Search results
1 – 10 of 251“Ambiguous keyboards” and “disambiguation processes” are becoming universally recognised through the popularisation of “predictive text messaging” on mobile phones. As this paper…
Abstract
Purpose
“Ambiguous keyboards” and “disambiguation processes” are becoming universally recognised through the popularisation of “predictive text messaging” on mobile phones. As this paper shows, although originating in the AT and AAC fields, these terms and techniques no longer appear to be widely understood or adopted by practitioners or users. The purpose of this paper is to introduce these techniques, discussing the research and theory around them, and to suggest them as AT and AAC strategies to be considered by practitioners and users.
Design/methodology/approach
This is a conceptual paper that describes the use of ambiguous keyboards and disambiguation. The hypothesis of the paper is that ambiguous keyboards and disambiguation processes offer potential to increase the efficiency and effectiveness of AAC and should thus be considered further in research and practice.
Findings
The two broad methods for removing the ambiguity from the output of an ambiguous keyboard are presented. A summary of the literature around the use of disambiguation processes provided and the use of disambiguation processes for AAC discussed.
Originality/value
This paper suggests that ambiguity should be adopted as a characteristic of an AAC keyboard as should the method of removing ambiguity – namely either coding or a disambiguation process.
Details
Keywords
Kristen K. Greene and Yee-Yin Choong
The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect…
Abstract
Purpose
The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect information system security, such complexity does not have to mean ambiguity for users. While many aspects of passwords have been studied, no research to date has systematically examined how ambiguous terminology affects user comprehension of password rules.
Design/methodology/approach
This research used a combination of quantitative and qualitative methods in a usable security study with 60 participants. Study tasks contained password rules based on real-world password requirements. Tasks consisted of character-selection tasks that varied the terms for non-alphanumeric characters to explore users’ interpretations of password rule language, and compliance-checking tasks to investigate how well users can apply their understanding of the allowed character space.
Findings
Results show that manipulating password rule terminology causes users’ interpretation of the allowed character space to shrink or expand. Users are confused by the terms “non-alphanumeric”, “symbols”, “special characters” and “punctuation marks” in password rules. Additionally, users are confused by partial lists of allowed characters using “e.g.” or “etc.”
Practical implications
This research provides data-driven usability guidance on constructing clearer language for password policies. Improving language clarity will help usability without sacrificing security, as simplifying password rule language does not change security requirements.
Originality/value
This is the first usable security study to systematically measure the effects of ambiguous password rules on user comprehension of the allowed character space.
Details
Keywords
Joseph R. Priester and Monique A. Fleming
The phenomenon of creativity spans research topics across Marketing and Consumer Behavior. Interest in, and research on, creativity has grown over the past several decades. With…
Abstract
The phenomenon of creativity spans research topics across Marketing and Consumer Behavior. Interest in, and research on, creativity has grown over the past several decades. With this heightened attention comes the question of how best to conceptualize and measure creativity. This question is addressed by reviewing the conceptualizations and measures used in the psychological study of creativity. From this review, we build a framework by which to analyze papers from the Journal of Consumer Research and the Journal of Marketing Research. Based upon this analysis, we provide recommendations and best practices for future research. Of particular importance, we recommend the use of convergent problem-solving tasks in combination with ratings of novelty and usefulness reported separately. Such measures allow one to distinguish between instances of effective-creativity (when an idea is both novel and useful) and instances of quasi-creativity (when an idea is novel but lacks usefulness). The importance of the framework to research and analysis beyond the experimental paradigm is discussed.
Details
Keywords
Allison K. Wisecup, Miller McPherson and Lynn Smith-Lovin
Gender constitutes one of the fundamental distinctions that organize social interaction. It is a salient social distinction in all societies, is a core personal identity for…
Abstract
Gender constitutes one of the fundamental distinctions that organize social interaction. It is a salient social distinction in all societies, is a core personal identity for social actors, and is often used to generate expectations for competence in task-focused mixed-sex groups. In this chapter, we explore the effect of androgynous (gender ambiguous) appearance on task performance of observers. We demonstrate that it takes longer for research participants to define the gender identity of such individuals. More importantly, we hypothesize that since androgynous individuals do not fit easily into gender schemas that people use to access information about interaction partners, the presence of an androgynous-looking person will slow performance on a cognitive task. An experimental study supports both hypotheses. We conclude with suggestions about how the presence of non-stereotypical interaction partners with ambiguous identities might influence group members’ task performance, cognitive inferences about and affective responses to other group members.
Rakesh Babu and Iris Xie
The purpose of this study is to explore design issues hampering the accessibility of digital libraries (DLs) for first-time blind users.
Abstract
Purpose
The purpose of this study is to explore design issues hampering the accessibility of digital libraries (DLs) for first-time blind users.
Design/methodology/approach
A combination of questionnaire, pre-interview, think-aloud and post-interview methods was used to collect data on non-visual interaction experiences with American Memory Digital Collection (AMDC) from 15 blind participants. Qualitative analysis via open coding revealed recurring themes on design problems and consequent difficulties for blind users in accessing DLs.
Findings
It was found that AMDC is not blind-friendly. Five categories of design problems were identified. Participants faced difficulty perceiving, operating and understanding content and controls needed for information retrieval.
Research limitations/implications
This paper does not offer a comprehensive set of design issues prevalent across DL design models, instead it focuses on design problems observed in a publicly available DL.
Practical implications
This paper raises awareness of design choices that can unintentionally bar blind information seekers from DL access, and further suggests solutions to reduce these design problems for blind users.
Originality/value
The paper’s originality is its identification of unique design problems that prevent blind users from effectively interacting with DLs.
Details
Keywords
Automation is no longer an option; it is no longer “if” but “when” and “how”. This book has been written for senior librarians who recognise this, for their line managers to whom…
Abstract
Automation is no longer an option; it is no longer “if” but “when” and “how”. This book has been written for senior librarians who recognise this, for their line managers to whom the detailed work has been delegated, and for the junior staff, library and clerical, who need to know not only how to operate a system, but why it works as it does.
Mireia Ribera, Merce Porras, Marc Boldu, Miquel Termens, Andreu Sule and Pilar Paris
The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development.
Abstract
Purpose
The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development.
Design/methodology/approach
In order to compare WCAG 2.0 with WCAG 1.0 a diachronic analysis of the evolution of these standards is done. Known authors and publications in the field, the Web Accessibility Initiative (WAI) web pages, WebAIM and the blogosphere were also monitored for comments and third‐party analyses. The analysis of the main changes from WCAG 1.0 to WCAG 2.0 was based on personal experience with WAI guidelines, experimentation with some of the new guidelines, and a selection of best practice online services in the application of the WCAG, including WAI documentation.
Findings
WCAG 2.0 is more educational and is applied to more technologies than WCAG 1.0. The limitations of WCAG 1.0 are mostly due to its origin. In changing from one to the other, new priorities and new elements must be taken into account. The paper concludes that though these guidelines are a useful tool for governments, they are only the first step towards accessibility, which can only be achieved through user‐centred design.
Originality/value
This paper explains the significance and limitations of the WCAG and gives a short guide to adapting web sites to the new regulations.
Details
Keywords
Wen Guang Qu and Zhongming Wang
Little research to date has investigated how firm experience and industry experience in related inter‐organizational systems (IOS) affect the adoption of open IOS. The purpose of…
Abstract
Purpose
Little research to date has investigated how firm experience and industry experience in related inter‐organizational systems (IOS) affect the adoption of open IOS. The purpose of this paper is to address this issue.
Design/methodology/approach
Based on large‐scale archival data from European countries, logistic regression was used to test the research model.
Findings
It was found that firm experience in EDI and experience in proprietary IOS positively affect the adoption of open IOS; industry experience in EDI and experience in proprietary IOS have a negative effect on the adoption of open IOS; and industry experience in open IOS has a positive effect on the adoption of open IOS.
Research limitations/implications
One main limitation is that the measures of the variables are based on single‐item and dichotomic scales. Also, this study only focused on the industry level and alternative explanations for the results have not been ruled out. The main implication is that IOS experience at firm and industry levels should be distinguished, as they can have different effects on the adoption of open IOS.
Originality/value
This paper is among the first that examines how the experience in prior generations of IOS affects the adoption of open IOS. Furthermore, the authors expand the literature by distinguishing IOS experience at two levels – firm level and industry level and show that it is necessary to recognize the different roles of different types of experience.
Details
Keywords
Job analysis is the common basis for designing a training course orprogramme, preparing performance tests, writing position (job)descriptions, identifying performance appraisal…
Abstract
Job analysis is the common basis for designing a training course or programme, preparing performance tests, writing position (job) descriptions, identifying performance appraisal criteria, and job restructuring. Its other applications in human resource development include career counselling and wage and salary administration. Job analysis answers the questions of what tasks, performed in what manner, make up a job. Outputs of this analytical study include: (a) a list of the job tasks; (b) details of how each task is performed; (c) statements describing the responsibility, job knowledge, mental application, and dexterity, as well as accuracy required; and (d) a list of the equipment, materials, and supplies used to perform the job. Various techniques for conducting a job analysis have been used. Each has its advantages and disadvantages. As a result, different techniques or combinations of techniques are appropriate to different situations. The combined on‐site observation and individual interview techniques are recommended for industrial, trade, craft, clerical, and technical jobs because they generate the most thorough and probably the most valid information. A job analysis schedule is used to report the job information obtained through observations and individual interviews. The schedule provides a framework of 12 items in which to arrange and describe important job analysis information. These 12 items are organised into four sections. Section one consists of items one through four. These items identify the job within the establishment in which it occurs. The second section presents item five, the work performed. It provides a thorough and complete description of the tasks of the job. The Work Performed section describes what the job incumbent does, how it is done, and why it is done. Section three presents items six through nine. These are the requirements placed on the job incumbent for successful performance. It is a detailed interpretation of the basic minimum (a) responsibility, (b) job knowledge, (c) mental application, and (d) dexterity and accuracy required of the job incumbent. The fourth section includes three items which provide background information on the job. These items are: (a) equipment, materials and supplies; (b) definitions of terms; and (c) general comments. Appendix A is a glossary of terms associated with job analysis. It is provided to facilitate more exacting communication. A job analysis schedule for a complex and a relatively simple job are included in Appendices B and C. These examples illustrate how important job analysis information is arranged and described. Appendix D provides a list of action verbs which are helpful when describing the manipulative tasks of a job.
Details