Evaluating the low-fidelity prototypes

Assignment Help Software Engineering
Reference no: EM132913194

Task-Centered Design and Prototyping

This assignment is designed to develop your ability to perform comprehensive task-centered design and prototyping. You will begin your iterative design of a particular system of your choice using task- centered system design and low-fidelity prototyping methods. The goal is to give you experience at

• identifying and developing suitable task descriptions for a domain of interest.
• moving from the developed task descriptions towards the important system requirements.
• brainstorming and formulating the pros and cons of different design alternatives through the use of low-fidelity prototypes.
• evaluating the low-fidelity prototypes using task-centered walkthroughs.
Before starting, do the required readings to familiarize yourself with the tasks that you need to perform.

Section 1: Tasks and Requirements

Length: about 10 pages (~2500 words) in Times New Roman 12-point font

Weight: 50% of the assignment mark evenly distributed among the four parts of Section 1

1. Introduction. Include a full description of the items below:
• Background
• Expected types of users of the system
• Work contexts-a description the work setting
• What the system will be used for
• System constraints

2. Concrete task examples. You will list at least five to seven concrete task examples. The task descriptions should follow the structure of the example provided on page 9 of the first reference introduced above, Working through Task-Centered System Design (Greenberg, 2003).

3. Tentative list of requirements. From the task examples, extract the major system requirements and prioritize them by a) absolutely must include, b) should include, c) could include, and d) exclude. Each category should be accompanied by a discussion of why items were placed in that category.

4. A concluding recommendation. This will include your recommendation to the vice president on how to proceed with the development of the product and also your perception of the major barriers you anticipate in the development process.

Section 2: First Prototype and Walkthrough

Length: an annotated design + about 5 pages (~1250 words) in Times New Roman 12-point font
Weight: 50% of the assignment mark evenly distributed between the two parts of Section 2

1. Prototype (storyboard or sketch). Develop several low-fidelity prototypes of designs that you believe will satisfy the major requirements (at least one for each requirement).
2. Walkthrough. For each of these prototype designs, use the tasks from Section 1 to perform a task-centered walkthrough of your prototypes. Based on the walkthroughs, identify the problems and successes for each task in that prototype. In essay form, summarize the major design problems that must be corrected, as well as what seems to work well. This will need to be based on the structure of the example provided on page 10 of Working through Task- Centered System Design (Greenberg, 2003).

Method
Step 1. Generate a list of expected users and an initial list of tasks. In this step, you interview knowledgeable people about their real-world tasks and observe them doing those tasks. Your goal is to generate an initial list of concrete task descriptions. If you do not have access to the appropriate people to interview for the application that you have selected, you will need to hypothesize about the possible users of the system and their initial list of tasks.

Step 2. Validate the tasks. The next step is to get a reality check of your task list. Have end users and/or client representatives review your tasks. You want them to tell you if the set of people is representative of potential end users of your product, if the tasks capture the variations of those done by real people, and if the details are realistic. As for step 1, if you do not have access to real end users, you will need to share the list of tasks that you have developed with a friend or colleague along with the description of the system. That person will then provide you with feedback on what she thinks is missing or unaligned with her opinion. Revise your work until you reach a satisfactory task list.

Step 3. Decide upon key users and a tentative list of requirements. The task examples will provide clues to specific system requirements that you need to include in your system design as well as who your target users will be. Because it is unrealistic to meet all requirements and address all users, it is your job to prioritize them and justify your decision with a clear rationale of why some requirements have higher priority than others.

Step 4. Develop low-fidelity prototypes. From the task examples and requirements, sketch out several competing interfaces. Discuss and choose the most promising of these, and develop a horizontal low-fidelity prototype (using storyboards or sketch methodology). Detailed information on how to develop storyboards or sketch prototypes is provided in the second required reading, Storyboards and Sketch Prototypes for Rapid Interface Visualization (Curtis & Vertelney, 1990).

Step 5. Perform a task-centered walkthrough. Evaluate your prototype for usability bugs by performing a task-centered walkthrough.

Step 6. Summarize and develop the report. Summarize all of the experience that you have gained in developing the prototypes in a two-part report, one for each section as explained above under the Deliverables heading.

Attachment:- Design and Prototyping.rar

Reference no: EM132913194

Questions Cloud

What are some of strategies or supports : What are some of the strategies or supports that can be put in place to support motor development in young children?
Create social skills interventions brochure : Create a social skills interventions brochure to distribute to stakeholders at your professional development session.
What are the critical success factors for big data analytics : What are the critical success factors for Big Data analytics? What is Big Data? Why is it important? Where does Big Data come from?
Is there enough consideration of analysis results : Is there enough consideration of the analysis results? Do you consider the significance and implication of the findings that have become clear through report.
Evaluating the low-fidelity prototypes : identifying and developing suitable task descriptions for a domain of interest and moving from the developed task descriptions towards the important system
How other governments or government agencies are using model : How other governments or government agencies are using models in their missions? How models and their solutions are used by the U.S
How prescriptive analytics relate to descriptive analytics : What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?
What business context would be appropriate to use : Research various methods of communication that are commonly used in business, What business context would be appropriate to use each communication method?
Risk and protective factors for children of divorce : Discuss some of the risk and protective factors for children of divorce. In addition, state what parents can do in order to minimize the negative effects

Reviews

Write a Review

Software Engineering Questions & Answers

  Grassroots computing changes way software is designed

Describe how grassroots computing changes the way software is designed, developed, tested, and maintained in typical organization. Write dwon the advantages and disadvantages of grassroots computing?

  Develop user acceptance tests for the review

Develop User Acceptance Tests for the Review Content Query use case text description and create bug reports for any bugs you have identified in your executed tests.

  Design er diagram for doctors prescribe drugs for patients

Design an E/R diagram for the following situation: Doctors prescribe drugs for patients. A given doctor can prescribe many drugs for a certain patient.

  Write article review papers on access control

You will write three 750-word article review papers in current APA format that focus on security engineering.

  Effective communication practice in organisations

ITECH 5500 - Professional Research and Communication Utilise effective communication practice in organisations and demonstrate expert English language skills in academic and professional contexts.

  Companies don''t focus on cyber security like they should

Companies don't focus on cyber security like they should

  A system for each design pattern containing

An example of a system for each design pattern containing the following information a.       Description of the system b.      The purpose of the system

  Explain quality management planning

Explain quality management planning. Explain quality and its importance to project success.

  Introduction to the theory of computation

The language define through the equality of two 2DIM-DFA machines on all inputs is un-decidable. The full definition of 2DIM-DFA can be discovered in Sipser's Introduction to the Theory of Computation.

  Design and development phases of software development

Discuss efforts that can be done at design and development phases of software development which pay dividends later in software maintenance, that is, improve the ability to maintain.

  Perform big data query manipulation

Perform big data query manipulation, evaluate various data storage option and type of aggregated data modelling - Carry out research on emerging Big Data

  Explain why is the cost of maintaining a system frequently

q1. name three key factors to consider when planning for system maintenance. do most health care systems actively plan

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd