Characteristics of the id process, Computer Engineering

Assignment Help:

The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later.

In addition to the four basic activities of design, there are three key characteristics of the interaction design process:

1 Users  should  be  involved  throughout  the development  of  the project. 

2 Specific usability and user experience goals should be identified, clearly documented and agreed upon at the beginning of the project 3  Iteration through the four activities is inevitable.

Usability and user experience goals are introduced in Unit 2 of this block, and their agreement with stakeholders is of particular importance to the 'Identifying needs and establishing requirements for the user experience' ID activity.

Iteration is only revisited briefly later in M364 so it is important you understand its meaning now, as it is central to the viewpoint of M364.

In this context, iteration means each of the four ID activities may need to be carried out more than once, depending upon the outcomes of the other activities. The following are three examples of why this situation often arises.

1 It is very difficult to understand fully the users and their needs without first having evaluated some designs with them. This is because each user has a unique and distinct personality, which results from both their experience of life and their genetic inheritance.
For this reason, you should never assume the users share your knowledge and background, because they probably do not.

2 Evaluation can result in the design or the requirements being modified; these then need evaluating again, and so on.

3 There is typically no single design that perfectly meets the needs of the users. Instead it is a matter of exploring the different design
options, making compromises as necessary. Each design needs to be evaluated, again resulting in iteration, tending towards the design that best meets the needs of the users.

Thus it is usually necessary to move between the four ID activities in a fluid and often repetitive manner.  

This makesthe ID processvery different to less flexible methodologies such as the waterfall model as described in Unit 3 of this block.  In the following section there is an activity that provides you with the opportunity to consider how one interaction designer actually applies this process.


Related Discussions:- Characteristics of the id process

Define register file, Define register file. All general purpose registe...

Define register file. All general purpose registers are combined into a one block called the register file.

Comparison between centralized and distributed spc, Explain the principles ...

Explain the principles of operation of centralized SPC and distributed SPC and compare their performance. All the control equipment is replaced with a single processor that mus

Define instruction code, Define Instruction Code. An Instruction code i...

Define Instruction Code. An Instruction code is a group of bits that instructs the computer to perform an exact operation. It is usually separated into parts, each having its o

Handling multiple devices - computer architecture, Handling Multiple Device...

Handling Multiple Devices Interrupt Priority   Continue to accept interrupt requests from higher priority components   Disable interrupts from component at the sa

What is the semiconductor memory chip, What is the Semiconductor memory chi...

What is the Semiconductor memory chip A semiconductor memory chip comprises a large number of cells organized into an array and the logic necessary to access any array in the c

Use of parallel construct with private clause, Q. Use of parallel construct...

Q. Use of parallel construct with private clause? In this example we would see use of parallel construct with private and firstprivate clauses. At end of program i and j remain

What problem does the namespace feature solve, Multiple providers of librar...

Multiple providers of libraries may use common global identifiers causing a name collision when an application tries to link with two or more such libraries. The namespace feature

What are the five popular hashing functions, Five popular hashing functions...

Five popular hashing functions are as follows:- Division Method Midsquare Method Folding Method Multiplicative method Digit Analysis

Explain typical packet switching network configuration, Explain typical pac...

Explain typical packet switching network configuration. Packet Switching: In packet switching the nodes handle greatly smaller data length than are determined in message swit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd