skip to main content
10.1145/3429789.3429813acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconetsiConference Proceedingsconference-collections
research-article

Identifying Usability Risks for Mobile Application

Authors Info & Claims
Published:25 November 2020Publication History

ABSTRACT

Risk is an important factor that determines the success of mobile application development. Identifying risks will help developers minimize failures. Likewise, the determination of risks that affect usability can support taking preventive action before failure occurs. Previous researches have shown that many risks have been identified in mobile application development. However, it is rare to determine usability risks in mobile applications. This study aims to identify the risks that affect the usability of mobile application users. This study uses a literature study with several stages, namely: identifying a combination of usability attributes, identifying risk factors (potential risks), and determining the potential usability risk of each usability attribute at each stage of information system application development. This study resulted in 8 usability attributes, 107 risk factors (potential risks), and usability potential risks for each usability attribute at each stage of mobile application development. The results of this study can also determine the usability attributes that affect each phase of mobile application development.

References

  1. Sakshi Goel, Renuka Nagpal, and Deepti Mehrotra, 2018. Mobile Applications Usability Parameters: Taking an Insight View. Lecture Notes in Networks and Systems, 35--43. DOI:10.1007/978-981-10-3932-4_4Google ScholarGoogle Scholar
  2. Sigit Hadi Prayoga and Dana Indra Sensuse, 2010. Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction), Jurnal Sistem Informasi MTI-UI 6, 1 (2010), 64--73. DOI: 10.21609/jsi.v6i1.278.Google ScholarGoogle Scholar
  3. Pu Tianyin. 2011. Development of software project risk management model review, In Proceeding 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC'11), 2979--2982. DOI: 10.1109/AIMSEC.2011.6011139.Google ScholarGoogle ScholarCross RefCross Ref
  4. Haneen Hijazi, Shihadeh Khaleel Alqrainy, Hasan Muaidi, and Thair jamal Khdour, 2014. Risk Factors in Software Development Phases. European Scientific Journal 10, 3 (Jan, 2014), 213--232.Google ScholarGoogle Scholar
  5. Eelke Folmer, Martjin van Welie, and Jan Bosch, 2006. Bridging patterns: an approach to bridge gaps between SE and HCI. Journal of Information and Software Technology 48, 2 (Feb 2006), 69--89. DOI:10.1016/ j.infsof.2005.02.005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dale Walter Karolak. 1999. Software Engineering Risk Management, Computer Society Press.Google ScholarGoogle Scholar
  7. Jacob Nielsen. 1992. Finding usability problems through heuristic evaluation, In Proceeding ACM 'CHI'92 (Monterey, CA, 3--7 May), 373--380.Google ScholarGoogle Scholar
  8. Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identifying usability risk: A survey study, In 8th Malaysian Software Engineering Conference (MySEC), IEEE Xplore, 148--153. DOI:10.1109/MYSEC.2014.6986005..Google ScholarGoogle ScholarCross RefCross Ref
  9. Jacob Nielsen. 1993. Usability engineering. Academic press, San Diego, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dongsong Zhang and Boonlit Adipat (2005): Challenges methodologies and issues in the usability testing of mobile applications", International Journal of Human Computer Interaction 18, 3 (July, 2005), 293--308. DOI:10.1207/s15327590ijhc1803_3Google ScholarGoogle ScholarCross RefCross Ref
  11. Ahmed Seffah, Mohammad Donayaee, Rex B. Kline, and Harkirat K. Padda, 2006. Usability measurement and metrics: A consolidated model, Software Quality Control 14, 2 (Jun, 2006), 159--178. DOI: 10.1007/s11219-006-7600-8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rosnita Baharuddin, Dalbir Singh, and Rozilawati Razali, 2013. Usability dimensions for mobile applications-a review. Research Journal of Applied Sciences, Engineering and Technology 5, 6 (Feb, 2013), 2225--2231. DOI:10.19026/rjaset.5.4776.Google ScholarGoogle Scholar
  13. Rachel Harrison, Derek Flood, and David Duce, 2013. Usability of mobile applications: literature review and rationale for a new usability model, Journal of Interaction Science, 1 (May 2013), 1--16.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ekjyot Kaur and Pali Delir Haghighi. 2016. A context-aware usability model for mobile health applications. In Proceeding. 14th Int. Conf. Adv. Mobile Comput. Mult Media (MoMM), 181--189. DOI: 10.1145/3007120.3007135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ryan Alturki and Valerie, 2019. Augmented and Virtual Reality in Mobile Fitness Applications: A Survey. In Applications of Intelligent Technologies in Healthcare, Springer, (Jan, 2019), 67--75. DOI: 10.1007/978-3-319-96139-2_7.Google ScholarGoogle ScholarCross RefCross Ref
  16. P. M. Chawan, Jijnasa Patil, and Radhika Naik, 2013. Software risk management. International Journal of Computer Science and Mobile Computing 2, 5 (May, 2013), 60--66.Google ScholarGoogle Scholar
  17. Karl E. Wieger, 1998. Know your enemy: Software risk management, Software Development 6, 10 (Oct, 1998), 6 pages. DOI:10.1207/s15327590ijhc1803_3.Google ScholarGoogle Scholar
  18. Anind K. Dey and Jonna Häkkilä. 2008. Context-Awareness and Mobile Devices. User Interface Design and Evaluation for Mobile Technology 1, 205--217.Google ScholarGoogle ScholarCross RefCross Ref
  19. Ann Bryd Platt, 1999. The usability risk, In Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, 396--400.Google ScholarGoogle ScholarCross RefCross Ref
  20. Pekka Ketola. 2002. Integrating usability with concurrent engineering in mobile phone development, Academic Dissertation, Department of Computer and Information Sciences, University of Tampere, Finland.Google ScholarGoogle Scholar
  21. Brian Lawrence, Karl Wiegers and Christof Ebert, 2001. The top risks of requirement engineering, IEEE Software 18, 6 (Dec, 2001), 62--63. DOI: 10.1109/52.965804.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Balasubramaniam Ramesh, Lan Coa, and Richard Baskerville. 2010. Agile requirement engineering practices and challenges: an empirical study, Info Systems Journal 20, 5 (Sept, 2010), 449--480.Google ScholarGoogle Scholar
  23. Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identification of usability risk in software development projects, International Journal of Software Engineering and Technology 1, 2 (Dec, 2014) IEEE Xplore, 7--12Google ScholarGoogle Scholar
  24. Ivan Sommerville. 2016. Software engineering (10th. ed). Addison-Wesley, Harlow, England.Google ScholarGoogle Scholar
  25. Sun-Jen Huang and Wen-Ming Han, 2008. Exploring the relationship between software project duration and risk exposure a cluster analysis. Information and Management 45, 3 (April, 2008), 175--182. DOI:10.1016/j.im.2008.02.001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Barry W. Boehm, 1991. Software risk management: principles and practices, IEEE Software 8, 1 (Jan, 1991), 32--41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Linda Wallace, Mark Keil, and Arum Rai, 2004. Understanding software project risk: a cluster analysis. Information & Management 42, 5 (March, 2004), 115--125. DOI: 10.1016/j.im.2003.12.007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Basit Shahzad, Abdullah S. Al-Mudimigh, and Zahid Ullah, 2010. Risk identification and preemptive scheduling in software development life cycle. Global Journal of Computer Science and Technology 10, 2 (April, 2010), 55--63.Google ScholarGoogle Scholar

Index Terms

  1. Identifying Usability Risks for Mobile Application

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICONETSI '20: Proceedings of the 2020 International Conference on Engineering and Information Technology for Sustainable Industry
      September 2020
      466 pages
      ISBN:9781450387712
      DOI:10.1145/3429789

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 November 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)15
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader