The document summarizes a heuristic evaluation conducted by Aaron Marcus and Associates (AM+A) on the iCalamity app, which assists people during disasters. The evaluation examined the app's usability, usefulness and appeal. It identified several issues with the initial setup process, application management, and screens. AM+A provided redesign suggestions to improve the layout, colors, typography and navigation. Further user testing is recommended to determine the most effective design changes.
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docxedgar6wallace88877
Simulation Modelling Practice and Theory 47 (2014) 28–45
Contents lists available at ScienceDirect
Simulation Modelling Practice and Theory
j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / s i m p a t
Insight Maker: A general-purpose tool for web-based modeling
& simulation
http://dx.doi.org/10.1016/j.simpat.2014.03.013
1569-190X/� 2014 The Author. Published by Elsevier B.V.
This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/3.0/).
E-mail address: [email protected]
1 The exact search query used was ‘’’modeling tool’’ OR ‘‘simulation tool’’’ in the Topic field.
Scott Fortmann-Roe
University of California, Berkeley, Department of Environmental Science, Policy, and Management, 130 Mulford Hall, Berkeley, CA 94720-3114, United States
a r t i c l e i n f o a b s t r a c t
Article history:
Received 29 April 2013
Received in revised form 23 March 2014
Accepted 26 March 2014
Available online 14 June 2014
Keywords:
Modeling
Simulation
Web-based technologies
System Dynamics
Agent-Based Modeling
A web-based, general-purpose simulation and modeling tool is presented in this paper. The
tool, Insight Maker, has been designed to make modeling and simulation accessible to a
wider audience of users. Insight Maker integrates three general modeling approaches –
System Dynamics, Agent-Based Modeling, and imperative programming – in a unified
modeling framework. The environment provides a graphical model construction interface
that is implemented purely in client-side code that runs on users’ machines. Advanced fea-
tures, such as model scripting and an optimization tool, are also described. Insight Maker,
under development for several years, has gained significant adoption with currently more
than 20,000 registered users. In addition to detailing the tool and its guiding philosophy,
this first paper on Insight Maker describes lessons learned from the development of a com-
plex web-based simulation and modeling tool.
� 2014 The Author. Published by Elsevier B.V. This is an open access article under the CC BY
license (http://creativecommons.org/licenses/by/3.0/).
1. Introduction
The field of modeling and simulation tools is diverse and emergent. General-purpose modeling tools (e.g. MATLAB’s
Simulink or the Modelica language [1]) sit beside highly focused and domain-specific applications (e.g. [2] for modeling
network control systems, [3] for simulating the behavior of wireless network routing protocols, or [4] for the simulation
and control of turbines). Interest in and published works on such tools has grown over time. The ISI Web of Knowledge
reports a substantial growth in papers published on modeling or simulation tools with 299 such papers published in the span
of 1985–1989, 1482 published from 1995 to 1999, and 3727 published from 2005 to 2009.1
For end-users, simulation and modeling tools are generally designed as executables to be run on a consumer operating
system such as W.
ForwardJS 2015: Choosing an Accessible Frameworkgerardkcohen
Starting a new project and selecting from the latest UI frameworks is a challenging experience. How do you know the one you choose is accessible?
Using some basic checks, we review Bootstrap, Foundation, Ionic, and Material Design Lite for some common interactions and patterns including: Forms, Tabs, Dialogs and Toooltips.
Code available at https://github.com/gerardkcohen/choosinga11yuiframework
1.Review news reports from a specific data breach. Choose a breach f.pdfarihantpatna
1.Review news reports from a specific data breach. Choose a breach for which plausable news
reports have identified how the attack occured and have identified the likely attacker. Complete
the following reports.
a. write a thrat agent profile of the likely attacker
b. write an attack scenario for the data breach.
c. write an attack case study about the data breack.
2.based on your answer to tha question above, develop an authentication policy for Alice,
asuming she faces weak authentication threats at home.
3. Review news reports for cyber attacks. identify a cyber attack that relied on masquerade to
succeed. Write an attack case study about that attack. Be sure to explain how the masquerade
was supposed to work and whether or not it succeeded.
Solution
The Attack Surface describes all of the different points where an attacker could get into a system,
and where they could get data out.
The Attack Surface of an application is:
You overlay this model with the different types of users - roles, privilege levels - that can access
the system (whether authorized or not). Complexity increases with the number of different types
of users. But it is important to focus especially on the two extremes: unauthenticated, anonymous
users and highly privileged admin users (e.g. database administrators, system administrators).
Group each type of attack point into buckets based on risk (external-facing or internal-facing),
purpose, implementation, design and technology. You can then count the number of attack points
of each type, then choose some cases for each type, and focus your review/assessment on those
cases.
With this approach, you don\'t need to understand every endpoint in order to understand the
Attack Surface and the potential risk profile of a system. Instead, you can count the different
general type of endpoints and the number of points of each type. With this you can budget what
it will take to assess risk at scale, and you can tell when the risk profile of an application has
significantly changed.
Identifying and Mapping the Attack Surface
You can start building a baseline description of the Attack Surface in a picture and notes. Spend
a few hours reviewing design and architecture documents from an attacker\'s perspective. Read
through the source code and identify different points of entry/exit:
The total number of different attack points can easily add up into the thousands or more. To
make this manageable, break the model into different types based on function, design and
technology:
You also need to identify the valuable data (e.g. confidential, sensitive, regulated) in the
application, by interviewing developers and users of the system, and again by reviewing the
source code.
You can also build up a picture of the Attack Surface by scanning the application. For web apps
you can use a tool like the OWASP_Zed_Attack_Proxy_Project or Arachnior Skipfish or w3af
or one of the many commercial dynamic testing and vulnerability scanning tools or servi.
App Architecture for Efficient Mobile App Development.pdfiDataScientists
In the procedure of developing a mobile app development, you should make sure each component is well-built. Even the minutest complications that may arise in the process of making a mobile app development architecture can challenge the quality of the ending result. Each mobile apps have a reliable mobile app development architecture and successfully runs over its users.
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTcsandit
Cloud computing is gaining prominence and popularity in three important forms: Software as a Service, Platform as a Service, and Infrastructure as a Service. In this paper, we will present
an empirical study of how these cloud-based services were used in an undergraduate Computer Science capstone class to enable agile and effective development, testing, and deployment of sophisticated software systems, facilitate team collaborations among students, and ease the project assessment and grading tasks for teachers. Especially, in this class, students and teachers could leverage time, talent, and resources collaboratively and distributedly on his/her own schedule, from his/her convenient location, and using heterogeneous programming platforms thanks to such a completely All-In-Cloud environment, which eliminated the necessity of spending valuable development time on local setup, configuration, and maintenance, streamlined version control and group management, and greatly increased the collective productivity of student groups. Despite of the relatively steep learning curve in the beginning of the semester, all nine groups of students benefitted tremendously from such an All-In-Cloud experience and eight of them completed their substantial software projects successfully. This paper is concluded with a vision on expandin and standardizing the adoption of the Cloud ecosystem in other Computer Science classes in the future.
Study On User Interface(UI) Attributes Of Web Forms For Better User Experienceiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
More Related Content
Similar to Heuristic Evaluation of iCalamityGuide Application
Simulation Modelling Practice and Theory 47 (2014) 28–45Cont.docxedgar6wallace88877
Simulation Modelling Practice and Theory 47 (2014) 28–45
Contents lists available at ScienceDirect
Simulation Modelling Practice and Theory
j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / s i m p a t
Insight Maker: A general-purpose tool for web-based modeling
& simulation
http://dx.doi.org/10.1016/j.simpat.2014.03.013
1569-190X/� 2014 The Author. Published by Elsevier B.V.
This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/3.0/).
E-mail address: [email protected]
1 The exact search query used was ‘’’modeling tool’’ OR ‘‘simulation tool’’’ in the Topic field.
Scott Fortmann-Roe
University of California, Berkeley, Department of Environmental Science, Policy, and Management, 130 Mulford Hall, Berkeley, CA 94720-3114, United States
a r t i c l e i n f o a b s t r a c t
Article history:
Received 29 April 2013
Received in revised form 23 March 2014
Accepted 26 March 2014
Available online 14 June 2014
Keywords:
Modeling
Simulation
Web-based technologies
System Dynamics
Agent-Based Modeling
A web-based, general-purpose simulation and modeling tool is presented in this paper. The
tool, Insight Maker, has been designed to make modeling and simulation accessible to a
wider audience of users. Insight Maker integrates three general modeling approaches –
System Dynamics, Agent-Based Modeling, and imperative programming – in a unified
modeling framework. The environment provides a graphical model construction interface
that is implemented purely in client-side code that runs on users’ machines. Advanced fea-
tures, such as model scripting and an optimization tool, are also described. Insight Maker,
under development for several years, has gained significant adoption with currently more
than 20,000 registered users. In addition to detailing the tool and its guiding philosophy,
this first paper on Insight Maker describes lessons learned from the development of a com-
plex web-based simulation and modeling tool.
� 2014 The Author. Published by Elsevier B.V. This is an open access article under the CC BY
license (http://creativecommons.org/licenses/by/3.0/).
1. Introduction
The field of modeling and simulation tools is diverse and emergent. General-purpose modeling tools (e.g. MATLAB’s
Simulink or the Modelica language [1]) sit beside highly focused and domain-specific applications (e.g. [2] for modeling
network control systems, [3] for simulating the behavior of wireless network routing protocols, or [4] for the simulation
and control of turbines). Interest in and published works on such tools has grown over time. The ISI Web of Knowledge
reports a substantial growth in papers published on modeling or simulation tools with 299 such papers published in the span
of 1985–1989, 1482 published from 1995 to 1999, and 3727 published from 2005 to 2009.1
For end-users, simulation and modeling tools are generally designed as executables to be run on a consumer operating
system such as W.
ForwardJS 2015: Choosing an Accessible Frameworkgerardkcohen
Starting a new project and selecting from the latest UI frameworks is a challenging experience. How do you know the one you choose is accessible?
Using some basic checks, we review Bootstrap, Foundation, Ionic, and Material Design Lite for some common interactions and patterns including: Forms, Tabs, Dialogs and Toooltips.
Code available at https://github.com/gerardkcohen/choosinga11yuiframework
1.Review news reports from a specific data breach. Choose a breach f.pdfarihantpatna
1.Review news reports from a specific data breach. Choose a breach for which plausable news
reports have identified how the attack occured and have identified the likely attacker. Complete
the following reports.
a. write a thrat agent profile of the likely attacker
b. write an attack scenario for the data breach.
c. write an attack case study about the data breack.
2.based on your answer to tha question above, develop an authentication policy for Alice,
asuming she faces weak authentication threats at home.
3. Review news reports for cyber attacks. identify a cyber attack that relied on masquerade to
succeed. Write an attack case study about that attack. Be sure to explain how the masquerade
was supposed to work and whether or not it succeeded.
Solution
The Attack Surface describes all of the different points where an attacker could get into a system,
and where they could get data out.
The Attack Surface of an application is:
You overlay this model with the different types of users - roles, privilege levels - that can access
the system (whether authorized or not). Complexity increases with the number of different types
of users. But it is important to focus especially on the two extremes: unauthenticated, anonymous
users and highly privileged admin users (e.g. database administrators, system administrators).
Group each type of attack point into buckets based on risk (external-facing or internal-facing),
purpose, implementation, design and technology. You can then count the number of attack points
of each type, then choose some cases for each type, and focus your review/assessment on those
cases.
With this approach, you don\'t need to understand every endpoint in order to understand the
Attack Surface and the potential risk profile of a system. Instead, you can count the different
general type of endpoints and the number of points of each type. With this you can budget what
it will take to assess risk at scale, and you can tell when the risk profile of an application has
significantly changed.
Identifying and Mapping the Attack Surface
You can start building a baseline description of the Attack Surface in a picture and notes. Spend
a few hours reviewing design and architecture documents from an attacker\'s perspective. Read
through the source code and identify different points of entry/exit:
The total number of different attack points can easily add up into the thousands or more. To
make this manageable, break the model into different types based on function, design and
technology:
You also need to identify the valuable data (e.g. confidential, sensitive, regulated) in the
application, by interviewing developers and users of the system, and again by reviewing the
source code.
You can also build up a picture of the Attack Surface by scanning the application. For web apps
you can use a tool like the OWASP_Zed_Attack_Proxy_Project or Arachnior Skipfish or w3af
or one of the many commercial dynamic testing and vulnerability scanning tools or servi.
App Architecture for Efficient Mobile App Development.pdfiDataScientists
In the procedure of developing a mobile app development, you should make sure each component is well-built. Even the minutest complications that may arise in the process of making a mobile app development architecture can challenge the quality of the ending result. Each mobile apps have a reliable mobile app development architecture and successfully runs over its users.
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTcsandit
Cloud computing is gaining prominence and popularity in three important forms: Software as a Service, Platform as a Service, and Infrastructure as a Service. In this paper, we will present
an empirical study of how these cloud-based services were used in an undergraduate Computer Science capstone class to enable agile and effective development, testing, and deployment of sophisticated software systems, facilitate team collaborations among students, and ease the project assessment and grading tasks for teachers. Especially, in this class, students and teachers could leverage time, talent, and resources collaboratively and distributedly on his/her own schedule, from his/her convenient location, and using heterogeneous programming platforms thanks to such a completely All-In-Cloud environment, which eliminated the necessity of spending valuable development time on local setup, configuration, and maintenance, streamlined version control and group management, and greatly increased the collective productivity of student groups. Despite of the relatively steep learning curve in the beginning of the semester, all nine groups of students benefitted tremendously from such an All-In-Cloud experience and eight of them completed their substantial software projects successfully. This paper is concluded with a vision on expandin and standardizing the adoption of the Cloud ecosystem in other Computer Science classes in the future.
Study On User Interface(UI) Attributes Of Web Forms For Better User Experienceiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Heuristic Evaluation of iCalamityGuide Application
1. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 1
Heuristic Evaluation: iCalamity Guide
Aaron Marcus, President, and Scott Abromowitz, Designer/Analyst
Aaron Marcus and Associates, Inc. (AM+A)
1196 Euclid Avenue, Suite 1F, Berkeley, California 94708-1640, USA
Tel: +1-510-601-0994,
Email: Aaron.Marcus@AMandA.com and scott@abromo.com
Web: www.AMandA.com
Prof. Maysoon F. Abulkhair
Faculty of Computing and Information Technology
King Abdulaziz University, Jeddah, Saudi Arabia
Email; mabualkhair@kau.edu.sa
2. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 2
iCalamity: App Assists People During
Natural, People-Made Disasters
R+D Project at King Abdulaziz University
Two user experiences based on user credentials
Individual (faculty, students ,administrators ,visitors); security agents
AM+A conducted heuristic evaluation (HE) in 2012
Examined usability, usefulness, and appeal per AM+A criteria
Detailed heuristics in Appendix of DUXU13 paper
Topics
Initial Set up
Application Management
Competitive Analysis
Screen Redesigns
Conclusion
3. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 3
HE Examples: Initial Set Up, 1/4
System Set-up: Insufficient options to reassure users
Example: What happens if users mis-type usernames/passwords
Example: What happens if users forget account names/passwords
Example: For visitors cautious about signing up, need for identifying
location while using app
Severity: 4/4 (bad!)
Bases: User control/freedom; Fitt’s Law; provide feedback
Initial uncertainty in regard to user credentials
Example: System doesn’t alert users to successful account creation
Example: Not clear what happens if user has multiple devices
Severity: ¾
Bases: User control/freedom; provide feedback; support action-reversal
4. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 4
HE Examples: Initial Set Up, 2/4
Basic functions: Confusing for individual users
Example: Colors on maps appear confusing
Example: Toolbar icons/signs confusing regarding Twitter logo
Severity: ¾
Bases: Info legibility/density; consistency/standards; real-world match;
Help/documentation; direct manipulation; visible UIs
Recommendation: Provide short descriptions; tutorials; standard colors
Notifying users of calamity
Example: Push notification needs to be clear about context and relevance
Severity: 2/4
Basis: Consistency/standards
Reommendation: Clearer descriptions
5. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 5
HE Examples: Initial Set Up, 3/4
Content: Clarity of language, detection of users
Example: General language clear (positive evaluation!)
Example: Needs more effective users’-locations detection: avoid clutter
Severity: ¾
Bases: Info legibility/density; consistency/standards; real-world match;
Help/documentation; direct manipulation; visible UIs
Recommendation: Provide
Notifying users of calamity
Example: Push notification needs to be clear about context and relevance
Severity: 2/4
Basis: Consistency/standards
Reommendation: Clearer descriptions
6. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 6
HE Examples: Initial Set Up, 4/4
Use of iOS HCI guidelines
Example: Toolbar buttons don’t follow iOS app guidelines
Example: Button labels did not use initial caps
Severity: 3/4
Bases: Consistency/standards
Recommendation: Change displays to conform to iOS standards
Error handling
Example: Error messages use confusing terminology and jargon, esp. for
security personnel
Severity: 3/4
Basis: Consistency/standards; Help/documentation
Reommendation: Conduct user tests for ease of learning and use
7. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 7
HE Examples:
Application Management
Manage accounts; delete accounts
Example: No way for users to be removed or logged out
Severity: 3/4
Bases: User control/freedom
Recommendation: Enable users to separate accounts and log out
Change building’s status
Example: Confusing for security agents to change building status from
unsafe to safe
Example: Difficult to change status of several buildings at once
Severity: 3/4
Basis: Modelessness
Reommendation: Consider screen redesigns
8. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 8
HE Examples: Competitive Analysis
of 3 Products, 1/2
Deloitte’s Bamboo (http://bamboo4bcm.com)
Targeted for businesses replacing paper-based prototcols
Positive: Users can see colleagues
Negative: Designed for offices of single building, not campus; locationpins can be come cluttered; no toolbar for easy navigation
MyDisasterDroid
(http://www.scribd.com/doc/94311333/Android)
Determines optimal route to safety based on users location and safe
areas
Positive: Prioritization of closer locations for rescuers; prioritizing location
with many people in need
Negative: No user awareness; UI is unintuitive; not easy to see location
of users or to designate buildings as safe or dangerous
9. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 9
HE Examples: Competitive Analysis
of 3 Products, 2/2
Meridian App (http://meridianapps.com)
Marketed to hospitals, malls, large building complexes to guide people
from one point in building to another point in same building; doesn’t rely
on GPS signal but on users’ ability to follow steps
Positive: Logically designed UI with legible words and warning; allows
direct manipulation
Negative: Not designed for multi-building campus
10. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 10
AM+A Redesigns Improve Layout,
Color, Typography, Navigation, 1/x
Non-security user screens
Rewording to enhance usability of pop-up notification and a color key
above tab bar for easy reference
11. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 11
AM+A Redesigns Improve Layout,
Color, Typography, Navigation, 2/x
Security personnel screens
More logical depiction for changing unsafe building to safe
12. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 12
AM+A Redesigns Improve Layout,
Color, Typography, Navigation, 3/x
Security personnel screens
Clearer status under building name; incorporated number of people in
building for easy reference; blue arrow links to list of people in building
13. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 13
Conclusions
Heuristic evaluation identified areas needing
improvement in good application’s UI/HCI/UX
Redesigns showed initial, clear examples of
recommended changes
User testing needs to determine which sketches
would provide most powerful enhancements
Acknowledgements
KAU IT Dept. development team students: Hajer Assiri, Reham
Fiesal, Somaia Alyoubi, Marwah Samarkandi, Noura Alsaba'an, and
Oraib Abdullah
14. AM+A
Aaron Marcus and Associates, Inc., www.AMandA.com, 14
Heuristic Evaluation: iCalamity Guide
Aaron Marcus, President, and Scott Abromowitz, Designer/Analyst
Aaron Marcus and Associates, Inc. (AM+A)
1196 Euclid Avenue, Suite 1F, Berkeley, California 94708-1640, USA
Tel: +1-510-601-0994,
Email: Aaron.Marcus@AMandA.com and scott@abromo.com
Web: www.AMandA.com
Prof. Maysoon F. Abulkhair
Faculty of Computing and Information Technology
King Abdulaziz University, Jeddah, Saudi Arabia
Email; mabualkhair@kau.edu.sa