top of page

DESIGN DOCUMENTS

Sheba Owens ID Logo.png

Design documents are the framework that define the problem, performance goal, and how we are going to get there, providing clarity for all stakeholders.

​

Scroll down or click to view samples of my work.

DESIGN DOCUMENTS

Scroll or click the pop-out arrow in the upper right corner to view the document.

 

BREWING SUCCESS: ONE VALUED CUSTOMER AT A TIME

 

Audience/Problem: This course was designed for coffee shop employees to address employees who were unequipped to offer senior-preferred menu options, unfamiliar with senior discount opportunities, and lacked strategies for creating an age-friendly atmosphere. The business goal was to increase the senior customer base by 25% within a 12-month period by introducing preferred menu options, implementing senior discounts, and creating a more welcoming environment for elderly customers.

 

Solution:  This course systematically addressed each identified deficiency. It equipped coffee shop employees with comprehensive knowledge about senior dietary preferences and needs, trained them to confidently promote appropriate menu options and special pricing for seniors, and developed their skills in creating a welcoming, comfortable atmosphere. Through interactive scenarios, role-playing, and practical demonstrations, the course transformed employees from being unaware of senior-specific considerations to becoming attentive, knowledgeable service providers capable of delivering an enhanced experience tailored to elderly customers' needs and preferences.

 

​Process: Using the ADDIE model, I began designing this course with a comprehensive analysis of performance gaps through stakeholder interviews and customer feedback. The design phase outlined clear learning objectives and interactive strategies, informed by adult learning principles, focusing on context-relevant scenarios and chunked content for efficient comprehension. Development leveraged Articulate Rise's block-based architecture, systematically progressing through each ADDIE phase to ensure alignment with training needs. Evaluation followed Kirkpatrick's Level 2 and 3, using embedded knowledge checks and on-the-job observation checklists to measure cognitive understanding and practical skill application, ultimately aiming to increase senior customer engagement.

​

Tools: Articulate Rise 360, Canva

​

​Additional Deliverables: 

Click the image to view the document. 

Scroll or click the pop-out arrow in the upper right corner to view the document.

 

PHISHING DEFENSE

 

Audience/Problem: This course was designed for bank employees with company email access who work onsite, remote, and hybrid. The course deals with data security vulnerabilities due to employee susceptibility to phishing attacks, with internal data showing staff regularly engaging in risky behaviors like clicking suspicious links and failing to report security concerns. The business goal was to enhance its cybersecurity resilience by implementing comprehensive employee training, targeting a 50% reduction in breach risk exposure and a 60% decrease in successful phishing attempts within the next year.

​

Solution: This course directly addressed critical data security vulnerabilities by transforming employees into a proactive defense line. It focused on three key areas: detection, where employees learned to identify subtle indicators of phishing attempts, such as suspicious links, unusual sender addresses, and urgent requests for sensitive information; reporting, by establishing clear and accessible reporting protocols, ensuring prompt escalation of suspicious activities to the security team; and response, by equipping employees with actionable steps to mitigate damage if they suspect they've been compromised, including immediate password changes and system scans. This multi-faceted approach fostered a security-conscious culture, significantly reducing the company's susceptibility to phishing attacks and strengthening its overall data security posture by empowering employees to actively participate in protecting sensitive information.

​

Process: Following the ADDIE model, I began by analyzing the company's data security vulnerabilities and the employee's existing knowledge, using surveys and stakeholder interviews to define the business problem and understand the target audience. In the design phase, I created a detailed design document outlining learning objectives, content structure, and interactive elements, including a microlearning job aid for quick reference. Development involved building the e-learning course in Articulate Storyline, incorporating engaging interactions like click-to-reveal, drag-and-drop, and tab interactions, to teach phishing detection and response. Implementation focused on deploying the course and providing learner support. For Evaluation, I utilized Kirkpatrick's Level 2, measuring learning through scenario-based assessments and post-course quiz, and Level 3, evaluating behavior change through simulated phishing tests and observation of employee reporting practices, ensuring the training effectively translated to real-world application.

​

Tools: Articulate Storyline 360, Adobe Illustrator, Canva

​

​Additional Deliverables: 

STORYBOARDS

Storyboards are the visual blueprint that outlines the sequence and content of an instructional experience, ensuring a clear and organized development process.

​

Scroll down or click to view samples of my work.​​

STORYBOARD

Scroll or click the pop-out arrow in the upper right corner to view the document.

PHISHING DEFENSE

 

Audience/Problem: This course was designed for bank employees with company email access who work onsite, remote, and hybrid. The course deals with data security vulnerabilities due to employee susceptibility to phishing attacks, with internal data showing staff regularly engaging in risky behaviors like clicking suspicious links and failing to report security concerns. The business goal was to enhance its cybersecurity resilience by implementing comprehensive employee training, targeting a 50% reduction in breach risk exposure and a 60% decrease in successful phishing attempts within the next year.

​

Solution: This course directly addressed critical data security vulnerabilities by transforming employees into a proactive defense line. It focused on three key areas: detection, where employees learned to identify subtle indicators of phishing attempts, such as suspicious links, unusual sender addresses, and urgent requests for sensitive information; reporting, by establishing clear and accessible reporting protocols, ensuring prompt escalation of suspicious activities to the security team; and response, by equipping employees with actionable steps to mitigate damage if they suspect they've been compromised, including immediate password changes and system scans. This multi-faceted approach fostered a security-conscious culture, significantly reducing the company's susceptibility to phishing attacks and strengthening its overall data security posture by empowering employees to actively participate in protecting sensitive information.

​

Process: Following the ADDIE model, I began by analyzing the company's data security vulnerabilities and the employee's existing knowledge, using surveys and stakeholder interviews to define the business problem and understand the target audience. In the design phase, I created a detailed design document outlining learning objectives, content structure, and interactive elements, including a microlearning job aid for quick reference. Development involved building the e-learning course in Articulate Storyline, incorporating engaging interactions like click-to-reveal, drag-and-drop, and tab interactions, to teach phishing detection and response. Implementation focused on deploying the course and providing learner support. For Evaluation, I utilized Kirkpatrick's Level 2, measuring learning through scenario-based assessments and post-course quiz, and Level 3, evaluating behavior change through simulated phishing tests and observation of employee reporting practices, ensuring the training effectively translated to real-world application.

​

Tools: Articulate Storyline 360, Adobe Illustrator, Canva

 

​​Additional Deliverables: 

Click the images to view the documents. 

LET'S CONNECT

Let's Connect Icon (1).png
LinkedIn Icon_edited.png
Email Icon_edited.png
Website Icon_edited.png
bottom of page