Free Essay

Information Technology

In:

Submitted By nyaora
Words 4475
Pages 18
| User Interface DesignAndrew DillonThis item is not the definitive copy. Please use the following citation when referencing this material: Dillon, A. (2003) User Interface Design. MacMillan Encyclopedia of Cognitive Science, Vol. 4, London: MacMillan, 453-458.Keywords: human-computer interaction, applied cognitive science, design, computer.Contents listIntroduction
Cognitive Science and design
The Basics of Human-Computer Interaction
Cognitive Design Guidelines: from psychophysics to semiotics
Beyond guidelines Cognitive theories and models in HCI
Developing user-centered design methods
Summary
Bibliography
GlossaryArticle definitionThis article covers the basic issues that the field of cognitive science raises in the design and testing of new digital technologies for human use.1. IntroductionThe design of computer interfaces that are usable and easily learned by humans is a non-trivial problem for software developers. As information technologies mediate many of the activities we now perform routinely as part of our lives, the attention paid to the process of human-computer interaction is enormous. Since much of the process of interaction is cognitive in nature, involving perception, representation, problem solving, navigation, query-formulation and language processing, the theories and methods of cognitive science are viewed as directly relevant to such concerns. The result has been the emergence of an applied cognitive science for software design that is known as the field of Human-Computer Interaction or HCI.2. Cognitive Science and designTraditional cognitive science approaches to HCI and user interface design model the user as made up of three basic components: the psychomotor, perceptual, and cognitive sub-systems. Recent treatments of HCI have extended these to include the social system as a core part of the users make-up and placed greater emphasis on group dynamics and social context in examining what users do with technology. Any full treatment of user psychology must embrace all components, though it remains the case that cognitive issues dominate most research in HCI.3. The Basics of Human-Computer Interaction:The success of any computer application is dependent on it providing appropriate facilities for the task at hand in a manner that enables users to exploit them effectively. Whereas the provision of facilities is an issue of functionality, the user interface is the means by which the functionality can be exploited, and here we are directly concerned with usability.For interaction to proceed the human user must input a signal to the computer and perceive changes in the interface. Since much of current interaction involves physical input and visual perception of output, any basic interactive device must convey an input device and a screen. However, to determine the appropriate input the user must have some representation of a goal or intention of an outcome to attain, necessitating the employment of memory, both short (to handle current status information) and long-term (to enable the planning and interpretation of the interactive sequence).Information undergoes transformation at each stage of progression from a perceived stimulus (e.g. a visual change in the interface) to a comprehended cue (e.g. a recognised sign) leading to an active response (e.g. push a mouse button). All of this happens repeatedly and rapidly as the human interacts with the system. This process can be simply envisioned using a variant of Neissers classic perceptual cycle model, whereby users engage in an ongoing cycle of information exchange involving exploration of a changing information environment (see Figure 1).Figure 1 Human Computer Interaction as iterative processFor example, any current interface provides a response to user input which signals to the user that their input has caused an action. Through direct manipulation, users can select and move objects on screen, open and close windows with a mouse click, or jump from place to place within documents via hyperlinks. In each case, the user must initiate an action and the interface must communicate its change of state through appropriate feedback to the user. Where feedback is vague, too rapid or non-existent, the user is likely to be confused as to the impact of their actions. Ideal feedback communicates to the user that the system status has altered in the intended manner and the user is closer to their goal as a result.We can usefully understand HCI as a cognitive process by considering the human as possessing general knowledge structures (mental models, schemata, etc.) which organise the users task-oriented information exploration and use. This exploration, which may involve a host of psycho-physical actions such as keypresses, scrolling, link selection, command input etc., exposes the human to samples of the information space contained within the software, the perception of which must be interpreted and categorized, before it in turn can influence the subsequent actions of the human and so forth in an iterative fashion.This is a very general portrayal of user psychology. Its purpose is to convey the active nature of cognition and show how humans select information on the basis of expectation and prior experience and how the selected information can itself modify the knowledge structures within the human. Thus, while the general model holds true, in the interface design context, any one user is likely to have unique experiences and knowledge, which will influence their perception of, and interactions with a computer. Software designers are now very aware of the affect interface design has on the user experience of their products and as a result have sought guidance and input from cognitive scientists as to how best to design interfaces for usability and human acceptance.The response from the cognitive community has been threefold: the derivation of design guidelines to aid designers; the formulation of theoretical models to predict user response in specific instances; and the development of design methods and evaluation techniques to improve the process of user-centered design.4. Cognitive Design Guidelines: from psychophysics to semioticsSince cognitive science has derived tremendous understanding of the mechanisms and processes underlying perception, memory, attention, categorisation, decision-making, comprehension and related processes and structures, it is reasonable to assume that such findings are very relevant to practical design issues. For interfaces, we need to consider if users will perceive actions and behaviors, how they will interpret them, what demands our designs place on their attention, what knowledge they will need to interpret and respond in a manner acceptable to the software. There have been many attempts to bridge the gap between scientific findings and software design, and a full set of guidelines drawn from studies of cognition could run to several volumes. As a result, much re-packaging of cognitive science has taken the form of general guidelines for designers to consider. The following represent a generic set that have gained broad acceptance by most interface designers. In each case, the linkages with cognitive science should be readily apparent to the reader.4.1 Screen readability and image qualityTo perform most information tasks with a computer the user must be able to extract and process visual stimuli reliably and quickly. Early computer screens suffered from a variety of technological limitations that resulted in slower reading of electronic text than paper, or constrained the range of representations possible on screen. Current design guidance recommends the use of high resolution screens with strong image polarity (preferably dark on light) to enhance human perception. Standard design advice is to produce all interfaces so that they can work in monotone and to add color sparingly to guide visual processing, attract attention, and aid chunking. As we interact more and more with screens, both large and small, the importance of readability cannot be overlooked, and poor visual ergonomics can prevent otherwise sophisticated software from being fully exploited.4.2 Manipulation and input devicesWhile the typical computer of today is a desktop model with a keyboard and a mouse, there are now many variants and alternatives such as PDA (Personal Digital Assistants) or laptop computers. These tools are designed for mobility, and use a stylus or trackpad as an input mechanism. Where once punched cards were the primary medium of interaction, the emergence of so-called Direct Manipulation interfaces has advanced the exploitation of natural mappings between pointing and positioning found in the real world with the control of objects in a digital environment. Immersive environments take this to the logical stage of creating a virtual world where users perform physical actions, much like the real world, to affect responses from the software.Studies of input devices have revealed that a mouse is fairly optimal for most standard pointing and clicking tasks, and that user reaching and target selection follow the basic parameters of Fitts Law. However, where few on-screen selections are available, or where the use of a mouse would not work well (e.g., in a mobile application), touch screens with pre-defined tabbing zones have proven suitable, and there are claims of rapid input speeds with stylized input such as Graffiti (a simplified, single stroke script designed for writing in a natural pen-based manner with the well-known Palm Computing series of devices). The QWERTY keyboard remains dominant despite evidence that more optimal keyboard layouts could be designed, hinting at one important aspect of design that is beyond the control of science, the influence of precedent, habit and market forces.4.3 Supporting accurate mental model formationContemporary work on HCI uses the concept of mental model extensively. The basic assumption is that users must try and understand what is happening with a system when they issue commands and since much of the activity is hidden, they have to rely on inference. Depending on their knowledge of computing or the task being performed, users may infer correctly or incorrectly, but each user develops their own image of the technology and how it works (though these may be broadly similar across many users).HCI research suggests that designers should regard models as mental scaffolding upon which users hang their ideas about how the system works. The user's model is a personalised, often idiosyncratic view of what the system does and how it does it. The designer should seek to make important aspects of the design transparent, coherent and supportive. Another source of the users mental model is prior experience particularly with related products. If the user has worked with another system or an older version of the existing system then that is bound to influence their perception of the new technology since their existing schemata will all be brought to bear on their initial interactions. The users experience of performing the tasks is also a contributing factor in the development of their model, and designers are advised to exploit the language, mappings, relationships among concepts, and procedures used by the target audience in creating an interface.4.4 Use of metaphors to enhance comprehension and learningAnother generic aspect of human cognition that seems readily exploitable by designers is the reliance of human thinking on metaphors and analogies. Linked to the general tendency to model and to learn by analogy, the logic behind metaphors is that they enable users to draw on existing world knowledge to act on the new domain.There has been much discussion within HCI of the merits of the metaphor approach in dialogue design, and it is argued that there are two relevant dimensions for understanding the information metaphors convey: scope and level of description. A metaphors scope refers to the number of concepts to which it relates. A metaphor of broad scope in the domain of HCI is the desk-top metaphor common to many computing interfaces. Here, many of the concepts a user deals with when working on the system can be easily dealt with cognitively in terms of physical desk-top manipulations. The metaphor of the World Wide Web as an information superhighway is similarly broad. The typewriter metaphor that was often invoked for explaining word processors is far more limited in scope. It offers a basic orientation to using word processors (i.e. you can use them to create print quality documents) but is severely limited beyond that as word processors do not behave like typewriters in many instances (e.g., typewriters do not save and store files, allow easy reformatting of text or make instant copies of documents).The metaphors level of description refers to the type of knowledge they are intended to convey. This may be very high level information such as how to think about the task and its completion, or very low, such as how to think about particular command syntax in order to best remember it. Theorists in HCI talk of four levels: task, semantic, lexical and physical which refer to general issues such as: Can I do it?; What does this command do?; What does that term mean? and What activities are needed to achieve that? respectively.Few, if any, metaphors convey information at all levels but this does not prevent them being useful to users. In fact, few users ever expect metaphors to offer full scope and levels of description so any metaphor employed should have its limitations and exceptions clearly pointed out. If the user cannot easily appreciate the metaphorical aspects and functional relations that are or are not essential to its use then the power of the metaphor will be greatly reduced. Of all the cognitive science concepts used in HCI, metaphor has proved one of the most durable and accepted.4.5 Learning by doingThe most successful systems are those that enable a user to get something done as soon as possible. Users tend to be very resistant to reading any accompanying documentation and often want to get on with real tasks immediately rather than follow any training guides. In this sense, error-free performance is not considered a real goal. Instead, cognitive scientists emphasise the importance of clear and informative feedback, and the ability to undo actions as more important in supporting the user through the learning curve.Having gained some knowledge by using one part of a system, users will expect to be able to apply this throughout the system. Particular attention should be paid to the consistent use of terms, colours and highlighting techniques, and the positioning of task related zones on the screen so as to support generalization by the user. Consistency can also be important to maintain between systems say the old and the new versions. The benefits of a new system can easily be obscured if users feel that their existing knowledge is now redundant and they must learn the new system from scratch.4.6 Minimizing attentional and cognitive loadTheoretical insights into cognitive architecture emphasize the memory and attentional constraints of humans. These lessons have been learned by the HCI community who argue that interaction sequences should be designed to minimise short term memory load (e.g. not demanding a user choose from an excessive number of menu items; requiring the user to remember numbers or characters from one screen to another, etc.). Since recognition memory is superior to absolute recall, the use of menus is now the norm in design compared to the command line interfaces of the 1980s, which required users to memorise control arguments.Similarly, a major contribution of cognitive science perspectives to user interface design has been in the area of task sequencing. User interface designers are encouraged to minimise the number of steps where information must be retained by the user. Instead, designers are encouraged to provide all necessary information in the interface for the user to exploit as needed. The use of animation is recommended only where a process is being explained, although many designers deliberately exploit the natural human perceptual tendency to attend to movement by using animation to capture attention, particularly for advertisements in web-based commercial sites.4.7 Using images and iconsScreen real-estate is a limited commodity and designers continually seek means of conveying concepts and actions through the language-independent medium of signs, images and symbols. A secondary push for more iconic interfaces is their presumed ability to cross cultural boundaries and enable international use.Semiotic approaches to design have been invoked to help designers create appropriately comprehensible icons but the results have been mixed. Current interfaces make extensive use of graphic capabilities and iconic representations but couple these with pop-up text labels that explain meaning to users who find the representations difficult to decipher.5. Beyond guidelines Cognitive theories and models in HCIIt is not yet possible to talk of a complete theory of human-computer interaction, given the many activities, processes, and tasks that computers support. However, to overcome the piecemeal approach that results from repeated empirical tests of evolving interface features, attempts have been made to produce stronger theoretical models to guide interface designers. This approach has worked best where it has been constrained to explain specific or localised interactive phenomena rather than the full range of user responses to information technology.5.1 Interaction as Serial Information ProcessingCognitive scientists have derived many findings about human information processing, and this knowledge has been distilled in the area of HCI into a form of engineering model of the user that can be exploited by designers. Generally referred to as the model human processor, this cognitive model enables interface designers to predict the time a user will take to complete a task sequence given an analysis of the cognitive, perceptual and psychomotor components that are applied at each step. For example, to determine how long it would take a user to complete the task sequence involving saving a file to hard disk, consider the following data points, derived from years of laboratory studies of humans to provide indices of various interactive acts: Label | Action | Time estimate (seconds) | Tk | Enter a keystroke | 0.23 | Th | Move hands to mouse | 0.36 | Tp | Time to point | 1.5 | Tm | Retrieve from memory | 1.2 | Tr | Time for computer to respond | 1.2 |
Table 1. Time estimates for completion of basic interactive tasks by a human operatorTo apply such a model model, the evaluator would first compute the basic steps a user must take with an interface. We can imagine a proposed design that requires the user to locate the mouse (Th) move the mouse to a menu (Tp), select the save command (Tp), allow the system to respond with a prompt (Tr) input the filename (Tk x No.of letters) and then hit a save button (Tk). The designer could very quickly use the estimates from Table 1 to calculate how long a user would take to perform this sequence and use these data to determine trade-offs in the proposed design.The exact value of the estimates can be argued over, but the principle of the model human processor is constant, i.e., decompose the task into its constituent actions and calculate the time involved in the serial processing of these acts. Multiple applications of this method have confirmed its value in estimating expert or error-free task completion times for repetitive, non-discretionary tasks.Of course, this model has its limitations. We cannot use it to estimate how long users will spend on tasks that are not highly practiced, or that require decision making, planning, or learning. Similarly, where tasks involve parallel processing, it is easy to overestimate times by assuming simple serial processing of the task actions. However, as an applied model of cognition for a constrained range of routine and well-practiced tasks, such a technique is clearly useful.There have been several extensions of this approach, most notably to cover learning. Based on a production system analysis, (describing the behaviour a user must learn to complete a task in terms of a series IF-THEN rules of interactive sequences, e.g., IF file is "new" THEN select menu option "New File" etc.) Cognitive Complexity Theory enables calculation of the estimated time it would take a user to learn a new procedure. According to current findings, each new If-THEN rule production will take a typical user approximately 25 seconds to learn. Armed with such knowledge, designers could estimate, for example, the costs involved in changing procedures or violating consistency of interaction with new designs. This is obviously a gross estimate but for many proceduralised tasks, the data indicate the underlying regularity of human performance.5.2 Socio-cogntive analyses of HCI: activity theory and acceptance modelsAn alternative application of cognitive theory has emerged as HCI researchers became interested in user acceptance of computers and the exploitation of technology by groups of users. Such research draws less on the classic experimental base of laboratory findings within cognitive science and more on its social and anthropological traditions. I have classified these together under the general heading of socio-cognitive theories.Activity theory aims to bring a closer reading of cultural forces to bear on our analyses of interaction. Users are seen as situated within a context that exerts strong forces on their actions. Furthermore, such users are dynamic, changing as their experience and application of technology changes. Taking an activity theory perspective on HCI, it is important to extend analyses of interface usability to cover the context in which the technology is used (or rejected).Typical activity theoretic approaches examine HCI in terms of the praxis, or situated context, e.g., a banking organization, a teaching scenario, or a medical process, in which the various levels of interaction can run from automatic individual operations to collective ventures or activities that define the groups purpose. The analysis and design of any technology needs to be grounded in such a broader perspective to ensure it is appropriate and usable by the intended user community. In this way, one can see activity theory as extending traditional cognitive approaches rather than replacing them.Other social-oriented approaches to HCI that consider cognition include the general class of acceptance theories that seek to predict if a user, given some choice, will utilise a technology. Such models emphasise the perceived value that users place on the new technology, and measure the relationship between such ratings and subsequent behaviour in context. For example, it is now known that if a user perceives a new tool as having direct usefulness for them in their work, they will be more likely to choose it, and may trade-off certain ease of use attributes for the power it affords them. Such perceptions by users seem to be formed very quickly, often within minutes of interacting for the first time, placing special emphasis on the value of early impressions due to aesthetics, implementation style and related factors.Theoretical developments in HCI have not kept pace with developments in technology, partly because of the speed of technological change but, more likely, due to the difficulty of translating cognitive science into rich theoretical models that predict human behavior in multiple contexts. While there is an occasional dismissal of the theoretical approach as too limited for practical application, most HCI professionals are of the view that long-term progress is only possible with increased effort at deriving and applying cognitive science theories to the problems of user interface design.6. Developing user-centered design methodsWhere design guidelines and theoretical models of interaction fail to provide sufficient answers, design teams resort to usability tests of their user interfaces. Cognitive scientists have contributed to this effort by providing the methodological and analytical perspective that informs evaluation practice.Within HCI there are three basic evaluation methods: expert-based, model-based and user-based. As indicated above, expert-based approaches assess an interface for compliance with known design principles and guidelines. As I have indicated, most of these guidelines are the products of cognitive science oriented research. Model-based approaches fall directly from the models mentioned in the previous section. They are the application of theoretical models to specific design questions and are almost always applied by those who have received some training in cognitive science. Both of these approaches are seen as fast and relatively cost-effective, but they are known to be limited in what they can predict.User-based approaches, as the name suggests, involve testing an interface with a sample of representative users in an appropriate context. There are as many variations on this theme as there are cognitive science methods of enquiry, ranging from controlled laboratory trials akin to psychology experiments, to field-based explorations derived from anthropological methods.The pressures of design place demands on HCI professionals to produce fast answers and cognitive scientists have worked on problems of improving test method reliability and validity. Current emphases include deriving better expert-based evaluation methods to overcome the rather poor validity of such methods (testers employing these methods tend to overestimate the number of problems users actually experience, that is, they label as problems many aspects of interfaces that users subsequently perceive as acceptable). Similarly, effort has been spent trying to package formal methods into tools that can be used effectively by non-cognitive scientists to predict usability. The dream of this approach is that software tools could be developed which designers would use to calculate learning effort or time to perform a task, without the designer having to know the details of how such an estimate is derived. The analogy is frequently made to the use engineers can make of the principles of physics. To date, few such tools have made the transition from research laboratory to design practice.7. SummaryUser interface design has proved to be a complicated process that requires detailed analysis of human performance and preference. Furthermore, developments in technology require an understanding of the emotional and trust aspects of interaction that have yet to be studied in detail by cognitive scientists. As a form of applied cognitive science, interface design is a fruitful testing ground for a range of cognitive theories and methods, and this is only the beginning. Further developments in the area of digital technologies will create ubiquitous computing devices that will surround us at work, in leisure and in our public and private lives. In such cases, cognitive scientists will be called on to aid the design and to study the impact of such technologies routinely, and theory will meet practice in a manner that is likely to be hugely important for our future well-being.BibliographyCard, S., Moran, T. and Newell, A. (1983) The Psychology of Human-Computer Interaction. LEA.Landauer, T. (1995) The Trouble with Computers. Cambridge MA: MIT PressNorman, D. (1986) The Design of Everyday Things. New York: Basic BooksHelander, M., Landauer, T., and Prabhu, P. (eds) (1997) Handbook of Human-Computer Interaction, Amsterdam: ElsevierRosson, M. and Carroll, J. (2001) Usability Engineering. San Francisco: Morgan-KaufmannGlossaryUser interface designHuman Computer InteractionApplied Cognitive ScienceDefinitionsHuman-Computer Interaction: the field of study concerned with the design and implementation of humanly usable and socially acceptable information technologiesUsability: the effectiveness, efficiency and satisfaction with which specific users can perform given tasks in a particular environment with a software application.Word Processor Used- MS Word 98 for Macintosh | |

Similar Documents

Premium Essay

Information Technology

...Information & Communications Technology Research Proposal Name: Institution Affiliation: Background There has been developing awareness that the power information technology and computing. This must be, and can be, amplified past its customary client base to achieve individuals who up to this point have not had an entry to such innovation. Being digitally joined has gotten to be continually basic to economic, instructive, and social headway. The objective of this exploration subsidizing activity is to create new information that will help stretch the capacities of figuring engineering better to serve social and economic difficulties of underserved groups, both provincial and urban. The expression Data and Communication Technology for Development are likewise utilized as a part of the scholarly research group to depict this same objective. Information and Communication Technologies must be moderate, available, and important. Novel methodologies in figuring engineering have the potential for the extraordinary effect in a scope of regions, including instruction, human services, and economic improvement. The significance that exploration projects can have around there is noteworthy since there are troublesome mechanical issues to be unraveled to understand that vision. For example, work in last-mile organizing bases, making instinctive client interfaces, creating ease processing gadgets and making applicable applications in regions (Werthner, 2009). Research Purpose ...

Words: 988 - Pages: 4

Premium Essay

Information Technology

...Information Technology (IT) Information Technology (IT) Information technology, in the first instance, brings to us the latest developments in science, technology and the arts in the advanced world. We can make use of the latest techniques and methods in the sciences and the arts within the four corners of our buildings. We can communicate with anyone anywhere in the world and send him messages in a jiffy. The e-mail has made it possible to send any amount of information to any place in a few seconds. The receiver of the information can at once send back the reply or his own information. Talk on programmes like hotmail messenger or yahoo messenger, along with the display of the talkers on the screen, gives a direct personal touch to the exchange of information and ideas. Information technology has, in effect, reduced distance completely between parties sitting in continents separated by the high seas and immeasurable skies. Computer technology can help us to bring about social, political and economic revolution in the country. We can make a complete study of the different social, political and economic systems in the most successful countries. The past, present and possible future of these countries and societies can be studied through computer records, films and programmes.4essay.blogspot.com Computer technology can be used to collect information about the different classes and groups of the people in the country. A thorough study of their educational, professional and social...

Words: 461 - Pages: 2

Premium Essay

Information Technology

...Chapter 1 1. How can information technology support a company’s business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer. The term information technology refers to the various hardware, software, networking, and data management parts that are a necessity for the system to function (pg. 8). Businesses regularly utilize computer-based information systems in order to record customer purchases, keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends. Without the support of information technology, businesses would ultimately fall apart. For example if a business did not choose to use computer-based information systems, they wouldn't be able to evaluate what items were selling better than others and ultimately lose valuable information for future success. Information technology can also aid in decision making for a business. Decisions are made based on analysis provided by computer-based information systems. For example a store manager may make the decision whether to discontinue an item for sale or keep it on the floor due to analysis of sales trends provided by computer-based systems. Lastly information technology helps business gain a competitive advantage. A competitive advantage is gained through computer-based information systems by applying innovative application of information technologies (pg. 9). For example a store manager installing touch screen kiosks throughout the organization...

Words: 1404 - Pages: 6

Premium Essay

Information Technology

...Information technology affects almost every aspect of the business world in today’s modern society. Within a matter of decades both internal and external processes have been transformed. For example, managers no longer handwrite reports for their office staff to type or use mail to correspond with clients or post flyers to communicate with employees. My department at Princeton University has experienced these types’of scenarios over the past five years. Five years ago, our procedures and computers systems were antiquated. The need for technology was essential to provide better communication and improve procedures, especially in a department that has over 200 employees who work in different locations throughout the University such as dorms, academic buildings, and athletic facilities. For instance, my department’s time-off request procedure and the process by which supervisors receive their daily work orders were lengthy, required several steps, and needed to be modernized. Realizing how outdated these procedures were, my department sought out several different types of technology to help improve its overall functionality. Technology acquired included, Sharepoint, Ipads, and EZ Maxmobile App. In just a short period of time, these products have significantly improved communication and procedures throughout the department and enhanced our customer service to our clients. The use of Sharepoint, a web-based intranet that streamlines the management of and access to data,...

Words: 416 - Pages: 2

Premium Essay

Role of Information Technology

...International Journal of Information Science and Technology THE ROLE AND EFFECT OF INFORMATION TECHNOLOGY IN THE CREATION AND MAINTENANCE OF SUSTAINABLE COMPETITIVE ADVANTAGE A. Talebnejad[1] Faculty of Management and Accounting Shahid Beheshti University Email: taleb149@yahoo.com Abstract -By the appropriate use of information technology, organizations can achieve sustainable competitive advantages. This technology because of including some characteristics such as being up-to-date, fast and precise and having different geographic localities all the time, has improved organizational efficiency, effectiveness and performance. In this article, we intend to investigate the role and effect of information technology in the creation and maintenance of sustainable competitive advantages from two different approaches: market-based approach and the resource-based approach. In the Market-based approach, meeting customer's and creating values for them, using information technology and the issue of achieving the competitive advantage and position in the market by organizations are addressed. In the resource-based approach, compatibility of the organization's resources such as those of information technology and organizational skills, particularly managerial ones are investigated. Amongst different organizational skills and resources, only managerial skills of information technology can create a sustainable competitive advantage. Keywords: Information Technology, Sustainable Competitive...

Words: 4885 - Pages: 20

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s...

Words: 529 - Pages: 3

Premium Essay

Information Technology Tool

...partner in a new business, one of your roles is to review information technology tools available to assist you in a certain aspect of your business (e.g., marketing, accounting, sales, quality assurance). Select a technology that emerged within the last five years and consider its impact on your business. Make a decision on whether to adopt this technology. B. Information Technology Tools 1. How technology helps business grow * SBA. (December 13, 2010).New Technology Guide Helps Entrepreneurs Grow Their Small Businesses and Create Jobs. Retrieved April 10, 2012 from, http://archive.sba.gov/idc/groups/public/documents/sba_homepage/news_release_10-71.pdf * Smart Business Information Technology. (2012). Information technology aids in business growth. Retrieved April 10, 2012 from, http://bizitc.com/performance/information-technology-aids-in-business-growth/ * SBA. (2012). New technology guide helps entrepreneurs grow their small businesses and create jobs. Retrieved April 10, 2012 from, http://www.asbdc.org/Library/SBA%20Technology%20Guide.pdf * Entrepreneurs’ Organization. (2012). How I leveraged technology to grow my business. Retreived April 10, 2012 from, http://www.eonetwork.org/knowledgebase/specialfeatures/Pages/HowILeveragedTechnologytoGrowMyBusiness.aspx 2. How technology lessens the geographical gap between countries * Net Industries. (2012). The international gap in technology. Retrieved April 10, 2012 from, http://education.stateuniversity...

Words: 2563 - Pages: 11

Free Essay

Information Technology Acts

...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate  (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people will...

Words: 467 - Pages: 2

Premium Essay

Information Technology in Business

...Riordan Manufacturing business chose to outsource their information technology (IT) systems and services for a variety of reasons. This choice carries with it some obvious benefits and some often not so obvious risks. Companies choosing to outsource IT must weigh the benefits and risks carefully, take measures to attenuate the associated risks and prepare their employees for the change by launching a campaign about the benefits of outsourcing. The risks involved with outsourcing mainly involve accessibility to service. According to Applegate (1995), if you rely on an outside contractor who generally has to come onsite to support your network, then [consider removing "then"] you live in a world where you simply hope critical services don’t [Contractions are inappropriate in academic writing--write it out] go down at a time when your ability to conduct business will be interrupted. Busy IT contractors may take days before they can come in to help, and this will likely be unacceptable if the problem is making it impossible for your staff to work. All the money saved by using a pay-as-you-go contractor can be lost with one serious issue within your network. With remote IT support such as managed services, some business owners are uncomfortable with having less personal touch and immediate feedback. When you have your own network administrator onsite, you can call them into your office and get a report or have questions answered. A remote based service will never be able to match...

Words: 991 - Pages: 4

Premium Essay

Communication and Information Technology

...Communication and Information Technology Latasha Wright HCS/320 June 18, 2012 Patricia Bird Communication and Information Technology Communication and information technology is frequently used as way to deliver effective communication messages. Many standard organizations such as hospitals and medical facilities continue to find ways to implement and improve communication channels. For these reasons, the use of e-mail communication in the hospital setting should be used as a way to enhance communication and information technology. First, I will explain how efficient and effective e-mail communication improves hospitals’ communication between personnel and patients. Because implementing new forms of technology comes with some advantages and disadvantages; I will discuss the incentives and drawbacks as well as its influences on consumers. Next I will explain the short and long-term financial impact that e-mail communication has on organizations. Then, I will provide technical improvements with e-mail communication in the future and why. Last, I will make necessary recommendations to improve e-mail communication in the hospital environment. My hope is that this essay will provide a better understanding about the use of e-mail communication and how organizations can benefit from its use. Efficient and Effective A popular form of communication, e-mail communication, is both efficient and effective for organizational use. E-mail communication is said to...

Words: 1070 - Pages: 5

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Premium Essay

Communication and Information Technology

...Communication and Information Technology HCS/320 January 28, 2012 Dr. B Communication and Information Technology Communication has been a key element in the health care field for many years. A patient communicates to the physician what is wrong with them, the physician communicates with the nurse what is to be done, and the information is entered into the patient file. The medical biller then bills the insurance or patient by sending an electronic claim, and the payer sends back a statement of payment. All this is considered communication. Over the years technology has advanced and the ways these communications have been used have changed. Now communication is done electronically, sent by email and even text message; there is even a way to teleconference over video phone with a patient or physician. After researching new technology I found Vocera, a communication system that makes communicating between team members faster and easier. The system uses a hand held device as well as a computer based program to communicate messages even alerts to get in touch with team members. The voice activated hand held device is the size of a cell phone and is typically hung around the neck. The hand held voice activated device can be used to call another team member, or can be used to access a paging system in case of emergency situations. Physicians can use the device to turn on their status, such as on call or on lunch break. When the computer based program is accessed by a nurse looking...

Words: 777 - Pages: 4

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become increasingly...

Words: 556 - Pages: 3

Premium Essay

Information Technology Agenda

...IT Agenda 1 IT Agenda and Organizational Strategies HCI 510 November 19, 2012 Mr. Lee Edwards IT Agenda 2 To achieve success in this information economy, IT is a critical facet of any organization. IT goals exists to help organizational leaders understand why IT goals must align with those of the business, how IT delivers value, and how its performance is measured, its resources properly allocated and its risks mitigated. In this paper, I will be discussing the relationship between the IT Department and organizational strategies, along with strategies that make an effective IT Department. Effective organizational strategies should be looked at like a wheel. It comprises five components: Leadership, Decision-making and structure, People, Work processes and systems and of course, culture. Leadership comprises a clear vision and priorities and a cohesive leadership team. The decision making portion makes up clear roles and accountabilities for decisions and an organizational structure that supports objectives. The people portion of the wheel includes organizational and individual talents necessary for success, and performance measures and incentives aligned with objectives. Work processes and systems encompass superior execution of pragmatic work processes and effective and efficient support processes and systems. And, finally the last portion is the organization culture. The culture covers high performance values and behaviors and a...

Words: 867 - Pages: 4

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology...

Words: 994 - Pages: 4