User Testing Cheat Sheet

Description
What do you see here?
What can you do here?
What do you think is going on here?
What do you think that does?
Why do you think that’s there?

Feelings What’s your opinion of __ ?
What do you think of __
?
Why do you say that?
Why?

Flow
What do you think will happen next?
What do you want to do next?

Keeping it moving
What are you wondering?
What are you looking for?
Is there a particular word you’re looking for?
What would you do to figure this out if I weren’t here?

Clarification
Are you saying that _ ?
I think I heard you say __
. Does that capture it?
Is it fair to say that __ ?
Is it accurate that __
?

Wrap-up
How was that experience overall?
Anything confusing? Anything difficult?
Anything missing?
How was that compared to your expectations?
What would you change?

By Molly Wilson, 2015. Thanks to Mia O’Neill, Julie Stanford, Kim Ladin, and Jenny Mailhot.
License: Creative Commons Attribution-NonCommercial-ShareAlike.

Related

On Trust and Transparency: Perspectives from Luminate's portfolio

In June 2018, Luminate commissioned Simply Secure to conduct human-centered design (HCD) research focused on uncovering grantees’ experiences of the funding process. The report highlights insights, feedback — including anonymized quotes and comments, and recommendations synthesized from 20 interviews + 53 survey responses.

Usability and Security: Not Binary Properties

People who think about computer security for a living sometimescringe when they read about the subject in the popular press.Security is a complex and nuanced... (Read more)

Data Handling Best Practices

Doing data handling with privacy and security in mind means spending some time to identify different threats, culminating in a threat model, and coming up with strategies that fit the particular threat model. We’ve compiled some best practices for both risk assessment and security strategies.