About user-centered systems design and evaluation

Assignment Help Basic Computer Science
Reference no: EM133137173

Throughout this course, you have learned about user-centered systems design and evaluation. Specifically, you have learned how to employ user-centered methodologies in the design of information technology applications and systems, to analyze user problems to inform user-centered design solutions, and to evaluate the design and development of a user-centered system. As user-centered design solutions are implemented, it is critical to consider the ethical impact. Although IT professionals design solutions that focus on user requirements and user needs, a system could have an unethical component that creates long-term problems for users, organizations, and society.

Scenario One: Imagine you are leading user testing for a software system development team of a large organization. Before beginning the user testing, you have users sign a nondisclosure agreement (NDA). At some point in the system development, you discover that one of the users violated the NDA and disclosed information to potential users of the system. You became aware of this after user testing was completed. If you select this scenario, reflect on the following:

• How would you respond, and what would you do?

• How would your decision and actions impact others?

• What have you learned in this course to help you address an ethical dilemma like this?

Scenario Two: Imagine you are a developer for a small start-up, and your project team recently collected user data from surveys. This user data contains first- and last-name information, phone numbers, and geographical information, as well as data on personal preferences and on user behaviors with an interface. A few weeks before your project team launches the system, you receive an email from a colleague you admire. This colleague works for a company you have been thinking about working for. The company is also a competitor of your current company because they share a similar user base. In the email, your colleague asks you to forward the data you gathered. By forwarding the data, you can save your colleague's company time, money, and resources. If you select this scenario, reflect on the following:

• How would you respond, and what would you do?

• Who is responsible for the data and protecting its privacy?

• What impact would you have on your current organization and on the surveyed users if you decide to share that information?

Scenario Three: Imagine you are a UX designer for a new augmented reality (AR) medical system. You love the innovative design that the interface offers to users, but there is a problem with its accessibility. Doctors, nurses, other medical staff, and patients need to use the system. Currently, the AR that you and your team developed is not usable by those who have vision or hearing disabilities. Another developer on your project team claims that the system is ready to be released on the market and sold to hospitals. If you select this scenario, reflect on the following:

• How would you respond, and what would you do?

• Is the technology ready to be released on the market?

• How much consideration should you and your company give to the AR user experience for those users who may have a disability?

In your responses to your peers, explain why you agree or disagree with their responses and support your position using ethical principles.

Reference no: EM133137173

Questions Cloud

Prepare the required journal entries for the transactions : January 01, reacquired and cancelled 25,000 Class B Common Shares at $7.00 per share. Prepare the required journal entries for the transactions
Digital investigative project : You now have an idea as to how to conduct a digital investigative project.
Prepare journal entries to record each transaction : Global Marine obtained a charter from the state in January that authorized 1,000,000 shares of common stock, Prepare journal entries to record each transaction
Project management network business plan class reflection : Discuss your experience in creating your Network Business Plan. What challenges did your group face creating your network? How did you solve them?
About user-centered systems design and evaluation : Throughout this course, you have learned about user-centered systems design and evaluation. How would you respond, and what would you do?
Business liability insurance and asset replacement insurance : Imagine you work for an organization that has business liability insurance, asset replacement insurance, and natural disaster insurance.
What amount of the foregoing items should be included : What amount of the foregoing items should be included in the determination of Mill's net income or loss for the six-month interim period ended June 30, 2021
Prepare journal entry to record purchase of the inventory : Prepare the journal entry to record the purchase of the inventory. b) Prepare the journal entry for any adjustments required at year end
Develop theoretical framework : The purpose of the theoretical framework is to tie the dissertation together. As the researcher, you should approach the proposed research from a theory or set

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Empowering organization to achieve its ultimate vision

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision.

  Best practices for internetnetwork security

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages with a minimum of 10 references regarding the topic: Best practices for internet/network security.

  Base on economical analysis

If a union demands and wins a wage increase in an unionized company, what are the chances (base on economical analysis) there will be a total wage bill increase

  Diverse population can be incredibly difficult

Building a user interface that meets the needs of a diverse population can be incredibly difficult.

  The application of data to problem

In the modern era, there are few professions that do not to some extent rely on data. Stockbrokers rely on market data to advise clients on financial matters.

  Essential in cryptography

What are the different uses of these tools besides cryptography? How do they work?

  Write the control break code in the main function

Save this source code file in a directory of your choice and then make that directory your working directory.

  Calculate the corresponding number of bit errors

Consider the STTC in Figure 6.3 when there is only one receive antenna. Assume a transmitted codeword that stays at state zero at all time.

  Advancements in artificial intelligence

Advancements in Artificial Intelligence. Be current. Published within the last few years.

  What is the total size of cache memory

A cache system has 1024 cache line with block size of 1024 bytes. It uses 22-bits TAG and 10-bits 'Ctrl' bits. What is the total size of cache memory in KB unit

  Determine how to diagnose and reseat the ram

Determine how to diagnose and reseat the RAM - Acceptable sources include the textbook, the Bible, and other sources containing an author and publication

  Compute the consumer surplus and producer surplus

Compute the consumer surplus and producer surplus. Assume the government imposes a price ceiling at P = $40.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd