7 research outputs found

    Closing the digital gap: handheld computing, adult first-time users, and a user experience metric model

    Get PDF
    This thesis assesses the speed of adaptation and adoption of computing systems from an adult first-time user perspective in South Africa, with the aim of determining if it could ultimately lead to the reduction of the existing digital gap. As is evident from the social, educational, and economical gap for some observers, the reality of the existence of the digital gap in South Africa is undeniable. Constant non-targeted progress is made toward addressing imbalances, which seem to be more visible as the number of constant and permanent users is visibly increasing. These observed phenomena are mostly noticed amongst urban, educated, younger, middle-class citizens. The forgotten “missing middle” are left to fend for themselves. These are people who are still outside the digital drive the world is experiencing based on their schooling grade, geographical location, income level, and age. They were not in school when computer literacy was introduced, and they were too poor to teach themselves how to use a computer, too remote to observe the digital drive, and too old to learn from their peers. As citizens, their welfare matters, and when assessing the penetration of ICT in the country, their numbers also matter. One cannot ignore their presence and the difficulties and frustration that they experience when coming into contact with a computing system for the first time. The researcher is of the view that the presence of a computing system may not simply translate to the closure of the digital gap. In other words, people may gain access to a computer, but without computing usability skills or Internet connectivity it may not add value to their daily activities. Closing the digital gap in South Africa can be seen as political propaganda, but the reality is, how do we measure and assess it? It comes down to users, and in this particular case, attention is turned to the “missing middle”, here referred to as the adult first-time user. This is simply someone who is over the age of 18 years, lives in a rural community in South Africa, never completed school, and is using a computer for the first time. The researcher used a handheld tablet system as a tool to assess the participants’ adequacy in terms of the rate at which they complete tasks by developing mathematical equations which were placed together within an assessment metric that was later used to determine user proficiency, as well as their adaptation and user experience in order to determine if the participant can later adopt the device and take advantage of it. By so doing, the metric will comprise variables such as the user movement time, task completion success rate, task completion speed, user satisfaction, user reaction time, user completion rate per activity, time-based efficiency, and the assessment of the level of frustration any adult first-time user may experience while interacting with the system for the first time. The term “digital gap” may not be new to the ICT sphere, but no one has taken the step towards assessing it. The digital gap is no longer the absence of computing systems in many communities but rather the presence of inadequate user experience, which has not been properly measured and documented. The user experience metric (UXM) that was developed in this study provided the researcher with the opportunity to reassess the issue of systems adaptation, adoption, and usability by adult first-time users. This research is particularly driven by sound interaction design principles, user adaptation, and usability and user experiencePh. D. (Information Systems)School of Computin

    Computer usability : interactive challenges faced by less experienced computer users in South Africa

    Get PDF
    Abstract:The growing use of applications and access to the internet has increased the number of average computer users in South Africa, as people are using applications like WhatsApp, Facebook, Twitter, Instagram, and more. The goal of the study is to identify the challenges that most South African people face when they are interacting with computer applications, web applications, and mobile applications. The reason for conducting the study is that lately in South Africa we have seen an increase in South Africans who have access to computer systems, such as the use of smartphones, tablets or iPads, game consoles, and laptops. Most of the people who are using these devices or have access to them still face challenges as to how to use these devices or to use some of the applications that come with these devices. The paper will begin by introducing the topic. The paper will be followed by a literature review section, which will include four topics relating to the topic that helped the researcher to build a foundation for the research topic and to get ideas on how to do the research. The paper will then be followed by the research methodology, and the findings of, and discussions flowing from the study will then follow

    Adult first-time user of handheld computer system : challenges

    Get PDF
    Abstract: Handheld computing systems or devices can be defined as exceptionally portable, independent information management and communication devices. Furthermore, handheld computing systems or devices can be seen as a small or pocket-sized computing device with a touch screen keyboard and input and output interface. According to the definition of handheld computing systems, numerous devices fit the description such as smartphones, personal digital assistants (PDAs) and pagers. However, adult first- time users of computer systems face different issues in adopting the device and the literature reviewed shows that most of them have difficulties with the design, such as the touch screen. The negative views of technology devices by adult first-time users can be attributed to the difficulty in adapting to new technology. Weakness, incapacity, distrust of technology, absence of perceived value and trouble in understanding how to utilise the device are largely the main problems observed by adult first-time users of handheld computer systems. However, they could accept the use of the devices provided their needs are taken into consideration by the developers. The limitation of the research was that only adults in the age range of 55 to 91 in Gauteng in South Africa were chosen for this research

    INTERACT 2015 Adjunct Proceedings. 15th IFIP TC.13 International Conference on Human-Computer Interaction 14-18 September 2015, Bamberg, Germany

    Get PDF
    INTERACT is among the world’s top conferences in Human-Computer Interaction. Starting with the first INTERACT conference in 1990, this conference series has been organised under the aegis of the Technical Committee 13 on Human-Computer Interaction of the UNESCO International Federation for Information Processing (IFIP). This committee aims at developing the science and technology of the interaction between humans and computing devices. The 15th IFIP TC.13 International Conference on Human-Computer Interaction - INTERACT 2015 took place from 14 to 18 September 2015 in Bamberg, Germany. The theme of INTERACT 2015 was "Connection.Tradition.Innovation". This volume presents the Adjunct Proceedings - it contains the position papers for the students of the Doctoral Consortium as well as the position papers of the participants of the various workshops

    The role of open source software in higher education institutions

    Get PDF
    M.Tech.This research endeavour offers a holistic approach to software systems adoption within the higher education (HE) systems of developing countries at a time when the cost of licensing fees seems to be negatively affecting their annual operational budgets. This study will investigate the pros and cons of adopting open source software (OSS) in HE institutions and from an academic perspective, also investigate how a particular software platform can be beneficial to students’ acquisition of knowledge. The investigation also aims to improve cost control. There are two types of software platforms: OSS and proprietary systems (PS). The former, OSS, is remarkable not only for its ease of access but also for public access of its source code. Proprietary software is said to be more advanced, stable, reliable and effective but very expensive and does not allow users to access its source code. Some argue that OSS is financially viable for HE institutions as an ideal platform for academic experimental learning, peer criticisms, student source code reviews through error tracing, and most importantly, for offering the Information Communication Technology (ICT) student a unique opportunity to master systems code writing without being bound to a particular vendor or commercial product. On the other hand, there are academic ICT experts who question the quality of OSS source code and supporting systems documents. They argue that the cost of maintenance, training and staff salaries for OSS can outweigh properly implemented PS. As most HE institutions experience annual budget cuts, the need to reduce ICT operational costs becomes a priority. These costs can be seriously reduced if software royalty fees can be better controlled and prioritised. Data for this research was gathered through surveys from students, lecturers, computer industry experts and administrative staff of HE institutions in the province of Gauteng, the economic hub of South Africa

    Improving information privacy and security : strengthening digital literacy in organisations

    Get PDF
    Abstract: In a world of instant information, information privacy and security are under constant attack. With that being the case, organisations are expected to comply with regulations of securing and ensuring that information assets are protected. Employees are also expected to operate within the set frameworks that have been adopted by the organisation, which brings about the question of digital literacy among the workforce in order to achieve the set goals. The security of information alludes to the manner in which information is stored, processed and transmitted in order to comply with the organisation’s information systems frameworks. The privacy of information can be described as the safeguarding of information related to a particular subject’s identity. In addition, the security of information is a significant instrument for ensuring information resources and business goals, while privacy is centred on the safety of a person's rights and privileges concerning similar information

    Quelles aires protégées pour l’Afrique de l’Ouest ?

    No full text
    Concilier conservation dans les aires protégées et développement des populations locales exige une bonne connaissance de la dynamique des systèmes naturels et sociaux. Issu d’un séminaire interdisciplinaire qui a réuni les partenaires de 16 pays, en majorité africains, ce CD-ROM présente les données biologiques et sociales permettant de questionner les pratiques en cours dans les aires protégées d’Afrique de l’Ouest. Il s’adresse aux scientifiques, aux gestionnaires et aux décideurs.Reconciling conservation in protected areas and development for the local people requires a good knowledge of the dynamics of natural and social systems. The result of an interdisciplinary seminar which brought together participants of 16 countries, mostly African, this work presents biological and social data in support of a re-consideration of the practices in progress in the protected areas of West Africa. It is intended as much for scientists as for managers and decision-makers
    corecore