Characteristics of the id process, Computer Engineering

Assignment Help:

The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later.

In addition to the four basic activities of design, there are three key characteristics of the interaction design process:

1 Users  should  be  involved  throughout  the development  of  the project. 

2 Specific usability and user experience goals should be identified, clearly documented and agreed upon at the beginning of the project 3  Iteration through the four activities is inevitable.

Usability and user experience goals are introduced in Unit 2 of this block, and their agreement with stakeholders is of particular importance to the 'Identifying needs and establishing requirements for the user experience' ID activity.

Iteration is only revisited briefly later in M364 so it is important you understand its meaning now, as it is central to the viewpoint of M364.

In this context, iteration means each of the four ID activities may need to be carried out more than once, depending upon the outcomes of the other activities. The following are three examples of why this situation often arises.

1 It is very difficult to understand fully the users and their needs without first having evaluated some designs with them. This is because each user has a unique and distinct personality, which results from both their experience of life and their genetic inheritance.
For this reason, you should never assume the users share your knowledge and background, because they probably do not.

2 Evaluation can result in the design or the requirements being modified; these then need evaluating again, and so on.

3 There is typically no single design that perfectly meets the needs of the users. Instead it is a matter of exploring the different design
options, making compromises as necessary. Each design needs to be evaluated, again resulting in iteration, tending towards the design that best meets the needs of the users.

Thus it is usually necessary to move between the four ID activities in a fluid and often repetitive manner.  

This makesthe ID processvery different to less flexible methodologies such as the waterfall model as described in Unit 3 of this block.  In the following section there is an activity that provides you with the opportunity to consider how one interaction designer actually applies this process.


Related Discussions:- Characteristics of the id process

What is socket, A socket is one end-point of a two-way communication link a...

A socket is one end-point of a two-way communication link among two programs running on the network. Socket classes are used to show the connection among a client program and a ser

Various interconnection networks-fully connected, Various Interconnection N...

Various Interconnection Networks Fully connected: This is the most controlling interconnection topology.In this each node is directly linked to all other nodes. The shortcomi

Properties of electronic cash, Properties : 1.  Monetary Value: Monetar...

Properties : 1.  Monetary Value: Monetary value must be backed by also cash, bank - authorized credit cards or bank certified cashier's cheque. 2.  Interoperability: E-cash

Printers, Printers are devices which put ink on paper in a controlled manne...

Printers are devices which put ink on paper in a controlled manner. They manually produce photographic images orreadable text. Printers have gone through a large transition in tech

What is the function of an ip packet screening router, Function of an IP Pa...

Function of an IP Packet Screening Router: A screening router is the most basic type of firewall and uses only the packet filtering capability to control and monitor network tr

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

What are the functions of virtual file system, What are the functions of vi...

What are the functions of virtual file system (VFS)? a. It splits file-system-generic operations from their implementation explaining a clean VFS interface. It allows transpare

Application to calculate weekly payment of a company, Problem: A compa...

Problem: A company requires a software application to calculate the weekly payment for its employees. The information about the employees (employees' data) is kept in a file.

What is the demand of mobile application developers, Desktop based IT appli...

Desktop based IT application is present but the mobile is future. All the applications that were made to work only on counter top are being ported to mobile. In the coming 10 years

Efficiency - metrics for performance evaluation, Q. Efficiency - Metrics fo...

Q. Efficiency - Metrics for performance evaluation? The other significant metric employed for performance measurement is efficiency of parallel computer system it implies that

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd