Free Essay

Information Sharing

In: Computers and Technology

Submitted By Bobbystarks15
Words 1276
Pages 6
Element 1

Group work – Identifying Usability Goals:

As part of the study to determine the usability and justification of this portal, product and service, I have prepared a user profile and a persona for the intended user of the website http://triposo.com/

This application is an interactive city guide which can be accessed over a number of platforms to assist a number of users to access information of a travel nature.

My research has led me to choose the student tourist who has graduated from undergrad school and is taking a year out to travel the world.

Profile of users & Persona:

• Users of mobile and Wi-Fi platforms

• To access on the go

• Easy to access

• Quick access of processed information/Data

• Amount of info to access

• Accessibility on various platforms – Android, IPod, Blackberry

• Offline accessibility due to location and the ability to get phone or WI-FI coverage.

Target Audience:

My initial research led to choose the age group of 19yrs to 25yrs old, as this would be the average age of students who could leave home to travel long distances and have the discipline to be responsible. The gender would be unisex as this product isn’t geared to a particular sex but to both sexes. And the social demographic as stated are young adults, the ethnic back grounds would be in effect, Asian, European and afro – American / Caribbean:

Age: 19 - 25

Gender: Male / Female

Social –Demographic: Young adults.

Primary User Group:

The Herschel’s are the primary user group chosen to test run the application of this product: the Herschel’s are a group of 4 siblings, a set of twins 2 boys and 2 girls who have graduated from university and plan to spend the next year travelling the world.

As part of their interest in travelling the world, immersing themselves in new cultures, lifestyle’s and language’s, they would also like to visit land marks, historical sites, universities, libraries, YMCA’S , museums and shopping centres.

This product would need to address the issue of being able to get very accurate information on destinations to visit, maps and any basic information of the intended destination and its hotel grids but also of the amenities that any young travellers would need to be aware of.

This portal would need to house information of not only the historical locations but also of the local bus stations, the tourist infrastructure and what time the first and last train and bus operates, Bureau de change, location of the youth hostel and basic words of the language of that country. For instance, hello, and good bye…can you help me?

As well as addressing the need to provide information for its users, the website can also in the future provide some travel services not currently part of the features. The idea is that as the website expands its services it could add cab and hotel bookings through a link, also where there might be free WI-FI in every city they visit, information on internet café’s , stationery stores, a downloadable pocket guide to the city or country of their destination. Also the travel video shop and podcasts would be a valuable addition to its customers and this will introduce an opportunity to charge a small subscription fee.

The idea to make the portal more interactive by allowing the users to blog and enter featured itineraries would be a very welcomed tool for a generation of electronic and gadget driven demo graph.

This statement answers the question on what categories and features would be a good addition to the service….also by adding a feedback link a lot of promising ideas would be passed on from their users.

User Experience Goals

Definition:

User interface design or user interface engineering is the design of computers, appliances, machines, mobile communication devices, software applications, and websites with the focus on the user's experience and interaction.
To obtain information on this, there is a model which helps to determine a list of questions to be answered. These are listed below.

1. Easy to Learn how to use

2. Effective to use

3. Efficient to use

4. Safe to use

5. Easy to remember

The Herschel’s would want access to a country and city wide information at a touch of a screen, which would give them access to student travel information. It should also in retrospect include; (as part of a future design)

• Integrated GPS system

• Easy to access across all platforms….Laptop’s, Ipads, Android, Blackberry

• No cost to the user

• Can download with minimal or No network coverage.

• Visual stimulus – pictures, video, voice

Tasks to Carry Out Identification, Evaluation and Usability experience:

As with many products or services the users are the key elements that determine if the whole project has ascertained fit for use and suitability, the decision to obtain indication to determine this was to conduct a user testing seminar and a survey group. These two processes allowed for us to address key deficiencies in the product but also to get idea of what features could be included and added for the future.

Usability Testing:

This technique was used to evaluate the www.Triposo.com app by our chosen demographic (undergraduate students). This gave us direct input on how the real users would interact with the system and how it could be of benefit by measuring the content, the context, the access, the suitability, how it interfaces with the chosen platforms and the human –computer interaction.

Our research led us to address the methodology of testing the efficiency, accuracy, recall and emotional response.

User Survey on the chosen user goals:

This process was to sample a portion of the population of actual users of triposo , this was to determine what other types of users would use this product, feedback on improving the delivery and expanding the platform’s on which it could be accessed, i.e. blackberry, customizing it to individual users, advertising, registration and access to support services.

Electronic Focus Groups:

This processed allows for emails to be sent out as survey templates to obtain feedback.

Purposed Changes & Additions to the Product:

The results and feedback of the surveys and user testing led us to these conclusions, which we feel would add some value to the product

1. Bookmark page of recent travels and visits, stores all that information on the medium

2. GPS system to give most accurate direction down to a square foot and family can log into their travel itinerary and check to see their locations.

3. More visuals, videos and pictures of the different location and monuments to include maps of exhibits and library book location.

4. A feature where family and friends can log into the system with an approved email or pin to check if their loved ones have arrived at their destination and where their last location was in the event there hasn’t been any contact.

5. A feature that would email friends and family after they arrive at a new country or city.

6. Weather forecast portal.

These suggestions were obtained from the user surveys and user goal testing results which have been used in constructing the use cases.

During the brain storming session a number of key attributes were discovered to set this site apart from the rest of the travel sites. The recently added GPS system and opportunity to expand its features, the idea of accessing the site features offline is a good idea and video shop which would allow users to upload videos on return of the best locations to visit and Triposo can edit it and broadcast them, the best one winning a prize, this will make it more interactive.

Similar Documents

Free Essay

Sharing Informations

...Sharing informations rzgporhjgpj jelkmfjlzej gmjglk mljefmozjemtk sùprjemgjù ùjemgomgk ùmjgmojzeùpg kùj mojezpùk jm jzej mojmùpg kmùj mojek zmùj ezjpùgkmo ùjk jm jùp j jzmojp k ùzjekoerkgùpkegù pk ùk ùpzkgpùkgpùzjkegpùj pùjkg pzejg pùe, mùzergjkmoeg erjgomejkg egjmoejg ejgmeogj germoj mojgr’rgogtre zermgljrm rdjgkmorjk rekg jergjojg rkemogjerojk lr jomrjthomjekr mojh omjrmo jehmoj moejhmojerh ohjm j omj ermo kjmoj hmorhe jom rhjheomj omjr ohj moejmhorj hmoertjhorjhorl jhjrmt eojoh j reml jho hjre hmojmorh ej hmoj hrmoh jmho j moj ehmo jmo hjmo hrjm ehojhmoh jmoejr omhjm orjehomjh mo jemhj meorjhmorhe kmojme hjmoh rjmoej mohjm oehrjmhj eomrjh emo jemh jomrhjeh morj h herjhliermjeho jem ojehtomjerh orjhmr jlmhekj zmoegjmoze hjgmegjmozjg mojezgojg omrjlmg jm gohjr mzlg hjk ggmro j oim ggmz oegu mog mozg umo g omjg mo jrgo jrmgo moigmoergjm mog oriemr zekhjlihe lehg jzg zmrogjrmo jmljr gomjg jgmr ejj mjegomj gmj gemojg omlrjmejg molj rmoej gomej mjgr omjergmolej gmojg emo jgmgo j mojg mo j mojeom j gomej m oj mjem j omg jemoj om jmoejmo jejmj meoj gmog je gjmr o j moj li hli h u h kug k g ug k g kug kugh hku g ku guyk gkyu g uj ghlki h il khyg kgulh ih j ug luh l uig lih i gh l ujgh li hl ih j g ilh jk b :h jl ikh ;j ghl g mzokrgemo zemgo jg oj mok erjmo gk jke mjrg okerm ljgrem lgkzegmrojmog k mzl,g rjn gmozelrg m gl,rkgmjmg rengmj ,enmkjgrml gnrl gml grenkg mer glkrg ,rgmke jmome lrjmoregjkr gmle grmolrg e,ml g,l gùmklerg, gle, mg k,egmlr...

Words: 259 - Pages: 2

Premium Essay

Information Sharing

...PART 5—LOOKING TO THE FUTURE Chapter 16—SUPPLY CHAIN PROCESS INTEGRATION AND A LOOK TOWARDS THE FUTURE For those for whom integration is not happening, the future is bleak and getting darker.[i] There is a lot of value that is “trapped” between the processes trading partners use to transact business, and when companies work together, they can unlock that value and share its benefits.[ii] LEARNING OBJECTIVES After completing this chapter, you should be able to: • Discuss and compare internal and external process integration. • Discuss the requirements for achieving process integration. • Describe the barriers to internal and external process integration, and what can be done to overcome them. • Understand the importance of performance measurements in achieving internal and external process integration. • Understand why it is important to align supply chain strategies with internal process strategies. • List and describe the eight key supply chain processes, and how trading partners integrate these processes. • Discuss a number of the latest trends in the areas of process management and process integration. CHAPTER OUTLINE Introduction Achieving Internal Process Integration Extending Integration to Supply Chain Trading Partners A Look at Trends and Developments in Integration and Process Management PROCESS MANAGEMENT IN ACTION—An Interview with Zack Noshirwani, Vice President of Integrated Supply Chain for...

Words: 19930 - Pages: 80

Free Essay

Information Sharing Models

...The following document is an archived chapter from a previous edition of A First Look at Communication Theory by Em Griffin, the leading college text in the field of communication theory (all editions published by McGraw-Hill). The theory is no longer covered in a full chapter of the current edition. This document is posted on the resource website for the text www.afirstlook.com All material is copyright © Em Griffin or used by permission of the copyright holder (Note that some cartoons reproduced in the textbook could not be included in the archived documents because copyright permission does not extend to online use.) CHAPTER 19 Information Systems Approach to Organizations of Karl Weick My father worked at a large metropolitan newspaper. I was six years old when he first took me to experience the final hour before the morning edition was "put to bed." The place was alive with activity-shouted orders, quick telephone calls, and copy boys running last-minute changes to the composing room. The whole scene was like watching a huge animal struggling for survival. Many systems theorists regard the image of a living organism as an appro­ priate metaphor to apply to all organizations-one model fits all. Even though mosquitoes, sparrows, trout, and polar bears represent vastly different species in the animal kingdom, they all have systems to provide for nourishment, respira­ tion, reproduction, and elimination of bodily waste. Karl Weick is uncomfortable comparing organizations...

Words: 3592 - Pages: 15

Premium Essay

Security and Information Sharing Model

...To set up a security and information sharing model for the company, it will be much better to utilize a manager security structure through Active Directory than through Workgroups. The reason for this is that there are many different departments within the company. Some information should only be available to specific users within various departments (such as managers). Other information should be available to all employees (employee handbooks, calendars, etc) and still other information should be accessible to only certain groups of people in specific departments (accounting, payroll, etc.) By instituting a managed security structure, it will be much easier to manage the access to resources and the addition or removal of users and/or access to these resources as the company grows and changes. The file/print/application architecture will be a client/server architecture so that the management of access to information and resources is in the hands of the network administrator as opposed to the individual users. This is an obvious security measure in any company dealing with sensitive information which should not be shared with all employees. Also this will create a centralized management system for the access to information and resources, making it easier to institute changes across the board. It would be very beneficial to create security group memberships in Active Directory, for the centralized and timely management of security. Simple changes to the security groups...

Words: 381 - Pages: 2

Premium Essay

Bridgewater Interiors Information Sharing

...Methods of Sharing Information at Bridgewater Interiors Patricia Reed HCS/325 January 30, 2012 Kelli Reid Methods of Sharing Information at Bridgewater Interiors The way that a business shares knowledge inside the organization as well as outside of the organization is very important. Whether a business shares knowledge through traditional means, or the new boundaryless means is critical to the success of the business. What are boundaryless organizations? “Boundaryless organizations communicate mainly through email, phone and other virtual methods rather than more traditional face-to-face communication. The freedom to telecommute with international employees removes geographical barriers to productivity and allows for schedule flexibility” (Hearst Communications, 2012). This paper will discuss the ways Bridgewater Interiors effectively shares knowledge within the organizations, and outside of the organization. This paper will also discuss whether these methods of communication are effective or ineffective, how these techniques can be used in a health care organization, and the impact that technology can have on information sharing. Bridgewater Interiors, a manufacturing company uses a variety of techniques and tools to effectively communicate with its business associates and employees. The first is daily team meetings at the beginning of every shift for all employees. The purpose of the daily team meetings is to exchange information that effects the entire facility,...

Words: 1062 - Pages: 5

Premium Essay

Lack Of Information Sharing In The Intelligence Community

...Information sharing between the agencies within the Intelligence Community have dramatically increased over the last decade. Information sharing can help organizations around the United States prevent attacks, terrorism, and even help local law enforcement solve crimes. Even though information sharing has increased there are still many obstacles that prevent some information sharing to occur between the agencies. Lack of adequate government funding for some organizations can cause many of the local organizations to be restricted to valuable resources. In addition to the lack of funding, the individual methods in which each organization stores their information proves to be an issue as well. Since the development of fusion centers, this has...

Words: 758 - Pages: 4

Free Essay

Use of It in Sharing Information Between Professionals

...HND HEALTH AND SOCIAL CARE MANAGEMENT Unit 16: UNDERSTANDING SPECIFIC NEEDS IN HEALTH AND SOCIAL CARE NEEDS I confirm that no part of this coursework, except where clearly quoted and referenced, has been copied from material belonging to any other person e.g. from a book, handout, another student. I am aware that it is a breach of ABI regulations to copy the work of another without clear acknowledgement and that attempting to do so will render me liable to disciplinary proceedings. Submission No: - 1 STUDENT NAME: LUCKY AKAEHOMEN STUDENT ID: 101760 TUTOR: KHALID KARIM Table of Contents PURPOSE OF REPORT 3 INTRODUCTION 3 (AC 1.1, M1) 4 1.1 4 AC 1.2 5 AC 1.3 6 A.C 3.1 9 A.C 3.2 11 A.C 4.1 11 A.C 4.2 11 A.C 4.3 12 REFERENCE 13 PURPOSE OF REPORT The purpose of this report is to show my understanding of the perceptions of health, disability, illness and behaviour. It is also to show how health and social care services and systems supports individuals with specific needs. This report will also show how much I understand the strategies that are necessary in coping with challenging behaviour related with specific needs and finally show the different approaches and intervention strategies that support individuals with specific needs. INTRODUCTION This report will cover a case study about Mr. K Gibbs, who was a 55year old man with severe learning disability and epilepsy. I will discuss the concepts of health, disability and illness in...

Words: 3632 - Pages: 15

Premium Essay

Evaluating the Value of Information Sharing in a Supply Chain

...Int J Adv Manuf Technol (2006) 27: 604–609 DOI 10.1007/s00170-004-2214-4 ORIGINAL ARTICLE J.M. Hsiao · C.J. Shieh Evaluating the value of information sharing in a supply chain using an ARIMA model Received: 10 October 2003 / Accepted: 20 April 2004 / Published online: 9 February 2005 © Springer-Verlag London Limited 2005 Abstract This paper considers a two-echelon supply chain, which contains one supplier and one retailer. It studies the quantification of the bullwhip effect and the value of informationsharing between the supplier and the retailer under an autoregressive integrated moving average (ARIMA) demand of (0, 1, q). The results show that with an increasing value of q, bullwhip effects will be more obvious, no matter whether there is information sharing or not. When there exists information sharing, the value of the bullwhip effect is greater than it is without information sharing. With an increasing value of q, the gap between the values of the bullwhip effect in the two cases will be larger. Keywords ARIMA · Bullwhip effect · Information sharing · Supply chain dard deviation of order amount is bigger than that of sales, i.e. demand deviation. This kind of distortion winds upward in the form of an increasing square of the standard deviation [9]. The bullwhip effect has drawn much attention in recent years [1, 3, 4, 6, 8–10]. This effect conceals a serious problem of cost. For instance, due to an inefficient estimation of demand, various problems may occur, such...

Words: 4416 - Pages: 18

Premium Essay

The Importance of Information Sharing in a Supply Chain for the Supplier‘S Performance

...The importance of information sharing in a supply chain for the supplier‘s performance Bachelor thesis: Organization studies, 2nd semester, academic year 2011-2012 Thesis Circle: Time will tell…. A processes perspective on inter-organizational collaboration Name: PC Jansen ANR: 770926 E-mail: P.C.Jansen@uvt.nl The importance of information sharing in a supply chain for the supplier‘s performance Abstract This literature review investigates the effect of information sharing from a buyer to a supplier in a supply chain on the performance of that supplier, with taking in mind that the supplier has to combat the bullwhip effect. With the existence of the bullwhip effect, a supplier cannot make right forecasts and therefore has difficulties in planning its production and/or inventory control. This research shows that information sharing is the key solution to reduce or avoid the bullwhip effect and, by that, it positively influences the performance of the supplier in the chain. Keywords: Bullwhip, supply chain, information sharing, supplier performance, inventory control, single-echelon, multi-echelon Thesis Circle: Time will tell…. A processes perspective on inter-organizational collaboration Supervisor: Remco Mannak Supervisor 2: Annemieke Stoppelenburg Name: PC Jansen ANR: 770926 E-mail: P.C.Jansen@uvt.nl 2 Table of contents Table of contents 3 1. Introduction 4 2. Theoretical Framework ...

Words: 12355 - Pages: 50

Free Essay

File Sharing: What and How Effects on Music Sales.

...File Sharing: what and how Effects on music sales. Abstract File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia(audio, images and video), documents or electronic books. It may be implemented through a variety of ways.In this paper we are discuss common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks,World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.We consider the specific case of file sharing and it’s effects on legal sales of music . 1. Introduction Files were first exchanged on removable media.Computers were able to accessremotefilesusing filesystem mounting and FTP servers.The mp3 encoding, which was standardized in 1991 and which substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, The Digital Millennium Copyright Act was unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as an unstructured centralized peer-to-peer system, requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. Gnutella, released in March, was the first decentralized file sharing network. In the gnutella network, all connecting software was considered equal...

Words: 1877 - Pages: 8

Free Essay

Gainsharing Approaches

...gainsharing approaches 3. To explore the recommendations that can make the gainsharing approaches programs more effective 1.3: SCOPE OF THE STUDY The scope of the report outlines the various objectives of the report. The scope of this report is to understand how comprehensive gainsharing approaches have become and to understand the massive impact it has on employee performance. 1.4: METHODOLODY I have gathered the information from various sources. The major sources of information include the book on Human Resource Management by Keith Davis and William B.Werther also Human Resource Management by Gary Dessler. For further elaboration and clarification, I also took help for various websites. I have mainly used secondary sources of data which was collected through various books and websites. 1.5: LIMITATIONS OF THE STUDY Research works are meant to face limitations. While completing this term paper I too had to face a lot of limitations in gathering information. My limitations included: * Time constraint * Lack of pertinent information Chapter 2 GAINSHARING APPROACHES Gainsharing programs actively encourage employees and employers to work together to solve the problems of cost, quality, and production...

Words: 4415 - Pages: 18

Free Essay

Case Study #2 Albatross Anchors

...company has grown drastically over the years and now employs over 130 people. They specialize in bell and snag hook anchors and operate as a strictly wholesale organization both domestically and internationally. Their manufacturing facility consists of one building which includes manufacturing, shipping, receiving, raw materials, finished product storage, the foundry and administrative offices. Their manufacturing facility is antiquated, worn, and technology deprived and no longer meets the US safety and environmental standards. Question 1 Carefully review the assignment scenario/case study. From the limited information in the scenario/case study, identify at least three direct and specific long-term and three direct and specific short term operations changes that Albatross Anchor must make to gain a clear and sustainable competitive advantage (provide detailed information to validate and support each recommended change). Long-Term Operational Changes (01) The first long-term change that Albatross Anchor should make to gain a clear and sustainable competitive advantage is technology. Since Albatross Anchor was founded in 1976, they haven’t updated the ways that they manufacture anchors. Each type of anchor they produce uses different types of manufacturing styles and they need to be changed each time to accommodate a different anchor. The machinery is obsolete, outdated, and is no longer meeting the environmental standards in the US. Some of their competitors may have access...

Words: 1204 - Pages: 5

Free Essay

How Is Digital Piracy Hurting Modern Society?

...Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern United States in 2006 (Zhang, Smith, McDowell, 2009). The reason college students were used is that piracy is very prevalent in academia, and students use pirated software extensively. The students were asked to complete the survey within a week and a confidentiality statement was included to assure the student that no personal information would be disclosed. A Likert scale was used with a scale...

Words: 1689 - Pages: 7

Free Essay

Terms Paper

... and they are able to handle the data processing locally rather than on central servers. Because of this, PC to PC, or peer-to-peer computing can now occur when individual computers bypass central servers to connect and collaborate directly with each other. Three Distinct Peer-to-Peer Computing Models There are three distinct peer-to-peer computing models: 1. Multiple Peer Relationship PCs are connected/networked to each other through servers, and files can be shared and collected from anyone else on that same network. One key problem is this can lead to major breeches in security and intellectual property issues. Examples: Napster - http://www.napster.com (music sharing) Note: Due to legal issues, Napster has temporarily stopped file sharing services on their site. Kazaa - http://www.kazaa.com (multimedia sharing) Server Computer A Computer B Computer C 2. Distributed Peer Relationship A group of computers connected together to combine their computing and processing abilities to search the Internet or solve very complex problems requiring massive process crunching. Examples: Infrasearch- http://www.infrasearch.com (search engine) Entropia - http://www.entropia.com (climate simulations and astrological calculations) Computer A Computer A Search Internet Computer B Solve Complex Problem Computer B Computer C Computer C 3. Collaborative Peer Relationship A small group of people agree to collaborate through a common interface,...

Words: 1418 - Pages: 6

Free Essay

Linux Essay

...File sharing through the network is just as easy as saving a file to a floppy disk, flash drive, or CD-ROM. You can send the file over a network connection, instead of saving the file to a storage device and personally hand delivering it, or sending it. Some file transferring such as email, have limited space for file sharing. You can use multiple different ways of transferring files. File transfers such as (P2P) known as peer to peer act as a client, and server. (P2P) allows larger transfers of file sharing, but does not use a central server. File sharing helps administration because, you can still have the security of the file that may be needed for business, or personal needs. Storing files in a central server allows only clients with permissions of the file. Files can be encrypted to protect information, and you have to have a password to access the content of the file. File sharing is better than using an external device since, external devices can be lost, or stolen. Sharing a file through a network allows the encryption to protect the permissions of the file, and only clients eligible of the content can see it. A good example of having file sharing instead of an external device is, when you have a extended business that needs to reach out to other owned locations. Instead of spending more money for external devices to be sent through the mail, which takes time and the package may not ever make it to the destination. Why not send the information through the network...

Words: 486 - Pages: 2