Building a Great Intranet Taxonomy

While it may seem like a "quick and easy" task, defining the navigation structure and organization of your intranet site will be one of the most challenging tasks you will face in the course of your project. It is also one of the most critical success factors. The site structure, also referred to as the information architecture or taxonomy, is the foundation of your intranet. Creating an effective taxonomy is as much an art as it is a science. Use the wrong terms and your users won't be able to navigate by intuition. Make your site too deep and they will never find the content they're looking for.

One common myth is that if you integrate a search engine with your site you don't need to focus as much on the taxonomy. This is completely false. All web users can be generalized into one of 2 buckets; "browsers" or "searchers". Searchers, of course, will first use a search engine to locate content while browsers will manually look for the desired information by navigating the taxonomy. This is not to say that browsers never search, or vice versa, it merely suggests that all users have a preference for one method or the other when attempting to locate content. The most efficient site will have a well-organized taxonomy AS WELL AS a good search engine to satisfy both types of users.

Building your taxonomy

Creating a taxonomy on your own is arguably the best approach. After all, no one knows your organization's culture and terminology better than you. If you're short on professional taxonomists here are some tips to keep in mind when defining your taxonomy.

  • The overall taxonomy should be wide, not deep
  • Use primary terms rather than marketing oriented or slang terms (the goal is to use language that can be understood by a new employee on their first day of work)
  • Try to keep some rigidity to the taxonomy, at least at the top levels -- this promotes familiarity for the users and enhances usability
  • Build two taxonomies; the primary being functional-centric and the secondary being organization-centric underneath the functional-centric
  • Try to limit your structure to just 2-7 items under each branch, otherwise consolidate
  • Use real content to validate your taxonomy
  • Define, validate, re-tool, define, validate, re-tool, and so on ?- taxonomy development is an iterative process
  • The structure should be very broad on top and narrow at the lowest levels

Remember that the taxonomy is a tool to locate content. The best way to verify you have a model that works is to use focus groups to test the structure. Ask the group where they would expect to find a specific example of content within the structure and see if that maps with what you've defined. If they keep missing, you need to go back and re-work the structure based on their feedback.

Bryan A. Mjaanes
Intranet101.com Admin
http://www.intranet101.com

eco-friendly cleaning service Buffalo Grove ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

How to Increase Sales with Automation Improvements

How popular is online shopping? And is there room for... Read More

Guide to Internet Business - Website Setup

After planning the design and content of your website, it's... Read More

Websites: You Get What You Pay For!

So you finally decided to invest in a web presence... Read More

Website Value - Whats Your Business Website Worth?

If you were asked to put a value on your... Read More

The Importance of Website Stats to You

One of the best tools you have as a webmaster... Read More

Database Driven Web Site - Do You Need It?

Many of site owners still don't realize all advantages of... Read More

Unlocking the Power of Your Website!

Why do some web sites reap huge benefits while others... Read More

Ever Wondered What Challenges Other People With Their Web Site?

Have you ever wondered what challenges are faced by other... Read More

UK Online Shopping with an Edge, for Buyers and Sellers Alike

Any new website competing on the internet, needs to take... Read More

Flash Deadly Sins (That Can Kill Your Web Business)

Looks like every client wants a Flash site these days... Read More

Instant Relevant Web Site Content - No Its Not a Bot

In about the Time it takes to Watch a Reality... Read More

Content Management ? The New Standard in Web Design

The evolution of web development parallels the model of technology... Read More

7 Ways to Gain a Professional Online Reputation

A professional online reputation is essential to the flourishing of... Read More

Stop Losing Precious Web Site Traffic to the Dreaded World Wide Web Black Hole

You work hard to build traffic to your web page.... Read More

Build a Web Site that Works...Even for a Safari Hobby!

My life's greatest passion is a safari hobby. And what... Read More

Website Sales: 10 Reasons Why People Dont Buy From You

You've put up a website to promote a product or... Read More

Free Isnt Always Good - 5 Reasons Why You Need Your Own Website

Often time I've browsed sites and seen the same thing... Read More

Having a Domain Name And Web Site Gives Your Business The Key To The Door

Just like all things in life, the ways to run... Read More

The Internet Road Map

1) Data CaptureOne easy way to collect e-mail addresses and... Read More

If You Build It, They Will Come?

Building a new website can be a lengthy task. From... Read More

7 Killer Ways To Increase Your Online Sales

Every online entrepreneur I talk to is asking the same... Read More

Revealing the Firefox Secret Used by Top Web Developers and Power-Browsers

Profiles are one of the best kept secrets around regarding... Read More

Enhance Your Website With A Yahoo-Style Directory

Does your website have a links/resources page?Do you exchange reciprocal... Read More

Art, Artists and the Web: Part 3--What to Put on an Artist?s Website

What to put your the website if you are an... Read More

I Did It: Six Months to a Successful Website

For years now I've been looking to start my own... Read More

express cleaning service Arlington Heights ..