0
Heuristic Evaluation Tutorial
Heuristic Evaluation <ul><li>Goal: Identifying usability problems in existing systems </li></ul><ul><li>Checking complianc...
Heuristic Evaluation <ul><li>The scope is limited to scenarios  </li></ul><ul><li>You can go through the interface several...
IT security management (ITSM) tools <ul><li>IT security management tools are components in the design, development, and ma...
Example ITSM Tool <ul><li>Firewall as a running example </li></ul><ul><li>Filtering packet based on certain characteristic...
HEURISTICS
1 - Visibility of system status <ul><li>The system should always keep users informed about what is going on, through appro...
1 - Visibility of system status : example Firewall rules: Block all connections to the range(192.168.0.1 - 192.168.0.255) ...
2 - Match between system and the real world  <ul><li>The system should speak the users' language, with words, phrases and ...
2 - Match between system and the real world : example Firewall rules: eth0 inbound on port 22 block eth 0 eth 1 Security A...
3 - User control and freedom  <ul><li>Users often choose system functions by mistake and will need a clearly marked &quot;...
3 - User control and freedom : example Firewall rules: A X B X C X Firewall
4 - Consistency and standards  <ul><li>Users should not have to wonder whether different words, situations, or actions mea...
4 - Consistency and standards : example Firewall rules file: eth0 inbound … block Block all incoming connections on eth 0 ...
5 - Error prevention  <ul><li>Even better than good error messages is a careful design which prevents a problem from occur...
5 - Error prevention : example  Firewall rules: Block all connections on port 22  Allow connections on port 22 for subnetw...
6 - Recognition rather than recall  <ul><li>Minimize the user's memory load by making objects, actions, and options visibl...
6 - Recognition rather than recall : example Firewall  Security Admin Write the rule in the following text box: Write the ...
7 - Flexibility and efficiency of use <ul><li>Accelerators -- unseen by the novice user -- may often speed up the interact...
7 - Flexibility and efficiency of use : example Security Admin Write the rule in the following text box: Write the rule in...
8 - Aesthetic and minimalist design  <ul><li>Dialogues should not contain information which is irrelevant or rarely needed...
8 - Aesthetic and minimalist design : example Security Admin
9 - Help users recognize, diagnose, and recover from errors  <ul><li>Error messages should be expressed in plain language ...
9 - Help users recognize, diagnose, and recover from errors : example  Allow connections on port 22 for subnetwork1 <ul><l...
10 - Help and documentation  <ul><li>Even though it is better if the system can be used without documentation, it may be n...
10 - Help and documentation : example Write the rule in the following: interface From To Port ? Security admin Firewall Fi...
IDENTITY MANAGEMENT SYSTEM  <ul><li>The target system for heuristic evaluation </li></ul>
Identity management system Neteauto Sales rep.  Source: Identity Lifecycle Management Flash Demo (http://www.ca.com/us/ide...
Identity management system Sales rep.  VP Sales Security admin Previous sales reports IdM System
Identity management system Certification Process Notification IdM System VP Sales Security admin Employees
<ul><li>System Demo </li></ul>
Upcoming SlideShare
Loading in...5
×

Trainingnielsenf 100802185639-phpapp01

272

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
272
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Trainingnielsenf 100802185639-phpapp01"

  1. 1. Heuristic Evaluation Tutorial
  2. 2. Heuristic Evaluation <ul><li>Goal: Identifying usability problems in existing systems </li></ul><ul><li>Checking compliance with a set of usability principles </li></ul><ul><li>Performed individually </li></ul><ul><li>Results will be aggregated </li></ul>
  3. 3. Heuristic Evaluation <ul><li>The scope is limited to scenarios </li></ul><ul><li>You can go through the interface several times </li></ul><ul><li>You should specify: </li></ul><ul><ul><li>The problem </li></ul></ul><ul><ul><li>The task </li></ul></ul><ul><ul><li>The heuristic(s) </li></ul></ul>
  4. 4. IT security management (ITSM) tools <ul><li>IT security management tools are components in the design, development, and maintenance of a secure information technology infrastructure. </li></ul><ul><ul><li>Examples: network firewall, intrusion detection system, identity and access management system </li></ul></ul><ul><li>Characteristics of the ITSM environment </li></ul><ul><ul><li>Complex, collaborative, people with different backgrounds </li></ul></ul>
  5. 5. Example ITSM Tool <ul><li>Firewall as a running example </li></ul><ul><li>Filtering packet based on certain characteristics </li></ul><ul><li>Firewall use rules for this purpose </li></ul><ul><ul><li>E.g. block every connection from 123.123.100.100 </li></ul></ul>
  6. 6. HEURISTICS
  7. 7. 1 - Visibility of system status <ul><li>The system should always keep users informed about what is going on, through appropriate feedback within reasonable time. </li></ul>
  8. 8. 1 - Visibility of system status : example Firewall rules: Block all connections to the range(192.168.0.1 - 192.168.0.255) Allow connections to 192.168.0.1 port 22 Firewall Security Admin
  9. 9. 2 - Match between system and the real world <ul><li>The system should speak the users' language, with words, phrases and concepts familiar to the user, rather than system-oriented terms. It should follow real-world conventions, making information appear in a natural and logical order. </li></ul>
  10. 10. 2 - Match between system and the real world : example Firewall rules: eth0 inbound on port 22 block eth 0 eth 1 Security Admin
  11. 11. 3 - User control and freedom <ul><li>Users often choose system functions by mistake and will need a clearly marked &quot;emergency exit&quot; to leave the unwanted state without having to go through an extended dialogue. Support undo and redo. </li></ul>
  12. 12. 3 - User control and freedom : example Firewall rules: A X B X C X Firewall
  13. 13. 4 - Consistency and standards <ul><li>Users should not have to wonder whether different words, situations, or actions mean the same thing. Follow platform conventions and terminology which are familiar to the user. </li></ul>
  14. 14. 4 - Consistency and standards : example Firewall rules file: eth0 inbound … block Block all incoming connections on eth 0 Block all incoming connections on eth 1 Block all incoming connections on eth 2 … Firewall UI: Firewall Security Admin
  15. 15. 5 - Error prevention <ul><li>Even better than good error messages is a careful design which prevents a problem from occurring in the first place. Either eliminate error-prone conditions or check for them and present users with a confirmation option before they commit to the action. </li></ul>
  16. 16. 5 - Error prevention : example Firewall rules: Block all connections on port 22 Allow connections on port 22 for subnetwork1 Are you sure … ? Security Admin
  17. 17. 6 - Recognition rather than recall <ul><li>Minimize the user's memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate. </li></ul>
  18. 18. 6 - Recognition rather than recall : example Firewall Security Admin Write the rule in the following text box: Write the rule in the following: interface From To Port
  19. 19. 7 - Flexibility and efficiency of use <ul><li>Accelerators -- unseen by the novice user -- may often speed up the interaction for the expert user such that the system can cater to both inexperienced and experienced users. Allow users to tailor frequent actions. </li></ul>
  20. 20. 7 - Flexibility and efficiency of use : example Security Admin Write the rule in the following text box: Write the rule in the following: interface From To Port
  21. 21. 8 - Aesthetic and minimalist design <ul><li>Dialogues should not contain information which is irrelevant or rarely needed. Every extra unit of information in a dialogue competes with the relevant units of information and diminishes their relative visibility. </li></ul>
  22. 22. 8 - Aesthetic and minimalist design : example Security Admin
  23. 23. 9 - Help users recognize, diagnose, and recover from errors <ul><li>Error messages should be expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution. </li></ul>
  24. 24. 9 - Help users recognize, diagnose, and recover from errors : example Allow connections on port 22 for subnetwork1 <ul><li>Error </li></ul><ul><li>Error 22 </li></ul><ul><li>Error – rule can’t be added </li></ul><ul><li>Error – Rule is in conflict with the rule number 34 </li></ul><ul><li>Error – The port number is not valid </li></ul><ul><li>Error – The port number should between 1~1024 </li></ul>Firewall Security Admin
  25. 25. 10 - Help and documentation <ul><li>Even though it is better if the system can be used without documentation, it may be necessary to provide help and documentation. Any such information should be easy to search, focused on the user's task, list concrete steps to be carried out, and not be too large. </li></ul>
  26. 26. 10 - Help and documentation : example Write the rule in the following: interface From To Port ? Security admin Firewall Firewall UI Write the rule in the following text box:
  27. 27. IDENTITY MANAGEMENT SYSTEM <ul><li>The target system for heuristic evaluation </li></ul>
  28. 28. Identity management system Neteauto Sales rep. Source: Identity Lifecycle Management Flash Demo (http://www.ca.com/us/identity-management.aspx#documents)
  29. 29. Identity management system Sales rep. VP Sales Security admin Previous sales reports IdM System
  30. 30. Identity management system Certification Process Notification IdM System VP Sales Security admin Employees
  31. 31. <ul><li>System Demo </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×