ABSTRACT
Risk is an important factor that determines the success of mobile application development. Identifying risks will help developers minimize failures. Likewise, the determination of risks that affect usability can support taking preventive action before failure occurs. Previous researches have shown that many risks have been identified in mobile application development. However, it is rare to determine usability risks in mobile applications. This study aims to identify the risks that affect the usability of mobile application users. This study uses a literature study with several stages, namely: identifying a combination of usability attributes, identifying risk factors (potential risks), and determining the potential usability risk of each usability attribute at each stage of information system application development. This study resulted in 8 usability attributes, 107 risk factors (potential risks), and usability potential risks for each usability attribute at each stage of mobile application development. The results of this study can also determine the usability attributes that affect each phase of mobile application development.
- Sakshi Goel, Renuka Nagpal, and Deepti Mehrotra, 2018. Mobile Applications Usability Parameters: Taking an Insight View. Lecture Notes in Networks and Systems, 35--43. DOI:10.1007/978-981-10-3932-4_4Google Scholar
- Sigit Hadi Prayoga and Dana Indra Sensuse, 2010. Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction), Jurnal Sistem Informasi MTI-UI 6, 1 (2010), 64--73. DOI: 10.21609/jsi.v6i1.278.Google Scholar
- Pu Tianyin. 2011. Development of software project risk management model review, In Proceeding 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC'11), 2979--2982. DOI: 10.1109/AIMSEC.2011.6011139.Google ScholarCross Ref
- Haneen Hijazi, Shihadeh Khaleel Alqrainy, Hasan Muaidi, and Thair jamal Khdour, 2014. Risk Factors in Software Development Phases. European Scientific Journal 10, 3 (Jan, 2014), 213--232.Google Scholar
- Eelke Folmer, Martjin van Welie, and Jan Bosch, 2006. Bridging patterns: an approach to bridge gaps between SE and HCI. Journal of Information and Software Technology 48, 2 (Feb 2006), 69--89. DOI:10.1016/ j.infsof.2005.02.005.Google ScholarDigital Library
- Dale Walter Karolak. 1999. Software Engineering Risk Management, Computer Society Press.Google Scholar
- Jacob Nielsen. 1992. Finding usability problems through heuristic evaluation, In Proceeding ACM 'CHI'92 (Monterey, CA, 3--7 May), 373--380.Google Scholar
- Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identifying usability risk: A survey study, In 8th Malaysian Software Engineering Conference (MySEC), IEEE Xplore, 148--153. DOI:10.1109/MYSEC.2014.6986005..Google ScholarCross Ref
- Jacob Nielsen. 1993. Usability engineering. Academic press, San Diego, CA.Google ScholarDigital Library
- Dongsong Zhang and Boonlit Adipat (2005): Challenges methodologies and issues in the usability testing of mobile applications", International Journal of Human Computer Interaction 18, 3 (July, 2005), 293--308. DOI:10.1207/s15327590ijhc1803_3Google ScholarCross Ref
- Ahmed Seffah, Mohammad Donayaee, Rex B. Kline, and Harkirat K. Padda, 2006. Usability measurement and metrics: A consolidated model, Software Quality Control 14, 2 (Jun, 2006), 159--178. DOI: 10.1007/s11219-006-7600-8.Google ScholarDigital Library
- Rosnita Baharuddin, Dalbir Singh, and Rozilawati Razali, 2013. Usability dimensions for mobile applications-a review. Research Journal of Applied Sciences, Engineering and Technology 5, 6 (Feb, 2013), 2225--2231. DOI:10.19026/rjaset.5.4776.Google Scholar
- Rachel Harrison, Derek Flood, and David Duce, 2013. Usability of mobile applications: literature review and rationale for a new usability model, Journal of Interaction Science, 1 (May 2013), 1--16.Google ScholarCross Ref
- Ekjyot Kaur and Pali Delir Haghighi. 2016. A context-aware usability model for mobile health applications. In Proceeding. 14th Int. Conf. Adv. Mobile Comput. Mult Media (MoMM), 181--189. DOI: 10.1145/3007120.3007135.Google ScholarDigital Library
- Ryan Alturki and Valerie, 2019. Augmented and Virtual Reality in Mobile Fitness Applications: A Survey. In Applications of Intelligent Technologies in Healthcare, Springer, (Jan, 2019), 67--75. DOI: 10.1007/978-3-319-96139-2_7.Google ScholarCross Ref
- P. M. Chawan, Jijnasa Patil, and Radhika Naik, 2013. Software risk management. International Journal of Computer Science and Mobile Computing 2, 5 (May, 2013), 60--66.Google Scholar
- Karl E. Wieger, 1998. Know your enemy: Software risk management, Software Development 6, 10 (Oct, 1998), 6 pages. DOI:10.1207/s15327590ijhc1803_3.Google Scholar
- Anind K. Dey and Jonna Häkkilä. 2008. Context-Awareness and Mobile Devices. User Interface Design and Evaluation for Mobile Technology 1, 205--217.Google ScholarCross Ref
- Ann Bryd Platt, 1999. The usability risk, In Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, 396--400.Google ScholarCross Ref
- Pekka Ketola. 2002. Integrating usability with concurrent engineering in mobile phone development, Academic Dissertation, Department of Computer and Information Sciences, University of Tampere, Finland.Google Scholar
- Brian Lawrence, Karl Wiegers and Christof Ebert, 2001. The top risks of requirement engineering, IEEE Software 18, 6 (Dec, 2001), 62--63. DOI: 10.1109/52.965804.Google ScholarDigital Library
- Balasubramaniam Ramesh, Lan Coa, and Richard Baskerville. 2010. Agile requirement engineering practices and challenges: an empirical study, Info Systems Journal 20, 5 (Sept, 2010), 449--480.Google Scholar
- Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identification of usability risk in software development projects, International Journal of Software Engineering and Technology 1, 2 (Dec, 2014) IEEE Xplore, 7--12Google Scholar
- Ivan Sommerville. 2016. Software engineering (10th. ed). Addison-Wesley, Harlow, England.Google Scholar
- Sun-Jen Huang and Wen-Ming Han, 2008. Exploring the relationship between software project duration and risk exposure a cluster analysis. Information and Management 45, 3 (April, 2008), 175--182. DOI:10.1016/j.im.2008.02.001.Google ScholarDigital Library
- Barry W. Boehm, 1991. Software risk management: principles and practices, IEEE Software 8, 1 (Jan, 1991), 32--41.Google ScholarDigital Library
- Linda Wallace, Mark Keil, and Arum Rai, 2004. Understanding software project risk: a cluster analysis. Information & Management 42, 5 (March, 2004), 115--125. DOI: 10.1016/j.im.2003.12.007.Google ScholarDigital Library
- Basit Shahzad, Abdullah S. Al-Mudimigh, and Zahid Ullah, 2010. Risk identification and preemptive scheduling in software development life cycle. Global Journal of Computer Science and Technology 10, 2 (April, 2010), 55--63.Google Scholar
Index Terms
- Identifying Usability Risks for Mobile Application
Recommendations
Evaluating Usability for Mobile Application: A MAUEM Approach
ICSEB '17: Proceedings of the 2017 International Conference on Software and e-BusinessMany traditional usability metrics were purposely created for desktop computer applications and may not be directly applicable to mobile device applications. Usability metrics refer as means of measuring or evaluating the usability factors, attributes ...
Risk factors identification and evolution analysis from textual risk disclosures for insurance industry
AbstractIn the traditional risk management of insurance industry, companies mainly focus on business risks related to insurance products in their daily operation, but ignores the harms of other risk types. There is no consensus on what are the risk ...
Identifying Software Project Risks: An International Delphi Study
Advocates of software risk management claim that by identifying and analyzing threats to success (i.e., risks) action can be taken to reduce the chance of failure of a project. The first step in the risk management process is to identify the risk itself,...
Comments