• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software

Extracts from this document...

Introduction

Heuristic Evaluation Stella Mills Department of Computing & Multimedia University of Gloucestershire The Park Cheltenham GL50 2QF, UK e-mail: smills@glos.ac.uk Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software and, in particular, the user interface [4]. Heuristic evaluation is the most informal method of usability inspection methods and 'involves having usability specialists judge whether each dialogue element conforms to established usability principles. These principles are normally referred to as the heuristics ...' [1, p.5]. Alternatively, heuristic evaluation is a usability engineering method 'for finding the usability problems in a user interface design so that they can be attended to as part of an iterative design process. Heuristic evaluation involves having a small set of evaluators examine the interface and judge its compliance with recognized usability principles (the "heuristics")' [4]. Usability engineering applies the principles of engineering to user interface design [6]. There is, therefore, no commonly accepted formal definition of an heuristic evaluation but essentially, a number of heuristics or principles are derived, usually from the literature, and then applied to the artifact to be evaluated, generally as a checklist. Potential problems for users are identified and suggestions made for their solution. The method does not involve the system's users and is generally completed by at least one, but preferably up to five, human factors' experts who should not have been involved in the development of the software. The need for experts, but not system users per se, places heuristic evaluation within the 'expert method' category of general methods of research in the social sciences. ...read more.

Middle

Table 3 Timing of use of heuristic evaluation in the lifecycle Heuristic evaluation can be used at any time in the lifecycle but, as with all human factors/ergonomics evaluation methods, the sooner it is used the more likely it is that problems will be identified and so will be cheaper to remove. Providing sufficient focus in terms of the characteristics of the users and the functionality of the system can be given, heuristic evaluation can be used on the first interface designs, even if these are in paper. If these evaluations are done by double experts then basic interface design errors, such as misuse of colour, too small font size of text etc., can be avoided. In systems which use templates for the interface design, such as is the case with an increasing number of websites, this can be most advantageous in terms of cost and time savings. However, it should be noted that even if heuristic evaluation is used at the beginning of the lifecycle, it should be used again, especially before the ?-release (the first version to be tried by actual users in the field of domain) since problems can creep into the interfaces design as it is developed. One of the advantages of heuristic evaluation is that the same heuristics can be used as the interface develops but it is wise to vary the evaluators since familiarity with an interface may lead to errors and omissions. The commercial use of heuristic evaluation Heuristic evaluation is quick to use since it can be accomplished in a few hours, especially if interface templates are used and there is, therefore, much commonality between the various screens of the system. ...read more.

Conclusion

Other evaluators may not place such emphasis on these problems; this may be particularly evident when severity ratings are used. In practice, the evaluators often meet after rating the problems in order to reach a consensus about the ratings so that the system's developers can have clear guidance about the importance of the problems cited. Such a group discussion can help to reduce the bias of each individual and is useful in informing the results of the evaluation. Group discussion and group working can be difficult owing to the different personalities in the group. It is important, therefore, that any group post-evaluation is formally chaired allowing each evaluator to express their views within the group. A chairperson should also sum up the findings formally so that a consensus of opinion is expressed in the report presented to the client. A full discussion of the problems of group working is beyond this article but such problems can arise within heuristic evaluation and can cause a slant upon the evaluation well beyond that of ordinary personal bias. Conclusion Heuristic evaluation is an inexpensive but efficient method of evaluating the interface of a software system and while it may not exhibit every usability problem of the system, it can be enlightening in terms of potential difficulties for different categories of user. Commercially, it is cost effective and consequently is used in industry to provide feedback, often well before the software is released for testing. While it is best achieved using 'triple' experts, it can be done by others since any reliable feedback is thought to be better than none. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    This can be done in the same amount of time as "mult" from above in cisc but the instructions in risc are less complex and require less transistors of hardware space . also because the instructions execute in a uniform amount of time ( i.e one clock)

  2. Network Design

    VoIP has many features like Voice mail, Caller ID, Call Conferencing, Call forwarding, Number Portability which we have to pay extra service charges to the service provider in the normal telephone network . Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    Usability testing requires that a working system be available, so these tests tend to be possible only late in the project. If there isn't time to fix these faults, they may be left in the released product. Overall, usability tests are most effective when used to investigate specific areas of an application or to explore particular issues.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Once the treatment has been administed the next process involves the vet recording this information. The next process will result in this information being used to update the client invoice regarding the treatment administered or prescribed . The next process will then result in the invoice being further updated if further treatment is required untill treatment is complete.

  1. Methods and technology used in Computer Forensics

    3.1 Hardware The hardware used in computer forensics varies greatly dependent on the type and complexity of the analysis in question. Several vendors offer a variety of standalone devices, while other's provide integrated configurations; essentially complete computer forensics hardware suites for investigators and analysts.

  2. A review of methods and techniques available for evaluating human computer interfaces

    The purpose of this report is to review and discuss the evaluation methods and also to investigate the techniques used to evaluate HCIs to assist potential evaluators to understand and enable them to make informed decisions about the most appropriate techniques for the HCI that they are evaluating.

  1. Wireless Local Area Network (WLAN) technology is rapidly becoming a crucial component of computer ...

    IEEE 802.11b is a data rate extension of the initial 802.11 DSSS, providing operation in the 2.4 GHz band up to 11Mbps. Most wireless LANs implemented today use the 802.11b version of the standard (Planet 2001), (Proxim 2001) and (Collins 2000).

  2. Analysing the usability of existing systems, and Designing an interactive system with a user-centred ...

    I decided to visit my local Odeon cinema in Uxbridge, and analysed the manual task of booking a ticket. I walked up the stairs to the entrance, the doors opened automatically and noticed the welcome sign (not relevant). The next step was to check what films were showing, and the timings.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work