Functions from your functional spec
Using one of the functions from your functional spec, write user instructions for ONE action (for example, if one of the functions is secure login, write the user steps for how to log in). Be sure to consider the four user questions. Then explain why your instructions are effective for the user in light of the various learning, input, and human cognition topics we have discussed throughout class.
into your account, you may have received an email upon registering containing a one-time use password code; if so, type this code instead of creating a new password for yourself at this step.
4. Click on “Log In” and wait for confirmation that you are successfully logged in (this may come in form of a welcome message).
These instructions are effective for users because they provide clear direction on how to complete their task and take into consideration potential user mistakes, such as typos when entering passwords from memory or confusion over whether they should enter an initial one-time-use password code or create their own long term password immediately out of registration. By providing explicit instructions on each step along with what action needs to be taken after each (typing username/password then clicking “Log In”), these steps meet all four user questions necessary for effective instruction - What do I need to do?, How do I do it?, When am I finished? and Why? The simplicity of these steps also allows users who have different levels of learning abilities to comprehend them without difficulty since there is no complex language used and no extra information given - just enough information necessary for successful completion of their goal: logging into their accounts securely using their existing usernames/passwords (or initial passwords). Additionally, breaking down tasks like logging into an account into smaller chunks helps reduce cognitive load on users by limiting them having to remember too many things at once (Parker et al., 2018) which can lead users feeling more confident about completing complex actions even without much prior experience with computers thanks improved usability design strategies like those employed here while still maintaining adequate security measures against breaches (Dillon & Morrissey, 2020).
References:
Dillon A., & Morrissey J., 2020) Usability Vs Security: Balancing Tradeoffs Between Design Choices And User Accessibility Experiences In Authentication Systems [Blog post]. Retrieved October 31st, 2020 From https://uxplanet.org/usability-vs-security-balancing-tradeoffs-between-design-choices-and-user accessibiltyexperiencesinauthenticationsystems--d816aab9e85f
Parker S., Hooper S., Farley H., Jones M., Edwards G., 2018) Cognitive Load Theory As A Way To Reframe Human–Computer Interaction Research [Journal article]. International Journal Of Human Computer Studies 111(5), 76–83