Search results

1 – 10 of 251
Article
Publication date: 9 December 2011

Simon Judge and Marcus Friday

Ambiguous keyboards” and “disambiguation processes” are becoming universally recognised through the popularisation of “predictive text messaging” on mobile phones. As this paper…

Abstract

Purpose

Ambiguous keyboards” and “disambiguation processes” are becoming universally recognised through the popularisation of “predictive text messaging” on mobile phones. As this paper shows, although originating in the AT and AAC fields, these terms and techniques no longer appear to be widely understood or adopted by practitioners or users. The purpose of this paper is to introduce these techniques, discussing the research and theory around them, and to suggest them as AT and AAC strategies to be considered by practitioners and users.

Design/methodology/approach

This is a conceptual paper that describes the use of ambiguous keyboards and disambiguation. The hypothesis of the paper is that ambiguous keyboards and disambiguation processes offer potential to increase the efficiency and effectiveness of AAC and should thus be considered further in research and practice.

Findings

The two broad methods for removing the ambiguity from the output of an ambiguous keyboard are presented. A summary of the literature around the use of disambiguation processes provided and the use of disambiguation processes for AAC discussed.

Originality/value

This paper suggests that ambiguity should be adopted as a characteristic of an AAC keyboard as should the method of removing ambiguity – namely either coding or a disambiguation process.

Content available
Article
Publication date: 9 December 2011

Michael Clarke and Jannet Wright

1044

Abstract

Details

Journal of Assistive Technologies, vol. 5 no. 4
Type: Research Article
ISSN: 1754-9450

Article
Publication date: 13 March 2017

Kristen K. Greene and Yee-Yin Choong

The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect…

Abstract

Purpose

The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect information system security, such complexity does not have to mean ambiguity for users. While many aspects of passwords have been studied, no research to date has systematically examined how ambiguous terminology affects user comprehension of password rules.

Design/methodology/approach

This research used a combination of quantitative and qualitative methods in a usable security study with 60 participants. Study tasks contained password rules based on real-world password requirements. Tasks consisted of character-selection tasks that varied the terms for non-alphanumeric characters to explore users’ interpretations of password rule language, and compliance-checking tasks to investigate how well users can apply their understanding of the allowed character space.

Findings

Results show that manipulating password rule terminology causes users’ interpretation of the allowed character space to shrink or expand. Users are confused by the terms “non-alphanumeric”, “symbols”, “special characters” and “punctuation marks” in password rules. Additionally, users are confused by partial lists of allowed characters using “e.g.” or “etc.”

Practical implications

This research provides data-driven usability guidance on constructing clearer language for password policies. Improving language clarity will help usability without sacrificing security, as simplifying password rule language does not change security requirements.

Originality/value

This is the first usable security study to systematically measure the effects of ambiguous password rules on user comprehension of the allowed character space.

Details

Information & Computer Security, vol. 25 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 17 September 2020

Joseph R. Priester and Monique A. Fleming

The phenomenon of creativity spans research topics across Marketing and Consumer Behavior. Interest in, and research on, creativity has grown over the past several decades. With…

Abstract

The phenomenon of creativity spans research topics across Marketing and Consumer Behavior. Interest in, and research on, creativity has grown over the past several decades. With this heightened attention comes the question of how best to conceptualize and measure creativity. This question is addressed by reviewing the conceptualizations and measures used in the psychological study of creativity. From this review, we build a framework by which to analyze papers from the Journal of Consumer Research and the Journal of Marketing Research. Based upon this analysis, we provide recommendations and best practices for future research. Of particular importance, we recommend the use of convergent problem-solving tasks in combination with ratings of novelty and usefulness reported separately. Such measures allow one to distinguish between instances of effective-creativity (when an idea is both novel and useful) and instances of quasi-creativity (when an idea is novel but lacks usefulness). The importance of the framework to research and analysis beyond the experimental paradigm is discussed.

Details

Continuing to Broaden the Marketing Concept
Type: Book
ISBN: 978-1-78754-824-4

Keywords

Book part
Publication date: 6 July 2005

Allison K. Wisecup, Miller McPherson and Lynn Smith-Lovin

Gender constitutes one of the fundamental distinctions that organize social interaction. It is a salient social distinction in all societies, is a core personal identity for…

Abstract

Gender constitutes one of the fundamental distinctions that organize social interaction. It is a salient social distinction in all societies, is a core personal identity for social actors, and is often used to generate expectations for competence in task-focused mixed-sex groups. In this chapter, we explore the effect of androgynous (gender ambiguous) appearance on task performance of observers. We demonstrate that it takes longer for research participants to define the gender identity of such individuals. More importantly, we hypothesize that since androgynous individuals do not fit easily into gender schemas that people use to access information about interaction partners, the presence of an androgynous-looking person will slow performance on a cognitive task. An experimental study supports both hypotheses. We conclude with suggestions about how the presence of non-stereotypical interaction partners with ambiguous identities might influence group members’ task performance, cognitive inferences about and affective responses to other group members.

Details

Social Identification in Groups
Type: Book
ISBN: 978-0-76231-223-8

Article
Publication date: 2 October 2017

Rakesh Babu and Iris Xie

The purpose of this study is to explore design issues hampering the accessibility of digital libraries (DLs) for first-time blind users.

1611

Abstract

Purpose

The purpose of this study is to explore design issues hampering the accessibility of digital libraries (DLs) for first-time blind users.

Design/methodology/approach

A combination of questionnaire, pre-interview, think-aloud and post-interview methods was used to collect data on non-visual interaction experiences with American Memory Digital Collection (AMDC) from 15 blind participants. Qualitative analysis via open coding revealed recurring themes on design problems and consequent difficulties for blind users in accessing DLs.

Findings

It was found that AMDC is not blind-friendly. Five categories of design problems were identified. Participants faced difficulty perceiving, operating and understanding content and controls needed for information retrieval.

Research limitations/implications

This paper does not offer a comprehensive set of design issues prevalent across DL design models, instead it focuses on design problems observed in a publicly available DL.

Practical implications

This paper raises awareness of design choices that can unintentionally bar blind information seekers from DL access, and further suggests solutions to reduce these design problems for blind users.

Originality/value

The paper’s originality is its identification of unique design problems that prevent blind users from effectively interacting with DLs.

Article
Publication date: 1 February 1981

R.G. Woods and C.M. Phillips

Automation is no longer an option; it is no longer “if” but “when” and “how”. This book has been written for senior librarians who recognise this, for their line managers to whom…

Abstract

Automation is no longer an option; it is no longer “if” but “when” and “how”. This book has been written for senior librarians who recognise this, for their line managers to whom the detailed work has been delegated, and for the junior staff, library and clerical, who need to know not only how to operate a system, but why it works as it does.

Details

Library Management, vol. 2 no. 2
Type: Research Article
ISSN: 0143-5124

Article
Publication date: 25 September 2009

Mireia Ribera, Merce Porras, Marc Boldu, Miquel Termens, Andreu Sule and Pilar Paris

The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development.

1920

Abstract

Purpose

The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development.

Design/methodology/approach

In order to compare WCAG 2.0 with WCAG 1.0 a diachronic analysis of the evolution of these standards is done. Known authors and publications in the field, the Web Accessibility Initiative (WAI) web pages, WebAIM and the blogosphere were also monitored for comments and third‐party analyses. The analysis of the main changes from WCAG 1.0 to WCAG 2.0 was based on personal experience with WAI guidelines, experimentation with some of the new guidelines, and a selection of best practice online services in the application of the WCAG, including WAI documentation.

Findings

WCAG 2.0 is more educational and is applied to more technologies than WCAG 1.0. The limitations of WCAG 1.0 are mostly due to its origin. In changing from one to the other, new priorities and new elements must be taken into account. The paper concludes that though these guidelines are a useful tool for governments, they are only the first step towards accessibility, which can only be achieved through user‐centred design.

Originality/value

This paper explains the significance and limitations of the WCAG and gives a short guide to adapting web sites to the new regulations.

Details

Program, vol. 43 no. 4
Type: Research Article
ISSN: 0033-0337

Keywords

Article
Publication date: 22 March 2011

Wen Guang Qu and Zhongming Wang

Little research to date has investigated how firm experience and industry experience in related inter‐organizational systems (IOS) affect the adoption of open IOS. The purpose of…

1102

Abstract

Purpose

Little research to date has investigated how firm experience and industry experience in related inter‐organizational systems (IOS) affect the adoption of open IOS. The purpose of this paper is to address this issue.

Design/methodology/approach

Based on large‐scale archival data from European countries, logistic regression was used to test the research model.

Findings

It was found that firm experience in EDI and experience in proprietary IOS positively affect the adoption of open IOS; industry experience in EDI and experience in proprietary IOS have a negative effect on the adoption of open IOS; and industry experience in open IOS has a positive effect on the adoption of open IOS.

Research limitations/implications

One main limitation is that the measures of the variables are based on single‐item and dichotomic scales. Also, this study only focused on the industry level and alternative explanations for the results have not been ruled out. The main implication is that IOS experience at firm and industry levels should be distinguished, as they can have different effects on the adoption of open IOS.

Originality/value

This paper is among the first that examines how the experience in prior generations of IOS affects the adoption of open IOS. Furthermore, the authors expand the literature by distinguishing IOS experience at two levels – firm level and industry level and show that it is necessary to recognize the different roles of different types of experience.

Details

Industrial Management & Data Systems, vol. 111 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 February 1989

Clifton P. Campbell

Job analysis is the common basis for designing a training course orprogramme, preparing performance tests, writing position (job)descriptions, identifying performance appraisal…

2671

Abstract

Job analysis is the common basis for designing a training course or programme, preparing performance tests, writing position (job) descriptions, identifying performance appraisal criteria, and job restructuring. Its other applications in human resource development include career counselling and wage and salary administration. Job analysis answers the questions of what tasks, performed in what manner, make up a job. Outputs of this analytical study include: (a) a list of the job tasks; (b) details of how each task is performed; (c) statements describing the responsibility, job knowledge, mental application, and dexterity, as well as accuracy required; and (d) a list of the equipment, materials, and supplies used to perform the job. Various techniques for conducting a job analysis have been used. Each has its advantages and disadvantages. As a result, different techniques or combinations of techniques are appropriate to different situations. The combined on‐site observation and individual interview techniques are recommended for industrial, trade, craft, clerical, and technical jobs because they generate the most thorough and probably the most valid information. A job analysis schedule is used to report the job information obtained through observations and individual interviews. The schedule provides a framework of 12 items in which to arrange and describe important job analysis information. These 12 items are organised into four sections. Section one consists of items one through four. These items identify the job within the establishment in which it occurs. The second section presents item five, the work performed. It provides a thorough and complete description of the tasks of the job. The Work Performed section describes what the job incumbent does, how it is done, and why it is done. Section three presents items six through nine. These are the requirements placed on the job incumbent for successful performance. It is a detailed interpretation of the basic minimum (a) responsibility, (b) job knowledge, (c) mental application, and (d) dexterity and accuracy required of the job incumbent. The fourth section includes three items which provide background information on the job. These items are: (a) equipment, materials and supplies; (b) definitions of terms; and (c) general comments. Appendix A is a glossary of terms associated with job analysis. It is provided to facilitate more exacting communication. A job analysis schedule for a complex and a relatively simple job are included in Appendices B and C. These examples illustrate how important job analysis information is arranged and described. Appendix D provides a list of action verbs which are helpful when describing the manipulative tasks of a job.

Details

Journal of European Industrial Training, vol. 13 no. 2
Type: Research Article
ISSN: 0309-0590

Keywords

1 – 10 of 251