How to Use Poka-Yoke (Mistake Proofing) Technique to Improve Software Quality

Software Engineering is a discipline that aims at producing high-quality software through a systematic, well-planned approach to software development.

It contains many good practices, following the standards to achieve the quality product. The three main phases of Software Development are Analysis – Design – Implementation. To accomplish high-quality software is essential to produce a defect-free product.

Poka yoke Technique

Software Process Engineering

Defect Management

The defect is the unexpected or undesired behavior that occurs in the product. Anything related to defect is a continual process, not a particular state.

Finding and fixing the defect in the early stage of Software Development reduces time, rework and money. Finding the defect in later stages always costs multiple times than the early stages. It enhances quality by adding reliability, portability, maintainability, etc.

Hence it is advisable every company should go with a Defect management system and defect management team at every stage of the development to attain good quality in products and to gain customer confidence.

One of such mistake-proofing technique is POKA-YOKE,

What Is Poka-Yoke?

It’s a quality assurance process introduced by Japanese engineer Shigeo Shingo. This term is used in the Japanese language as “Poka” meaning mistake and “Yoke” meaning prevent i.e. mistake preventing or mistake-proofing technique.

The purpose of Poka-Yoke is to develop processes to reduce defects by avoiding or correcting (design to show alerts or warning messages to the user) mistakes in early design and development phases. This technique is mostly used in manufacturing industries but now this effective technique is also adapted to software development processes as well.

Poka-Yoke example from a manufacturing industry

Poka yoke example from manufacturing

A good example of Poka-Yoke design from the manufacturing industry – SIM card slot in cell phones are designed in such a way that the user is allowed to insert SIM card in a correct way only. There is no chance for the user to make a mistake while putting the SIM card on a cell phone. This makes the design mistake proof.

Poka-Yoke example from a Software Application

Poka Yoke Software Example

The perfect example of Poka-yoke process in Software Application is – Gmail email attachments feature – when you type word ‘find attached’ while composing a new email and try to send it without attaching a file Google will show you a popup reminder saying that you used words “find attached” in your email but did not attach any files, do you still want to continue sending?

How Poka-Yoke Technique Works?

Steps to Implement a Poka-Yoke Process:

Below are a few steps to design and implement a process to prevent Software Defects:

  •  List all user scenarios or end-to-end test cases for the application.
  •  Analyze all these user scenarios by asking 5-whys questions to understand the ways these scenarios can fail.
  • Once you identify the ways these user scenarios can be wrong, design and apply a Poka-Yoke technique to avoid the possible problems (For Example, this design could be a simple Unit test to check if any function was written is working properly or not).
  • Make sure the technique designed to avoid the defect is working properly by giving errors or the warning message for incorrect input or handling of the user scenario.
  • Once the trial is passed add this technique to the list of Poka-Yoke processes to be performed each time on new release/build.  (In the above Unit testing example, once the unit test is written to check the function code, check if it is working for positive and negative values. When this test passes add it to ‘Unit tests’ repository to be executed each time any change is made in relevant modules)
  • Measure the success of this Poka-Yoke process. Check if this technique has really prevented or caught defects when happening.

Categories Of Poka-Yoke

  • Defect Prevention
  • Defect Detection

Defect Prevention is the most important activity in SDLC. This method is used to identify all possible issues and actions needed to eliminate those issues. Many software defects can be prevented in the design phase itself.

The Quality Assurance team can help to prevent these defects by reviewing the Software Requirement Specification documents. All issues identified in this stage are addressed in software coding phase and prevented from carrying to later stages.

The manufacturing and software industry examples provided above are good examples of defect prevention techniques.

Defect Detection is the most common task for quality assurance teams. QA teams use various approaches and strategies for executing test cases effectively. Defects are detected by many other testing methods like Smoke and Exploratory testing.

What Are The Qualities of a Good Poka-Yoke Process?

  • Poka-Yoke should be simple to create and maintain. It should be easy to handle and cost-effective. Maintaining a complex Poka-Yoke is time-consuming and often results in issues if not maintained properly.
  • Poka-Yoke should be designed early in SDLC so that it can detect issues quickly.
  • A good Poka-Yoke should be accurate enough to find issues when they occur.
  • A good Poka-Yoke should be designed in such a way that it should stop the most common issues occurring in the software.
  • It should be part of the Software Design and Coding process.

Need Of Poka-Yoke In Software Design Phase

To develop quality software, it is important to design it according to the user’s expectations. The user should be able to use/handle the software with ease without making any costly mistakes.

Poka-Yoke examples in design and quality

#1) An example of missing attachment files while composing an email using Gmail.

#2) Some websites show the password strength indicator to show password strength. It also guides users to use a strong password with combinations of characters and numbers.

Poka yoke example 2

#3) Google search engine feature to auto-suggest spelling corrections for the user search query. This helps users to avoid making inadvertent mistakes.

Poka yoke example 3

#4) Banking websites use double text field feature to accept sensitive information like passwords or account numbers. The second text field is usually encrypted to avoid making any mistake while providing the input value and to check if both the text field values match.

The need for Poka-Yoke in Software Development

From countless industry examples, it’s now well known that the cost of fixing a defect after product release is many times greater than fixing it in the development cycle.

Further reading =>> What is the Cost of Quality (COQ)?

The best solution to avoid post-release issues is introducing the Poka-Yoke techniques which could catch defects in early development phases making it cheaper to fix. Poka-Yoke process implementation largely depends on the Tester’s ability to capture and eliminate the issues.

Poka-Yoke examples in Software Development

  1. Unit testing is one of the most effective means of mistake-proofing software development.
  2. Having validation Poka-Yoke in the kit is always a good suggestion for developers. Validation mistakes should be handled in your code. These validation issues should be revisited and updated periodically.
  3. A common and most effective Poka-Yoke is to hire the right candidates to mistake-proof your software.


Making mistakes is OK; just don’t make the same mistake again and again. And to avoid making the same mistakes again there should be some checks or processes in place. Poka-Yoke techniques are developed to solve this problem.

Article References:
  • Shigeo Shingo, Zero Quality Control
  • Wikipedia reference
  • Boris Beizer, Software Testing Techniques, 2nd ed. Van Nostrand Reinhold

About Author: This is a guest post by Nataraj Kanchyani. He is working as a Senior Software Engineer-Testing at Centurylink Technologies India Pvt Ltd, Bangalore.

Do you have any experience working on this technique? Or have you ever worked on developing such defect prevention and detection processes? Let us know in the comments below.

Recommended Reading

22 thoughts on “How to Use Poka-Yoke (Mistake Proofing) Technique to Improve Software Quality”

  1. We used some of the techniques like unit testing and SRS review but did not heard about this term.
    thanks for sharing learned something new.

  2. FMEA (Failure Mode Effect Analysis) is also one of the technique used to identify the risks and mitigate them in the Design.
    How this Poka-Yoke is the difference from FMEA?
    Is it an another techinical term for FMEA?

  3. @BasavaKumar M,
    FMEA – is a evaluation method for possible failures and impacts on system.Does this method contains possible preventive methods ? Not sure ..
    Poka-Yoke – It is a preventive system before failure.In very early stage we try to stop major issue.
    Ex: Now your login page handles 10 possible failures, later if you find/learn more preventive methods,then you need update poke-yoke to address these issues as well.
    But intension of both technique is same,that is to provide quality product.

  4. Good one.I dint heard about this term before and thanks for keeping the information in it,in a very simple and straight-forward way.This article will be a good guide to understand about different software testing techniques in the industry for the freshers like me.

  5. Nice job. If you explain this technique with a sample application or scenario, it will be much helpful. So that the testers will implement this technique easily.

  6. @ Shanudeen
    there are very nice and simple examples given in this post itself. for example the example of mistake proofing gmail feature to send email without attachment. Most users draft emails with words like attachments but they forget to attach the files. If they get popup message like Google gives user will not make any mistake using the application.

    this is the example of poka yoke in design phase wheer Google reduced the possibility of issues by desiging the application in such a way that most issues occuring while handling the application are already anticipated and taken care by design.

    hope this is helpful.

  7. Hi Nataraj,
    Great Information!
    I really more enjoyed read this article.
    At ITCombine we believe in providing with cost effective solutions for combining technology with business goals. ITCombine can boast of expertise in providing diversified services at one place, with high proficiency.

  8. Hi Nataraj,
    It is a nice article. But i need to know if we can use Poka-Yoke in a Validation testing which is predominant while dealing with Software’s used by Life Sciences industry where restrictions on the type of testing are quite a lot.

  9. Good article, nicely written.

    Poka-yoke is defect prevention technique; That is, you can never make a mistake when the system is in place.
    Poka yoke system prevents you from making defects/problems

    1. For some front/Top load washing machines, without the lid closed correctly, we can not operate it. So the door lock mechanism is poka-yoke here.

    2. Lid lock system in mixer grinders – You can not open the lid of mixer while grinding. Some mixers have double lock, you wont be able to operate unless jar is fixed correctly.

    2. Elevator sensors – Doors will not be closed if any object is in between the doors. The sensor system is acting as the poka-yoke here. With this, Nothing(no one) will get trapped in between the doors.

    3. Ignition in vehicles – Without applying breaks, you can not start a vehicle. So that the driver will never lose control of the vehicle while starting it.

    In software context, password system is the best example, allowing only right people to enter the system.

    Another example is ‘I agree’ check box/ button for sign up/ installations. This will be unchecked by default, a break point for the user to be careful.

    Similar example is CAPTCHA, to avoid spam in websites.

    Even our office swipe card is a poka-yoke, prevents any outsiders to enter company premises.


Leave a Comment