Free Essay

Sensor Network

In: Computers and Technology

Submitted By sadegh
Words 6266
Pages 26
Proceedings of IFIP 17th World Computer Congress, Montreal, Canada, 25-30 August 2002, p133-148. Kluwer Academic Publishers.

User requirements analysis
A review of supporting methods
Martin Maguire
Research School in Ergonomics and Human Factors Loughborough University, UK

Nigel Bevan
Serco Usability Services, UK


Understanding user requirements is an integral part of information systems design and is critical to the success of interactive systems. However specifying these requirements is not so simple to achieve. This paper describes general methods to support user requirements analysis that can be adapted to a range of situations. Some brief case studies are described to illustrate how these methods have been applied in practice. user requirements, user-centred design, usability methods

Key words:



Understanding user requirements is an integral part of information systems design and is critical to the success of interactive systems. It is now widely understood that successful systems and products begin with an understanding of the needs and requirements of the users. As specified in the ISO 13407 standard (ISO, 1999), user-centred design begins with a thorough understanding of the needs and requirements of the users. The benefits can include increased productivity, enhanced quality of work, reductions in support and training costs, and improved user satisfaction. Requirements analysis is not a simple process. Particular problems faced by the analyst are: • addressing complex organisational situations with many stakeholders • users and designers thinking along traditional lines, reflecting the current system and processes, rather than being innovative • users not knowing in advance what they want from the future system (Olphert & Damodaran, 2002)

2 •

M. Maguire and N. Bevan

rapid development cycles, reducing the time available for user needs analysis • representing user requirements in an appropriate form. This paper considers how these problems can be addressed by selecting appropriate methods to support the process of user requirements generation and validation. It describes each method briefly and shows how it contributes to the requirements process. The basis for the application of different user requirements methods is a simple process as shown in Figure 1 below encompassing 4 elements:

Information gathering

User needs identification

Envisioning and evaluation

Requirements specification

Figure 1: General process for user requirements analysis

The four stages, and methods used to support the stages, are described in the next sections, followed by a summary table highlighting the advantages and disadvantages of each technique.



The first step in user requirements analysis is to gather background information about the users and stakeholders and the processes that currently take place. The following methods may be adopted: Stakeholder analysis identifies all the users and stakeholders who may influence or be impacted by the system. This helps ensure that the needs of all those involved are taken into account. If required, the system is tested by them. User groups may include end users, supervisors, installers, and maintainers. Other stakeholders include recipients of output from the system, marketing staff, purchasers and support staff (Taylor, 1990). Stakeholder analysis identifies, for each user and stakeholder group, their main roles, responsibilities and task goals in relation to the system. One of the main issues is how to trade-off the competing needs of different stakeholder groups in the new system (see 4.5 Allocation of function and user cost-benefit analysis).

User requirements analysis


Secondary market research involves researching published sources such as research reports, census data, demographic information, that throw light upon the range of possible user markets. Websites representing special groups of users such as that for the Royal National Institute for the Blind ( give information about the nature of the user population they represent (Mander & Smith, 2002). Context of use analysis is used when a system or product is developed. The quality of a system, including usability, accessibility and social acceptability factors, depends on having a very good understanding of the context of use of the system. For example, a bank machine (ATM) will be much more usable if it is designed for use at night as well as during the day, in bright sunlight as well as normal light, and by people in wheelchairs as well as those able to stand. Similarly in an office environment, there are many characteristics that can impinge on the usability of a new software product e.g. user workload, support available, or interruptions. Capturing contextual information is therefore important in helping to specify user requirements. In order to gather contextual information, stakeholders attend a facilitated meeting, called a Context Meeting. Here a questionnaire is completed to capture the characteristics of the users, their tasks and operating environment (see main headings in Table 1 below).
User group • System skills and experience. • Task knowledge. • Training. • Qualifications. • Language skills. • Age & gender. • Physical and cognitive capabilities. • Attitudes and motivations. Physical environment • Auditory environment. • Thermal environment. • Visual environment. • Vibration. • Space and furniture. • User posture. • Health hazards. • Protective clothing & equipment. • • • • • • • • • • • • • • • •
Technical environment Tasks • Hardware. Task list. • Software. Goal. • Network. Output. • Reference materials. Steps. • Other equipment. Frequency. Importance. Duration. Dependencies. Organisational environment Work practices. Assistance. Interruptions. Management & communications structure. Computer use policy. Organisational aims. Industrial relations. Job characteristics.

Table 1. Context of use factors

Context of use analysis was one of the outcomes of the ESPRIT HUFIT project and developed further in the ESPRIT MUSiC project (Bevan and Macleod, 1994). Context of use analysis within usability activities are also reviewed in Maguire (2001c).


M. Maguire and N. Bevan

Task analysis involves the study of what a user is required to do in terms of actions and/or cognitive processes to achieve a task. A detailed task analysis can be conducted to understand the current system, the information flows within it, the problems for people, and opportunities that indicate user needs. There are many variations of task analysis and notations for recording task activities. One of the most widely used is hierarchical task analysis, where high level tasks are de-composed into more detailed components and sequences. Another method creates a flow chart showing the sequence of human activities and the associated inputs and outputs (Ericsson 2001). Kirwan & Ainsworth (1992) provide a guide to the different task analysis methods, while Hackos & Redish (1998) explain some of the simpler methods for user interface design. Rich pictures can help stakeholders map, explore and understand a complex problem space and thereby help to identify hidden requirements (Checkland, 1981). The technique involves creating a series of sketches to show how people and systems relate to each other in an organisation. They may show peoples’ roles, power structures, communications and reporting mechanisms. Drawing simple figures of people with thought and speech bubbles linked to them can show particular problem areas in the current environment that may lead to new user requirements. Field study and observational methods involve an investigator viewing users as they work and taking notes of the activity that takes place. Observation may be either direct, where the investigator is actually present during the task, or indirect, where the task is recorded on videotape by the analysis team and viewed at a later time. The observer tries to be unobtrusive during the session and only poses questions if clarification is needed. Obtaining the co-operation of users is vital so the interpersonal skills of the observer are important. For further information see Preece et al. (1994). Diary keeping provides a record of user behaviour over a period of time. They require the participant to record activities they are engaged in throughout a normal day that may lead to the identification of user requirements for a new system or product. Diaries require careful design and prompting if they are to be employed properly be participants. Video recording can be used to capture human processes in a stakeholder’s workplace or other location. The results can then be revised for the purpose of understanding more about the work and generating relevant questions relevant to user needs. Video can also be a useful supplement to other method e.g. to demonstrate new system concepts to users during user/stakeholder discussion groups.



Once user data has been collected, user needs can start to be identified. A number of methods exist for identifying such needs.

User requirements analysis


User surveys involve administering a set of written questions to a sample population of users. Surveys can help determine the needs of users, current work practices and attitudes to new system ideas. Surveys are normally composed of a mix of 'closed' questions with fixed responses and 'open' questions, where the respondents are free to answer as they wish. This method is useful for obtaining quantitative as well as some qualitative data from a large number of users about the problems of existing tasks or the current system. For further information see Preece et al. (1994). Focus groups bring together a cross-section of stakeholders in a discussion group format. This method is useful for requirements elicitation and can help to identify issues that need to be tackled. The general idea is that each participant can act to stimulate ideas in the other people present, and that by a process of discussion, the collective view becomes established which is greater than the individual parts. For further information see Bruseberg & McDonagh-Philp (2001). Interviewing is a commonly used technique where users, stakeholders and domain experts are questioned to gain information about their needs or requirements in relation to the new system. Interviews are usually semistructured based on a series of fixed questions with scope for the user to expand on their responses. They can also be used as part of task analysis. For further information see Preece et al. (1994) and Macaulay (1996). Interviews on a customer site by representatives from the system development team can be very informative. Seeing the environment also gives a vivid mental picture of how users are working with the existing system and how the new system can support them (Mander and Smith, 2002). Scenarios and use cases give detailed realistic examples of how users may carry out their tasks in a specified context with the future system. The primary aim of scenario building is to provide examples of future use as an aid to understanding and clarifying user requirements and to provide a basis for later usability testing. Scenarios can help identify usability targets and likely task completion times. The method also promotes developer buy-in and encourages a human-centred design approach. Scenarios of use are sometimes called ‘use cases’, although the term is also used by software engineers to refer to the use of functions. In a related method called personas, a caricature is created with a name, personality and picture, to represent each of the most important user groups. Potential design solutions can then be evaluated against the needs of a particular persona and the tasks they are expected to perform. Personas are used by innovative design groups to stimulate creativity rather than refine a design solution (Cooper 1999). Future workshops are a way to help users and designers ‘break out’ from a current situations and thinking. Essentially they involve gathering


M. Maguire and N. Bevan

participants and posing questions such as: ‘Where do you want to be 10 years from now’. Once participants have agreed a suitable goal, they then seek to establish a process by which it can be achieved. Another variation is to define new technological developments, discuss when they might be attainable and what implications this might have for the user organisation. Evaluating an existing or competitor system can provide valuable information about the extent to which current systems meet user needs and can identify potential usability problems to avoid in the new system. Useful features identified in a competitor system can also be fed into the design process as potential user requirements. Measures of effectiveness, efficiency and satisfaction can be used as a baseline for the new system. To obtain accurate measures a controlled user test should be used, but valuable information can still be obtained from less formal methods of testing.



Once an initial set of user requirements has been developed, it is important to develop a prototype to illustrate them. User feedback can then be obtained on the prototype to validate and refine the user requirements. Potential techniques are described in this section Brainstorm sessions bring together a set of design and task experts to inspire each other in the creative, idea generation phase of the problem solving process. They are used to generate new ideas by freeing the mind to accept any idea that is suggested, thus allowing freedom for creativity. The method has been widely used the early phases of design. The results of a brainstorming session are, it is hoped, a set of good ideas and a general feel for the solution area to meet user needs. Card sorting is a technique for uncovering the hierarchical structure in a set of concepts by asking users to group items written on a set of cards. This is often used, for instance, to work out the organisation of a website. Users would be given cards with the names of the intended web pages on the site and asked to group the cards into related categories. After gathering the groupings from several users, designers can typically spot clear structures across many users. Statistical analysis can uncover the best groupings from the data where it is not clear by inspection. IBM (2002) is an example of an analysis programme. Affinity diagramming is a related technique that can be used for organising the structure of a new system, and allows participants to work as a group. Designers or users write down items such as potential screens or functions on sticky notes and then organise the notes by grouping them, to uncover the structure and relationships in a domain. Affinity diagrams are often a good next step after a brainstorming session. See Beyer & Holtzblatt (1998) for more information.

User requirements analysis


Storyboards, also termed "Presentation Scenarios", are sequences of images that show the relationship between user actions or inputs and system outputs. A typical storyboard will contain a number of images depicting features such as menus, dialogue boxes and windows. Storyboard sequences provide a platform for exploring and refining user requirements options via a static representation of the future system by showing them to potential users and members of a design team (Andriole, 1989). Prototyping is where designers create paper or software-based simulations of user interface elements (menus, buttons, icons, windows, dialogue sequences, etc.) in a static or dynamic way. When a paper prototype has been prepared, a member of the design team sits before a user and 'plays the computer' by moving the paper and card interface elements around in response to the user's actions. The difficulties encountered by the user and user comments, are recorded by an observer. Software prototypes provide a greater level of realism than is normally possible with simple paper mockups. Here, the aim is to create a rapid prototype that is used to establish an acceptable design for the user but is then thrown away prior to full implementation. Some design processes are based on a rapid application development (RAD) approach. Here a small group of designers and users work intensively on a prototype, making frequent changes in response to user comment. The prototype evolves into the full system. Hall (2001) discusses the merits and cost-benefits of varying fidelity levels of prototypes. Allocation of function is an important element for many systems. As ISO 13407 (1999) states in clause 7.3.2, allocation of function is "the division of system tasks into those performed by humans and those performed by technology" to specify a clear system boundary. A range of options is established to identify the optimal division of labour, to provide job satisfaction and efficient operation of the whole work process. User costbenefit analysis can then be carried out to determine how acceptable each user group will find the new arrangement. The use of task allocation charts and cost-benefit analysis is most useful for systems that affect whole work processes rather than single user, single task products. They also provide the opportunity to rethink the system design or user roles to provide a more acceptable solution for all groups. A process for performing a user costbenefit analysis is described by Eason (1988). Design guidelines and standards are referred to by designers and HCI specialists for guidance on ergonomic issues associated with the system being developed. The ISO 9241 standard (ISO, 1997) covers many aspects of hardware and software user-interface design, and contains a widely agreed body of software ergonomics advice. See Bevan (2001) for more information on ISO standards. Style guides embody good practice in interface design. Following a style guide will increase the consistency between screens and can reduce the development time. For a GUI (graphic user interface) an operating


M. Maguire and N. Bevan

system style guide should be followed to implement good practice and to provide consistency. For websites, design guidelines are evolving but good web design principles are gradually being established (Nielsen, 2000). Nicolle and Abascal (2001) discuss issues and present guidelines to make systems accessible by people with disabilities. Parallel design sessions involve a few small groups of designers working independently, to generate a range of diverse solutions. The aim is to develop and evaluate different system designs before choosing a solution (possibly drawing from several solutions) as a basis for the implemented system



General guidance on specifying user and organisational requirements and objectives is provided in ISO 13407. The following should be documented within the specification: identification of the range of relevant users and other stakeholders, a clear statement of design goals, the requirements with an indication their priority levels, measurable benchmarks against which the emerging design can be tested, evidence of acceptance of the requirements by the stakeholders, acknowledgement of statutory or legislative requirements, e.g. for health and safety. It is also important to manage changing requirements as the system develops. The following sections describe techniques and methods to support user and organisational requirements specification. Task/function mapping specifies the system functions that each user will require for the different tasks that they perform. By showing the relationship between the tasks and the corresponding functional requirements linked in matrix form, trade-offs can be made between different functions, or to add and remove functions depending on their value for supporting specific tasks. It is also useful for multi-user systems to ensure that the tasks of each user type are supported. Requirements categorisation User requirements: It is important to establish and document the user requirements so that they lead into the process of designing the system itself. User requirements will include summary descriptions of the tasks that the system will support and the functions that will be provided to support them. Usability requirements: It is also necessary to describe the detailed usability requirements in order to set objectives for the design team, and help prioritise usability work. Generally agreed usability goals to define are: effectiveness: the degree of success with which users achieve their task goals: efficiency: the time it takes to complete tasks; and satisfaction: user comfort and acceptability; see ISO 9241, part 11 ‘Guidance on Usability’ (ISO, 1997). These are most easily derived from the evaluation of an existing system. Other more detailed usability issues provide more specific design objectives e.g. understandability, learnability, supportiveness, flexibility and

User requirements analysis


attractiveness. Having established usability requirements, it is then necessary to translate the requirements into a specification (specification = requirement + measure). ISO 9126-4 (ISO, 2002) provides a framework for specifying measurable requirements (see also section 6.3). Organisational requirements: A third element is to specify the organisational requirements for the user-system complex, i.e. those that come out of a system being placed into a social context. An understanding of organisational requirements will help to create systems that can support the management structure of the organisation and communications within it, as well as group and collaborative working. Defining and grouping the tasks in an appropriate way will help to create motivating and satisfying jobs, ideally allowing users autonomy, flexibility, provision of good feedback on their performance and the opportunity to develop their skills and careers. Statutory or legislative requirements may also be classed as organisational requirements. The information needed to specify user, usability and organisational requirements will be drawn from the context of use and user needs activities described in previous sections. Maguire (1998) and Roberston & Roberston (1999) provide frameworks for user requirements specification. Prioritisation of user requirements is important so that development resources can be directed appropriately. The DSDM development method uses ‘time boxes’ where the functions and features in each phase of a system’s release are defined by the resources available. This helps control the risks in system development, and allows the customer to redirect future effort to meet the user’s needs more closely. Criteria setting relates to the need for criteria to help decide whether the user requirements have been achieved. This can be done by an inspection team or by user testing, where a representative user sample performs typical tasks with the system and the performance scores and attitude ratings help decide if the system can be accepted. Defining acceptance criteria in advance can be achieved by performing pre-tests on the existing system or on a competitor system, to specify criteria that the new system must be at least as good as these current systems.


M. Maguire and N. Bevan



Table 2 below presents the advantages and disadvantages of each method presented in this paper to assist in method selection.
Stakeholder analysis Secondary market research Context of use analysis

Ensures that all relevant stakeholders are considered. Low cost and provides good overview of potential market. Provides framework for documenting all factors that may affect the usability of the product. Defines and models tasks that can highlight user needs directly. Allows complex user environments to be mapped out and potential requirements to be identified Allows viewing of what users actually do in context and may discover unnoticed processes. Allows user to record activities throughout the day.

Information may be too general or out of date. May be lengthy process. Not all headings applicable to project. Could be shortcircuited for smaller systems. May be over-formal for simple tasks or open-ended tasks. Pictures may highlight indicative factors but may lack sufficient detail. Time consuming to perform. User commentary and analyst observation may disturb tasks. Users may forget to complete diaries or summarise activities at the end. Analyst reminders may be annoying. Time consuming to perform. Requires users to explain activities post-observation. Does not capture in depth comments and may not permit follow-up. Recruitment effort to assemble groups. Dominant participants may influence group disproportionately.


Task Analysis

Rich pictures

Field study and observational methods Diary keeping

Video recording

Captures real current activities without the intrusiveness of direct observation.

3. USER NEEDS IDENTIFICATION User surveys Relatively quick method of determining preferences of large user groups and allows for statistical analysis. Focus groups Allows analyst to rapidly obtain a wide variety of user views and possibly a consensus.

Table 2. Comparison of user requirements methods

User requirements analysis


3. USER NEEDS IDENTIFICATION continued Interviewing Interviews allow for quick elicitation of ideas and concepts. Customer visits brings user context to life. Effective way of thinking about future system use in context. Personas can bring user needs to life. Way of thinking creatively. Effective means of identifying current problems, possible new features and acceptance criteria. Blank page approach allowing for rapid elicitation and innovative thinking. Effective means of organising structure of a system e.g. a website. Demonstrates software interactions and possibly user context simply and early in the development cycle. Quick to build and refine. Allows early detection of usability issues in response to user feedback Identifies task concerns for the whole work process. Helps define fulfilling jobs and reduces risk of dissatisfied staff. Draws upon established knowledge to assist design. Produces range of design ideas and solutions. Can pick best from each. Need to negotiate access and to combine range of possibly differing opinions from different users. Scenarios may raise expectations too much. Personas may over simplify user population. Results may seem too ambitious for current needs. May lead to including too many new functions or make system too similar to a competitor’s. Doesn’t cover detailed design aspects. Needs way to combine results if performed by individuals or groups separately. Lacks interactive quality of prototyping.

Scenarios, use cases and personas

Future workshops Existing system/ competitor analysis


Card sorting and affinity diagrams Storyboards


Allocation of function and cost benefit analysis

Design guidelines and standards Parallel design

Paper prototypes do not support evaluation of fine details. Throwaway software prototypes do but are time consuming to build. Needs good overview of whole system. Many allocation options can cause confusion. Cost benefits sometimes hard to estimate. May be too general or constrain design. Requires certain amount of organisation to assemble design teams.

Table 2. Comparison of user requirements methods (continued)


M. Maguire and N. Bevan

5. REQUIREMENTS SPECIFICATION Task/function mapping Way of selecting functions that are relevant to specific tasks. May be a way to avoid including too many functions. Effective way to categorise user requirements. Covers user and organisational levels. Ensures that effort is put into the most important aspects of the system. Way to determine if developed system has met the user requirements. Knowing when task definitions sufficient. Make include tasks to justify unnecessary functions. May be hard to decide which user requirements fall into which categories. Poor management of user expectations may results in disappointed users. Not easily to define suitable criteria. Extensive testing of achievement may be resource intensive.

User. usability and organisational requirements Prioritisation

Criteria setting

Table 2. Comparison of user requirements methods (continued)



This section describes a series of case studies to show how the methods described in this paper support user requirements development. Normally a mix of methods and techniques is needed. Development of intranet site. A study was carried out by HUSAT (Maguire & Hirst, 2001b) to evaluate and redesign an intranet site for a police service in the UK. Human Factors consultants performed the study working with a police officer who was project manager for intranet development, and a civilian co-ordinator with a knowledge of police procedures and human factors. Semi-structured interviews were performed with users and stakeholders covering: needs and aspirations regarding the intranet, how well the current system meets those needs, and possible improvements that could be made. Interviewees were given access to the intranet site so they could demonstrate their comments. They included a constable, sergeant, inspector, senior officers and non-police admin staff. Following the user and stakeholder interviews, an expert review of the intranet pages was performed to establish the strengths and weaknesses of the current service. General recommendations for change were made following the expert evaluation. These were discussed with police representatives and different options for concept designs were proposed using storyboards and screen prototypes. These methods matched the requirement to create and discuss rapid prototypes within the design team. Having developed the design concept, several options for the graphic design for the site were produced as software prototypes to demonstrate both look and feel. A final design for the home page and secondary level content pages was then produced with web

User requirements analysis


templates to allow the police service to install the new pages and maintain them in the future. The project showed how a combination of methods can produce an acceptable new system design within a relatively short time (3 months). Expert evaluation of training opportunities. An evaluation was carried out by HUSAT (Maguire & Hirst, 2001a) which provided information about business-related courses to SME's (Small and Medium Enterprises). This was part of a programme of work to develop user requirements for a web-based elearning service or 'virtual campus'. An evaluation was performed by two Human Factors experts who spent time reviewing each of the main parts of the system from their own experience, a knowledge of typical tasks and usability principles. When providing comments on the system the aim was not to improve the current system but to identify features and implications for the new system. Inputs, from a usability perspective, were made to the user specification of the new virtual campus system. These included elements such as: the inclusion of functions to cover course providers as well as users (as this stakeholder had not previously been considered); suggestion for a mechanism to enter, modify and delete course information and course modules; and provision of typical scenarios of use by the users to make sure that the supplier and customer have the same 'vision' of the system. The project demonstrated how expert evaluation of a current system can provide useful feedback into the requirements specification for the new system. Interviews to assess future requirements for financial services. Interviews were carried out by HUSAT with family groups to study their management of home finances (Maguire, 1999). Context of use information was gathered, supported by photographs taken of rooms where financial tasks were carried out. The interviews were held as a series of focus group sessions within each household to discuss how and where they performed financial tasks, how they would like to receive services in future and through which devices, e.g. TV, PC, or other domestic appliance. The sessions were videotaped and areas and devices in the home were photographed. The study showed where household devices were located and where family members performed current financial tasks. This provided a basis for identifying innovative ways to deliver future financial services to the home. Survey to establish user needs for a climate change system. The EC IST EuroClim project ( aims to develop an advanced climate monitoring and prediction system for Europe. Climate related data will be stored in digital form collected from a network of sites across Europe. The system will produce raster maps and datasets for scientists and public users showing changes in snow on land, glaciers, sea ice, and general climate trends. To understand the diversity of user requirements for data precision, metadata and data formats, a user needs survey was carried out with climate


M. Maguire and N. Bevan

professionals and public users across Europe. Much effort was required to analyse all the different needs and to summarise them in a form that the design team could assimilate. User needs for data quality varied between users. Therefore charts were produced to show what proportion of users in the survey would be satisfied by different components of data quality i.e. resolution, accuracy and delivery delay. For a specialist system such as EuroClim, it is important to be able to trace the requirements back to the organisations that specified them so that clarification of user needs can be obtained. Based on the information gathered from the survey, a user interface mock-up is being developed to demonstrate the system concept and to ‘prototype’ the user requirements before the system specification is firmed up and development begins. User centred design at IAI. Serco worked with IAI LAHAV to evaluate the benefits of applying user-centred methods on a typical project. The user centred design techniques recommended by TRUMP (Bevan et al, 2000) were selected to be simple to plan and apply, and easy to learn by development teams. 1. Stakeholder meeting and context of use workshop The stakeholder meeting identifies and agrees on the role of usability, the usability goals, and how these relate to the business objectives and success criteria for the system. The context workshop collects detailed information about the intended users, their tasks, and the technical and environmental constraints. Both events each last for about half a day. 2. Scenarios of use A half day workshop to document examples of how users are expected carry out key tasks in a specified contexts, to provide an input to design and a basis for subsequent usability testing. 3. Evaluate an existing system Evaluation of an earlier version or competitor system to identify usability problems and obtain measures of usability as an input to usability requirements. 4. Usability requirements A half-day workshop to establish usability requirements for the user groups and tasks identified in the context of use analysis and in the scenarios. 5. Paper prototyping Evaluation by users of quick low fidelity prototypes to clarify requirements and enable draft interaction designs and screen designs to be rapidly simulated and tested. 6. Style guide Identify, document and adhere to industry, corporate or project conventions for screen and page design. 7. Evaluation of machine prototypes Informal usability testing with 3-5 representative users carrying out key tasks to provide rapid feedback. 8. Usability testing Formal usability testing with 8 representatives of a user group carrying out key tasks to identify any remaining usability problems and evaluate whether usability objectives have been achieved. IAI concluded that most of the techniques are very intuitive to understand, implement and facilitate. Practicing these techniques in the early stages of

User requirements analysis


design and development ensures less design mistakes later on. All participants and developers thought that most of the techniques were worthwhile and helped in developing a better and more usable system. The techniques were assessed as cost effective and inexpensive to apply.



To ensure a successful outcome, the design team must satisfy the needs and wants of the user when the development is complete. To achieve this, user needs should not only be elicited by techniques such as surveys, focus groups, interviews etc., but they should also be reflected back to users via simulations in order to prototype the user requirements. The requirements will of course then evolve as the system develops and more formal user evaluation takes place.



Andriole, S. J. (1989), Storyboard prototyping: a new approach to user requirements analysis, QED Information Sciences, Inc. Bevan N (2001) International Standards for HCI and Usability. International Journal of Human-Computer Studies, 55, 4. Bevan, N, Bogomolni, I, & Ryan, N (2000) Cost-effective user centred design, Bevan, N. & Macleod, M (1994) Usability measurement in context. Behaviour and Information Technology, 13, 132-145 Beyer, H. & Holtzblatt, K. (1998), Contextual design: defining customer-centered systems, Morgan Kaufmann Publishers. Bruseberg, A. & McDonagh-Philp, D. (2001), New product development by eliciting user experience and aspirations, International Journal of Human-Computer Studies, 55(4), 435-452. Checkland, P. (1981), Systems thinking, systems practice, Wiley. Cooper, A. (1999), The inmates are running the asylum: why high tech products drive us crazy and how to restore the sanity, Sams publishing. Eason, K.D. (1988), Information technology and organisational change, Taylor and Francis. Ericsson Infocom Consultants AB and Linköping University (2001), The Delta method. Hackos, J. & Redish, J. (1998), User and task analysis for interface design, Wiley. Hall, R.R. (2001), Prototyping for usability of new technology, International Journal of Human-Computer Studies, 55, 4, 485-502. IBM (2002), EZSort ISO (1997), ISO 9241: Ergonomics requirements for office work with visual display terminals (VDTs), 17parts, International Standards Organisation. ISO (1999), ISO 13407: Human-centred design processes for interactive systems, International Standards Organisation.


M. Maguire and N. Bevan

ISO (2002), ISO/IEC 9126-4: Software engineering – software product quality – Part 4: Quality in Use Metrics, International Standards Organisation. Kirwan, B. & Ainsworth, L.K. (eds.) (1992), A guide to task analysis, Taylor and Francis. Macaulay, L.A. (1996), Requirements engineering, Springer Verlag Series on Applied Computing. Maguire, M.C. (1998), User-centred requirements handbook. EC Telematics Applications Programme, Project TE 2010 RESPECT (Requirements Engineering and Specification in Telematics), WP4 Deliverable D4.2, version 3.3, May. Maguire, M.C. (1999), NCR Knowledge Lab. Report on study of the management of domestic finances by family groups, 7 May, RSEHF (formerly HUSAT), Loughborough University, Loughborough, UK. Maguire, M.C. & Hirst, S.J. (2001a), Usability evaluation of the LINK project TIGS website and feedback on OVC specification. HUSAT Consultancy Limited, 2 March 2001. RSEHF (formerly HUSAT), Loughborough University, Loughborough, UK. Maguire, M.C. & Hirst, S.J. (2001b), Metropolitan Police Service redesign of corporate intranet pages. HUSAT Consultancy Limited, 26 March 2001. RSEHF (formerly HUSAT), Loughborough University, Loughborough, UK. Maguire, M.C. (2001c), Context of use within usability activities, International Journal of Human-Computer Studies, 55(4), 453-484. Mander, R. & Smith, B. (2002), Web usability for dummies, New York: Hungry Minds. Nielsen, J. (2000), Designing web usability: The practice of simplicity, New Riders Publishing. Nicolle, C. & Abascal, J. (eds.) (2001), Inclusive design guidelines for HCI, Taylor & Francis. Olphert, C.W. & Damodaran, L. (2002), Getting what you want, or wanting what you get? - beyond user centred design, Proceedings of the Third International Conference on Design and Emotion, Loughborough, UK, 1-3 July 2002. Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S. & Carey, T. (1994), Human-computer interaction. Addison-Wesley. Robertson, S. & Roberston, T. (1999), Mastering the requirements process, AddisonWesley and ACM Press. Taylor, B. (1990), The HUFIT planning, analysis and specification toolset, In D. Diaper, G. Cockton, D. Gilmore & B. Shackel, (eds.), Human-Computer Interaction - INTERACT'90, 371-376. Amsterdam: North-Holland.

Similar Documents

Free Essay

Wireless Sensor Network

...Wireless Sensor Networks and Their Usage Ali Raza,Shahid Rasheed & Shazib Javeed University Of Central Punjab Abstract Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? Key Words Wireless Sensor Network (WSNs) Structural Health Monitoring (SHM) Micro Electro-Mechanical Systems (MEMS) Introduction Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment......

Words: 2659 - Pages: 11

Free Essay

Wireless Sensor Networks

...SECURE ROUTING IN WIRELESS SENSOR NETWORKS By [Name] The Name of the Class (Course) Professor (Tutor): The Name of the School (University): The City and State The Date: Abstract. Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make...

Words: 5106 - Pages: 21

Free Essay

Energy Efficiency in Sensor Networks

...Topology-Transparent Duty Cycling for Wireless Sensor Networks Computer Science& Engineering Arizona State University Abstract Our goal is to save energy in wireless sensor networks (WSNs) by periodic duty-cycling of sensor nodes. We schedule sensor nodes between active (transmit or receive) and sleep modes while bounding packet latency in the presence of collisions. In order to support a dynamic WSN topology, we focus on topology-transparent approaches to scheduling; these are independent of detailed topology information. Much work has been done on topology-transparent scheduling in which all nodes are active. In this work, we examine the connection between topology-transparent dutycycling and such non-sleeping schedules. This suggests a way to construct topology-transparent duty-cycling schedules. We analyse the performance of topology-transparent schedules with a focus on throughput in the worst case. A construction of topology-transparent duty-cycling schedules based on a topology-transparent non-sleeping schedule is proposed. The constructed schedule achieves the maximum average throughput in the worst case if the given nonsleeping schedule satisfies certain properties. 1 Introduction Wireless sensor networking has been a growing research area for the last years. It has a wide range of potential applications, such as environment monitoring, smart spaces, medical systems and robotic exploration. In sensor networks, sensor nodes are normally......

Words: 6730 - Pages: 27

Free Essay

Routing in Wireless Sensor Networks

...Routing in Wireless Sensor Networks: application on Fire Detection Abstract: this paper is about fire detection in building using a modified APTEEN routing protocol. Here we design a system called iFireControl which is a smart detection system for buildings, which is more water efficient than many current systems, while keeping its robustness. introduction A Wireless Sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensors activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; nowadays such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, Agriculture, Area Monitoring, Smart Home Monitoring, Seismic Monitoring etc. Wireless Sensor Networks provide a bridge between the real physical and virtual worlds; allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales. The WSN is built of “nodes” from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a...

Words: 4845 - Pages: 20

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Free Essay

Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on Ns2

...2009 World Congress on Computer Science and Information Engineering Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on NS2 Junguo Zhang, Wenbin Li, Xueliang Zhao, Xiaodong Bai, Chen Chen Beijing Forestry University, 35 Qinghua East Road, Haidian District,Beijing, 100083 P.R.China information which processed by the embedded system to the user terminals by means of random selforganization wireless communication network through multi-hop relay. Thus it authentically achieves the purpose of ‘monitor anywhere and anytime’. The basic function of sensor network is gathering and sending back the information of the monitoring areas which the relevant sensor nodes are set in. But the sensor network node resources are very limited, which mainly embodies in battery capacity, processing ability, storage capacity, communication bandwidth and so on. Because of the limited monitoring range and reliability of each sensor, we have to make the monitoring areas of the sensor nodes overlapped when they are placed in order to enhance the robustness and accuracy of the information gathered by the entire network. In this case, certain redundancy in the gathered data will be inevitable. On the way of sending monitoring data by multi-hop relay to the sink nodes (or base stations) which are responsible to gather the data. It is necessary to reduce the redundant information by fusion processing. Data fusion is generally defined as......

Words: 3532 - Pages: 15

Free Essay

Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network Using Cellular Automata

.... . . . . . . . . . 2 3 3 4 4 4 5 6 7 7 8 8 9 . . . . . . . . . . . . . . . . . . . 10 2 Introduction 3 Wireless Sensor Network 3.1 The Basics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 3.1.2 3.1.3 3.2 3.3 3.4 Components of Sensor Nodes . . . . . . . . . . . . . . . . Key Features . . . . . . . . . . . . . . . . . . . . . . . . . Types of Sensor nodes . . . . . . . . . . . . . . . . . . . . Constraints in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . Applications of WSN . . . . . . . . . . . . . . . . . . . . . . . . . Security Threats in WSN . . . . . . . . . . . . . . . . . . . . . . 4 Cellular Automata 4.1 Reversible Cellular Automata 5 Deployment issues in WSN with specific focus on authentication 5.1 5.2 Authentication of Cluster Head and Base Station . . . . . . . . . Authentication of Nodes . . . . . . . . . . . . . . . . . . . . . . . 12 13 13 14 15 15 15 16 6 Schemes as well as Supporting claims 6.1 6.2 6.3 Cloning attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion List of Figures 1 2 3 4 5 Wireless sensor Network . . . . . . . . . . . . . . . . . . . . . . . Components of Sensor Nodes . . . . . . . . . . . . . . . . . . . . WSN with three types of sensor nodes . . . . . . . . . . . . . . . Elementary CA . . . . . . . . . . . . . . . . . . . . . . . . . . . .......

Words: 4368 - Pages: 18

Premium Essay

Wireless Sensor Network Case Study

...IN WIRELESS SENSOR NETWORK USING NODE ENERGY BASED SCHEDULING METHOD Jency. J1,Anita Christy angelin2, 1PG Scholar/Department of CSE, Karunya University,Coimbatore-India. 2Assistant Professor/Department of CSE, Karunya University, Coimbatore-India. ---------------------------------------------------------------------------------------------------------------- Abstract—Wireless sensor networks consist of large number of battery powered wireless sensor nodes. A major key issue in WSNs is to reduce the energy consumption while maintaining the normal functions of WSNs. Many different methods are used to reduce the energy consumption in the wireless sensor networks. If the node is not able to send a packet to the...

Words: 2807 - Pages: 12

Free Essay

Internet of Things

...the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing......

Words: 858 - Pages: 4

Premium Essay


...Advances In Medical Technology: What Does The Future Hold? ScienceDaily (June 16, 2009) — Major challenges and opportunities will arise in the health sector in the future. Research in technology that can be applied to this sector is being carried out by several UPC teams. [pic] Although sophisticated medical technology is already available in health systems in developed countries, further advances are constantly being made. As a result of the addition of medical nanotechnology to existing knowledge of molecular and cellular biology, it seems likely that new, more personalised, more accurate and more rapid diagnostic techniques will be devised in the future, as well as new treatments that are also more personalised and promote regeneration of the organism. Clearly, as areas of research such as biomaterials or tissue engineering are developed for use in regenerative medicine, the range of opportunities will increase dramatically. Josep Anton Planell, the director of the Institute for Bioengineering of Catalonia (IBEC), which was formed by the UB, the UPC and the Generalitat (Government of Catalonia) and has its headquarters in Barcelona Science Park, considers that “in the future, it will be possible to design intelligent biomaterials that, when placed where damaged tissue needs to be regenerated, will be able to stimulate the stem cells to do what we want them to do”. However, more knowledge is needed to perfect the process. He states, “We are beginning to understand which...

Words: 1133 - Pages: 5

Free Essay

Internet of Things

...IoT (Hiremath, 2015) IoT stands for Internet of things which in itself explains that it is things that are connected to internet which include sensors, devices, actuators, transducers any equipment or material thing (further referred as THINGS ) which in some way are able to communicate via internet. There has been some kind of automation in industry, home, and office through various THINGS but IoT is a concept where in all these THINGS are connected to internet and communicate via internet and can be intervened or controlled through internet. They also intern generate data and can be stored on cloud for further processing or the data required for control mechanism of these THINGS may exist on cloud itself. The crux of such exercise is to achieve improved efficiency, effectiveness, accuracy and economic benefit. I chose not to tell you the whole story but few specific examples of IoT which will bring us on same page of thoughts and make us easily understand in future anything we come across which is related to IoT. Smart Home: Smart home widely working on ZigBee protocol (considered as most secured and safe till now) is basically automation of lights, AC, door lock, Curtains etc.. In home and also able to communicate via internet through a gateway to any smart device connected to internet like smart phone and be accessible to any authorised user so as to monitor or control home appliances sitting globally anywhere using a smart home specific application. For example a......

Words: 1698 - Pages: 7

Free Essay


...Embedded system is a computer system with a dedicated function within a larger mechanical or electrical system • Often ES are Real time Systems • Embedded Systems are generally – Small size – Low Power and Price – Rugged OS Embedded system … • Embedded systems are often based on microcontrollers • Embedded systems are used in various portable devices • Embedded systems are used in transportation, fire safety, safety and security, medical applications and life critical systems • A new class of wireless embedded devices called motes are networked wireless sensors. Wireless sensor network (WSN) • A wireless sensor network (WSN) is an example of a complete embedded system – Various ES work in a distributed network – Communicate wirelessly – Contains independent sensors etc. A WSN … Embedded System : Node • WSN is composed of various nodes • Resource Constraints • Network Topology and Routing Embedded Systems Specifications • Specifications WE NEED FORMALITY TO FILL THE GAPS • Implementation Model Checking in Embedded System Apply Properties Yes OR No If No....... Why No? • Where Modeling Techniques can be used in Embedded Systems? Specification Stage – Give a description of the system to be developed, at whatever level(s) of detail desired – Used to guide further development activities – Used to verify that the requirements for the system being developed have been completely and accurately specified •...

Words: 383 - Pages: 2

Free Essay

Ic- Internet of Things

...IC the Future! Frost & Sullivan’s Virtual Thought Leadership Panel on Internet of Everything Measurement & Instrumentation March 20, 2014 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan. Moderator’s Profile • 12 years of expertise in semiconductor and wireless industry. Special expertise in business and product strategy, positioning, consulting and market analysis. Heads a team of global analysts that conduct both syndicated and custom research on various segments of the semiconductor industry. Some of the application that are on focus in the semiconductor group including automotive, healthcare, consumer electronics, aerospace, defense, industrial, wired and wireless communication 2 • Aravind Seshagiri, Program Manager, Measurement & Instrumentation Frost & Sullivan Follow me on: (Connect with social media) @asesh1974 • • Key Take Away’s from the previous edition Ian Ferguson, Vice President Segment Marketing Security is non-negotiable. ARM is concerned about fragmentation of standards and compromise on privacy. Performance, power efficiency and the flexibility to reconfigure on the go are they key needs for next gen processors. Bob Doud, Director of Marketing Privacy a pressing issue rather than actual information overload...

Words: 2300 - Pages: 10

Free Essay


...A BIG DATA APPROACH FOR HEALTH CARE APPLICATION DEVELOPMENT G.Sravya [1], A.Shalini [2], K.Raghava Rao [3] @ B.Tech Students, dept. of Electronics and Computers. K L University, Guntur, AP. *.Professor, dept. of Electronics and Computers. K L University, Guntur, AP ,, ABSTRACT: Big data is playing a vital role in present scenario. big data has become the buzzword in every field of research. big data is collection of many sets of data which contains large amount of information and little ambiguity where other traditional technologies are lagging and cannot compete with it .big data helps to manipulate and update the large amount of data which is used by every organization in any fields The main aim of this paper is to address the impact of these big data issues on health care application development but health care industry is lagging behind other sectors in using big data .although it is in early stages in health care it provides the researches to accesses what type of treatment should be taken that are more preferable for particular diseases, type of drugs required and patients records I. Introduction Health care is one of the most prominent problems faced by the society now a day. Every day a new disease is take birth which leads to illness of millions of people. Every disease has its own and unique medicine for its cure. Maintaining all the data related......

Words: 2414 - Pages: 10

Free Essay


...Proceedings of the “International Conference on Nanoscience, Engineering and Technology” (ICONSET 2011) Organized by Sathyabama University in association with Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam, 28-30 November, 2011. Energy Conservation Through Application Of Nanotechnology N.K Mishra Department of Environmental Science and Biotechnology The Technological Institute of Textile & Sciences Bhiwani, Haryana Priti Grover, Deepak Arora Department of Computer Science & Information Technology The Technological Institute of Textile & Sciences Bhiwani, Haryana, Many years got spend in analyzing the technique – Nanotechnology and make it possible for Application. It involves the particles which are very small in size(1 to 100 nm) and measured as nanometers , if compared to human hair which is 80,000nm , the particles used in Nanotechnology is about thousands nanometers less than human hair. As the meaning of term accepted, working on it get started so as to give a new evolution to the world. Abstract— Nanotechnology is an advance and globally implied technology for almost all real application. In today’s modern era the idea of large and complex size items are diverted in the compact items. Such technology enhanced materials will enable weight reduction accompanied by an increase in stability and improved functionality. Nanotechnology helps in realization of miniaturized devices......

Words: 1423 - Pages: 6