Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3429789.3429813acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconetsiConference Proceedingsconference-collections
research-article

Identifying Usability Risks for Mobile Application

Published: 25 November 2020 Publication History

Abstract

Risk is an important factor that determines the success of mobile application development. Identifying risks will help developers minimize failures. Likewise, the determination of risks that affect usability can support taking preventive action before failure occurs. Previous researches have shown that many risks have been identified in mobile application development. However, it is rare to determine usability risks in mobile applications. This study aims to identify the risks that affect the usability of mobile application users. This study uses a literature study with several stages, namely: identifying a combination of usability attributes, identifying risk factors (potential risks), and determining the potential usability risk of each usability attribute at each stage of information system application development. This study resulted in 8 usability attributes, 107 risk factors (potential risks), and usability potential risks for each usability attribute at each stage of mobile application development. The results of this study can also determine the usability attributes that affect each phase of mobile application development.

References

[1]
Sakshi Goel, Renuka Nagpal, and Deepti Mehrotra, 2018. Mobile Applications Usability Parameters: Taking an Insight View. Lecture Notes in Networks and Systems, 35--43.
[2]
Sigit Hadi Prayoga and Dana Indra Sensuse, 2010. Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction), Jurnal Sistem Informasi MTI-UI 6, 1 (2010), 64--73.
[3]
Pu Tianyin. 2011. Development of software project risk management model review, In Proceeding 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC'11), 2979--2982.
[4]
Haneen Hijazi, Shihadeh Khaleel Alqrainy, Hasan Muaidi, and Thair jamal Khdour, 2014. Risk Factors in Software Development Phases. European Scientific Journal 10, 3 (Jan, 2014), 213--232.
[5]
Eelke Folmer, Martjin van Welie, and Jan Bosch, 2006. Bridging patterns: an approach to bridge gaps between SE and HCI. Journal of Information and Software Technology 48, 2 (Feb 2006), 69--89. j.infsof.2005.02.005.
[6]
Dale Walter Karolak. 1999. Software Engineering Risk Management, Computer Society Press.
[7]
Jacob Nielsen. 1992. Finding usability problems through heuristic evaluation, In Proceeding ACM 'CHI'92 (Monterey, CA, 3--7 May), 373--380.
[8]
Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identifying usability risk: A survey study, In 8th Malaysian Software Engineering Conference (MySEC), IEEE Xplore, 148--153.
[9]
Jacob Nielsen. 1993. Usability engineering. Academic press, San Diego, CA.
[10]
Dongsong Zhang and Boonlit Adipat (2005): Challenges methodologies and issues in the usability testing of mobile applications", International Journal of Human Computer Interaction 18, 3 (July, 2005), 293--308.
[11]
Ahmed Seffah, Mohammad Donayaee, Rex B. Kline, and Harkirat K. Padda, 2006. Usability measurement and metrics: A consolidated model, Software Quality Control 14, 2 (Jun, 2006), 159--178.
[12]
Rosnita Baharuddin, Dalbir Singh, and Rozilawati Razali, 2013. Usability dimensions for mobile applications-a review. Research Journal of Applied Sciences, Engineering and Technology 5, 6 (Feb, 2013), 2225--2231.
[13]
Rachel Harrison, Derek Flood, and David Duce, 2013. Usability of mobile applications: literature review and rationale for a new usability model, Journal of Interaction Science, 1 (May 2013), 1--16.
[14]
Ekjyot Kaur and Pali Delir Haghighi. 2016. A context-aware usability model for mobile health applications. In Proceeding. 14th Int. Conf. Adv. Mobile Comput. Mult Media (MoMM), 181--189.
[15]
Ryan Alturki and Valerie, 2019. Augmented and Virtual Reality in Mobile Fitness Applications: A Survey. In Applications of Intelligent Technologies in Healthcare, Springer, (Jan, 2019), 67--75.
[16]
P. M. Chawan, Jijnasa Patil, and Radhika Naik, 2013. Software risk management. International Journal of Computer Science and Mobile Computing 2, 5 (May, 2013), 60--66.
[17]
Karl E. Wieger, 1998. Know your enemy: Software risk management, Software Development 6, 10 (Oct, 1998), 6 pages.
[18]
Anind K. Dey and Jonna Häkkilä. 2008. Context-Awareness and Mobile Devices. User Interface Design and Evaluation for Mobile Technology 1, 205--217.
[19]
Ann Bryd Platt, 1999. The usability risk, In Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, 396--400.
[20]
Pekka Ketola. 2002. Integrating usability with concurrent engineering in mobile phone development, Academic Dissertation, Department of Computer and Information Sciences, University of Tampere, Finland.
[21]
Brian Lawrence, Karl Wiegers and Christof Ebert, 2001. The top risks of requirement engineering, IEEE Software 18, 6 (Dec, 2001), 62--63.
[22]
Balasubramaniam Ramesh, Lan Coa, and Richard Baskerville. 2010. Agile requirement engineering practices and challenges: an empirical study, Info Systems Journal 20, 5 (Sept, 2010), 449--480.
[23]
Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identification of usability risk in software development projects, International Journal of Software Engineering and Technology 1, 2 (Dec, 2014) IEEE Xplore, 7--12
[24]
Ivan Sommerville. 2016. Software engineering (10th. ed). Addison-Wesley, Harlow, England.
[25]
Sun-Jen Huang and Wen-Ming Han, 2008. Exploring the relationship between software project duration and risk exposure a cluster analysis. Information and Management 45, 3 (April, 2008), 175--182.
[26]
Barry W. Boehm, 1991. Software risk management: principles and practices, IEEE Software 8, 1 (Jan, 1991), 32--41.
[27]
Linda Wallace, Mark Keil, and Arum Rai, 2004. Understanding software project risk: a cluster analysis. Information & Management 42, 5 (March, 2004), 115--125.
[28]
Basit Shahzad, Abdullah S. Al-Mudimigh, and Zahid Ullah, 2010. Risk identification and preemptive scheduling in software development life cycle. Global Journal of Computer Science and Technology 10, 2 (April, 2010), 55--63.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICONETSI '20: Proceedings of the 2020 International Conference on Engineering and Information Technology for Sustainable Industry
September 2020
466 pages
ISBN:9781450387712
DOI:10.1145/3429789
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 November 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Risk Factor
  2. Usability Attribute
  3. Usability Risk

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICONETSI

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 128
    Total Downloads
  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media