• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software

Extracts from this document...


Heuristic Evaluation

Stella Mills

Department of Computing & Multimedia

University of Gloucestershire

The Park


GL50  2QF, UK

e-mail:  smills@glos.ac.uk

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software and, in particular, the user interface [4].  Heuristic evaluation is the most informal method of usability inspection methods and ‘involves having usability specialists judge whether each dialogue element conforms to established usability principles.  These principles are normally referred to as the heuristics …’ [1, p.5].   Alternatively, heuristic evaluation is a usability engineering method ‘for finding the usability problems in a user interface design so that they can be attended to as part of an iterative design process.  Heuristic evaluation involves having a small set of evaluators examine the interface and judge its compliance with recognized usability principles (the ”heuristics”)’ [4].  Usability engineering applies the principles of engineering to user interface design [6].

There is, therefore, no commonly accepted formal definition of an heuristic evaluation but essentially, a number of heuristics or principles are derived, usually from the literature, and then applied to the artifact to be evaluated, generally as a checklist.  Potential problems for users are identified and suggestions made for their solution.  The method does not involve the system’s users and is generally completed by at least one, but preferably up to five, human factors’ experts who should not have been involved in the development of the software.  The need for experts, but not system users per se, places heuristic evaluation within the ‘expert method’ category of general methods of research in the social sciences.

...read more.


vide infra) who also have expert application domain knowledge.

The number of evaluators can vary from one to as many as are available but it has been found that an upper limit of about five [4] brings an increase in the identification of problems when compared to costs.  If the evaluators are all double experts, then this number can be reduced and successful commercial evaluations have been achieved with only one evaluator.  It can be argued [4], that if the heuristics are derived by a double expert then they can be applied by any user.  However, this is fraught with problems of misinterpretation of the heuristics and the inability of the users to role-play other users; indeed, novice users usually cannot role-play expert users, although some experts can achieve some success with the method.

When the evaluators have finished the evaluating session and the first three columns of the checklist table are completed, it is usual to give some indication of the severity, from the corresponding user’s perspective, of the problems found.  If there is more than one evaluator, then the complete list of problems is circulated to all the evaluators who rank, from a usability perspective, all the problems found.  It is not always possible for the evaluator to indicate the costs involved or other factors since they have not been privy to the formal design process.  Nielsen [4] suggested a rating of 0 to 4 where 0 indicates there is no problem and 4 signals a usability catastrophe (Table 3).  These ratings can be used to indicate where the software needs better usability input and which specific problems need fixing as a matter of priority.

Table 3

...read more.



Heuristic evaluation is an inexpensive but efficient method of evaluating the interface of a software system and while it may not exhibit every usability problem of the system, it can be enlightening in terms of potential difficulties for different categories of user.  Commercially, it is cost effective and consequently is used in industry to provide feedback, often well before the software is released for testing.  While it is best achieved using ‘triple’ experts, it can be done by others since any reliable feedback is thought to be better than none.


1  Mack, R.L. and Nielsen, J., Executive summary, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 1.

2  Mills, S., Usability problems of acoustical fishing displays, Displays, 16, 115, 1995.

3  Mills, S., Integrating information - a task-orientated approach, Interacting with Computers, 9(3), 1998, 225-240.

4  Nielsen, J., Heuristic evaluation, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 2.

5  Preece, J., Rogers, Y. and Sharp, H, Interaction Design beyond human-computer interaction, John Wiley & Sons, Inc., New York, 2002.

6  Wixon, D., Jones, S., Tse, L. and Casaday, G., Inspections and design reviews:  framework, history and reflection, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 4.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Network Design

    VoIP has many features like Voice mail, Caller ID, Call Conferencing, Call forwarding, Number Portability which we have to pay extra service charges to the service provider in the normal telephone network . Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems.

  2. CAM, which stands for Computer aided manufacture, is used extensively within companies as a ...

    and precisely drilled holes that are alternatively reamed or tapped. Each hole is referenced by and alphanumeric code that can be referenced as a datum. The tapped holes are used for clamping purposes. See. Fig. 3. Fig. 3. - An example of a Grid plate The grid plate is clamped

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    This framework has been identified as a pratical and applicable, utilised within many industries and environments. Its focal stance is that of the data required and not the process or procedures which are performed. * Data Activity and interaction models * Function/entity type matrix * Bubble chart * User views

  2. A review of methods and techniques available for evaluating human computer interfaces

    Evaluation of the human computer interface The evaluation of HCIs enables the evaluator to assess how a design is suited to users' needs and what users think of the design. Evaluation of the HCI should be performed throughout the entire design and production process, otherwise known as iterative design and evaluation.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    The essential difficulty of configuration testing is therefore deciding on the scope of the testing. The big questions include the following: * What do your users actually use? * Which configurations should you support? (Not all will be worth considering)

  2. Methods and technology used in Computer Forensics

    Tools which facilitate reconstruction have become more common with the emergence of more sophisticated methods of data corruption and deletion. Reconstruction tools provide the facility to do two things; copy and rebuild data. Essentially, a reconstruct function could be used to simply create an exact clone of a disk's partition.

  1. The purpose of this project is to discuss the issues associated with the deployment ...

    and introducing higher bandwidths and speeds in third-generation (3G) wireless networks such as W-CDMAand CDMA2000 3XRTT. These higher capable network bearers permit new types of content (e.g., streaming media) and provide an 'always on' availability. These new aspects of the serving networks permit new operational activities. * TCP/IP as Transport Protocol - Most new wireless network technologies provide IP packet support as a basic data transport protocol.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    The size of cache is user configurable and can be set to 4K, 8K, 16K or 32K bytes. The L1 memory is connected to a second-level memory of on-chip memory called L2. The L2 memory acts as a bridge between the L1 memory and memory located off-chip.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work