Characteristics of the id process, Computer Engineering

Assignment Help:

The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later.

In addition to the four basic activities of design, there are three key characteristics of the interaction design process:

1 Users  should  be  involved  throughout  the development  of  the project. 

2 Specific usability and user experience goals should be identified, clearly documented and agreed upon at the beginning of the project 3  Iteration through the four activities is inevitable.

Usability and user experience goals are introduced in Unit 2 of this block, and their agreement with stakeholders is of particular importance to the 'Identifying needs and establishing requirements for the user experience' ID activity.

Iteration is only revisited briefly later in M364 so it is important you understand its meaning now, as it is central to the viewpoint of M364.

In this context, iteration means each of the four ID activities may need to be carried out more than once, depending upon the outcomes of the other activities. The following are three examples of why this situation often arises.

1 It is very difficult to understand fully the users and their needs without first having evaluated some designs with them. This is because each user has a unique and distinct personality, which results from both their experience of life and their genetic inheritance.
For this reason, you should never assume the users share your knowledge and background, because they probably do not.

2 Evaluation can result in the design or the requirements being modified; these then need evaluating again, and so on.

3 There is typically no single design that perfectly meets the needs of the users. Instead it is a matter of exploring the different design
options, making compromises as necessary. Each design needs to be evaluated, again resulting in iteration, tending towards the design that best meets the needs of the users.

Thus it is usually necessary to move between the four ID activities in a fluid and often repetitive manner.  

This makesthe ID processvery different to less flexible methodologies such as the waterfall model as described in Unit 3 of this block.  In the following section there is an activity that provides you with the opportunity to consider how one interaction designer actually applies this process.


Related Discussions:- Characteristics of the id process

Explain automated and manual systems, Q. Explain Automated and Manual syste...

Q. Explain Automated and Manual systems? Automated and Manual systems: The system that doesn't need human intervention is known as'Automated system'. In this system whole proce

Explain various steps for analysing an algorithm, Explain various steps for...

Explain various steps for analysing an algorithm.  The several steps involved in analysis of an algorithm are: 1. For any algorithm, the first step should be to show that it

Find max conversion time of 6-bit dual slope A/D converter, A 6-bit Dual Sl...

A 6-bit Dual Slope A/D converter uses a reference of -6V and a 1 MHz clock. It uses a fixed count of 40 (101000). Find Maximum Conversion Time.         Ans. The time T 1 specifie

Explain the isa and hasa class relationships, How would you implement each ...

How would you implement each in a class design? Ans) A specialized class "is" a specialization of another class and, thus, has the ISA relationship with the other class. An Em

What is file allocation table, Q. What is File allocation table? FAT ma...

Q. What is File allocation table? FAT maps the usage of data space of disk. It comprises information about space used by every individual file and unused disk space as well as

C program, find area uder the curve y=f(x) between x=a and x=b Posted Date...

find area uder the curve y=f(x) between x=a and x=b Posted Date: 9/1/2012 1:50:09 AM

What is encapsulation technique, Hiding data within the class and making it...

Hiding data within the class and making it available only by the methods. This method is used to protect your class against accidental changes to fields, which might leave the clas

What are the cycle based simulators, What are the Cycle based simulators ...

What are the Cycle based simulators Cycle based simulators are more like a high speed electric carving knife in comparison since they focus on a subset of the biggest problem:

What is a piconet in a bluetooth context, Problem: (a) IEEE802.11 supp...

Problem: (a) IEEE802.11 supports two types of network architecture, describe these architectures with the support of diagrams detailing the network components. (b) The MAC

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd