Characteristics of the id process, Computer Engineering

Assignment Help:

The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later.

In addition to the four basic activities of design, there are three key characteristics of the interaction design process:

1 Users  should  be  involved  throughout  the development  of  the project. 

2 Specific usability and user experience goals should be identified, clearly documented and agreed upon at the beginning of the project 3  Iteration through the four activities is inevitable.

Usability and user experience goals are introduced in Unit 2 of this block, and their agreement with stakeholders is of particular importance to the 'Identifying needs and establishing requirements for the user experience' ID activity.

Iteration is only revisited briefly later in M364 so it is important you understand its meaning now, as it is central to the viewpoint of M364.

In this context, iteration means each of the four ID activities may need to be carried out more than once, depending upon the outcomes of the other activities. The following are three examples of why this situation often arises.

1 It is very difficult to understand fully the users and their needs without first having evaluated some designs with them. This is because each user has a unique and distinct personality, which results from both their experience of life and their genetic inheritance.
For this reason, you should never assume the users share your knowledge and background, because they probably do not.

2 Evaluation can result in the design or the requirements being modified; these then need evaluating again, and so on.

3 There is typically no single design that perfectly meets the needs of the users. Instead it is a matter of exploring the different design
options, making compromises as necessary. Each design needs to be evaluated, again resulting in iteration, tending towards the design that best meets the needs of the users.

Thus it is usually necessary to move between the four ID activities in a fluid and often repetitive manner.  

This makesthe ID processvery different to less flexible methodologies such as the waterfall model as described in Unit 3 of this block.  In the following section there is an activity that provides you with the opportunity to consider how one interaction designer actually applies this process.


Related Discussions:- Characteristics of the id process

Briefly explain register-to-register architecture, Register-to-Register Arc...

Register-to-Register Architecture In this organization results and operands are not accessed straight from main memory by scalar or vector registers. The vectors that are neede

Duplicating processes, DUPLICATING PROCESSES : As we mentioned earlier dup...

DUPLICATING PROCESSES : As we mentioned earlier duplicating is a process whereby a master copy is prepared from which a large number of other copies are obtained with the help of

Priority interrupt and synchronous bus, What is a Priority Interrupt? A...

What is a Priority Interrupt? Ans: A priority interrupt is a type of interrupt that establishes a priority over the many sources to determine which condition is to be serviced

Define various types of shift registers, What are various types of Shi...

What are various types of Shift Registers ? Ans: Kinds of Shift Registers: (i) SISO that is Serial-In Serial-Out Shift Register (ii) SIPO that is Serial-In P

Explain macro definition, Explain macro definition. A unit of specifica...

Explain macro definition. A unit of specification for a program generation is termed as a macro. This consists of name, body of code and set of formal parameters.

What is web mail services, What is Web Mail Services? Web-based email s...

What is Web Mail Services? Web-based email services are also called as web mail or HTTP email. Unlike traditional POP email, web mail can be accessed from any PC using any web

Explian two limitations of dead-box analysis, (a) Explian two limitations o...

(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by

Detrmine pure paging, Which is not a key piece of information, stored in si...

Which is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory Ans. A reference for the disk block which stores the page is

What is a table attribute, What is a Table attribute? The table's attr...

What is a Table attribute? The table's attributes verifies who is responsible for maintaining a table and which types of access are permitted for the table.  The most signific

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd