SlideShare a Scribd company logo
1 of 38
Chapter 10
ESTABLISHING REQUIREMENTS
Overview
• The importance of requirements
• Different types of requirements
• Data gathering for requirements
• Data analysis and presentation
• Task description:Scenarios
Use Cases
Essential use cases
• Task analysis: HTA
www.id-book.com 2
What, how and why?
What needs to be achieved?
1. Understand as much as possible about users, task, context
2. Produce a stable set of requirements
How can this be done?
• Data gathering activities
• Data analysis activities
• Expression as ‘requirements’
• All of this is iterative
www.id-book.com 3
What, how and why?
• Why bother?
Requirements
definition is the
stage where
failure occurs
most
commonly
Getting requirements right is crucial
www.id-book.com 4
Establishing requirements
• What do users want? What do users ‘need’?
Requirements need clarification, refinement, completion,
re-scoping
Input: Requirements document (maybe)
Output: stable requirements
• Why ‘establish’?
Requirements arise from understanding users’ needs
Requirements can be justified & related to data
www.id-book.com 5
Volere shell
www.id-book.com 6
Volere requirements template
www.id-book.com 7
Different kinds of requirements
• Functional:
—What the system should do
• (Non-functional: security, response time...)
• Data:
—What kinds of data need to be stored?
—How will they be stored (e.g. database)?
www.id-book.com 8
Different kinds of requirements
Environment or context of use:
• physical: dusty? noisy? vibration? light? heat?
humidity? …. (e.g. ATM)
• social: sharing of files, of displays, in paper, across
great distances, synchronous, privacy for clients
• organisational: hierarchy, IT department’s attitude
and remit, user support, communications structure
and infrastructure, availability of training
www.id-book.com 9
Underwater computing
www.id-book.com 10
Underwater computing
www.id-book.com 11
Different kinds of requirements
Users: Who are they?
— Characteristics: nationality, educational background,
attitude to computers
— System use: novice, expert, casual, frequent
— Novice: prompted, constrained, clear
— Expert: flexibility, access/power
— Frequent: short cuts
— Casual/infrequent: clear menu paths
www.id-book.com 12
What are the users’ capabilities?
Humans vary in many dimensions:
— size of hands may affect the size and positioning of input buttons
— motor abilities may affect the suitability of certain input and output
devices
— height if designing a physical kiosk
— strength - a child’s toy requires little strength to operate, but
greater strength to change batteries
— disabilities (e.g. sight, hearing, dexterity)
www.id-book.com 13
Personas
• Capture a set of user characteristics (user profile)
• Not real people, but synthesised from real users
• Should not be idealised
• Bring them to life with a name, characteristics,
goals, personal background
• Develop a small set of personas with one primary
www.id-book.com 14
Example Persona
www.id-book.com 15
Data gathering for requirements
• Interviews:
— Props, e.g. sample scenarios of use,
prototypes, can be used in interviews
— Good for exploring issues
— Development team members can connect with stakeholders
• Focus groups:
— Group interviews
— Good at gaining a consensus view and/or highlighting areas of
conflict
— But can be dominated by individuals
www.id-book.com 16
Data gathering for requirements
• Questionnaires:
— Often used in conjunction with other
techniques
— Can give quantitative or qualitative data
— Good for answering specific questions from
a large, dispersed group of people
• Researching similar products:
— Good for prompting requirements
www.id-book.com 17
Data gathering for requirements
• Direct observation:
— Gain insights into stakeholders’ tasks
— Good for understanding the nature and
context of the tasks
— But, it requires time and commitment
from a member of the design team, and
it can result in a huge amount of data
• Indirect observation:
— Not often used in requirements activity
— Good for logging current tasks
www.id-book.com 18
Data gathering for requirements
Studying documentation:
— Procedures and rules are often written
down in manuals
— Good source of data about the steps
involved in an activity, and any
regulations governing a task
— Not to be used in isolation
— Good for understanding legislation, and
getting background information
— No stakeholder time, which is a limiting
factor on the other techniques
www.id-book.com 19
Some examples
Cultural probes
www.id-book.com 20
Some examples
Ethnographic study, interviews, usability tests, and user
participation
www.id-book.com 21
Contextual Inquiry
• An approach to ethnographic study where user is expert,
designer is apprentice
• A form of interview, but
— at users’ workplace (workstation)
— 2 to 3 hours long
• Four main principles:
— Context: see workplace & what happens
— Partnership: user and developer collaborate
— Interpretation: observations interpreted by user and developer
together
— Focus: project focus to understand what to look for
www.id-book.com 22
Considerations for data gathering (1)
• Identifying and involving stakeholders:
users, managers, developers, customer reps?, union reps?,
shareholders?
• Involving stakeholders: workshops, interviews, workplace
studies, co-opt stakeholders onto the development team
• ‘Real’ users, not managers
• Political problems within the organisation
• Dominance of certain stakeholders
• Economic and business environment changes
• Balancing functional and usability demands
www.id-book.com 23
Considerations for data gathering (2)
• Requirements management: version control, ownership
• Communication between parties:
— within development team
— with customer/user
— between users… different parts of an organisation
use different terminology
• Domain knowledge distributed and implicit:
— difficult to dig up and understand
— knowledge articulation: how do you walk?
• Availability of key people
www.id-book.com 24
Data gathering guidelines
• Focus on identifying the stakeholders’ needs
• Involve all the stakeholder groups
• Involve more than one representative from
each stakeholder group
• Use a combination of data gathering
techniques
• Support the process with props such as
prototypes and task descriptions
www.id-book.com 25
Data interpretation and analysis
• Start soon after data gathering session
• Initial interpretation before deeper analysis
• Different approaches emphasize different
elements e.g. class diagrams for object-
oriented systems, entity-relationship
diagrams for data intensive systems
www.id-book.com 26
Task descriptions
• Scenarios
― an informal narrative story, simple, ‘natural’,
personal, not generalisable
• Use cases
— assume interaction with a system
— assume detailed understanding of the interaction
• Essential use cases
— abstract away from the details
— does not have the same assumptions as use cases
www.id-book.com 27
Scenario for travel organizer
“The Thomson family enjoy outdoor activities and want to try their hand at
sailing this year. There are four family members: Sky (10 years old),
Eamonn (15 years old), Claire (35), and Will (40). One evening after dinner
they decide to start exploring the possibilities. They all gather around the
travel organizer and enter their initial set of requirements – a sailing trip for
four novices in the Mediterranean. The console is designed so that all
members of the family can interact easily and comfortably with it. The
system’s initial suggestion is a flotilla, where several crews (with various
levels of experience) sail together on separate boats. Sky and Eamonn
aren’t very happy at the idea of going on vacation with a group of other
people, even though the Thomsons would have their own boat. The travel
organizer shows them descriptions of flotillas from other children their ages
and they are all very positive, so eventually, everyone agrees to explore
flotilla opportunities. Will confirms this recommendation and asks for detailed
options. As it’s getting late, he asks for the details to be saved so everyone
can consider them tomorrow. The travel organizer emails them a summary
of the different options available.”
www.id-book.com 28
Scenarios and Personas
www.id-book.com 29
Use case for travel organizer
1. The system displays options for investigating visa and vaccination
requirements.
2. The user chooses the option to find out about visa requirements.
3. The system prompts user for the name of the destination country.
4. The user enters the country’s name.
5. The system checks that the country is valid.
6. The system prompts the user for her nationality.
7. The user enters her nationality.
8. The system checks the visa requirements of the entered country for a
passport holder of her nationality.
9. The system displays the visa requirements.
10. The system displays the option to print out the visa requirements.
11. The user chooses to print the requirements.
www.id-book.com 30
Alternative courses for travel organizer
Some alternative courses:
6. If the country name is invalid:
6.1 The system displays an error message.
6.2 The system returns to step 3.
8. If the nationality is invalid:
8.1 The system displays an error message.
8.2 The system returns to step 6.
9. If no information about visa requirements is found:
9.1 The system displays a suitable message.
9.2 The system returns to step 1.
www.id-book.com 31
Example use case diagram for travel organizer
www.id-book.com 32
Example essential use case for travel organizer
retrieve Visa
USER INTENTION SYSTEM RESPONSIBILITY
find visa requirements request destination and
nationality
supply required information
obtain appropriate visa info
obtain copy of visa info
offer info in different formats
choose suitable format
provide info in chosen format
www.id-book.com 33
Task analysis
• Task descriptions are often used to envision new systems or
devices
• Task analysis is used mainly to investigate an existing
situation
• It is important not to focus on superficial activities
– What are people trying to achieve?
– Why are they trying to achieve it?
– How are they going about it?
• Many techniques, the most popular is Hierarchical Task
Analysis (HTA)
www.id-book.com 34
Hierarchical Task Analysis
• Involves breaking a task down into subtasks, then sub-
sub-tasks and so on. These are grouped as plans which
specify how the tasks might be performed in practice
• HTA focuses on physical and observable actions, and
includes looking at actions not related to software or an
interaction device
• Start with a user goal which is examined and the main
tasks for achieving it are identified
• Tasks are sub-divided into sub-tasks
www.id-book.com 35
Example Hierarchical Task Analysis
0. In order to buy a DVD
1. locate DVD
2. add DVD to shopping basket
3. enter payment details
4. complete address
5. confirm order
plan 0: If regular user do 1-2-5.
If new user do 1-2-3-4-5.
www.id-book.com 36
Example Hierarchical Task Analysis
(graphical)
www.id-book.com 37
Summary
• Getting requirements right is crucial
• There are different kinds of requirement, each is
significant for interaction design
• The most commonly-used techniques for data
gathering are: questionnaires, interviews, focus
groups, direct observation, studying documentation
and researching similar products
• Scenarios, use cases and essential use cases can be
used to articulate existing and envisioned work
practices.
• Task analysis techniques such as HTA help to
investigate existing systems and practices
www.id-book.com 38

More Related Content

Viewers also liked

IWP&DC EEP small hydro
IWP&DC EEP small hydroIWP&DC EEP small hydro
IWP&DC EEP small hydroWim Jonker Klunne
 
Caterva Presentation Public
Caterva Presentation PublicCaterva Presentation Public
Caterva Presentation PublicMarkus Brehler
 
RBI Banking Insurance Services PPT
RBI Banking Insurance Services PPTRBI Banking Insurance Services PPT
RBI Banking Insurance Services PPTMayank Garg
 
El amante liberal. 419
El amante liberal. 419El amante liberal. 419
El amante liberal. 419maravillas1
 
Exponential Government
Exponential GovernmentExponential Government
Exponential GovernmentDustin Haisler
 
La gitanilla
La gitanillaLa gitanilla
La gitanillayassinaitona
 
CIS375 Interaction Designs Chapter12
CIS375 Interaction Designs Chapter12CIS375 Interaction Designs Chapter12
CIS375 Interaction Designs Chapter12Dr. Ahmed Al Zaidy
 
INTRODUCTION OF GAME DESIGN AND DEVELOPMENT
INTRODUCTION OF GAME DESIGN AND DEVELOPMENTINTRODUCTION OF GAME DESIGN AND DEVELOPMENT
INTRODUCTION OF GAME DESIGN AND DEVELOPMENTLaili Farhana M.I.
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game DevelopmentShaan Alam
 
Introduction to HTML5 game development (with Phaser)
Introduction to HTML5 game development (with Phaser)Introduction to HTML5 game development (with Phaser)
Introduction to HTML5 game development (with Phaser)Valerio Riva
 
Skills You Need to Be a Video Game Developer
Skills You Need to Be a Video Game DeveloperSkills You Need to Be a Video Game Developer
Skills You Need to Be a Video Game DeveloperMSBCollege
 
CIS110 Computer Programming Design Chapter (7)
CIS110 Computer Programming Design Chapter  (7)CIS110 Computer Programming Design Chapter  (7)
CIS110 Computer Programming Design Chapter (7)Dr. Ahmed Al Zaidy
 
CIS110 Computer Programming Design Chapter (13)
CIS110 Computer Programming Design Chapter  (13)CIS110 Computer Programming Design Chapter  (13)
CIS110 Computer Programming Design Chapter (13)Dr. Ahmed Al Zaidy
 
CIS110 Computer Programming Design Chapter (11)
CIS110 Computer Programming Design Chapter  (11)CIS110 Computer Programming Design Chapter  (11)
CIS110 Computer Programming Design Chapter (11)Dr. Ahmed Al Zaidy
 
CIS110 Computer Programming Design Chapter (14)
CIS110 Computer Programming Design Chapter  (14)CIS110 Computer Programming Design Chapter  (14)
CIS110 Computer Programming Design Chapter (14)Dr. Ahmed Al Zaidy
 

Viewers also liked (17)

AACA.PDF
AACA.PDFAACA.PDF
AACA.PDF
 
IWP&DC EEP small hydro
IWP&DC EEP small hydroIWP&DC EEP small hydro
IWP&DC EEP small hydro
 
Caterva Presentation Public
Caterva Presentation PublicCaterva Presentation Public
Caterva Presentation Public
 
RBI Banking Insurance Services PPT
RBI Banking Insurance Services PPTRBI Banking Insurance Services PPT
RBI Banking Insurance Services PPT
 
IANUS als fachspezifisches Forschungsdatenzentrum fĂźr die Altertumswissenscha...
IANUS als fachspezifisches Forschungsdatenzentrum fĂźr die Altertumswissenscha...IANUS als fachspezifisches Forschungsdatenzentrum fĂźr die Altertumswissenscha...
IANUS als fachspezifisches Forschungsdatenzentrum fĂźr die Altertumswissenscha...
 
El amante liberal. 419
El amante liberal. 419El amante liberal. 419
El amante liberal. 419
 
Exponential Government
Exponential GovernmentExponential Government
Exponential Government
 
La gitanilla
La gitanillaLa gitanilla
La gitanilla
 
CIS375 Interaction Designs Chapter12
CIS375 Interaction Designs Chapter12CIS375 Interaction Designs Chapter12
CIS375 Interaction Designs Chapter12
 
INTRODUCTION OF GAME DESIGN AND DEVELOPMENT
INTRODUCTION OF GAME DESIGN AND DEVELOPMENTINTRODUCTION OF GAME DESIGN AND DEVELOPMENT
INTRODUCTION OF GAME DESIGN AND DEVELOPMENT
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game Development
 
Introduction to HTML5 game development (with Phaser)
Introduction to HTML5 game development (with Phaser)Introduction to HTML5 game development (with Phaser)
Introduction to HTML5 game development (with Phaser)
 
Skills You Need to Be a Video Game Developer
Skills You Need to Be a Video Game DeveloperSkills You Need to Be a Video Game Developer
Skills You Need to Be a Video Game Developer
 
CIS110 Computer Programming Design Chapter (7)
CIS110 Computer Programming Design Chapter  (7)CIS110 Computer Programming Design Chapter  (7)
CIS110 Computer Programming Design Chapter (7)
 
CIS110 Computer Programming Design Chapter (13)
CIS110 Computer Programming Design Chapter  (13)CIS110 Computer Programming Design Chapter  (13)
CIS110 Computer Programming Design Chapter (13)
 
CIS110 Computer Programming Design Chapter (11)
CIS110 Computer Programming Design Chapter  (11)CIS110 Computer Programming Design Chapter  (11)
CIS110 Computer Programming Design Chapter (11)
 
CIS110 Computer Programming Design Chapter (14)
CIS110 Computer Programming Design Chapter  (14)CIS110 Computer Programming Design Chapter  (14)
CIS110 Computer Programming Design Chapter (14)
 

Similar to CIS375 Interaction Designs Chapter10

Usability requirements
Usability requirements Usability requirements
Usability requirements Andres Baravalle
 
User Experience from a Business Perspective
User Experience from a Business PerspectiveUser Experience from a Business Perspective
User Experience from a Business PerspectiveDanny Mittleman
 
Global Redirective Practices: an online workshop for a client
Global Redirective Practices: an online workshop for a clientGlobal Redirective Practices: an online workshop for a client
Global Redirective Practices: an online workshop for a clientSean Connolly
 
information system analysis and design
information system analysis and designinformation system analysis and design
information system analysis and designEndalkachewYazie1
 
CIS375 Interaction Designs Chapter15
CIS375 Interaction Designs Chapter15CIS375 Interaction Designs Chapter15
CIS375 Interaction Designs Chapter15Dr. Ahmed Al Zaidy
 
See to believe: capturing insights using contextual inquiry
See to believe: capturing insights using contextual inquirySee to believe: capturing insights using contextual inquiry
See to believe: capturing insights using contextual inquiryDeirdre Costello
 
Building better prototype
Building better prototypeBuilding better prototype
Building better prototypePriyanka Rana
 
vu-re-lecture-09 engineering requiremen.ppt
vu-re-lecture-09 engineering requiremen.pptvu-re-lecture-09 engineering requiremen.ppt
vu-re-lecture-09 engineering requiremen.pptubaidullah75790
 
CIS375 Interaction Designs Chapter13
CIS375 Interaction Designs Chapter13CIS375 Interaction Designs Chapter13
CIS375 Interaction Designs Chapter13Dr. Ahmed Al Zaidy
 
CBMI 2013 Presentation: User Intentions in Multimedia
CBMI 2013 Presentation: User Intentions in MultimediaCBMI 2013 Presentation: User Intentions in Multimedia
CBMI 2013 Presentation: User Intentions in Multimediadermotte
 
CIS375 Interaction Designs Chapter9
CIS375 Interaction Designs Chapter9CIS375 Interaction Designs Chapter9
CIS375 Interaction Designs Chapter9Dr. Ahmed Al Zaidy
 
Fast & Cheap UX Research
Fast & Cheap UX ResearchFast & Cheap UX Research
Fast & Cheap UX ResearchJodi Bollaert
 
CIS375 Interaction Designs Chapter8
CIS375 Interaction Designs Chapter8CIS375 Interaction Designs Chapter8
CIS375 Interaction Designs Chapter8Dr. Ahmed Al Zaidy
 
AccessU 2018 - Introduction to User Research
AccessU 2018 - Introduction to User ResearchAccessU 2018 - Introduction to User Research
AccessU 2018 - Introduction to User ResearchKate Walser
 
Physical and Online Card Sorts: A Practical Overview and Case Study
Physical and Online Card Sorts: A Practical Overview and Case StudyPhysical and Online Card Sorts: A Practical Overview and Case Study
Physical and Online Card Sorts: A Practical Overview and Case StudyBob Thomas
 
Requirements Engineering for the Humanities
Requirements Engineering for the HumanitiesRequirements Engineering for the Humanities
Requirements Engineering for the HumanitiesShawn Day
 
Summit EU Machine Learning
Summit EU Machine LearningSummit EU Machine Learning
Summit EU Machine LearningMapR Technologies
 
Requirements analysis.pptx
Requirements analysis.pptxRequirements analysis.pptx
Requirements analysis.pptxazida3
 
Requirments Elicitation.pptx
Requirments Elicitation.pptxRequirments Elicitation.pptx
Requirments Elicitation.pptxazida3
 

Similar to CIS375 Interaction Designs Chapter10 (20)

Usability requirements
Usability requirements Usability requirements
Usability requirements
 
User Experience from a Business Perspective
User Experience from a Business PerspectiveUser Experience from a Business Perspective
User Experience from a Business Perspective
 
Know the user
Know the userKnow the user
Know the user
 
Global Redirective Practices: an online workshop for a client
Global Redirective Practices: an online workshop for a clientGlobal Redirective Practices: an online workshop for a client
Global Redirective Practices: an online workshop for a client
 
information system analysis and design
information system analysis and designinformation system analysis and design
information system analysis and design
 
CIS375 Interaction Designs Chapter15
CIS375 Interaction Designs Chapter15CIS375 Interaction Designs Chapter15
CIS375 Interaction Designs Chapter15
 
See to believe: capturing insights using contextual inquiry
See to believe: capturing insights using contextual inquirySee to believe: capturing insights using contextual inquiry
See to believe: capturing insights using contextual inquiry
 
Building better prototype
Building better prototypeBuilding better prototype
Building better prototype
 
vu-re-lecture-09 engineering requiremen.ppt
vu-re-lecture-09 engineering requiremen.pptvu-re-lecture-09 engineering requiremen.ppt
vu-re-lecture-09 engineering requiremen.ppt
 
CIS375 Interaction Designs Chapter13
CIS375 Interaction Designs Chapter13CIS375 Interaction Designs Chapter13
CIS375 Interaction Designs Chapter13
 
CBMI 2013 Presentation: User Intentions in Multimedia
CBMI 2013 Presentation: User Intentions in MultimediaCBMI 2013 Presentation: User Intentions in Multimedia
CBMI 2013 Presentation: User Intentions in Multimedia
 
CIS375 Interaction Designs Chapter9
CIS375 Interaction Designs Chapter9CIS375 Interaction Designs Chapter9
CIS375 Interaction Designs Chapter9
 
Fast & Cheap UX Research
Fast & Cheap UX ResearchFast & Cheap UX Research
Fast & Cheap UX Research
 
CIS375 Interaction Designs Chapter8
CIS375 Interaction Designs Chapter8CIS375 Interaction Designs Chapter8
CIS375 Interaction Designs Chapter8
 
AccessU 2018 - Introduction to User Research
AccessU 2018 - Introduction to User ResearchAccessU 2018 - Introduction to User Research
AccessU 2018 - Introduction to User Research
 
Physical and Online Card Sorts: A Practical Overview and Case Study
Physical and Online Card Sorts: A Practical Overview and Case StudyPhysical and Online Card Sorts: A Practical Overview and Case Study
Physical and Online Card Sorts: A Practical Overview and Case Study
 
Requirements Engineering for the Humanities
Requirements Engineering for the HumanitiesRequirements Engineering for the Humanities
Requirements Engineering for the Humanities
 
Summit EU Machine Learning
Summit EU Machine LearningSummit EU Machine Learning
Summit EU Machine Learning
 
Requirements analysis.pptx
Requirements analysis.pptxRequirements analysis.pptx
Requirements analysis.pptx
 
Requirments Elicitation.pptx
Requirments Elicitation.pptxRequirments Elicitation.pptx
Requirments Elicitation.pptx
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk MitigationDr. Ahmed Al Zaidy
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (20)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

CIS375 Interaction Designs Chapter10

  • 2. Overview • The importance of requirements • Different types of requirements • Data gathering for requirements • Data analysis and presentation • Task description:Scenarios Use Cases Essential use cases • Task analysis: HTA www.id-book.com 2
  • 3. What, how and why? What needs to be achieved? 1. Understand as much as possible about users, task, context 2. Produce a stable set of requirements How can this be done? • Data gathering activities • Data analysis activities • Expression as ‘requirements’ • All of this is iterative www.id-book.com 3
  • 4. What, how and why? • Why bother? Requirements definition is the stage where failure occurs most commonly Getting requirements right is crucial www.id-book.com 4
  • 5. Establishing requirements • What do users want? What do users ‘need’? Requirements need clarification, refinement, completion, re-scoping Input: Requirements document (maybe) Output: stable requirements • Why ‘establish’? Requirements arise from understanding users’ needs Requirements can be justified & related to data www.id-book.com 5
  • 8. Different kinds of requirements • Functional: —What the system should do • (Non-functional: security, response time...) • Data: —What kinds of data need to be stored? —How will they be stored (e.g. database)? www.id-book.com 8
  • 9. Different kinds of requirements Environment or context of use: • physical: dusty? noisy? vibration? light? heat? humidity? …. (e.g. ATM) • social: sharing of files, of displays, in paper, across great distances, synchronous, privacy for clients • organisational: hierarchy, IT department’s attitude and remit, user support, communications structure and infrastructure, availability of training www.id-book.com 9
  • 12. Different kinds of requirements Users: Who are they? — Characteristics: nationality, educational background, attitude to computers — System use: novice, expert, casual, frequent — Novice: prompted, constrained, clear — Expert: flexibility, access/power — Frequent: short cuts — Casual/infrequent: clear menu paths www.id-book.com 12
  • 13. What are the users’ capabilities? Humans vary in many dimensions: — size of hands may affect the size and positioning of input buttons — motor abilities may affect the suitability of certain input and output devices — height if designing a physical kiosk — strength - a child’s toy requires little strength to operate, but greater strength to change batteries — disabilities (e.g. sight, hearing, dexterity) www.id-book.com 13
  • 14. Personas • Capture a set of user characteristics (user profile) • Not real people, but synthesised from real users • Should not be idealised • Bring them to life with a name, characteristics, goals, personal background • Develop a small set of personas with one primary www.id-book.com 14
  • 16. Data gathering for requirements • Interviews: — Props, e.g. sample scenarios of use, prototypes, can be used in interviews — Good for exploring issues — Development team members can connect with stakeholders • Focus groups: — Group interviews — Good at gaining a consensus view and/or highlighting areas of conflict — But can be dominated by individuals www.id-book.com 16
  • 17. Data gathering for requirements • Questionnaires: — Often used in conjunction with other techniques — Can give quantitative or qualitative data — Good for answering specific questions from a large, dispersed group of people • Researching similar products: — Good for prompting requirements www.id-book.com 17
  • 18. Data gathering for requirements • Direct observation: — Gain insights into stakeholders’ tasks — Good for understanding the nature and context of the tasks — But, it requires time and commitment from a member of the design team, and it can result in a huge amount of data • Indirect observation: — Not often used in requirements activity — Good for logging current tasks www.id-book.com 18
  • 19. Data gathering for requirements Studying documentation: — Procedures and rules are often written down in manuals — Good source of data about the steps involved in an activity, and any regulations governing a task — Not to be used in isolation — Good for understanding legislation, and getting background information — No stakeholder time, which is a limiting factor on the other techniques www.id-book.com 19
  • 21. Some examples Ethnographic study, interviews, usability tests, and user participation www.id-book.com 21
  • 22. Contextual Inquiry • An approach to ethnographic study where user is expert, designer is apprentice • A form of interview, but — at users’ workplace (workstation) — 2 to 3 hours long • Four main principles: — Context: see workplace & what happens — Partnership: user and developer collaborate — Interpretation: observations interpreted by user and developer together — Focus: project focus to understand what to look for www.id-book.com 22
  • 23. Considerations for data gathering (1) • Identifying and involving stakeholders: users, managers, developers, customer reps?, union reps?, shareholders? • Involving stakeholders: workshops, interviews, workplace studies, co-opt stakeholders onto the development team • ‘Real’ users, not managers • Political problems within the organisation • Dominance of certain stakeholders • Economic and business environment changes • Balancing functional and usability demands www.id-book.com 23
  • 24. Considerations for data gathering (2) • Requirements management: version control, ownership • Communication between parties: — within development team — with customer/user — between users… different parts of an organisation use different terminology • Domain knowledge distributed and implicit: — difficult to dig up and understand — knowledge articulation: how do you walk? • Availability of key people www.id-book.com 24
  • 25. Data gathering guidelines • Focus on identifying the stakeholders’ needs • Involve all the stakeholder groups • Involve more than one representative from each stakeholder group • Use a combination of data gathering techniques • Support the process with props such as prototypes and task descriptions www.id-book.com 25
  • 26. Data interpretation and analysis • Start soon after data gathering session • Initial interpretation before deeper analysis • Different approaches emphasize different elements e.g. class diagrams for object- oriented systems, entity-relationship diagrams for data intensive systems www.id-book.com 26
  • 27. Task descriptions • Scenarios ― an informal narrative story, simple, ‘natural’, personal, not generalisable • Use cases — assume interaction with a system — assume detailed understanding of the interaction • Essential use cases — abstract away from the details — does not have the same assumptions as use cases www.id-book.com 27
  • 28. Scenario for travel organizer “The Thomson family enjoy outdoor activities and want to try their hand at sailing this year. There are four family members: Sky (10 years old), Eamonn (15 years old), Claire (35), and Will (40). One evening after dinner they decide to start exploring the possibilities. They all gather around the travel organizer and enter their initial set of requirements – a sailing trip for four novices in the Mediterranean. The console is designed so that all members of the family can interact easily and comfortably with it. The system’s initial suggestion is a flotilla, where several crews (with various levels of experience) sail together on separate boats. Sky and Eamonn aren’t very happy at the idea of going on vacation with a group of other people, even though the Thomsons would have their own boat. The travel organizer shows them descriptions of flotillas from other children their ages and they are all very positive, so eventually, everyone agrees to explore flotilla opportunities. Will confirms this recommendation and asks for detailed options. As it’s getting late, he asks for the details to be saved so everyone can consider them tomorrow. The travel organizer emails them a summary of the different options available.” www.id-book.com 28
  • 30. Use case for travel organizer 1. The system displays options for investigating visa and vaccination requirements. 2. The user chooses the option to find out about visa requirements. 3. The system prompts user for the name of the destination country. 4. The user enters the country’s name. 5. The system checks that the country is valid. 6. The system prompts the user for her nationality. 7. The user enters her nationality. 8. The system checks the visa requirements of the entered country for a passport holder of her nationality. 9. The system displays the visa requirements. 10. The system displays the option to print out the visa requirements. 11. The user chooses to print the requirements. www.id-book.com 30
  • 31. Alternative courses for travel organizer Some alternative courses: 6. If the country name is invalid: 6.1 The system displays an error message. 6.2 The system returns to step 3. 8. If the nationality is invalid: 8.1 The system displays an error message. 8.2 The system returns to step 6. 9. If no information about visa requirements is found: 9.1 The system displays a suitable message. 9.2 The system returns to step 1. www.id-book.com 31
  • 32. Example use case diagram for travel organizer www.id-book.com 32
  • 33. Example essential use case for travel organizer retrieve Visa USER INTENTION SYSTEM RESPONSIBILITY find visa requirements request destination and nationality supply required information obtain appropriate visa info obtain copy of visa info offer info in different formats choose suitable format provide info in chosen format www.id-book.com 33
  • 34. Task analysis • Task descriptions are often used to envision new systems or devices • Task analysis is used mainly to investigate an existing situation • It is important not to focus on superficial activities – What are people trying to achieve? – Why are they trying to achieve it? – How are they going about it? • Many techniques, the most popular is Hierarchical Task Analysis (HTA) www.id-book.com 34
  • 35. Hierarchical Task Analysis • Involves breaking a task down into subtasks, then sub- sub-tasks and so on. These are grouped as plans which specify how the tasks might be performed in practice • HTA focuses on physical and observable actions, and includes looking at actions not related to software or an interaction device • Start with a user goal which is examined and the main tasks for achieving it are identified • Tasks are sub-divided into sub-tasks www.id-book.com 35
  • 36. Example Hierarchical Task Analysis 0. In order to buy a DVD 1. locate DVD 2. add DVD to shopping basket 3. enter payment details 4. complete address 5. confirm order plan 0: If regular user do 1-2-5. If new user do 1-2-3-4-5. www.id-book.com 36
  • 37. Example Hierarchical Task Analysis (graphical) www.id-book.com 37
  • 38. Summary • Getting requirements right is crucial • There are different kinds of requirement, each is significant for interaction design • The most commonly-used techniques for data gathering are: questionnaires, interviews, focus groups, direct observation, studying documentation and researching similar products • Scenarios, use cases and essential use cases can be used to articulate existing and envisioned work practices. • Task analysis techniques such as HTA help to investigate existing systems and practices www.id-book.com 38