Process of interaction design, Computer Engineering

Assignment Help:

This unit starts by discussing the importance of involving users in the interaction design process, explaining the reasons why user involvement can be useful, the different degrees of user involvement, and the principles underpinning effective user involvement. In particular, two aspects of user-centred design are considered. Firstly, I discuss the need to base the design upon a detailed understanding of the users, their activities and the environment in which they carry out these activities. Secondly, I consider the need to involve users in the development of interactive products.

The unit then considers the four interaction design activities in more detail: identifying needs and establishing requirements for the user experience; developing alternative designs that meet those requirements; building interactive versions of the designs so that they can be communicated and assessed; and evaluating what is being built through the process and the user experience it offers. These activities were introduced in Unit 1. Some practical issues are then discussed, in particular stakeholder analysis; identifying needs; and generating alternative designs and choosing between these. Various lifecycle models are then described, including the lifecycle model for interaction design which is referred to throughout M364. This lifecycle is based on the four interaction design activities.

It include an extended case study based upon a UK company called Tokairo and the approach it took to designing the interaction for a record-keeping system for lorry drivers. This case study illustrates the main themes in the unit and provides the opportunity to compare the theory with the reality of interaction design.


Related Discussions:- Process of interaction design

Differentiate between compiler and interpreter, (i) Compiler and Interpret...

(i) Compiler and Interpreter: These are two types of language translators. A compiler changes the source program (user-written program) into an object code (machine language b

Explain difference between security and protection, Explain difference betw...

Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

What is monitoring-and-surveillance agents, Q. What is monitoring-and-surve...

Q. What is monitoring-and-surveillance agents? ANSWER: Monitoring-and-surveillance agents or predictive agents are intelligent agents that examine and report on equipment.

Flynn’s classification, Flynn's Classification  This classification was...

Flynn's Classification  This classification was early proposed and studied by Michael Flynn in 1972. Flynn did not believe the machine architecture for organization of parallel

Programming project, l need a help for my project pllz:) Write a program th...

l need a help for my project pllz:) Write a program that will simulate ATM machine. The Program should prompt the user to enter a valid PIN password number of 5 digits (PIN: 12312)

Give an example of resource allocation graph & deadlocked, Suppose there ar...

Suppose there are 2 copies of resource A, 3 copies of resource B, and 3 copies of resource C. Suppose further that process 1 holds one unit of resources B and C and is waiting for

What interprets can a browser contain besides html and http, What interpret...

What interprets can a browser contain besides HTML and HTTP? Besides an HTTP client and an HTML interpreter, a browser can have elements whihc enable the browser to perform any

High level language program characteristics, Q. High Level Language Program...

Q. High Level Language Program Characteristics? So it is clear that new architectures must support high-level language programming. A high-level language system can be implemen

Explain naming convention in arrays, Explanation Arrays in many programm...

Explanation Arrays in many programming-languages generally show a fixed list of values (e.g. a list of lastnames). Though within SQABasic the size for an array can either be fix

Expression for boolean function in standard POSform, Write the expression f...

Write the expression for Boolean function for F (A, B, C) = ∑m (1,4,5,6,7) in standard POS form.                                   Ans: f (A,B,C )= ΣM (1,4,5,6,7) in standard POS

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd