15 research outputs found

    The impact of cultural context on web design for e-Government in South Africa

    Get PDF
    The role and power of ICT today, particularly the Internet, cannot be underestimated. The Internet has a great impact on the business environment, where a large majority of companies and organisations have made substantial investments in an online presence in the form of websites, as well as the IT infrastructure needed to improve business processes. In terms of websites, research has shown that it is critical to identify the target market of the site and the actual users, and to construct the site according to their specific needs and preferences. This is to a large extent the focus of the field of Human Computer Interaction. It therefore makes perfect sense that many software products and websites fail to meet the users‟ needs, as they are designed mainly by Western designers for Eastern and African users. In essence, the failure is due to the fact that the design does not accommodate the cultural behaviours, understandings and preferences of the intended users, thus making it difficult for them to use and adopt them. This has been confirmed by many researchers who have studied various culture dimensions and their relation to Web design. As mentioned, the role of the Internet in terms of its effect in the business world is becoming increasingly important. However, the Internet could prove to play an influential role in the public sector as well and could therefore be used as a critical tool by government in the form of e-Government. Many countries are adopting e-Government initiatives in an attempt to improve their relations within government itself and with their citizens and businesses. This would help them to render better service delivery and at the same time empower the citizens to also participate in the governance of the country itself. The concept for this dissertation was formulated in terms of three key ingredients: e-Government, culture dimensions and Web design. The purpose of this dissertation is to examine the way a specific culture dimension, referred to as the cultural-context dimension, which focuses on the communication process, can impact in Web design. Once this is achieved, it will be possible to determine how this can positively affect the design of the South African e-Government website so that the overall usability of the site may be improved. The improvements will be justified because the site would then match the cultural behaviours, perceptions and Web design preferences of South African users. In short, the goal of this III dissertation is to provide guidelines and recommendations that will improve the South African e-Government website (www.gov.za) by examining anthropologist Edward Hall‟s cultural-context dimension and its role in the Web design process

    A framework to evaluate usable security in online social networking

    Get PDF
    It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks

    A framework to evaluate usable security in online social networking

    Get PDF
    It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks

    Guidelines for the design of a mobile phone application for deaf people

    Get PDF
    Deaf people in South Africa are no longer a minority group and their needs regarding communication and interaction must therefore be taken into consideration. This demographic does not communicate and interact in the same way as hearing people, which means that any existing usability or accessibility guidelines do not apply. As a result, Deaf people do not have access to information in the same way that a hearing person does. Providing proper access to Information and Communications Technology services, which meet their particular needs, will help the hearing impaired to better integrate into society. The importance of demolishing the communication barrier between the hearing and the hearing impaired is very important. Many people assume that sign language is somehow based on oral language. However, this is not the case. Sign languages are natural visual-spatial languages, and form a contrast with spoken languages which are auditory-vocal based. Acknowledging this fact in 2008, the South African Sign Language Policy Implementation Conference together with several governmental bodies suggested that South African Sign Language should become recognized as the 12th official language of South Africa. Due to the fact that cell phone technology continues to evolve, it will remain a tool of communication upon which Deaf people heavily rely on. The cell phone fulfils a basic need for everyone, but especially for the Deaf demographic as they rely on the short message system to communicate. Deaf people are currently faced with a lack of appropriate mobile phone applications, which would allow them to communicate with hearing as well as deaf people. The primary objective of this research was therefore to make mobile technology equally accessible meaning usable to members of the Deaf demographic. The focus of the research was to investigate the communication barrier and a range of variables that can influence the deaf user’s experience. Topics such as user interface design, usability and interaction were investigated. The outcome of this research was to propose a set of guidelines that, when applied to the design of a website or to phone application accessibility, would ensure communication and interaction from a deaf user. The proposed set of guidelines was then applied to the design of the high fidelity prototype of a mobile phone application. The specific application is a messaging phone application that allows deaf users to communicate with other deaf and hearing users via short message system. A mobile phone application that allows Deaf people to send and receive messages based on the sign language alphabet. The application was named Signchat. Purpose of this was to visibly display how the guidelines were implemented in Signchat. While Signchat’s main purpose is to accommodate the needs of Deaf people, it is also a learning tool and an application that bridges the gap by allowing deaf and hearing users to communicate

    Guidelines for the design of a mobile phone application for deaf people

    Get PDF
    Deaf people in South Africa are no longer a minority group and their needs regarding communication and interaction must therefore be taken into consideration. This demographic does not communicate and interact in the same way as hearing people, which means that any existing usability or accessibility guidelines do not apply. As a result, Deaf people do not have access to information in the same way that a hearing person does. Providing proper access to Information and Communications Technology services, which meet their particular needs, will help the hearing impaired to better integrate into society. The importance of demolishing the communication barrier between the hearing and the hearing impaired is very important. Many people assume that sign language is somehow based on oral language. However, this is not the case. Sign languages are natural visual-spatial languages, and form a contrast with spoken languages which are auditory-vocal based. Acknowledging this fact in 2008, the South African Sign Language Policy Implementation Conference together with several governmental bodies suggested that South African Sign Language should become recognized as the 12th official language of South Africa. Due to the fact that cell phone technology continues to evolve, it will remain a tool of communication upon which Deaf people heavily rely on. The cell phone fulfils a basic need for everyone, but especially for the Deaf demographic as they rely on the short message system to communicate. Deaf people are currently faced with a lack of appropriate mobile phone applications, which would allow them to communicate with hearing as well as deaf people. The primary objective of this research was therefore to make mobile technology equally accessible meaning usable to members of the Deaf demographic. The focus of the research was to investigate the communication barrier and a range of variables that can influence the deaf user’s experience. Topics such as user interface design, usability and interaction were investigated. The outcome of this research was to propose a set of guidelines that, when applied to the design of a website or to phone application accessibility, would ensure communication and interaction from a deaf user. The proposed set of guidelines was then applied to the design of the high fidelity prototype of a mobile phone application. The specific application is a messaging phone application that allows deaf users to communicate with other deaf and hearing users via short message system. A mobile phone application that allows Deaf people to send and receive messages based on the sign language alphabet. The application was named Signchat. Purpose of this was to visibly display how the guidelines were implemented in Signchat. While Signchat’s main purpose is to accommodate the needs of Deaf people, it is also a learning tool and an application that bridges the gap by allowing deaf and hearing users to communicate

    Establishing usability heuristics for heuristics evaluation in a specific domain: is there a consensus?

    Get PDF
    Heuristics evaluation is frequently employed to evaluate usability. While general heuristics are suitable to evaluate most user interfaces, there is still a need to establish heuristics for specific domains to ensure that their specific usability issues are identified. This paper presents a comprehensive review of 70 studies related to usability heuristics for specific domains. The aim of this paper is to review the processes that were applied to establish heuristics in specific domains and identify gaps in order to provide recommendations for future research and area of improvements. The most urgent issue found is the deficiency of validation effort following heuristics proposition and the lack of robustness and rigour of validation method adopted. Whether domain specific heuristics perform better or worse than general ones is inconclusive due to lack of validation quality and clarity on how to assess the effectiveness of heuristics for specific domains. The lack of validation quality also affects effort in improving existing heuristics for specific domain as their weaknesses are not addressed

    European Union digital education framework : a quality standard to guide the design of healthcare apps

    Get PDF
    Digital Education Initiatives and Timely Solutions (DIG-IT) is an Erasmus+ project collaboration between university academics, clinical educators, industry partners, healthcare professionals, and technology experts over 5 European Union (EU) states. The objectives are to create digital educational capacity for academic faculty and mobile learning opportunities for continuing professional healthcare education. The first deliverable of this project was the innovative European Union Digital Education Quality Standards Framework and Toolkit or EU-DEF. This framework can be used to consider all principle and secondary aspects when designing, delivering, and evaluating digital education resources. In this article we explore the framework efficacy in collaboratively developing two open access, mobile healthcare apps, ECG Interpretation for Nurses and Nurse Leadership and Management. We describe the teamwork needed and steps taken during this process, and demonstrate the adaptability, usability, and value of this tool for other online development projects. The EU-DEF is an evidence-based, comprehensive framework that can be used as a starting point for individuals or teams when developing digital educational projects. Considering all variables helps focus the expertise required to produce robust end-products.peer-reviewe

    Interactive Software Technology for Deaf Users: Mapping the HCI Research Landscape that Focuses on Accessibility

    No full text
    The purpose of this paper is to chart research developments in HCI literature that focuses on accessibility for the deaf user group. A map for this particular landscape has been constructed based on a review of the four most relevant sources in HCI that focuses on accessibility, from 2000 to 2013. The map describes topics of research that are covered under the umbrella of Interactive Software Technology (IST) for deaf users in HCI literature that focuses on accessibility. To construct the map and identify these topics a systematic approach was applied, involving a number of stages and employing several research methods (literature review, focus group and card sorting). The resulting map, which underwent three revisions, consists of 23 code categories in total: 3 main categories, 8 subcategories, 7 second-level subcategories and 5 third-level subcategories. This paper can act as a guide for other researchers interested in conducting research within this landscape

    Development and Validation of an Evaluation Toolkit to Appraise eLearning Courses in Higher Education: A Pilot Study

    No full text
    The development and evaluation of eLearning approaches is a global trend in higher education today. This study aimed to develop a companion evaluation toolkit consisting of formative and summative assessment scales to evaluate academics’ experiences in designing, delivering, and evaluating eLearning. To test the psychometric properties of the companion evaluation toolkit, an instrument validation study was conducted. Items were created, then tested for content and face validity. A confirmatory factor analysis (n = 185 participants) for the summative assessment scale examined the underlying structure of the scale, while reliability was assessed using the Cronbach’s alpha coefficient. The results show that the model examined is consistent with the 3 factors (33 items) explaining a total of 62% of the variance. The results also show a high level of reliability for both the formative and summative scales that comprise the companion evaluation toolkit. The results of this study can be used and welcomed by both teachers and professionals involved in the development and use of learning management systems or in the design, delivery, and evaluation of the eLearning process
    corecore