• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software

Extracts from this document...


Heuristic Evaluation

Stella Mills

Department of Computing & Multimedia

University of Gloucestershire

The Park


GL50  2QF, UK

e-mail:  smills@glos.ac.uk

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software and, in particular, the user interface [4].  Heuristic evaluation is the most informal method of usability inspection methods and ‘involves having usability specialists judge whether each dialogue element conforms to established usability principles.  These principles are normally referred to as the heuristics …’ [1, p.5].   Alternatively, heuristic evaluation is a usability engineering method ‘for finding the usability problems in a user interface design so that they can be attended to as part of an iterative design process.  Heuristic evaluation involves having a small set of evaluators examine the interface and judge its compliance with recognized usability principles (the ”heuristics”)’ [4].  Usability engineering applies the principles of engineering to user interface design [6].

There is, therefore, no commonly accepted formal definition of an heuristic evaluation but essentially, a number of heuristics or principles are derived, usually from the literature, and then applied to the artifact to be evaluated, generally as a checklist.  Potential problems for users are identified and suggestions made for their solution.  The method does not involve the system’s users and is generally completed by at least one, but preferably up to five, human factors’ experts who should not have been involved in the development of the software.  The need for experts, but not system users per se, places heuristic evaluation within the ‘expert method’ category of general methods of research in the social sciences.

...read more.


vide infra) who also have expert application domain knowledge.

The number of evaluators can vary from one to as many as are available but it has been found that an upper limit of about five [4] brings an increase in the identification of problems when compared to costs.  If the evaluators are all double experts, then this number can be reduced and successful commercial evaluations have been achieved with only one evaluator.  It can be argued [4], that if the heuristics are derived by a double expert then they can be applied by any user.  However, this is fraught with problems of misinterpretation of the heuristics and the inability of the users to role-play other users; indeed, novice users usually cannot role-play expert users, although some experts can achieve some success with the method.

When the evaluators have finished the evaluating session and the first three columns of the checklist table are completed, it is usual to give some indication of the severity, from the corresponding user’s perspective, of the problems found.  If there is more than one evaluator, then the complete list of problems is circulated to all the evaluators who rank, from a usability perspective, all the problems found.  It is not always possible for the evaluator to indicate the costs involved or other factors since they have not been privy to the formal design process.  Nielsen [4] suggested a rating of 0 to 4 where 0 indicates there is no problem and 4 signals a usability catastrophe (Table 3).  These ratings can be used to indicate where the software needs better usability input and which specific problems need fixing as a matter of priority.

Table 3

...read more.



Heuristic evaluation is an inexpensive but efficient method of evaluating the interface of a software system and while it may not exhibit every usability problem of the system, it can be enlightening in terms of potential difficulties for different categories of user.  Commercially, it is cost effective and consequently is used in industry to provide feedback, often well before the software is released for testing.  While it is best achieved using ‘triple’ experts, it can be done by others since any reliable feedback is thought to be better than none.


1  Mack, R.L. and Nielsen, J., Executive summary, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 1.

2  Mills, S., Usability problems of acoustical fishing displays, Displays, 16, 115, 1995.

3  Mills, S., Integrating information - a task-orientated approach, Interacting with Computers, 9(3), 1998, 225-240.

4  Nielsen, J., Heuristic evaluation, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 2.

5  Preece, J., Rogers, Y. and Sharp, H, Interaction Design beyond human-computer interaction, John Wiley & Sons, Inc., New York, 2002.

6  Wixon, D., Jones, S., Tse, L. and Casaday, G., Inspections and design reviews:  framework, history and reflection, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 4.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    cisc architecture would already have a instruction "mult" loaded in its architecture and the task can be done simply by the instruction , ("mult" 2:3, 5:2. ). Very little ram is required here as the instruction is short. The designers try to build the complex instruction directly onto the hardware.

  2. Network Design

    VoIP has many features like Voice mail, Caller ID, Call Conferencing, Call forwarding, Number Portability which we have to pay extra service charges to the service provider in the normal telephone network . Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    from errors 10 Help and documentation Table 7.7 Usability Heuristics 7.7.3 Usability Testing Usability testing aims to detect usability faults in a system by using the system to perform selected tasks. There are two broad ways of performing usability testing: in a usability laboratory or in the field.

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    to book an appointment this provides the initial tigger which enables clients to book an appointment. Once the client calls their branch a convenient appointment is created illustrated by the next process, this information is then stored within the system.

  1. Methods and technology used in Computer Forensics

    To facilitate this, many tools will offer integrated reporting features, which will create logs of what was found through the analysis, what steps the investigator took during the analysis, as well as translate and create representations of non readable data so that they can be displayed and viewed for reporting purposes.

  2. A review of methods and techniques available for evaluating human computer interfaces

    (Baecker et al, 1995; Preece et al, 2002; Christie, Scane & Collyer, 2002). Baecker et al (1995) further defined iterative design and evaluation by instructing the evaluator to iterate or repeat the design and evaluation of a HCI until a satisfactory result is achieved.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Figure 5.2 Simulation Results for Case 2 Number Reference Number Matching Ratio % 0 31 85 1 4 92 2 10 89 3 17 100 4 33 96 5 35 84 6 26 92 Table 5.3 Case 2 Simulation Results for Character Recognition The tabulated results above provide us with the following three fields.

  2. CAM, which stands for Computer aided manufacture, is used extensively within companies as a ...

    Each of these methods are discussed later under tactile and non-tactile sensing. Qualified tooling is a special type of tooling where known dimensions are given when the tool is supplied between a datum face and the tool tip. These dimensions are guaranteed to be the same no matter which tool (of the same type)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work