5,336 research outputs found

    ACWW: Adding Automation to the Cognitive Walkthrough for the Web (CWW)

    Get PDF
    The Cognitive Walkthrough for the Web (CWW) is a Usability Evaluation Method that can be used as an approach to evaluate a website. Unfortunately, the original formulation of CWW has been applied by researchers in the area as a set of a semi-manual processes, which have proven to be extremely time-consuming, and as with any semi-manual process, error-prone. This thesis presents a web-based approach to automate CWW, which we call ACWW. The automation of these processes implies, on the one hand, that researchers can reduce the amount of time dedicated to computing the results associated with performing various analyses. On the other hand, it implies that the accuracy of computed results can be improved. ACWW is available from http://autocww.colorado.edu/~brownr/. Finally, ACWW has been mentioned in a paper by Dr. Marilyn Blackmon, a leader in usability research, at the Association for Computing Machinery (ACM) Conference on Human Factors in Computing Systems (CHI) in April of 2005 [Blackmon05]

    The patterning of finance/security : a designerly walkthrough of challenger banking apps

    Get PDF
    Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps

    Usability evaluation of a virtual museum interface

    Get PDF
    The Augmented Representation of Cultural Objects (ARCO) system provides software and interface tools to museum curators to develop virtual museum exhibitions, as well as a virtual environment for museum visitors over the World Wide Web or in informative kiosks. The main purpose of the system is to offer an enhanced educative and entertaining experience to virtual museum visitors. In order to assess the usability of the system, two approaches have been employed: a questionnaire based survey and a Cognitive Walkthrough session. Both approaches employed expert evaluators, such as domain experts and usability experts. The result of this study shows a fair performance of the followed approach, as regards the consumed time, financial and other resources, as a great deal of usability problems has been uncovered and many aspects of the system have been investigated. The knowledge gathered aims at creating a conceptual framework for diagnose usability problems in systems in the area of Virtual Cultural Heritage

    Evaluating the End-User Experience of Private Browsing Mode

    Get PDF
    Nowadays, all major web browsers have a private browsing mode. However, the mode's benefits and limitations are not particularly understood. Through the use of survey studies, prior work has found that most users are either unaware of private browsing or do not use it. Further, those who do use private browsing generally have misconceptions about what protection it provides. However, prior work has not investigated \emph{why} users misunderstand the benefits and limitations of private browsing. In this work, we do so by designing and conducting a three-part study: (1) an analytical approach combining cognitive walkthrough and heuristic evaluation to inspect the user interface of private mode in different browsers; (2) a qualitative, interview-based study to explore users' mental models of private browsing and its security goals; (3) a participatory design study to investigate why existing browser disclosures, the in-browser explanations of private browsing mode, do not communicate the security goals of private browsing to users. Participants critiqued the browser disclosures of three web browsers: Brave, Firefox, and Google Chrome, and then designed new ones. We find that the user interface of private mode in different web browsers violates several well-established design guidelines and heuristics. Further, most participants had incorrect mental models of private browsing, influencing their understanding and usage of private mode. Additionally, we find that existing browser disclosures are not only vague, but also misleading. None of the three studied browser disclosures communicates or explains the primary security goal of private browsing. Drawing from the results of our user study, we extract a set of design recommendations that we encourage browser designers to validate, in order to design more effective and informative browser disclosures related to private mode

    Health Figures: An Open Source JavaScript Library for Health Data Visualization

    Get PDF
    The way we look at data has a great impact on how we can understand it, particularly when the data is related to health and wellness. Due to the increased use of self-tracking devices and the ongoing shift towards preventive medicine, better understanding of our health data is an important part of improving the general welfare of the citizens. Electronic Health Records, self-tracking devices and mobile applications provide a rich variety of data but it often becomes difficult to understand. We implemented the hFigures library inspired on the hGraph visualization with additional improvements. The purpose of the library is to provide a visual representation of the evolution of health measurements in a complete and useful manner. We researched the usefulness and usability of the library by building an application for health data visualization in a health coaching program. We performed a user evaluation with Heuristic Evaluation, Controlled User Testing and Usability Questionnaires. In the Heuristics Evaluation the average response was 6.3 out of 7 points and the Cognitive Walkthrough done by usability experts indicated no design or mismatch errors. In the CSUQ usability test the system obtained an average score of 6.13 out of 7, and in the ASQ usability test the overall satisfaction score was 6.64 out of 7. We developed hFigures, an open source library for visualizing a complete, accurate and normalized graphical representation of health data. The idea is based on the concept of the hGraph but it provides additional key features, including a comparison of multiple health measurements over time. We conducted a usability evaluation of the library as a key component of an application for health and wellness monitoring. The results indicate that the data visualization library was helpful in assisting users in understanding health data and its evolution over time.Comment: BMC Medical Informatics and Decision Making 16.1 (2016

    Interaction design issues for car navigation systems

    Get PDF
    We describe a study on the interaction design of in-car navigation systems. It focused on a commercial product. Critical incident analysis was performed based on natural use of the system by a usability analyst. A cognitive walkthrough was then performed based on actual scenarios from the natural use. This is a non-classic application of cognitive walkthrough. It allowed anecdotal critical incidents to be theoretically grounded. We draw conclusions about the interaction design of car navigation systems

    Records management capacity and compliance toolkits : a critical assessment.

    Get PDF
    This article seeks to present the results of a project that critically evaluated a series of toolkits for assessing records management capacity and/or compliance. These toolkits have been developed in different countries and sectors within the context of the e-environment and provide evidence of good corporate and information governance. Design/methodology/approach - A desk-based investigation of the tools was followed by an electronic Delphi with toolkit developers and performance measurement experts to develop a set of evaluation criteria. Different stakeholders then evaluated the toolkits against the criteria using cognitive walkthroughs and expert heuristic reviews. The results and the research process were reviewed via electronic discussion. Findings - Developed by recognised and highly respected organisations, three of the toolkits are software tools, whilst the fourth is a methodology. They are all underpinned by relevant national/international records management legislation, standards and good practice including, either implicitly or explicitly, ISO 15489. They all have strengths, complementing rather than competing with one another. They enable the involvement of other staff, thereby providing an opportunity for raising awareness of the importance of effective records management. Practical implications - These toolkits are potentially very powerful, flexible and of real value to organisations in managing their records. They can be used for a "quick and dirty" assessment of records management capacity or compliance as well as in-depth analysis. The most important criterion for selecting the appropriate one is to match the toolkit with the scenario. Originality/value - This paper aims to raise awareness of the range and nature of records management toolkits and their potential for varied use in practice to support more effective management of records

    Methodological development

    Get PDF
    Book description: Human-Computer Interaction draws on the fields of computer science, psychology, cognitive science, and organisational and social sciences in order to understand how people use and experience interactive technology. Until now, researchers have been forced to return to the individual subjects to learn about research methods and how to adapt them to the particular challenges of HCI. This is the first book to provide a single resource through which a range of commonly used research methods in HCI are introduced. Chapters are authored by internationally leading HCI researchers who use examples from their own work to illustrate how the methods apply in an HCI context. Each chapter also contains key references to help researchers find out more about each method as it has been used in HCI. Topics covered include experimental design, use of eyetracking, qualitative research methods, cognitive modelling, how to develop new methodologies and writing up your research

    The Effect of Walkthrough Observations on Teacher Perspectives in Christian Schools

    Get PDF
    This study investigated the effects on teacher perceptions of frequent, brief classroom observations in Christian schools. Teachers (N=111) responded to 13 belief and value statements prior to and after the term during which administrators conducted weekly, brief, unannounced observations in their classes. Teachers reported significant positive change regarding (a) analyzing reasons for selecting methods to assess learning, (b) being encouraged after class observations, and (c) being encouraged after receiving feedback related to the observations
    corecore