Upon opening the black box and finding it full: Exploring the ethics in design practices

M Steen - Science, Technology, & Human Values, 2015 - journals.sagepub.com
Contemporary design practices, such as participatory design (PD), human-centered design
(HCD), and codesign, have inherent ethical qualities, which often remain implicit and …

The prevalence of UX design in agile development processes in industry

T Øvad, LB Larsen - 2015 Agile Conference, 2015 - ieeexplore.ieee.org
The gap between how the academic world develops usability and user experience (UX)
methods, and how the industry employs these methods is perceived as both broad and …

New approaches to usability evaluation in software development: Barefoot and crowdsourcing

A Bruun, J Stage - Journal of Systems and Software, 2015 - Elsevier
Usability evaluations provide software development teams with insights on the degree to
which software applications enable users to achieve their goals, how fast these goals can be …

UX work in startups: current practices and future needs

L Hokkanen, K Väänänen-Vainio-Mattila - Agile Processes in Software …, 2015 - Springer
Startups are creating innovative new products and services while seeking fast growth with
little resources. The capability to produce software products with good user experience (UX) …

Addressing the Context of Use in Mobile Computing: a Survey on the State of the Practice

E Eshet, H Bouwman - Interacting with Computers, 2015 - academic.oup.com
Understanding the context of use is essential to the design of interactive systems. In contrast
to the relatively stable and homogeneous use context in stationary computing, the context of …

Experiences with usability testing: Effects of thinking aloud and moderator presence

S Riihiaho - 2015 - aaltodoc.aalto.fi
Usability testing has become a standard method when evaluating the usability of various
systems with real users. Despite this, the factors of usability testing have been given little …

Usability evaluation of IPsec configuring components

VR Hiran - 2015 - diva-portal.org
The security protocol IPsec is used in the LTE network to achieve a secure communication
from prying eyes. However, the use of IPsec is optional by the LTE standard. Whether or not …