• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20

A Report On Molich and Nielsen Heuristics.

Extracts from this document...

Introduction

A Report

On

Molich and Nielsen

Heuristics

By

Imran Musa Patel


Contents

INTRODUCTION

HEURISTIC EVALUATION

HEURISTICS OF GOOD DESIGN (MOLICH & NIELSEN)

Ten Usability Heuristics

USE SIMPLE AND NATURAL DIALOGUE

SPEAK THE USERS LANGUAGE

MINIMIZE MEMORY LOAD FOR USER

BE CONSISTENT AND KEEPING THE SAME STANDARDS

PROVIDE FEEDBACK

GENERAL SYSTEM RESPONSES FOR ERRORS

DESIGNING FOR SLIPS

LITTLE IS MORE

HELP AND DOCUMENTATION

Provide Help

HEURISTIC SUMMARY

BIBLIOGRAPHY

Books

Sites


Introduction

As software designers, it is important to build a user-friendly interface, to provide successful software.

Implementing Molich and Nielsen design heuristics, within the development area can provide a leading edge with other competitors.

In the following report, you will find how the Molich and Nielsen design heuristics can be implemented in the area of software design industry, how it can improve the product, and what heuristics means.  This will be run along side examples of Microsoft.


Heuristic Evaluation

To make an evaluation of a users interface, heuristic evaluation is a cheap and quick method to under take such task.

The most popular inspection method is heuristic evaluation.  This is done synthetically, of a user interface design for usability.  The whole aim of the heuristic evaluation is to identify problems that may occur with users, as part of the design process.  It involves set of evaluators to examine the interface, and are to judge the interface with the principles of the heuristics, such as Molich and Nielsen design heuristics.

Reason why a group of people are selected to judge this is an individual cannot be expected to find all the problems his self.  As this has been proven that different users do find different usability problems.  


Heuristics of Good Design (Molich & Nielsen)

...read more.

Middle

image02.png

This will give you more or less the same visual appearance and when selecting a task, this will also have the same effect.  This will also mean that across the complete system, consistent syntax is being used.


Provide Feedback

It is required on a interface to make sure continuously, you inform the user about what the interface is doing, how the interface is interpreting the user’s input, and most of all the user should always know what is going on.  As shown below:

image03.png

When providing a feedback, the feedback should be as specific as possible, this depending on the user’s input.  As shown below:

image04.pngimage05.png

The feedback provided is best to keep within the context of the action, as shown below.

image06.png

When providing the feedback it is important to take time to respond under consideration.  Depending how users observe delay, as shown below:

0.1 second max: Seen as instantaneous

1 seconds max: User’s thoughts are not disturbed, but the delay is noticed

10 seconds: It limits the users attention focused on the dialog

>10 seconds: while waiting the user will want to perform other task

When dealing with long delays, you would cursors for short transactions, as shown below:

image07.png


When providing a dialog for longer transactions, it is best to provide percentage bars, this would hopefully show the user what the interface is doing, how much information left and what the estimated time remaining, as shown below:

image08.png

When providing dialogs for time not known, and it’s can be used randomly, as shown below.

image09.png


 Provide clearly marked exits

...read more.

Conclusion

image20.pngimage21.png

Wizards – This walks the user through a typical task, such as installation, but it is dangerous if user gets stuck.

Tips – giving user tips on migration path to learning system features, must be smart, otherwise it can be tedious and boring, as shown below.

image22.png


Heuristic Summary

Systematic inspection of a user interface design for usability would be, to use principles to find the usability problems in design and fix them.

Methods that should be used to allow you to do this, is to have a small set of evaluators (3-5), to examine interface using the heuristic as a structure, where by individual inspection in isolation (1-2 hours for most interface), to compare notes once this has been done.  It is noted that a single evaluator only catches 35% of usability problems, where as 5 evaluators catch 75% of the problems.

The people who should inspect the interface would usually be, interface experts, project team, double experts and end users.


Bibliography

Books

  • Molich, R., and Nielsen, J. (1990). Improving a human-computer dialogue, Communications of the ACM33, 3 (March), 338-348.
  • Nielsen, J., and Molich, R. (1990). Heuristic evaluation of user interfaces, Proc. ACM CHI'90 Conf. (Seattle, WA, 1-5 April), 249-256.
  • Nielsen, J. (1994a). Enhancing the explanatory power of usability heuristics. Proc. ACM CHI'94 Conf. (Boston, MA, April 24-28), 152-158.
  • Nielsen, J. (1994b). Heuristic evaluation. In Nielsen, J., and Mack, R.L. (Eds.), Usability Inspection Methods, John Wiley & Sons, New York, NY

Sites

http://pages.cpsc.ucalgary.ca/~tamj/2001/hci_topics/topics/guidelin.html

http://www.useit.com/papers/heuristic/heuristic_evaluation.html

http://www.useit.com/papers/heuristic/heuristic_list.html

    Imran M Patel                                                     -  -                                  Human Computer Interface

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Network Design

    same network can be used to transfer both data and voice .VoIP will cut down the cost of implementing an internal telephone system and it provides many features than the normal telephone implementation. Figure 11 - VoIP implementation For moderation and management purposes APIIT law school staff may need to

  2. OMC-R and CBSC ATP Overview

    It takes a few minutes for the BACKUP node to re-initialize. 6. At the omc CLI window, execute the command audit cbsc-1 dbsync. The command should complete without any errors.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Hence, the power function from the math library routine was used to optimize the resizing_quad_gen function. Similarly, another technique was used to optimize the 'for' loop in Template_matching function. Let us see the basic requirement to perform Template Matching before diving into the optimization technique.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Seven data flows have been established for the Client entity. Reading from left to right firstly we have Invoice, this dataflow identifies when an invoice is issued to the client once payment is required. Secondly we have prescription, this identifies when a client is presented with a prescription for their pet.

  1. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    Yes 17 To check to see if the 'Start' command button in user form 6 called 'Goodbye' goes to the first user form. The 'Start' command button in user form 6 called 'Goodbye' should take the user back to the first user form of the software called 'Welcome'.

  2. Lifecycle Management Of Information Technology Project In Construction

    do in manufacturing. They provide integrated, computer-ba?ed collection? of all known project information. They may contain geometric information to allow tool? like 3D vi?ualization, but they al?o contain non-geometric de?ign and management information, ?uch a? material propertie?, ?upplier information, co?t and ?chedule data, organizational information, etc. Thu?, per?pective i?

  1. Network report for Middlesex University. The current network design is a star topology with ...

    As Figure below illustrates, a hierarchical network design has three layers: * The core layer provides optimal transport between sites. * The distribution layer provides policy-based connectivity. * The access layer provides workgroup/user access to the network. Core Layer: The core layer is the high-speed switching backbone of the network, which is crucial to enable corporate communications.

  2. microprosessor principles

    Use the instruction set provided for the Intel 8051 series of microcontrollers, perform a hand assembly of the following program: START: MOV A,#05H 74,05 MOV B, #04H 75,04 MOV R0, B A8 LOOP: ADD A, B 25 DJNZ R0, LOOP D8 END Develop a flowchart for the above program, and explain what the program does.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work