These refer to organisation's ability to manage resources including employees and meeting their customer/user demands. New skills and capabilities can ensure growth and development in the long term and for organisations to improve their digital transformation efforts, they need to source fresh talent and nurture current skills within the organisations. In innovation management, the capabilities aspect mainly revolves around people's abilities, unique insights, and practical skills in the organisation.
Published in Chapter:
Human-Centered Design to Enhance the Usability, Human Factors, and User Experience Within Digital Destructive Ecosystems
Heru Susanto (Brunei University of Technology, Brunei & The Indonesian Institute of Sciences, Indonesia), Fahmi Ibrahim (Brunei University of Technology, Brunei), Saleem Haja Nazmudeen (Brunei University of Technology, Brunei), Fadzliwati Mohiddin (Brunei University of Technology, Brunei), and Desi Setiana (Ministry of Law and Human Right, Indonesia & University of Brunei Darussalam, Brunei)
Copyright: © 2021
|Pages: 19
DOI: 10.4018/978-1-7998-4787-8.ch005
Abstract
Human-centered design is an approach that focuses on involving the end user throughout the product development and testing process which can be crucial in ensuring that the product meets the needs and capabilities of the user, particularly in terms of user experience and safety. The structured and iterative nature of human-centered design can often be a challenge for the design team when faced with the necessary, rapid, product development life cycles associated with the competitiveness in the industry. This ensures that the needs of the user are taken into account throughout the design process whilst also maintaining a rapid pace of development, and its rationale before outlining how it was applied to assess and enhance the usability, human factors, and user experience within destructive digital ecosystem era. The authors encouraged a system approach such as human-centered design for prevention on further damages being done on data breaches through the application of each steps of the process.