Proceedings of the 7th International Conference on Methods and Techniques in Behavioral Research 2010
DOI: 10.1145/1931344.1931363
|View full text |Cite
|
Sign up to set email alerts
|

A method for remote and semi-automatic usability evaluation of web-based applications through users behavior analysis

Abstract: In this paper we describe a method for evaluating the usability of web-based applications. Our method is based on remote and automatic capture and semi-automatic analysis of users behavior, in order to find usability problems in the applications' interfaces. The goal of our method is to allow an analysis of the way users actually interact with the evaluated interface. Through the analysis of users behavior is possible to find patterns of interaction. Analyzing the patterns found and comparing it to the expecte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…The analysis of the data was executed following the activities described in the WebHint method [12] [13].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The analysis of the data was executed following the activities described in the WebHint method [12] [13].…”
Section: Discussionmentioning
confidence: 99%
“…In the second study, we had 17 users participating of the study as volunteers. The usability studies were carried out following the steps described in the WebHint method [12] [13]. The method consists of three main activities: Task Definition, User Interaction Capture and Data Analysis, as described bellow.…”
Section: Usability Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples are WebHint [17], WebRemUsine [18,19], and ReModEl [20]. With respect to Ivory and Hearst [16], these methods belong to the groups capture and analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The use of proxies to get the same information as Web server logs has been exploited in terms of showing paths and measuring timings at each Web page [5]. There have been visualization approaches that gave easily understandable insight into the users' behaviour performing a series of task [4], as well as methods that avoid predefining the users' interaction by letting them interact freely to then isolate the tasks to be evaluated from the data [12]. As we stated before, both approaches are biased as they only give insight into the use of those predefined task models.…”
Section: Related Literaturementioning
confidence: 99%