41 research outputs found

    eCulture: examining and quantifying cultural differences in user acceptance between Chinese and British web site users

    Get PDF
    A thesis submitted for the degree of Doctor of Philosophy of the University of LutonThe World Wide Web (WWW) has become an important medium for communicating between people all over the world. It is regarded as a global system and is associated with a wide user and social system diversity. The effects of differing user-groups and their associated cultures on user acceptance of web sites can be significant, and as a result understanding the behaviour of web users in various cultures is becoming a significant concern. The eCulture research project is based on previous classical theories and research in culture. It applies a factorial experimental design strategy (the Taguchi method) in crosscultural usability / acceptability, together with other approaches such as semiotic analysis and card sorting. Two types of analysis, both top-down and bottom-up have been implemented to investigate differences in web site usability and acceptability between users from Mainland China and the United Kingdom. Based on experiments on web sites investigating the relationship between cultural issues and usability lacceptability aspects between Chinese and British web users, several issues, such as cultural factors, cognitive abilities, social semiotic differences and other issues have emerged. One of the goals has been to develop 'cultural fingerprints' for both web sites and users in different cultures. By comparing cultural and site fingerprints, usability and acceptability of web sites can be diagrammatically matched to the target culture. Experiments investigating qualitative factors and quantitative data collection and analysis based on the Taguchi method has led to the successful development of two versions of 'cultural fingerprint' for both web sites and target cultures in the UK and China. It has been possible to relate these studies to a wider body of knowledge, and to suggest ways in which the work may be extended in the future

    A Tool for Getting Cultural Differences in HCI

    Get PDF

    How relevant are Hofstede’s dimensions for inter-cultural studies? A replication of Hofstede’s research among current international business students

    Get PDF
    In the present study the cultural dimensions of the well known Dutch researcher Geert Hofstede were tested on a sample of international business students. The sample consisted of 1 033 students from the Netherlands, Germany, China, South Africa and Qatar. The findings of the present research contest many of Hofstede’s original findings. The dimensions power distance and long-term orientation show significant differences with Hofstede’s original country values. The dimensions individualism, masculinity and uncertainty avoidance show significant differences for half of the countries. No significant differences were found between male and female students. The results show– if anything – that Hofstede seems to be right with his warning to be careful with relatively small samples. Or, it might be that cultures are less stable after all.Keywords: Hofstede’s cultural dimensions; Dutch, German, Chinese, South African, Qatari business student

    Capturing cultural differences between UK and Malaysian drivers to inform the design of in-vehicle navigation systems

    Get PDF
    Attending to cultural diversity is important for products and technology intended for global placement, such as automobiles, yet many products (and associated interfaces) lack genuine cultural differentiation. For example, in-vehicle navigation systems are typically identical in form and function across world markets, differing only in the local language and map database. To capture and explore culturally-salient design factors, we utilised a scenario-based design methodology, involving 6 experienced drivers from the UK and Malaysia. Participants were asked to portray their ideal navigation system interface designs – by drawing pictograms and devising accompanying spoken messages – to direct drivers along 3 prescribed routes in the UK, Malaysia and Japan. Routes were presented using video and paper maps, with the order of presentation counterbalanced between groups; participants were not told in advance from which country each route was derived. Proposed designs highlight differences at a country level, which are consequently interpreted from a cultural perspective. For example, Malaysian drivers included a higher density of navigational elements in their designs, particularly in their home environment, compared to UK drivers. Malaysian drivers also created more incremental designs, particularly on the approach to a manoeuvre, suggesting a desire for greater navigational support at this point in the journey. Landmarks were consistently incorporated in designs, but differences were noted in cultural salience. Additionally, the phrasing of instructions (e.g. “go straight on”), nomenclature for road elements (e.g. ‘roundabout’) and distance declaration conventions (e.g. units) differed at a country level. The findings can be used to inform the design of culturally-attuned in-vehicle navigation systems

    Capturing cultural differences between UK and Malaysian drivers to inform the design of in-vehicle navigation systems

    Get PDF
    Attending to cultural diversity is important for products and technology intended for global placement, such as automobiles, yet many products (and associated interfaces) lack genuine cultural differentiation. For example, in-vehicle navigation systems are typically identical in form and function across world markets, differing only in the local language and map database. To capture and explore culturally-salient design factors, we utilised a scenario-based design methodology, involving 6 experienced drivers from the UK and Malaysia. Participants were asked to portray their ideal navigation system interface designs – by drawing pictograms and devising accompanying spoken messages – to direct drivers along 3 prescribed routes in the UK, Malaysia and Japan. Routes were presented using video and paper maps, with the order of presentation counterbalanced between groups; participants were not told in advance from which country each route was derived. Proposed designs highlight differences at a country level, which are consequently interpreted from a cultural perspective. For example, Malaysian drivers included a higher density of navigational elements in their designs, particularly in their home environment, compared to UK drivers. Malaysian drivers also created more incremental designs, particularly on the approach to a manoeuvre, suggesting a desire for greater navigational support at this point in the journey. Landmarks were consistently incorporated in designs, but differences were noted in cultural salience. Additionally, the phrasing of instructions (e.g. “go straight on”), nomenclature for road elements (e.g. ‘roundabout’) and distance declaration conventions (e.g. units) differed at a country level. The findings can be used to inform the design of culturally-attuned in-vehicle navigation systems

    How WEIRD is Usable Privacy and Security Research? (Extended Version)

    Full text link
    In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western, Educated, Industrialized, Rich, and Democratic) countries. This WEIRD skew may hinder understanding of diverse populations and their cultural differences. The usable privacy and security (UPS) field has inherited many research methodologies from research on human factor fields. We conducted a literature review to understand the extent to which participant samples in UPS papers were from WEIRD countries and the characteristics of the methodologies and research topics in each user study recruiting Western or non-Western participants. We found that the skew toward WEIRD countries in UPS is greater than that in HCI. Geographic and linguistic barriers in the study methods and recruitment methods may cause researchers to conduct user studies locally. In addition, many papers did not report participant demographics, which could hinder the replication of the reported studies, leading to low reproducibility. To improve geographic diversity, we provide the suggestions including facilitate replication studies, address geographic and linguistic issues of study/recruitment methods, and facilitate research on the topics for non-WEIRD populations.Comment: This paper is the extended version of the paper presented at USENIX SECURITY 202

    An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman

    Get PDF
    Authentication mechanisms provide the cornerstone for security for many distributed systems, especially for increasingly popular online applications. For decades, widely used, traditional authentication methods included passwords and PINs that are now inadequate to protect online users and organizations from ever more sophisticated attacks. This study proposes an improvement to traditional authentication mechanisms. The solution introduced here includes a one-time-password (OTP) and incorporates the concept of multiple levels and multiple channels – features that are much more successful than traditional authentication mechanisms in protecting users' online accounts from being compromised. This research study reviews and evaluates current authentication classes and mechanisms and proposes an authentication mechanism that uses a variety of techniques, including multiple channels, to resist attacks more effectively than most commonly used mechanisms. Three aspects of the mechanism were evaluated: 1. The security of multi-channel authentication (MCA) was evaluated in theoretical terms, using a widely accepted methodology. 2. The usability was evaluated by carrying out a user study. 3. Finally, the acceptability thereof was evaluated by asking the participants in study (2) specific questions which aligned with the technology acceptance model (TAM). The study’s analysis of the data, gathered from online questionnaires and application log tables, showed that most participants found the MCA mechanism superior to other available authentication mechanisms and clearly supported the proposed MCA mechanism and the benefits that it provides. The research presents guidelines on how to implement the proposed mechanism, provides a detailed analysis of its effectiveness in protecting users' online accounts against specific, commonly deployed attacks, and reports on its usability and acceptability. It represents a significant step forward in the evolution of authentication mechanisms meeting the security needs of online users while maintaining usability

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects
    corecore