Process of interaction design, Computer Engineering

Assignment Help:

This unit starts by discussing the importance of involving users in the interaction design process, explaining the reasons why user involvement can be useful, the different degrees of user involvement, and the principles underpinning effective user involvement. In particular, two aspects of user-centred design are considered. Firstly, I discuss the need to base the design upon a detailed understanding of the users, their activities and the environment in which they carry out these activities. Secondly, I consider the need to involve users in the development of interactive products.

The unit then considers the four interaction design activities in more detail: identifying needs and establishing requirements for the user experience; developing alternative designs that meet those requirements; building interactive versions of the designs so that they can be communicated and assessed; and evaluating what is being built through the process and the user experience it offers. These activities were introduced in Unit 1. Some practical issues are then discussed, in particular stakeholder analysis; identifying needs; and generating alternative designs and choosing between these. Various lifecycle models are then described, including the lifecycle model for interaction design which is referred to throughout M364. This lifecycle is based on the four interaction design activities.

It include an extended case study based upon a UK company called Tokairo and the approach it took to designing the interaction for a record-keeping system for lorry drivers. This case study illustrates the main themes in the unit and provides the opportunity to compare the theory with the reality of interaction design.


Related Discussions:- Process of interaction design

Visual basic application, Name the platforms by which visual basic applicat...

Name the platforms by which visual basic applications are available? Ans) Most of the visual basic applications are available on 32 bit Intel platforms. These applications also

Subprogram or procedure level, SubProgram or Procedure Level This level...

SubProgram or Procedure Level This level consists of subroutines, procedures or subprograms. Average grain size is used at this level containing various thousands of instructio

Can a vector have a component equivalent to zero, Q. Can a vector have a co...

Q. Can a vector have a component equivalent to zero and still have a nonzero magnitude? Answer:- Yes For example the 2-dimensional vector (1, 0) has length sqrt (1+0) = 1

What are the features of the hardwired control, What are the features of th...

What are the features of the hardwired control? A controller that uses this approach can function at high speed. It has little flexibility and the complexity of the instruction

Application of connect-4 game, The game Connect-4 is played on a board that...

The game Connect-4 is played on a board that has seven columns. There are six spaces on each column. The board is initially empty. Two players take turns dropping one piece (black

4 variable k-maps, 4-variable K-maps have 16 squares which arearranged in 4...

4-variable K-maps have 16 squares which arearranged in 4 columns and 4 rows.  Columns and rows are labeled with 2 variables. The rows are arranged so that C or D ch

Hypothetical reliable data transfer protocol, the c code for hypothetical r...

the c code for hypothetical reliable data transfer protocol

Explain about flip-flops, Explain about Flip-Flops  Flip-Flops are also...

Explain about Flip-Flops  Flip-Flops are also called bistable multivibrator.  A flip-flop is capable of storing 1 bit of binary data.  It has two stable states- 'one' and 'zero

What is preemptive and nonpreemptive scheduling, What is preemptive and non...

What is preemptive and nonpreemptive scheduling? Under nonpreemptive scheduling once the CPU has been allocated to a process, the process keeps the CPU unless it releases the C

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd