• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software

Extracts from this document...

Introduction

Heuristic Evaluation Stella Mills Department of Computing & Multimedia University of Gloucestershire The Park Cheltenham GL50 2QF, UK e-mail: smills@glos.ac.uk Heuristic evaluation was used by Jakob Nielsen in 1990 to describe a type of inspection method [5], for identifying usability problems of computer software and, in particular, the user interface [4]. Heuristic evaluation is the most informal method of usability inspection methods and 'involves having usability specialists judge whether each dialogue element conforms to established usability principles. These principles are normally referred to as the heuristics ...' [1, p.5]. Alternatively, heuristic evaluation is a usability engineering method 'for finding the usability problems in a user interface design so that they can be attended to as part of an iterative design process. Heuristic evaluation involves having a small set of evaluators examine the interface and judge its compliance with recognized usability principles (the "heuristics")' [4]. Usability engineering applies the principles of engineering to user interface design [6]. There is, therefore, no commonly accepted formal definition of an heuristic evaluation but essentially, a number of heuristics or principles are derived, usually from the literature, and then applied to the artifact to be evaluated, generally as a checklist. Potential problems for users are identified and suggestions made for their solution. The method does not involve the system's users and is generally completed by at least one, but preferably up to five, human factors' experts who should not have been involved in the development of the software. The need for experts, but not system users per se, places heuristic evaluation within the 'expert method' category of general methods of research in the social sciences. ...read more.

Middle

Table 3 Timing of use of heuristic evaluation in the lifecycle Heuristic evaluation can be used at any time in the lifecycle but, as with all human factors/ergonomics evaluation methods, the sooner it is used the more likely it is that problems will be identified and so will be cheaper to remove. Providing sufficient focus in terms of the characteristics of the users and the functionality of the system can be given, heuristic evaluation can be used on the first interface designs, even if these are in paper. If these evaluations are done by double experts then basic interface design errors, such as misuse of colour, too small font size of text etc., can be avoided. In systems which use templates for the interface design, such as is the case with an increasing number of websites, this can be most advantageous in terms of cost and time savings. However, it should be noted that even if heuristic evaluation is used at the beginning of the lifecycle, it should be used again, especially before the ?-release (the first version to be tried by actual users in the field of domain) since problems can creep into the interfaces design as it is developed. One of the advantages of heuristic evaluation is that the same heuristics can be used as the interface develops but it is wise to vary the evaluators since familiarity with an interface may lead to errors and omissions. The commercial use of heuristic evaluation Heuristic evaluation is quick to use since it can be accomplished in a few hours, especially if interface templates are used and there is, therefore, much commonality between the various screens of the system. ...read more.

Conclusion

Other evaluators may not place such emphasis on these problems; this may be particularly evident when severity ratings are used. In practice, the evaluators often meet after rating the problems in order to reach a consensus about the ratings so that the system's developers can have clear guidance about the importance of the problems cited. Such a group discussion can help to reduce the bias of each individual and is useful in informing the results of the evaluation. Group discussion and group working can be difficult owing to the different personalities in the group. It is important, therefore, that any group post-evaluation is formally chaired allowing each evaluator to express their views within the group. A chairperson should also sum up the findings formally so that a consensus of opinion is expressed in the report presented to the client. A full discussion of the problems of group working is beyond this article but such problems can arise within heuristic evaluation and can cause a slant upon the evaluation well beyond that of ordinary personal bias. Conclusion Heuristic evaluation is an inexpensive but efficient method of evaluating the interface of a software system and while it may not exhibit every usability problem of the system, it can be enlightening in terms of potential difficulties for different categories of user. Commercially, it is cost effective and consequently is used in industry to provide feedback, often well before the software is released for testing. While it is best achieved using 'triple' experts, it can be done by others since any reliable feedback is thought to be better than none. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. This paper will propose a testing strategy for Internet E-Commerce applications and assess its ...

    * Voice-enabled browsers that navigate Web sites using speech commands; * Specialized keyboards and mice; * Voice-recognition software; * Refreshable braille devices that transfer text onto a special device; * Screen magnification or enhancement software. 7.8 Security Testing When most people think of security (and the challenge that hackers present

  2. IP network design

    While the two devices involved in the collision are waiting to resend, it's possible for another device to send a packet, which may also be involved in another collision. An Ethernet network based on switching overcomes this effect. Ethernet switches separate the network into microsegments, which should be single host segments.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Engineering IE developed in the late 1970's to early 1980's is a comprehensive framework dealing with all aspects of its life cycle. From employing this Framework this generates a project management mechanisum which produces quality systems efficietly. IE aknowledges the fact that process development is essential to model a system correctly.

  2. What is research?

    true of mathematics: 'In the birth of controls aimed at control of what is free and unordered, crystallized by early counting, we see a new attitude toward the world. If naming is a distancing, a mastery, so too is number, which is impoverished naming.

  1. Methods and technology used in Computer Forensics

    Extraction tools also feature a number of tools often found to be in use by malicious users. Computer forensic tools will offer their users functions such as brute-force attacks, in the event of an investigator having to overcome some form of encryption in order to get at the data that is required for analysis.

  2. Analysing the usability of existing systems, and Designing an interactive system with a user-centred ...

    I then asked how many seats were left, which were 65, I was allowed to sit anywhere I chose, so I paid, and received my ticket. I got my ticket with ease, I knew what film I wanted to watch, so all I had to do was to check the timings.

  1. A review of methods and techniques available for evaluating human computer interfaces

    The purpose of this report is to review and discuss the evaluation methods and also to investigate the techniques used to evaluate HCIs to assist potential evaluators to understand and enable them to make informed decisions about the most appropriate techniques for the HCI that they are evaluating.

  2. Problems in requirements modelling

    The introduction of high-level languages also meant that software development became much more efficient in terms of effort. This however, did not mean that the effort spent writing programs decreased. Instead the complexity of the problems increased, the effort kept on increasing and so did the complexity of the programs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work