Usability, Testing, and Ethical Issues in Captive End-User Systems

Usability, Testing, and Ethical Issues in Captive End-User Systems

Marvin D. Troutt (Graduate School of Management, Kent State University, USA), Douglas A. Druckenmiller (Western Illinois University – Quad Cities, USA) and William Acar (Graduate School of Management, Kent State University, USA)
DOI: 10.4018/978-1-60566-136-0.ch003
OnDemand PDF Download:
$37.50

Abstract

This chapter uses some special usability and ethical issues that arise from experience with what can be called captive end-user systems (CEUS). These are systems required to gain access to or participate in a private or privileged organization, or for an employee or member of another organization wishing to gain such access and participation. We focus on a few systems we list, but our discussion is relevant to many others, and not necessarily Web-based ones. The specific usability aimed at in this chapter is usability testing (UT), which we use in its usually accepted definition.
Chapter Preview
Top

Introduction

This chapter reviews, extends and updates earlier work (Troutt, 2007) that introduced the term captive end-user systems (CEUS) and the basic ideas. The earlier paper focused on some special usability, usability testing (UT), and ethical issues that arise from experience with such systems. These are systems that are required to gain access to, and participate in, a private or privileged organization. They do also apply to situations where an employee or member of another organization who may wish to gain similar access and participation. The examples that come to mind are generally web-based and required for submitting such material as:

  • Articles to academic journals (editorial systems)

  • Job applications

  • Student applications to universities and academic programs

  • Faculty curriculum vitae (CV) material into a database

Our focus is on systems like those listed, but many others, not necessarily web-based ones, could also be listed. Automated phone-answering systems come to mind. Government forms such as tax filing forms also qualify, although in that case, commercial tax preparation software is available in the form of several competing products.

As an attempt at a more precise definition, we suggest the following. A captive end-user system (CEUS) is a computer-based system whose intended end users will not have had input into the systems analysis and user testing of the system and or did not have an opportunity to shop among similar systems.

Top

Background: A Growing Problem

A First Example

A case familiar to one of the authors involves a change to the e-mail system at a Midwestern US university. Some people, like his spouse, hate the new system which is called Zimbra. This has now become a new curse word in the office (as in “I’ve been Zimbra-ed” or just “Oh Zimbra!”). While sympathetic to his spouse’s viewpoint, the coauthor in question doesn’t have the same problems using it. This is in part due to many hidden features that are part of the interface, hence undocumented and not obvious to the general user. For instance, this mail client is a Web 2.0 application. People were used to using MS Outlook and all of the features it had, as well as its user-interface components. Since this interface doesn’t work the same way, it feels unfriendly and not as functional, until one figures out how to do the same things in it.

This usability deficiency was described to an expert in this sort of situation, most prevalent in the conversion of an old system or the adoption of a new system. The new system may be actually a better design, but because it doesn’t allow them to do things in the same old way, it first appears unfriendly and not a good fit with established procedures and habits. As a forerunner of our discussion, let us reveal at this stage that the expert’s recommended solution is to first find out what outcome or objective the end users are seeking, and only then show them how this can be accomplished in the new system. At the 2007 HICSS conference, a presentation specifically looked at that issue as a shared mental model problem in virtual team support (Thomas & Bostrom, 2007) The research showed that training and the development of shared mental models among users has a direct impact on successful appropriation of newly introduced tools. Such training and development activity is many times replaced by coercive actions that mandate change without justification or explanation. Such coercive approaches are rarely successful.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Steve Clarke
Chapter 1
Jeremy Fowler
Although the discipline of information systems (IS) development is well established, IS failure and abandonment remains widespread. As a result, a... Sample PDF
Information Systems Success and Failure—Two Sides of One Coin, or Different in Nature? An Exploratory Study
$37.50
Chapter 2
Jeanette Eriksson, Yvonne Dittrich
This chapter reports on a case study performed in cooperation with a telecommunication provider. The telecom business changes rapidly as new... Sample PDF
Achieving Sustainable Tailorable Software Systems by Collaboration Between End-Users and Developers
$37.50
Chapter 3
Marvin D. Troutt, Douglas A. Druckenmiller, William Acar
This chapter uses some special usability and ethical issues that arise from experience with what can be called captive end-user systems (CEUS).... Sample PDF
Usability, Testing, and Ethical Issues in Captive End-User Systems
$37.50
Chapter 4
Jonathan P. Caulkins, Erica Layne Morrison, Timothy Weidemann
Spreadsheets are commonly used and commonly flawed, but it is not clear how often spreadsheet errors lead to bad decisions. We interviewed 45... Sample PDF
Do Spreadsheet Errors Lead to Bad Decisions? Perspectives of Executives and Senior Managers
$37.50
Chapter 5
Lixuan Zhang, Randall Young, Victor Prybutok
The means by which the U.S. justice system attempts to control illegal hacking are practiced under the assumption that hacking is like any other... Sample PDF
A Comparison of the Inhibitors of Hacking vs. Shoplifting
$37.50
Chapter 6
Dewi Rooslani Tojib
he last decade has seen the proliferation of business-to-employee (B2E) portals as integrated, efficient, and user-friendly technology platform to... Sample PDF
Developing Success Measure for Staff Portal Implementation
$37.50
Chapter 7
Peter Baloh
Improving how knowledge is leveraged in organizations for improved business performance is currently considered as a major organizational change.... Sample PDF
Contingencies in the KMS Design: A Tentative Design Model
$37.50
Chapter 8
Beryl Burns
We report the findings of a field study of the enactment of ICT supported knowledge work in a Human Resources contact centre, illustrating the... Sample PDF
Users as Developers: A Field Study of Call Centre Knowledge Work
$37.50
Chapter 9
Raymond R. Panko
This chapter describes two experiments that examined overconfidence in spreadsheet development. Overconfidence has been seen widely in spreadsheet... Sample PDF
Two Experiments in Reducing Overconfidence in Spreadsheet Development
$37.50
Chapter 10
Steven John Simon, David Paper
Voice recognition technology-enabled devices possess extraordinary growth potential, yet some research indicates that organizations and consumers... Sample PDF
User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model
$37.50
Chapter 11
Peter P. Mykytyn
Colleges of business have dealt with teaching computer literacy and advanced computer application concepts for many years, often with much... Sample PDF
Educating Our Students in Computer Application Concepts: A Case for Problem-Based Learning
$37.50
Chapter 12
Elaine H. Ferneley
End user development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs.... Sample PDF
Covert End User Development: A Study of Success
$37.50
Chapter 13
Steven Hornik, Richard D. Johnson, Yu Wu
Central to the design of successful virtual learning initiatives is the matching of technology to the needs of the training environment. The... Sample PDF
When Technology Does Not Support Learning: Conflicts Between Epistemological Beliefs and Technology Support in Virtual Learning Environments
$37.50
Chapter 14
Tom Butler
The study’s objective is to arrive at a theoretical model and framework to guide research into the implementation of KMS, while also seeking to... Sample PDF
A Theoretical Model and Framework for Understanding Knowledge Management System Implementation
$37.50
Chapter 15
Jun Xu, Mohammed Quaddus
This chapter develops a model of adoption and continued use of knowledge management systems (KMSs), which is primarily built on Rogers’ (1995)... Sample PDF
Exploring the Factors Influencing End Users' Acceptance of Knowledge Management Systems: Development of a Research Model of Adoption and Continued Use
$37.50
Chapter 16
Wei-Na Lee
In today’s global environment, a myriad of communication mechanisms enable cultures around the world to interact with one another and form complex... Sample PDF
Classifying Web Users: A Cultural Value-Based Approach
$37.50
Chapter 17
Annette Hallin, Kristina Lundevall
This chapter presents the mCity Project, a project owned by the City of Stockholm, aiming at creating user-friendly mobile services in collaboration... Sample PDF
mCity: User Focused Development of Mobile Services Within the City of Stockholm
$37.50
Chapter 18
Cristina Hava Muntean, Gabriel-Miro Muntean
Lately, user quality of experience (QoE) during their interaction with a system is a significant factor in the assessment of most systems. However... Sample PDF
End-User Quality of Experience-Aware Personalized E-Learning
$37.50
Chapter 19
High-Tech Meets End-User  (pages 302-320)
Marc Steen
One challenge within the high-tech sector is to develop products that end users will actually need and will be able to use. One way of trying to... Sample PDF
High-Tech Meets End-User
$37.50
About the Contributors