How Experience and Expertise Affect the Use of a Complex Technology

2016 ◽  
Vol 29 (2) ◽  
pp. 59-80 ◽  
Author(s):  
Richard J. Goeke ◽  
Robert H. Faley ◽  
Alan A. Brandyberry ◽  
Kevin E. Dow

As end-users work with increasingly complex technologies, it is important that these technologies be used to the fullest extent possible. Time is needed to learn how to use these new technologies and fit them to user tasks, but the fact that a user has gained experience does not mean that expertise has also been gained. Using survey data collected from 187 data warehouse end-users, we found that experience and expertise have a significant positive correlation (r = 0.35, p < 0.001), but expertise has a significantly greater effect on ease-of-use perceptions (t=10.2, p < 0.0001) and the use of a technology (t=21.08, p < 0.0001) than experience. Therefore, it is critical that researchers properly delineate which construct – end-user expertise or experience – is being assessed, when measuring the effect that individual differences have on the perceptions and use of technology.

Author(s):  
Richard J. Goeke ◽  
Robert H. Faley ◽  
Alan A. Brandyberry ◽  
Kevin E. Dow

As end-users work with increasingly complex technologies, it is important that these technologies be used to the fullest extent possible. Time is needed to learn how to use these new technologies and fit them to user tasks, but the fact that a user has gained experience does not mean that expertise has also been gained. Using survey data collected from 187 data warehouse end-users, we found that experience and expertise have a significant positive correlation (r = 0.35, p < 0.001), but expertise has a significantly greater effect on ease-of-use perceptions (t=10.2, p < 0.0001) and the use of a technology (t=21.08, p < 0.0001) than experience. Therefore, it is critical that researchers properly delineate which construct – end-user expertise or experience – is being assessed, when measuring the effect that individual differences have on the perceptions and use of technology.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.


2022 ◽  
Vol 12 (1) ◽  
pp. 479
Author(s):  
Victor Ponce ◽  
Bessam Abdulrazak

Context-aware application development frameworks enable context management and environment adaptation to automatize people’s activities. New technologies such as 5G and the Internet of Things (IoT) increase environment context (from devices/services), making functionalities available to augment context-aware applications. The result is an increased deployment of context-aware applications to support end-users in everyday activities. However, developing applications in context-aware frameworks involve diverse technologies, so that it traditionally involves software experts. In general, context-aware applications are limited in terms of personalization for end-users. They include configurations to personalize applications, but non-software experts can only change some of these configurations. Nowadays, advances in human–computer interaction provide techniques/metaphors to approach non-software experts. One approach is end-user development (EUD)—a set of activities and development tools that considers non-software experts as application builders. In this paper, we present our analysis of existing EUD approaches for building context-aware applications. We present a literature review of 37 screened papers obtained from research databases. This review aims to identify the methods, techniques, and tools proposed to build context-aware applications. Specifically, we reviewed EUD building techniques and implementations. Building techniques include metaphors/interaction styles proposed for application specification, composition, and testing. The implementations include a specification method to integrate and process context on the target application platforms. We also present the adoption trend and challenges of context-aware end-user development.


JAICT ◽  
2018 ◽  
Vol 3 (2) ◽  
Author(s):  
Roy Sari Milda Siregar

Evaluation of information system performance is needed to get an overview of the ease of end-users in utilizing a new technology. This study aims to evaluate the performance of information systems in a state-owned company (PT PLN Madya Langsa) based on an end-user perspective that is separated into two categories: employees and managers. The level of employee satisfaction (primary user) is measured using EUCS (aspect of: content, accuracy, format, ease of use, timeliness, and satisfaction). The manager's satisfaction level (secondary user) is measured by using IT BSC (aspect of: company contribution, user, operational excellence, and future orientation). The evaluation on the primary user showed that it was low at 25.6%, moderate at 56.64% and high at 18%. The percentage of user satisfaction with the information systems is 72.9% of the results expected by users. Meanwhile, evaluation on the secondary user obtained the following results: low at 10.5%, moderate 84.2% and high at 5.3%. The percentage of user satisfaction with the information system was 92.8% of the results that is expected by users. This study also discusses why there are differences in the percentage of primary user satisfaction compare to the secondary user and provides suggestions how to improve the level of satisfaction of the end users in the future.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


2016 ◽  
pp. 483-502
Author(s):  
Chang Liu ◽  
Ying Zhong

Multi-level adaptation in end-user development (EUD) is an effective way to enable non-technical end users such as educators to gradually introduce more functionality with increasing complexity to 3D virtual learning environments developed by themselves using EUD approaches. Parameterization, integration, and extension are three levels of adaptation ranging from straightforward to complex in terms of what end users have to understand in order to develop functional software applications, all within reach of end users without special training on programming. A 3D educational application EUD system prototype, iVirtualWorld, has been expanded to support 3D virtual chemistry experiments generation using these three levels of EUD adaptation. An evaluation has been conducted on 18 participants from the education domain, and the results confirmed ease-of-learn, ease-of-use, and usefulness of this solution. Contributions of this paper are 1) a paradigm for applying EUD technologies in 3D virtual learning environment creation; 2) an easy-to-use tool for educators to build customized virtual chemistry experiments; and 3) empirical assessment data for the multi-level adaptation solution.


Author(s):  
Merrill Warkentin ◽  
Kimberly Davis ◽  
Ernst Bekkering

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
Ahed S Al-Haraizah

Insight into the reasons why people adopt or reject technology is one of the most challenging issues in information technology research. This chapter draws on the Electronic Commerce Technology Acceptance (ECTA) framework, which is in turn based on Technology Acceptance Model (TAM) and examines Jordanian government’s employees’ attitudes towards adoption and use of Electronic Mailing systems within their job. The chapter is aimed at providing an overview of the current state of use, adoption and implementation of electronic mailing innovation within organisations, specifically governmental institutions in developing countries like Jordan. More precisely, the author first quantify constructs relating to the current state of governmental institutions’ beliefs and attitudes toward E-Mailing systems technology in Jordan, and then develop and validate the relationships between the various factors that drive the adoption and acceptance of such innovation. A quantitative survey is used to establish and illustrates employee’s behavioural intention and decision to e-mailing systems. The main influencing issues discussed in this chapter that affect these employees imply perceived usefulness, perceived ease of use, employees’ attitudes towards new technologies, and behavioural intentions to use. Whereas, these various issues are suggested in the Technology Acceptance Model (TAM), the enhanced Technology Acceptance Model extends them to include the external social factors proposed in this chapter such as trust, cultural beliefs, and sociology of technology. Eventually, the significant insight emanated from the findings identifies ways of assisting and spurring employees to make use of technology more effectively.


2014 ◽  
Vol 11 (2) ◽  
pp. 481-501 ◽  
Author(s):  
Clemente Borges ◽  
José Macías

In most respects, there are implicit drawbacks concerning representation and interaction with data in relational-database applications. On the one hand, there is a lack of expressiveness and ease of use in the user interfaces that handle such data. On the other hand, there is an implicit need for interactive end-user visual tools to query data and avoid dependency on programming languages. The main aim of this work is to study the problem of database interaction and usability, comparing existing solutions and providing a new approach that overcomes existing problems. We propose a web-based tool that manipulates Data Warehouse schemas by using a visual language to represent the database structure and providing several visualization techniques that facilitate the interaction and creation of queries involving different levels of complexity. We based our research on an End-User Development approach that has been evaluated to obtain some initial usability indicators.


2015 ◽  
pp. 426-445
Author(s):  
Chang Liu ◽  
Ying Zhong

Multi-level adaptation in end-user development (EUD) is an effective way to enable non-technical end users such as educators to gradually introduce more functionality with increasing complexity to 3D virtual learning environments developed by themselves using EUD approaches. Parameterization, integration, and extension are three levels of adaptation ranging from straightforward to complex in terms of what end users have to understand in order to develop functional software applications, all within reach of end users without special training on programming. A 3D educational application EUD system prototype, iVirtualWorld, has been expanded to support 3D virtual chemistry experiments generation using these three levels of EUD adaptation. An evaluation has been conducted on 18 participants from the education domain, and the results confirmed ease-of-learn, ease-of-use, and usefulness of this solution. Contributions of this paper are 1) a paradigm for applying EUD technologies in 3D virtual learning environment creation; 2) an easy-to-use tool for educators to build customized virtual chemistry experiments; and 3) empirical assessment data for the multi-level adaptation solution.


Sign in / Sign up

Export Citation Format

Share Document