• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software

Extracts from this document...

Introduction

Heuristic Evaluation

Stella Mills

Department of Computing & Multimedia

University of Gloucestershire

The Park

Cheltenham

GL50  2QF, UK

e-mail:  smills@glos.ac.uk

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software and, in particular, the user interface [4].  Heuristic evaluation is the most informal method of usability inspection methods and ‘involves having usability specialists judge whether each dialogue element conforms to established usability principles.  These principles are normally referred to as the heuristics …’ [1, p.5].   Alternatively, heuristic evaluation is a usability engineering method ‘for finding the usability problems in a user interface design so that they can be attended to as part of an iterative design process.  Heuristic evaluation involves having a small set of evaluators examine the interface and judge its compliance with recognized usability principles (the ”heuristics”)’ [4].  Usability engineering applies the principles of engineering to user interface design [6].

There is, therefore, no commonly accepted formal definition of an heuristic evaluation but essentially, a number of heuristics or principles are derived, usually from the literature, and then applied to the artifact to be evaluated, generally as a checklist.  Potential problems for users are identified and suggestions made for their solution.  The method does not involve the system’s users and is generally completed by at least one, but preferably up to five, human factors’ experts who should not have been involved in the development of the software.  The need for experts, but not system users per se, places heuristic evaluation within the ‘expert method’ category of general methods of research in the social sciences.

...read more.

Middle

vide infra) who also have expert application domain knowledge.

The number of evaluators can vary from one to as many as are available but it has been found that an upper limit of about five [4] brings an increase in the identification of problems when compared to costs.  If the evaluators are all double experts, then this number can be reduced and successful commercial evaluations have been achieved with only one evaluator.  It can be argued [4], that if the heuristics are derived by a double expert then they can be applied by any user.  However, this is fraught with problems of misinterpretation of the heuristics and the inability of the users to role-play other users; indeed, novice users usually cannot role-play expert users, although some experts can achieve some success with the method.

When the evaluators have finished the evaluating session and the first three columns of the checklist table are completed, it is usual to give some indication of the severity, from the corresponding user’s perspective, of the problems found.  If there is more than one evaluator, then the complete list of problems is circulated to all the evaluators who rank, from a usability perspective, all the problems found.  It is not always possible for the evaluator to indicate the costs involved or other factors since they have not been privy to the formal design process.  Nielsen [4] suggested a rating of 0 to 4 where 0 indicates there is no problem and 4 signals a usability catastrophe (Table 3).  These ratings can be used to indicate where the software needs better usability input and which specific problems need fixing as a matter of priority.

Table 3

...read more.

Conclusion

Conclusion

Heuristic evaluation is an inexpensive but efficient method of evaluating the interface of a software system and while it may not exhibit every usability problem of the system, it can be enlightening in terms of potential difficulties for different categories of user.  Commercially, it is cost effective and consequently is used in industry to provide feedback, often well before the software is released for testing.  While it is best achieved using ‘triple’ experts, it can be done by others since any reliable feedback is thought to be better than none.

References

1  Mack, R.L. and Nielsen, J., Executive summary, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 1.

2  Mills, S., Usability problems of acoustical fishing displays, Displays, 16, 115, 1995.

3  Mills, S., Integrating information - a task-orientated approach, Interacting with Computers, 9(3), 1998, 225-240.

4  Nielsen, J., Heuristic evaluation, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 2.

5  Preece, J., Rogers, Y. and Sharp, H, Interaction Design beyond human-computer interaction, John Wiley & Sons, Inc., New York, 2002.

6  Wixon, D., Jones, S., Tse, L. and Casaday, G., Inspections and design reviews:  framework, history and reflection, in Usability Inspection Methods, Nielsen, J. and Mack, R.L., Eds., John Wiley & Sons Inc., New York, 1994, chap 4.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    a semi conductor manufacturer to place more parts on a single silicon weafer and can lower the chip cost . the risc deisgn would also have a shorter design cycle , they can be created quicker And can take advantage of other technological advances sooner , leading to greater performance between generations.

  2. Network Design

    VoIP has many features like Voice mail, Caller ID, Call Conferencing, Call forwarding, Number Portability which we have to pay extra service charges to the service provider in the normal telephone network . Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems.

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    1 Visibility of system status 2 Match between system and the real world 3 User control and freedom 4 Consistency and standards 5 Error prevention 6 Recognition rather than recall 7 Flexibility and efficiency of use 8 Aesthetic and minimalist design 9 Help for users to recognize, diagnose, and recover

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    This framework has been identified as a pratical and applicable, utilised within many industries and environments. Its focal stance is that of the data required and not the process or procedures which are performed. * Data Activity and interaction models * Function/entity type matrix * Bubble chart * User views

  1. Methods and technology used in Computer Forensics

    To facilitate this, many tools will offer integrated reporting features, which will create logs of what was found through the analysis, what steps the investigator took during the analysis, as well as translate and create representations of non readable data so that they can be displayed and viewed for reporting purposes.

  2. A review of methods and techniques available for evaluating human computer interfaces

    Evaluation of the human computer interface The evaluation of HCIs enables the evaluator to assess how a design is suited to users' needs and what users think of the design. Evaluation of the HCI should be performed throughout the entire design and production process, otherwise known as iterative design and evaluation.

  1. CAM, which stands for Computer aided manufacture, is used extensively within companies as a ...

    2.) and then the locking tang is tightened. Similar to the qualified tooling the dimension from the tip to the three datum faces is identical between blocks with the same tool type. Once again tool offsets will not be affected by changing tools to another of a similar type. Fig. 2.

  2. The purpose of this project is to discuss the issues associated with the deployment ...

    The motivation for developing WAP was to extend Internet technologies to wireless networks, bearers and devices. Just as earlier versions of WAP anticipated developments in image displays, public-key infrastructure (PKI) and end-to-end security, messaging, push technology, and a number of W3C and IETF standards, WAP 2.0 capitalizes on a wide

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work