- Note: The chapter response will be revised and expanded when I have more time. It is worthy of a better treatment than is given below.
- This chapter seems to provide a very nice concise summary of what is known, and not known about usability testing.
- While it certainly has nothing to do with Neilsen's approach or style, I always have difficulty reading about experimental design and analysis of the resultant data. I don't actually have much trouble doing it: my trouble lies in reading about how to do it. I personally find it very tedious. As a result this chapter requires a great deal of effort for me. Also as a result I thoroughly appreciate the summaries and lists.
- Good questions to remember for the research proposal:
- Under what conditions is this application good for?
- What users is this application good for?
- What purpose is this application good for?
- The class discussion prompted this response:
- Further ideas to explore:
- Credentials: How have credentials changed with the development of on-line resources, both academic and non-academic? I have this sense that younger people are much more aware of the implications of this shift in how information is presented than we are. They are far more savvy than we give them credit for. For the most part they are also far more sophisticated in their understanding of what credentials represent. I am convinced that new methods of authentication, reputation-building, and verification will evolve. Some of these will not necessarily be tied to individual "biological units": perhaps a better label might be "sources". Sources can indeed be individuals, but they can also be organizations, small groups of people, business, and so on. Key issues will revolve around verification: that is, ensuring that the claimed, or credited source is indeed the identity that has been previously established. If the source is trusted, then another aspect of verification will center around verification that the material in question has not been tampered with.
|