1,251 research outputs found

    Web page enhancement on desktop and mobile browsers

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2013."February 2013." Cataloged from PDF version of thesis.Includes bibliographical references (p. 154-165).The Web is a convenient platform to deliver information, but reading web pages is not as easy as it was in 1990s. This thesis focuses on investigating techniques to enhance web pages on desktop and mobile browsers for two specific populations: non-native English readers and mobile users. There are three issues addressed in this thesis: web page readability, web page skimmability and continuous reading support on mobile devices. On today's primarily English-language Web, non-native readers encounter some problems, even if they have some fluency in English. This thesis focuses on content presentation and proposes a new transformation method, Jenga Format, to enhance web page readability. A user study with 30 non-native users showed that Jenga transformation not only improved reading comprehension, but also made the web page reading easier. On the other hand, readability research has found that average reading times for non-native readers has remained the same or even worse. This thesis studies this issue and proposes Froggy GX (Generation neXt) to improve reading under time constraints. A user study with 20 non-native users showed that Froggy GX not only enhanced reading comprehension under time constraints, but also provided higher user satisfaction than reading unaided. When using the Web on mobile devices, the reading situation becomes challenging. Even worse, context switches, such as from walking to sitting, static standing, or hands-free situations like driving, happen in reading in on-the-go situations, but this scenario was not adequately addressed in previous studies. This thesis investigates this scenario and proposes a new mobile browser, Read4Me, to support continuous reading on a mobile device. A user study with 10 mobile users showed that auto-switching not only provided significantly fewer dangerous encounters than visual-reading, but also provided the best reading experience.by Chen-Hsiang Yu.Ph.D

    Information Outlook, January 2007

    Get PDF
    Volume 11, Issue 1https://scholarworks.sjsu.edu/sla_io_2007/1000/thumbnail.jp

    See What I’m Saying? Comparing Intelligent Personal Assistant Use for Native and Non-Native Language Speakers

    Get PDF
    Limited linguistic coverage for Intelligent Personal Assistants (IPAs) means that many interact in a non-native language. Yet we know little about how IPAs currently support or hinder these users. Through native (L1) and non-native (L2) English speakers interacting with Google Assistant on a smartphone and smart speaker, we aim to understand this more deeply. Interviews revealed that L2 speakers prioritised utterance planning around perceived linguistic limitations, as opposed to L1 speakers prioritising succinctness because of system limitations. L2 speakers see IPAs as insensitive to linguistic needs resulting in failed interaction. L2 speakers clearly preferred using smartphones, as visual feedback supported diagnoses of communication breakdowns whilst allowing time to process query results. Conversely, L1 speakers preferred smart speakers, with audio feedback being seen as sufficient. We discuss the need to tailor the IPA experience for L2 users, emphasising visual feedback whilst reducing the burden of language production

    Evaluating readability as a factor in information security policies

    Get PDF
    This thesis was previously held under moratorium from 26/11/19 to 26/11/21Policies should be treated as rules or principles that individuals can readily comprehend and follow as a pre-requisite to any organisational requirement to obey and enact regulations. This dissertation attempts to highlight one of the important factors to consider before issuing any policy that staff members are required to follow. Presently, there is no ready mechanism for estimating the likely efficacy of such policies across an organisation. One factor that has a plausible impact upon the comprehensibility of policies is their readability. Researchers have designed a number of software readability metrics that evaluate how difficult a passage is to comprehend; yet, little is known about the impact of readability on the interpretation of information security policies and whether analysis of readability may prove to be a useful insight. This thesis describes the first study to investigate the feasibility of applying readability metrics as an indicator of policy comprehensibility through a mixed methods approach, with the formulation and implementation of a seven phase sequential exploratory fully mixed methods design. Each one was established in light of the outcomes from the previous phase. The methodological approach of this research study is one of the distinguishing characteristics reported in the thesis, which was as follows: * eight policies were selected (from a combination of academia and industry sector institutes); * specialists were requested their insights on key policy elements; * focus group interviews were conducted; * comprehension tests were developed (Cloze tests); * a pilot study of comprehension tests was organised (preceded by a small-scale test); * a main study of comprehension tests was performed with 600 participants and reduce that for validation to 396; * a comparison was made of comprehension results against readability metrics. The results reveal that the traditional readability metrics are ineffective in predicting human estimation. Nevertheless, readability, as measured using a bespoke readability metric, may yield useful insight upon the likely difficulty that end-users may face in comprehending a written text. Thereby, our study aims to provide an effective approach to enhancing the comprehensibility of information security policies and afford a facility for future research in this area. The research contributes to our understanding of readability in general and offering an optimal technique to measure the readability in particular. We recommend immediate corrective actions to enhance the ease of comprehension for information security policies. In part, this may reduce instances where users avoid fully reading the information security policies, and may also increase the likelihood of user compliance. We suggest that the application of appropriately selected readability assessment may assist policy makers to test their draft policies for ease of comprehension before policy release. Indeed, there may be grounds for a readability compliance test that future information security policies must satisfy.Policies should be treated as rules or principles that individuals can readily comprehend and follow as a pre-requisite to any organisational requirement to obey and enact regulations. This dissertation attempts to highlight one of the important factors to consider before issuing any policy that staff members are required to follow. Presently, there is no ready mechanism for estimating the likely efficacy of such policies across an organisation. One factor that has a plausible impact upon the comprehensibility of policies is their readability. Researchers have designed a number of software readability metrics that evaluate how difficult a passage is to comprehend; yet, little is known about the impact of readability on the interpretation of information security policies and whether analysis of readability may prove to be a useful insight. This thesis describes the first study to investigate the feasibility of applying readability metrics as an indicator of policy comprehensibility through a mixed methods approach, with the formulation and implementation of a seven phase sequential exploratory fully mixed methods design. Each one was established in light of the outcomes from the previous phase. The methodological approach of this research study is one of the distinguishing characteristics reported in the thesis, which was as follows: * eight policies were selected (from a combination of academia and industry sector institutes); * specialists were requested their insights on key policy elements; * focus group interviews were conducted; * comprehension tests were developed (Cloze tests); * a pilot study of comprehension tests was organised (preceded by a small-scale test); * a main study of comprehension tests was performed with 600 participants and reduce that for validation to 396; * a comparison was made of comprehension results against readability metrics. The results reveal that the traditional readability metrics are ineffective in predicting human estimation. Nevertheless, readability, as measured using a bespoke readability metric, may yield useful insight upon the likely difficulty that end-users may face in comprehending a written text. Thereby, our study aims to provide an effective approach to enhancing the comprehensibility of information security policies and afford a facility for future research in this area. The research contributes to our understanding of readability in general and offering an optimal technique to measure the readability in particular. We recommend immediate corrective actions to enhance the ease of comprehension for information security policies. In part, this may reduce instances where users avoid fully reading the information security policies, and may also increase the likelihood of user compliance. We suggest that the application of appropriately selected readability assessment may assist policy makers to test their draft policies for ease of comprehension before policy release. Indeed, there may be grounds for a readability compliance test that future information security policies must satisfy

    Amanda Schertzer English MA Portfolio

    Get PDF
    This is the final portfolio for my Master\u27s of Arts in English with a specialization in Professional Writing and Rhetoric. The information herein includes an analytical narrative and four projects that I feel best illustrate my knowledge, skills, and academic/ professional growth. These four pieces are titled Understanding, Retention, and Access as An Explanation for Absence of Medical Writing Style: Historical and Modern Perspectives, The Infographic: What Is It? Expressivist Pedagogy: An Applicable Approach? and Historical Fiction or Historical Inaccuracy? Historical Inaccuracies Within Little House on The Prairie by Laura Ingalls Wilder

    Blogging mastery: analyzing the key strategies behind successful blogs

    Get PDF
    Bloggers in the digital landscape have the power to shape consumer behavior and influence their peers. However, successfully running a blog demands time and commitment, similar to operating a small business. Yet, there is scant literature regarding successful practices and strategies that bloggers use to build their blogs and remain successful. This study explores bloggers\u27 most effective methods and strategies to establish themselves in their respective niches. The qualitative research study uses transcendental phenomenology to examine the lived experiences of successful bloggers, aiming to provide insights into their successful strategies, best practices, challenges, and insights for new bloggers. Twelve bloggers that met the criteria for inclusion were interviewed using 12 semi-structured open-ended questions. Thematic analysis was used to code and categorize the themes. The findings suggest that bloggers use various strategies to establish themselves in their respective niches and overcome challenges. The study results were integrated and used to develop the Blogger Success Framework to help established and aspiring bloggers navigate the digital landscape of blogging

    Social Knowledge Environments

    Get PDF
    Knowledge management represents a key issue for both information systems’ academics and practitioners, including those who have become disillusioned by actual results that fail to deliver on exaggerated promises and idealistic visions. Social software, a tremendous global success story, has prompted similarly high expectations regarding the ways in which organizations can improve their knowledge handling. But can these expectations be met, whether in academic research or the real world? This article seeks to identify current research trends and gaps, with a focus on social knowledge environments. The proposed research agenda features four focal challenges: semi-permeable organizations, social software in professional work settings, crowd knowledge, and crossborder knowledge management. Three solutions emerge as likely methods to address these challenges: designoriented solutions, analytical solutions, and interdisciplinary dialogue

    Pertanika Journal of Social Sciences & Humanities

    Get PDF

    Rulemaking in 140 Characters or Less: Social Networking and Public Participation in Rulemaking

    Get PDF
    Rulemaking—the process by which administrative agencies make new regulations—has long been a target for egovernment efforts. The process is now one of the most important ways the federal government makes public policy. Moreover, transparency and participation rights are already part of its legal structure. The first generation of federal erulemaking involved putting the conventional process online by creating an e-docket of rulemaking materials and allowing online submission of public comments. Now the Obama administration is urging agencies to embark on the second generation of technology-assisted rulemaking, by bringing social media into the process. In this Article we describe the initial results of a pilot Rulemaking 2.0 system, Regulation Room, with particular emphasis on its social networking and other Web 2.0 elements. Web 2.0 technologies and methods seem well suited to overcoming one of the principal barriers to broader, better public participation in rulemaking: unawareness that a rulemaking of interest is going on. We talk here about the successes and obstacles to social-media based outreach in the first two rulemakings offered on Regulation Room. Our experience confirms the power of viral information spreading on the Web, but also warns that outcomes can be shaped by circumstances difficult, if not impossible, for the outreach effort to control. There are two additional substantial barriers to broader, better public participation in rulemaking: ignorance of the rulemaking process, and the information overload of voluminous and complex rulemaking materials. Social media are less obviously suited to lowering these barriers. We describe here the design elements and human intervention strategies being used in Regulation Room, with some success, to overcome process ignorance and information overload. However, it is important to recognize that the paradigmatic Web 2.0 user experience involves behaviors fundamentally at odds with the goals of such strategies. One of these is the ubiquitousness of voting (through rating, ranking, and recommending) as “participation” online. Another is what Web guru Jacok Neilsen calls the ruthlessness of users in moving rapidly through web sites, skimming rather than carefully reading content and impatiently seeking something to do quickly before they move on. Neither of these behaviors well serves those who would participate effectively in rulemaking. For this reason, Rulemaking 2.0 systems must be consciously engaged in culture creation, a challenging undertaking that requires simultaneously using, and fighting, the methods and expectations of the Web

    Full Issue

    Get PDF
    corecore