Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests, Second Edition
Dana Chisnell is an independent user researcher and usability consultant. She has done usability, user interface design, and technical communications consulting and development since 1982.
For more information, please access the author's website at
Table of Contents
Preface to the Second Edition.
Part One Usability Testing: An Overview.
Chapter 1 What Makes Something Usable?
Chapter 2 What Is Usability Testing?
Chapter 3 When Should You Test?
Chapter 4 Skills for Test Moderators.
Part Two The Process for Conducting a Test.
Chapter 5 Develop the Test Plan.
Chapter 6 Set Up a Testing Environment.
Chapter 7 Find and Select Participants.
Chapter 8 Prepare Test Materials.
Chapter 9 Conduct the Test Sessions.
Chapter 10 Debrief the Participant and Observers.
Chapter 11 Analyze Data and Observations.
Chapter 12 Report Findings and Recommendations.
Part Three Advanced Techniques.
Chapter 13 Variations on the Basic Method.
Chapter 14 Expanding from Usability Testing to Designing the User Experience.
Sign up now »
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes