Publishers of technology books, eBooks, and videos for creative people

Home > Articles > Web Design & Development > Blogs

This chapter is from the book

Reuse methods

There are two methods for reuse: opportunistic reuse (an author makes a conscious decision to reuse content) and systematic reuse (planned reuse where content is automatically inserted). Within each method of reuse are three options: locked reuse (reused content cannot be changed), derivative reuse (reused content can be changed) and nested reuse (multiple versions of the content are contained within the same element). This section details the methods and options for reuse.

Opportunistic reuse

Opportunistic reuse occurs when the author makes a conscious decision to find an element, retrieve it, and reuse it. Opportunistic reuse requires that the author be aware of the opportunities for reuse and be motivated to search for and retrieve reusable content. Opportunistic reuse is the most common form of reuse. Opportunistic reuse does not rely on specific technology; it can be done without a content management system, although a CMS is advisable.

Any content can be used in an opportunistic reuse situation. In some ways, opportunistic reuse is a replacement for the "copy and paste" that many organizations use. However, opportunistic reuse is not copy and paste because reused content does not actually include the content in the "document"; it is actually a "pointer" to the source content.

Many organizations use opportunistic reuse when they need to rapidly reconfigure their information products to meet new product or customer requirements. One organization found that they could even create new translated documents by using existing reusable elements without having to have any new content translated (that is, they could use existing translated elements in a new configuration).

Opportunistic reuse provides authors with the greatest flexibility because it provides them with the choice to reuse content and to determine which reusable content is appropriate. However, opportunistic reuse results in the lowest incidence of reuse because it puts the burden on the authors to want to reuse content, to know that potential reusable content exists, and to go and find the content they want to reuse. If there is a lack of motivation, or a lack of awareness that a suitable reusable element exists or might exist, or if it is difficult for authors to find the appropriate element, reuse may not occur. In addition, authors may reuse content inappropriately; there are no safeguards to prevent this.

To increase the effectiveness of opportunistic reuse, organizations can optimize retrievability, provide guidelines, and ensure that authors are effectively trained. Retrievability can be optimized through the use of content management systems, effective categorization of content, and rich metadata. Reuse guidelines include models to help authors identify where content should be reused (see Chapter 8, "Information modeling"). Training ensures that authors are trained to use the models and the content management system and to follow guidelines for reuse. Organizational incentives can provide motivation for authors to reuse content.

Systematic reuse

Systematic reuse is planned reuse. Specific content is identified as reusable in a specific location. Then the content management system automatically inserts (auto-populates) the reusable content in the appropriate locations in the document. The author does not have to determine whether the reusable content exists or search for and retrieve it. Systematic reuse ensures that content is reused and reduces the burden on the author to know that reusable content exists, to find the reusable content, and to insert it appropriately.

Systematic reuse is dependent upon detailed information models, reuse maps (identification of where content is reused in your information set), and support for dynamic delivery of content through your content management system. This means that systematic reuse is planned for in advance, in the modeling and system configuration stage. Authors do not determine reuse; the system determines reuse.

The content management system uses your information models to identify where content can be reused. If a content element exists and matches the author's specific content requirements, the reusable elements are automatically inserted into appropriate spots in the document (that is, the document is pre-populated with content).

Systematic reuse is the most costly to implement because it requires the most planning for reuse, the creation of detailed models and reuse maps, and appropriate technology (for example, a dynamic content engine), but it provides the greatest return on investment. Return on investment is achieved through guaranteed reuse (reuse is automatic and not dependent on author motivation and knowledge of existing content).

Authors can perceive systematic reuse as being overly restrictive (that is, it does not provide flexibility and opportunities to be creative). This perception can be reduced if authors are provided with the opportunity to modify reusable content where appropriate (derivative reuse) and to choose not to use reusable elements when they are not appropriate in the given instance. However, care should be taken to ensure the effectiveness of systematic reuse is not diminished through increased flexibility. You need to ensure that content that must be included cannot be removed, that content that should not be changed is not editable, and that authors are educated on the value of systematic reuse.

Use systematic reuse when your content is very structured and you can explicitly identify where content is to be reused, and where you want to ensure that specific content is reused.

Examples of systematic reuse can include corporate standard information such as trademarks, copyrights, license information, and warranties. However, systematic reuse can be used wherever an organization wants to ensure that content is reused (for example, in product descriptions, warnings, cautions, notes, definitions, company profiles, and disclaimers).

Example: Systematic reuse

A consulting company that does process re-engineering creates a series of reports (analysis, recommendations, implementation). To assist consultants in the report writing process the company has implemented systematic reuse. Analysis reports identify the issues observed within the organization. The consultant summarizes the issues at the beginning of each section. The summaries are reused in the Executive Summary unchanged (locked). The issues are reused (locked) in the recommendations report and each issue is addressed by a recommendation. The recommendations are summarized at the beginning of each section and are reused (derivative) in the Executive Summary. In this way, after consultants write the content, they don't have to worry about copying and pasting content into the other portions of the report or the next report; the content is automatically reused appropriately (see Figure 2.1). In addition, the author can choose to change the reused content to ensure it fits the current situation (for example, in the Executive Summary of the recommendations).

Figure 2.1 Systematic reuse.

Locked reuse

Locked reuse is where a reusable element is reused unchanged. Only an author with appropriate permissions may change the content of the element. This ensures that key content is reused identically. You can systematically reuse or opportunistically reuse a locked element.

Types of content that are commonly locked include legal information, cautionary information, standard statements of disclaimer, company descriptions, product positioning, or branding information. Any content that you do not want changed by others can be locked.

Use locked reuse when you want to ensure content is not changed when it is reused.

Derivative reuse

When an author edits a reusable content element, the resulting element then becomes a derivative, or a "child" of the original "parent" element. An element that is systematically reused or opportunistically reused and is not locked can become a derivative element. A derivative element continues to be related to the original, such that if the original (parent) changes, the author of the derivative (child) element is notified of the change and the change can be incorporated or not as desired. Providing derivative reuse increases the flexibility of reuse.

Derivative reuse is common in organizations where key content should be retained, but such changes as the following may be made to the content:

  • Tense (for example, in content used over time in different reports)

  • Spelling (for example, American English versus British English)

  • Order of the content

  • Emphasis (for example, changing the focus of benefits from one set of features to another to address different regional needs)

  • Use (for example, a brochure which would be very marketing oriented and a user guide which would be more product usage oriented)

Translated content is an example of derivative reuse (the original language element is reused, but the content is replaced by the translated content); however, the relationship is maintained to ensure that whenever the source element is changed, the translated element is identified as requiring change. In the case of translation, the entire content of the element is changed; however, in the majority of cases of derivative reuse, only a few words are changed or sentences are added or deleted. For more on content relationships see Appendix E, "Content relationships."

Example: Usability reports

A company is planning to conduct a usability test of its new Internet site. They create a proposal for management to indicate the types of users they will select, then they conduct the test and write the summary report. They derivatively reuse content from the proposal in the summary report. Compare the pieces of the two reports (Table 2.1) to see how the content changes derivatively.

Table 2.1 Example of derivative reuse

Usability test proposal report selecting test subjects

Usability summary report selected test subjects

The following criteria for selection will be used to ensure we get appropriate test subjects from all our key customer areas including:

The following criteria for selection were used to ensure we got appropriate test subjects from all our key customer areas including:

  • Commercial customers
  • Commercial customers
  • General public customers
  • General public customers
  • Decision-makers
  • Decision-makers

The selected test subjects should meet the following criteria:

The selected test subjects met the following criteria:

  • English as a first language
  • English as a first language
  • Uses the Internet at least twice a week
  • Uses the Internet at least twice a week
  • Uses Product ABC
  • Uses Product ABC
  • Has previously used our Help Desk for assistance
  • Has previously used our Help Desk for assistance

Each participant will be asked to complete a pre-test questionnaire (see Appendix A "Checklist for implementing a Unified Content Strategy") to enable us to assess prior knowledge and experience.

Each participant was asked to complete a pre-test questionnaire (see Appendix A) that enabled us to assess prior knowledge and experience.


Nested reuse

Nested reuse is content that has a number of reusable elements contained within a single element. The sum of all the elements creates an element, and subsets of the element can be used in alternate information products. Nested reuse does not involve building from small reusable elements; rather it involves an element that contains all the reusable sub-elements.

Nested reusable information enables authors to create content for all the outputs at the same time, thereby providing context and frequently speeding up the content authoring process. When content is nested, all the relevant content is available at a glance.

Nested reuse can be used any time when greater or lesser detail of content is required for one information product or another, or when it makes it easier for the author to create all the necessary content on a topic/subject in one place.

Use nested reuse when you want to retain the context for alternate content or when content is a subset of other content.

Example: Product description

A company produces a product called the B-Brother. They reuse a product description (see Table 2.2) in three different information products: a brochure, an operations guide, and an e-commerce site.

Table 2.2 Comparison of product description content

Brochure

Operations guide

E-commerce site

The B-Brother model 1984 is a programmable device that connects directly to consumers' televisions to track the channels they flip to, what programs they record, and what commercials they skip. The information is instantly transmitted to the cable or satellite provider.

The B-Brother connects directly to consumers' televisions. It can be programmed to track what channels they flip to, what programs they record, and what commercials they skip. The information is transmitted to the cable or satellite provider.

The B-Brother model 1984 is a device that connects directly to consumers' televisions to track their television watching habits.


As you can see by reading the three examples, the content is different, sometimes only slightly different, but still different. It doesn't need to be different. First the authors unify the content as shown in Figure 2.2 to create one product statement that encapsulates what the company is trying to say about the product.

Figure 2.2  Unified product description.

Then the content is identified, as shown in Figure 2.3, to indicate which components are appropriate for each information product.

Figure 2.3 Product description marked to indicate information product reuse.

The product description includes a short description of the product (the first sentence) that can be used in all three information products. The second and third sentence can be used in the brochure and the operations guide, which require more content. This is illustrated in Table 2.3.

Table 2.3 Product description reuse

Brochure

Operations Guide

E-commerce product description

The B-Brother model 1984 is a device that connects directly to consumers' televisions to track their television watching habits.

It can be programmed to track what channels they flip to, what programs they record, and what commercials they skip. The information is instantly transmitted to the cable or satellite provider.

The B-Brother model 1984 is a device that connects directly to consumers' televisions to track their television watching habits.

It can be programmed to track what channels they flip to, what programs they record, and what commercials they skip. The information is instantly transmitted to the cable or satellite provider.

The B-Brother model 1984 is a device that connects directly to consumers' televisions to track their television watching habits.

 


Example: Procedure

A company has developed training, user documentation, and help for its time tracking system. The content needed to be updated and they have decided to redesign the common procedural information as a nested procedure. Figure 2.4 illustrates an original procedure that is common across training materials, user documentation, and Help.

Figure 2.4 Original procedure content.

Table 2.4 shows how the procedure was unified with nested reuse to create one procedure that could be used to produce each of the information products. All the content for the procedure is contained in one place. The content for the Help is nested within the content for the user guide, which in turn is nested in the training materials.

Table 2.4 Unified procedure content

Content

Information product

 

Training

User documentation

Help

Creating a time tracking entry

Objective: The objective of this lesson is to create a time entry for a project.

 

 

1. Open TimeTracker.

2. Select New from the File menu.

Select: Intranet Redesign

 

 

3. Select the project to apply the time to.

Click the drop-down list to display the available projects.

 

4. Select the task.

Click the drop-down list to display the list of tasks.

 

Select: Meeting

 

 

5. Enter a description of the work done in the Description box.

Make the description as descriptive as possible to help management better understand the work completed. If you had any problems accomplishing the task, record the problems here.

 

Enter: Identify the stakeholders for the redesign project.

 

 

6. Enter a date. The date defaults to today's date.

Change the date to yesterday's date.

 

 

7. Enter the time spent on the task to the nearest 15 minutes.

Enter: 1:30:00

 

 

8. Save the entry.

Related topics

 

 

  • Verifying time entries.

 

 

  • Submitting your timesheets.

 

 

  • Creating reports.

 

 


Notice that the formatting that was visible in the training materials (exercise content in the left column) or Help (hypertext links) is not shown in this nested example. Formatting is applied when the content is published in the relevant information product, not during the authoring stage (see Figure 2.5).

Figure 2.5 Formatted published version of the nested procedure.

The nested procedure enables an organization to create all the necessary content at the same time and publish the content as desired to the appropriate information product. Creating all the content in context makes it easier to write it and to ensure consistency.

Peachpit Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Peachpit and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Peachpit products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email ask@peachpit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.peachpit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020