user

Towards a Methodology to Elicit Tacit Domain Knowledge from Users




user

An Improved SMS User Interface Result Checking System




user

User Acceptance of the E-Government Services in Malaysia: Structural Equation Modelling Approach




user

The Influence of User Efficacy and Expectation on Actual System Use




user

External Variables as Antecedents of Users Perception in Virtual Library Usage

Several studies extended the Technology Acceptance Model (TAM) by examining the antecedents of perceived usefulness and perceived ease of use; the present study looks at demographic aspect of external variables in virtual library use among undergraduate students. The purpose of this study is to identify the demographic factors sex, level of study, cumulative grade point average, and computer knowledge that act as external factors that are antecedents of perceived usefulness and perceived ease of use. The university management makes a large investment in the provision of a virtual library; investigation of the virtual library acceptance by students is important. TAM and theory of reasoned action (TRA) are utilised to theoretically test a model for the extension and to predict virtual library acceptance and usage. In a survey study, data was collected by using a structured questionnaire given to 394 randomly selected participants in a private university. Data were analysed by Pearson product moment correlation, multiple and hierarchical regression. The result of the study is consistent with TAM factors examined for explaining virtual library usage. The extension model accounts for 2.5% variance in perceived usefulness, 2.1% in perceived ease of use, 11.7% - 15.2% on intention to use and 7.2% on actual use of virtual library. Implications of the findings of the study on user’s virtual library training are discussed.




user

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




user

The Segmentation of Mobile Application Users in The Hotel Booking Journey

Aim/Purpose: This study aims to create customer segmentation who use Online Travel Agent (OTA) mobile applications in Indonesia throughout their hotel booking journey. Background: In the context of mobile hotel booking applications, research analyzing the customer experience at each customer journey stage is scarce. However, literature increasingly acknowledges the significance of this stage in comprehending customer behavior and revenue streams. Methodology: This study employs a mixed-method and exploratory approach by doing in-depth interviews with 20 participants and questionnaires from 207 participants. Interview data are analyzed using thematic analysis, while the questionnaires are analyzed using descriptive statistics. Contribution: This study enriches knowledge in understanding customer behavior that considers the usage of mobile apps as a segmentation criterion in the hotel booking journey. Findings: We developed four user personas (no sweat player, spotless seeker, social squad, and bargain hunter) that show customer segmentation based on the purpose, motivation, and actions in each journey stage (inspiration, consideration, reservation, and experience). Recommendations for Practitioners: The resulting customer segmentation enables hospitality firms to improve their current services by adapting to the needs of various segments and avoiding unanticipated customer pain points, such as incomplete information, price changes, no social proof, and limited payment options. Recommendation for Researchers: The quality and robustness of the customer segment produced in this study can be further tested based on the criteria of homogeneity, size, potential benefits, segment stability, segment accessibility, segment compatibility, and segment actionability. Impact on Society: This study has enriched the existing literature by establishing a correlation between user characteristics and how they use smartphones for tourism planning, focusing on hotel booking in mobile applications. Future Research: For future research, each customer segment’s demographic and behavioral factors can be explored further.




user

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




user

Use of Mobile Health Applications by Lay Users in Kuwait

Aim/Purpose: This study aims to explore the use of mobile health applications (mHealth apps) by lay users in Kuwait. Specifically, it seeks to: (i) identify and highlight the impact of factors that contribute to their use of mHealth apps and (ii) validate a model of these users’ usage of mHealth apps. Background: The advancement of information technologies has paved the way for efficiency and effectiveness in healthcare sectors in developed countries. Kuwait has attempted to revolutionise healthcare systems through mobile applications of information technology solutions to educate users on better methods of receiving customised health services. However, end-user usage of mHealth apps remains in the infancy in developing countries, including Kuwait. Lay users are often vulnerable and frequently overlooked by researchers and health technology providers. Methodology: A cross-sectional study was conducted among 225 lay users of mHealth apps in Kuwait using an online questionnaire to achieve the study objectives. A purposive sampling method utilising convenience and snowballing sampling techniques was used in which all the respondents were lay users. Descriptive statistics, Pearson correlation, and regression analyses were employed to analyse the collected data. Contribution: The study contributes to the extant literature on health informatics and mHealth by providing a comprehensive understanding of how technological, social, and functional factors are related to mHealth apps in the context of developing countries. It identifies key drivers of mHealth app use, suggests expanding the TAM model, and facilitates comparisons with developed countries, addressing gaps in mHealth research. Findings: Four factors (i.e., perceived trust (PT), perceived ease of use (PEU) and behaviour control (PBC), perceived usefulness (PU), and subjective norms (SN)) were identified that influence the use of mHealth apps. These four identified factors also contributed to lay users’ use of these mHealth apps. Among these four factors, perceived trust (PT) was the main contributor to lay users’ use of these mHealth apps. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of mHealth apps. The findings urge developers to enhance app functionality by prioritising privacy and security to build user trust while outlining guidelines for future development focused on user-centric design and compliance with data privacy regulations. Additionally, the government should establish supportive policies and funding, ensure regulatory oversight, and promote public awareness to foster trust. Healthcare providers should integrate mHealth apps into their services, train staff for practical use, gather users’ feedback, and collaborate with developers to create tailored healthcare solutions. Future Research: Additional research is required to apply probability sampling techniques and increase the sample size to generate more reliable and generalisable findings. Additionally, the young age segment must be considered here, and research must be extended to consider the moderating role of demographic factors like age, gender, and educational levels to better understand the adoption of mHealth apps.




user

Personalized Tourism Recommendations: Leveraging User Preferences and Trust Network

Aim/Purpose: This study aims to develop a solution for personalized tourism recommendations that addresses information overload, data sparsity, and the cold-start problem. It focuses on enabling tourists to choose the most suitable tourism-related facilities, such as restaurants and hotels, that match their individual needs and preferences. Background: The tourism industry is experiencing a significant shift towards digitalization due to the increasing use of online platforms and the abundance of user data. Travelers now heavily rely on online resources to explore destinations and associated options like hotels, restaurants, attractions, transportation, and events. In this dynamic landscape, personalized recommendation systems play a crucial role in enhancing user experience and ensuring customer satisfaction. However, existing recommendation systems encounter major challenges in precisely understanding the complexities of user preferences within the tourism domain. Traditional approaches often rely solely on user ratings, neglecting the complex nature of travel choices. Data sparsity further complicates the issue, as users might have limited interactions with the system or incomplete preference profiles. This sparsity can hinder the effectiveness of these systems, leading to inaccurate or irrelevant recommendations. The cold-start problem presents another challenge, particularly with new users who lack a substantial interaction history within the system, thereby complicating the task of recommending relevant options. These limitations can greatly hinder the performance of recommendation systems and ultimately reduce user satisfaction with the overall experience. Methodology: The proposed User-based Multi-Criteria Trust-aware Collaborative Filtering (UMCTCF) approach exploits two key aspects to enhance both the accuracy and coverage of recommendations within tourism recommender systems: multi-criteria user preferences and implicit trust networks. Multi-criteria ratings capture the various factors that influence user preferences for specific tourism items, such as restaurants or hotels. These factors surpass a simple one-star rating and take into account the complex nature of travel choices. Implicit trust relationships refer to connections between users that are established through shared interests and past interactions without the need for explicit trust declarations. By integrating these elements, UMCTCF aims to provide more accurate and reliable recommendations, especially when data sparsity limits the ability to accurately predict user preferences, particularly for new users. Furthermore, the approach employs a switch hybridization scheme, which combines predictions from different components within UMCTCF. This scheme leads to a more robust recommendation strategy by leveraging diverse sources of information. Extensive experiments were conducted using real-world tourism datasets encompassing restaurants and hotels to evaluate the effectiveness of UMCTCF. The performance of UMCTCF was then compared against baseline methods to assess its prediction accuracy and coverage. Contribution: This study introduces a novel and effective recommendation approach, UMCTCF, which addresses the limitations of existing methods in personalized tourism recommendations by offering several key contributions. First, it transcends simple item preferences by incorporating multi-criteria user preferences. This allows UMCTCF to consider the various factors that users prioritize when making tourism decisions, leading to a more comprehensive understanding of user choices and, ultimately, more accurate recommendations. Second, UMCTCF leverages the collective wisdom of users by incorporating an implicit trust network into the recommendation process. By incorporating these trust relationships into the recommendation process, UMCTCF enhances its effectiveness, particularly in scenarios with data sparsity or new users with limited interaction history. Finally, UMCTCF demonstrates robustness towards data sparsity and the cold-start problem. This resilience in situations with limited data or incomplete user profiles makes UMCTCF particularly suitable for real-world applications in the tourism domain. Findings: The results consistently demonstrated UMCTCF’s superiority in key metrics, effectively addressing the challenges of data sparsity and new users while enhancing both prediction accuracy and coverage. In terms of prediction accuracy, UMCTCF yielded significantly more accurate predictions of user preferences for tourism items compared to baseline methods. Furthermore, UMCTCF achieved superior coverage compared to baseline methods, signifying its ability to recommend a wider range of tourism items, particularly for new users who might have limited interaction history within the system. This increased coverage has the potential to enhance user satisfaction by offering a more diverse and enriching set of recommendations. These findings collectively highlight the effectiveness of UMCTCF in addressing the challenges of personalized tourism recommendations, paving the way for improved user satisfaction and decision-making within the tourism domain. Recommendations for Practitioners: The proposed UMCTCF approach offers a potential opportunity for tourism recommendation systems, enabling practitioners to create solutions that prioritize the needs and preferences of users. By incorporating UMCTCF into online tourism platforms, tourists can utilize its capabilities to make well-informed decisions when selecting tourism-related facilities. Furthermore, UMCTCF’s robust design allows it to function effectively even in scenarios with data sparsity or new users with limited interaction history. This characteristic makes UMCTCF particularly valuable for real-world applications, especially in scenarios where these limitations are common obstacles. Recommendation for Researchers: The success of UMCTCF can open up new avenues in personalized recommendation research. One promising direction lies in exploring the integration of additional contextual information, such as temporal (time-based) or location-based information. By incorporating these elements, the model could be further improved, allowing for even more personalized recommendations. Furthermore, exploring the potential of UMCTCF in domains other than tourism has considerable significance. By exploring its effectiveness in other e-commerce domains, researchers can broaden the impact of UMCTCF and contribute to the advancement of personalized recommendation systems across various industries. Impact on Society: UMCTCF has the potential to make a positive impact on society in various ways. By delivering accurate and diverse recommendations that are tailored to individual user preferences, UMCTCF fosters a more positive and rewarding user experience with tourism recommendation systems. This can lead to increased user engagement with tourism platforms, ultimately enhancing overall satisfaction with travel planning. Furthermore, UMCTCF enables users to make more informed decisions through broader and more accurate recommendations, potentially reducing planning stress and leading to more fulfilling travel experiences. Future Research: Expanding upon the success of UMCTCF, future research activities can explore several promising paths. Enriching UMCTCF with various contextual data, such as spatial or location-based data, to enhance recommendation accuracy and relevance. Leveraging user-generated content, like reviews and social media posts, could provide deeper insights into user preferences and sentiments, improving personalization. Additionally, applying UMCTCF in various e-commerce domains beyond tourism, such as online shopping, entertainment, and healthcare, could yield valuable insights and enhance recommendation systems. Finally, exploring the integration of optimization algorithms could improve both recommendation accuracy and efficiency.




user

Learning-Based Models for Building User Profiles for Personalized Information Access

Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work.




user

Impact of User Satisfaction With E-Government Services on Continuance Use Intention and Citizen Trust Using TAM-ISSM Framework

Aim/Purpose: This study investigates the drivers of user satisfaction in e-government services and its influence on continued use intention and citizen trust in government. It employs the integration of the Technology Acceptance Model (TAM) and the Information System Success Model (ISSM). Background: Electronic government, transforming citizen-state interactions, has gained momentum worldwide, including in India, where the aim is to leverage technology to improve citizen services, streamline administration, and engage the public. While prior research has explored factors influencing citizen satisfaction with e-government services globally, this area of study has been relatively unexplored in India, particularly in the post-COVID era. Challenges to widespread e-government adoption in India include a large and diverse population, limited digital infrastructure in rural areas, low digital literacy, and weak data protection regulations. Additionally, global declines in citizen trust, attributed to economic concerns, corruption, and information disclosures, further complicate the scenario. This study seeks to investigate the influence of various factors on user satisfaction and continuance usage of e-government services in India. It also aims to understand how these services contribute to building citizens’ trust in government. Methodology: The data were collected by utilizing survey items on drivers of e-government services, user satisfaction, citizen trust, and continuance use intention derived from existing literature on information systems and e-government. Responses from 501 Indian participants, collected using an online questionnaire, were analyzed using PLS-SEM. Contribution: This study makes a dual contribution to the e-government domain. First, it introduces a comprehensive research model that examines factors influencing users’ satisfaction and continuance intention with e-government services. The proposed model integrates the TAM and ISSM. Combining these models allows for a comprehensive examination of e-government satisfaction and continued intention. By analyzing the impact of user satisfaction on continuance intention and citizen trust through an integrated model, researchers and practitioners gain insights into the complex dynamics involved. Second, the study uncovers the effects of residential status on user satisfaction, trust, and continuance intention regarding e-government services. Findings reveal disparities in the influence of system and service quality on user satisfaction across different user segments. Researchers and policymakers should consider these insights when designing e-government services to ensure user satisfaction, continuance intention, and the building of citizen trust. Findings: The findings indicate that the quality of information, service, system, and perceived usefulness play important roles in user satisfaction with e-government services. All hypothesized paths were significant, except for perceived ease of use. Furthermore, the study highlights that user satisfaction significantly impacts citizen trust and continuance use intention. Recommendations for Practitioners: The findings suggest that government authorities should focus on delivering accurate, comprehensive, and timely information in a secure, glitch-free, and user-friendly digital environment. Implementing an interactive and accessible interface, ensuring compatibility across devices, and implementing swift query resolution mechanisms collectively contribute to improving users’ satisfaction. Conducting awareness and training initiatives, providing 24×7 access to online tutorials, helpdesks, technical support, clear FAQs, and integrating AI-driven customer service support can further ensure a seamless user experience. Government institutions should leverage social influence, community engagement, and social media campaigns to enhance user trust. Promotional campaigns, incentive programs, endorsements, and user testimonials should be used to improve users’ satisfaction and continuance intention. Recommendation for Researchers: An integrated model combining TAM and ISSM offers a robust approach for thoroughly analyzing the diverse factors influencing user satisfaction and continuance intention in the evolving digitalization landscape of e-government services. This expansion, aligning with ISSM’s perspective, enhances the literature by demonstrating how user satisfaction impacts continuance usage intention and citizen trust in e-government services in India and other emerging economies. Impact on Society: Examining the factors influencing user satisfaction and continuance intention in e-government services and their subsequent impact on citizen trust carries significant societal implications. The findings can contribute to the establishment of transparent and accountable governance practices, fostering a stronger connection between governments and their citizens. Future Research: There are several promising avenues to explore to enhance future research. Expanding the scope by incorporating a larger sample size could enable a more thorough analysis. Alternatively, delving into the performance of specific e-government services would offer greater precision, considering that this study treats e-government services generically. Additionally, incorporating in-depth interviews and longitudinal studies would yield a more comprehensive understanding of the dynamic evolution of digitalization.




user

Evaluation of Learning Objects from the User's Perspective: The Case of the EURIDICE Service




user

Developing Web-Based Learning Resources in School Education: A User-Centered Approach




user

CAPTCHA: Impact on User Experience of Users with Learning Disabilities

CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.




user

A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications




user

Use-Cases and Personas: A Case Study in Light-Weight User Interaction Design for Small Development Projects




user

The Value of User Participation in E-Commerce Systems Development




user

On Categorizing the IS Research Literature: User Oriented Perspective




user

The Culture of Information Systems in Knowledge-Creating Contexts: The Role of User-Centred Design




user

Co-evolution and Contradiction: A Diamond Model of Designer-User Interaction




user

Measuring IS System Service Quality with SERVQUAL: Users' Perceptions of Relative Importance of the Five SERVPERF Dimensions




user

Testing a Model of Users’ Web Risk Information Seeking Intention




user

User Perceptions of Aesthetic Visual Design Variables within the Informing Environment: A Web-Based Experiment




user

Social Networks in which Users are not Small Circles

Understanding of social network structure and user behavior has important implications for site design, applications (e.g., ad placement policies), accurate modeling for social studies, and design of next-generation infrastructure and content distribution systems. Currently, characterizations of social networks have been dominated by topological studies in which graph representations are analyzed in terms of connectivity using techniques such as degree distribution, diameter, average degree, clustering coefficient, average path length, and cycles. The problem is that these parameters are not completely satisfactory in the sense that they cannot account for individual events and have only limited use, since one can produce a set of synthetic graphs that have the exact same metrics or statistics but exhibit fundamentally different connectivity structures. In such an approach, a node drawn as a small circle represents an individual. A small circle reflects a black box model in which the interior of the node is blocked from view. This paper focuses on the node level by considering the structural interiority of a node to provide a more fine-grained understanding of social networks. Node interiors are modeled by use of six generic stages: creation, release, transfer, arrival, acceptance, and processing of the artifacts that flow among and within nodes. The resulting description portrays nodes as comprising mostly creators (e.g., of data), receivers/senders (e.g., bus boys), and processors (re-formatters). Two sample online social networks are analyzed according to these features of nodes. This examination points to the viability of the representational method for characterization of social networks.




user

Influence of Information Product Quality on Informing Users: A Web Portal Context

Web portals have been used as information products to deliver personalized, feature-rich, and flexible information needs to Internet users. However, all portals are not equal. Most of them have relatively a small number of visitors, while a few capture the majority of surfers. This study seeks to uncover the factors that contribute the perceived quality of a general portal. Based on 21 factors derived from an extensive literature review on Information Product Quality (IPQ), web usage, and media use, an experimental study was conducted to identify the factors that are perceived by web portal users as most relevant. The literature categorizes quality factors of an information product in three dimensions: information, physical, and service. This experiment suggests a different clustering of factors: Content relevancy, Communication interactiveness, Information currency, and Instant gratification. The findings in this study will help developers find a more customer-oriented approach to developing high-traffic portals.




user

Effectiveness of Agile Implementation Methods in Business Intelligence Projects from an End-user Perspective

The global Business Intelligence (BI) market grew by 10% in 2013 according to the Gartner Report. Today organizations require better use of data and analytics to support their business decisions. Internet power and business trend changes have provided a broad term for data analytics – Big Data. To be able to handle it and leverage a value of having access to Big Data, organizations have no other choice than to get proper systems implemented and working. However traditional methods are not efficient for changing business needs. The long time between project start and go-live causes a gap between initial solution blueprint and actual user requirements in the end of the project. This article presents the latest market trends in BI systems implementation by comparing Agile with traditional methods. It presents a case study provided in a large telecommunications company (20K employees) and the results of a pilot research provided in the three large companies: telecommunications, digital, and insurance. Both studies prove that Agile methods might be more effective in BI projects from an end-user perspective and give first results and added value in a much shorter time compared to a traditional approach.




user

Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models

Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background: The paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Contribution: This paper sheds light onto the weaknesses in earlier information behaviour models and stresses (and advocates) the need for research on social information behaviour. Findings: Prominent information behaviour models deal with individual information behaviour. People live in a social world and sort out most of their daily or work problems in groups. However, only seven papers discuss social information behaviour (Scopus search). Recommendations for Practitioners : ICT tools used for inter-organisational sharing should be redesigned for effective information-sharing during disaster/emergency times. Recommendation for Researchers: There are scarce sources on social side of the information behaviour, however, most of the work tasks are carried out in groups/teams. Impact on Society: In dynamic work contexts like disaster management and health care settings, collaborative information-sharing may result in decreasing the losses. Future Research: A fieldwork will be conducted in disaster management context investigating the inter-organisational information-sharing.




user

Ladies First: The Influence of Mobile Dating Applications on the Psychological Empowerment of Female Users

Aim/Purpose: This study was undertaken to shed light on how the use of a heteronormative mobile dating application creates an environment to promote psychological empowerment among female users within the online dating scene. The study focused on a mobile dating application which specifically challenges traditional gender roles, namely Bumble. Background: Mobile dating applications have become an increasingly popular medium for people to meet potential partners. However, users’ pre-existing social norms and biases inform how they communicate on these platforms, and stereotyped judgment about women perpetuates ideologies which continue to oppress them within the cyber world. Despite this, very little research has investigated the experiences of female users of mobile dating applications. Methodology: The study was qualitative in nature, and 10 semi-structured interviews of female Bumble users were conducted. The data were analyzed using thematic analysis. Contribution: The study contributes to knowledge by highlighting how key features of mobile dating applications influence various aspects of psychological empowerment as articulated in the findings. Findings: The findings show that the Bumble application supports Intrapersonal variables of Psychological Empowerment of female users relative to Domain Specific Perceived Control and Self-Efficacy, Motivation to Control and Perceived Competence. However, Domain Specific Perceived Control can also be negatively impacted due to self-doubt when female users receive little to no matches. Interactional variables of psychological empowerment are also supported, as Bumble allows female users to be critically aware of the need to screen potential partners, understand relevant causal agents, develop skills relative to initiating conversations and mobilize resources. However, Bumble is not effective in supporting behavioral variables of psychological empowerment because of limitations in the tool’s functionality and the behavior of the people interacting on the platform. Recommendations for Practitioners: The findings are important as they suggest the need to enhance the features available to female users in order to better suit their needs and desire to take control of their lives in the context of dating and/or friendship. Recommendation for Researchers: The findings reveal the need for a change of perceptions and attitudes on the part of some users to create a safer and more considerate virtual dating space, to truly achieve psychological empowerment. Future Research: More research is required on how male and female users domesticate mobile dating applications and how the use of these applications influence their daily lives from a socio-cultural point of view.




user

The Good, the Bad, and the Neutral: Twitter Users’ Opinion on the ASUU Strike

Aim/Purpose: Nigeria’s university education goes through incessant strikes by the Academic Staff Union of Universities (ASUU). This strike has led to shared emotion on micro-blogging sites like Twitter. This study analyzed selected historical tweets from the “ASUU” to understand citizens’ opinions. Background: The researchers conducted sentiment analysis and topic modelling to understand Twitter users’ opinions on the strike. Methodology: The researchers used the Valence Aware Dictionary for Sentiment Reasoning (VADER) technique for sentiment analysis, and the Latent Dirichlet allocation (LDA) was used for topic modelling. A total of 10,000 tweets were first extracted for the study. After data cleaning, 1323 tweets were left. Contribution: To the researcher’s best knowledge, no published study has presented a sentiment analysis on the topic of the ASUU strike using the Twitter dataset. This research will fill this gap by providing a sentiment analysis and drawing out subjects by exploring the tweets on the phrase “ASUU.” Findings: The sentiment analysis result using VADER returned 567 tweets as ‘Negative,’ with the remaining 544 and 212 categorized as Positive and Neutral. The result of the LDA returned six topics, all comprising seven keywords. The topics were the solution to the strike, ASUU strike effect, strike Call-off, appeal to ASUU, student protest and student appeal. Recommendation for Researchers: Researchers can use this study’s findings to compare with other contexts of opinion mining. Practitioners may also use the research to understand better the attitudes of their staff and students about the strikes to create actionable solutions before the suspension of the strike. Future Research: Future studies can collect information from other social networking and blogging sites.




user

NSA Advises Andriod and iPhone User to Restart Thier Phones

In its recently released mobile device best practices guide, the National Security Agency (NSA) goes old-school geek and advises people to turn their phones off and on again....




user

Just crossed over 1100 Active Users of the yToggle Extension - and 5 Star Rated! Thanks!!!!!

...




user

OpenAI reaches 1 million business users

OpenAI hits one million paying business users for ChatGPT Enterprise, Team, and Edu, with global adoption.






user

Brick Search user survey

Brick Search is an app that helps identify collectable minifigs by scanning the QR code on the packet.

Its development team has launched a survey asking for your thoughts on the state of CMF collecting. With three CMF series now having scannable codes and a few weeks to go until the next series hits the shelves, Brick Search wants LEGO fans to weigh in on what they like, dislike and want to see in the future.

So, if you've not done so already, download the app, then complete the survey.

© 2024 Brickset.com. Republication prohibited without prior permission.




user

Facebook and Instagram users in Europe can opt for less personalized ads

Facebook and Instagram users in Europe will get the option to see less personalized ads if they don't want to pay for an ad-free subscription, social media company Meta said Tuesday, bowing to pressure from Brussels over digital competition concerns.




user

European Space Agency's call for proposals: Data User Element INNOVATOR

European Space Agency (ESA) has released its call for proposals for the next projects in the Data User Element (DUE) INNOVATOR arena. Projects are expected to contributed to various international efforts, and CliC and the Cryosphere in a Changing Climate Grand Challenge are specifically mentioned. We encourage those of you interested in submitting a proposal to consider tying your efforts to some of the ongoing and developing CliC activities.
 
The full call for proposals can be downloaded here.
 
The DUE INNOVATOR III will consist in a suite of up to 12 projects of maximum two year time duration and of value up to 200 K euro each. The  DUE INNOVATOR III projects will give to the end-users, industry and research communities the opportunity to develop and demonstrate innovative Earth Observation (EO) services and products using existing ESA, ESA third-party mission and other EO datasets. These original projects, if successful, may constitute future large scale activities within the Agency's Data User Element (DUE) programme.
 
The DUE INNOVATOR III application areas and service themes are open, but require a targeted end-user community that will directly benefit from these new services and products. At least one end-user entity shall be actively involved in each DUE INNOVATOR III project and will be responsible for providing the detailed service and product requirements, as well as support the interpretation and validation of the service products, and assess the adequacy of and benefits of the service.
 
Each project will be carried out up to 24 months and will consist of three phases: - Specification and demonstration; - Implementation and validation; - Evaluation and evolution scenario. EO topics already covered by past or ongoing projects within the ESA DUP/DUE, EOMD, GSE, EU Framework Programmes or National programmes will not be considered for funding. Spanish Tenderers are advised that although Spain is participating in EOEP-4, its contribution is already earmarked for specific elements in EOEP-4 aiming at ensuring continuity with activities stemming from the previous period. Therefore, for this ITT, entities which have their registered office in Spain are not entitled to take part in a bidding consortium, either as Prime Contract or as subcontractor.




user

2016 GEO BON Open Science Conference: Biodiversity and ecosystem Services Monitoring for the 2020 Targets and beyond. Building on observations for user needs

The 2016 GEO BON Open Science Conference: "Biodiversity and ecosystem Services Monitoring for the 2020 Targets and beyond. Building on observations for user needs" will take place from 4 to 9 July 2016 in Leipzig, Germany. 

Biodiversity Science is facing enormous challenges as the pressures upon the earth’s biotic systems are rapidly intensifying and we are unlikely to reach the CBD 2020 Aichi Targets. But how far or close are we to reach the targets? The GEO BON Open Science Conference on "Biodiversity and Ecosystem Services Monitoring for the 2020 Targets and beyond" will assess this question. The conference is open to the wide scientific public and is sponsored and co-organized by iDiv, UFZ, SASCAL (others to come).

For more information please visit: http://conf2016.geobon.org





user

Relating costs to the user value of farmland biodiversity measurements




user

Decision support tools in conservation: a workshop to improve user-centred design





user

CDC: Construction tops list of industries with highest percentage of tobacco users

Washington – Although tobacco use continues to decrease among working adults overall, a significant number of workers in the construction, mining, and transportation and warehousing industries still use some form of tobacco product, according to a report from the Centers for Disease Control and Prevention.




user

User Experience, Integration Pace Wholesale Monitoring Trends

Monitoring centers are focused on improving customer contact and providing tools for ease of use and quicker response.




user

‘Filtering Out Confusion’: NIOSH answers FAQs on respirator user seal checks

Washington — Seal checks should be conducted every time respiratory protection is used on the job, and employers and workers should ensure the equipment is worn properly so an adequate seal is achieved, NIOSH states in a recently published list of frequently asked questions about user seal checks.




user

Axis Notifies Users of Image Quality Issues

AXIS Image Health Analytics notifies users of any issues with image quality and ensures that the cameras being used are capturing the right images at all times.




user

Login changes coming for users of DOT’s drug-testing database

Washington — The Department of Transportation is changing how users access the Drug and Alcohol Testing Management Information System.




user

Snap One Enhances User Privacy & Security With New Remote Access Feature for Luma x20 Cameras

Snap One announced that its Luma x20 family of surveillance products now offer full control over integrators’ system access to view live and recorded video.




user

Snap One Enhances Clare Software for Integrators & End Users

The update includes several new features for integrator partners and end users designed to help increase safety and improve the overall user experience with greater visibility into systems, flexibility, and additional third party integrations.




user

How to Talk to End Users About AI

Much like IT and cybersecurity, the AI world is changing and evolving so quickly it can be  difficult to keep up.