He is passionate about his work and feels ownership towards all his products and applications. He regards customer information highly and customer trust is of paramount importance to his business. Hence, he exercises extra caution in matters related to customer account information and hence trusts only established brand names for third party software. Adam usually works from 9AM to 6PM but he is willing to put in extra hours if the effort justifies incremental cost/quality/schedule benefits.

  6. Scenarios • Amy | Light User Amy is a married woman with no children. She uses the internet for personal affairs at home and the office. Amy sometimes finds computers and web sites to be confusing and intimidating. She uses the internet to pay her bills and keep in touch with her friends. Her biggest concern is the safety of the product and is worried about her information being out on the public domain. Amy often travels for work and often needs to access the internet from multiple locations: work, home, and travel.

  7. Scenarios • Bill: Heavy User Bill is a Software Systems Engineer with great interest in technology who works for a software products company. He generally surfs the internet for sites on programming and software architecture like code guru etc. Bill has accounts on many applications and a password management system with the same, similar and complex passwords for different types of applications. His new laptop has finger print enabled logon so he can safely enable the password remembering facility on this laptop. However, it gets frustrating for him to remember the passwords for the applications when he is using the employers' system. He finds the process of getting a password reset cumbersome and irritating. He wishes that there was an integrated system that could store all his passwords without having him to remember them.

  8. Value Opportunity Analysis – Users Heavy Users Light Users

  9. Value Opportunity Analysis - Businesses

  10. Value Opportunity Analysis - users want to feel secure that there information is safe. - users need to feel confident that the product will work - product needs to be bug free and safe holding users information - light users need to be able to easily use this product - Look of product should be simple and stylish - Core technology must be reliable and actually save users time - Product needs to be well made and bug free. Users need to know it will last.

  11. Value Based Product Specification • Be secure and safe. • Be able to be used on multiple computer systems. • Be easy to use. • Seamless platform integration. • Encourages unique passwords and prompts if password change needed. • Have a trustworthy brand support

More Related