Human Factor in IT Assignment: Project Evaluation and Case Studies

Verified

Added on  2022/12/12

|5
|818
|115
Homework Assignment
AI Summary
This assignment explores the human factor in IT, focusing on project feasibility, evaluation methodologies, and case study analyses. It begins by assessing the feasibility of a project based on Human-Computer Interaction (HCI) principles, emphasizing the importance of adherence to HCI techniques and the potential drawbacks of making changes to a project's operational complexity. The assignment then details the evaluation process using the DECIDE framework, outlining how goals are determined, stakeholders are identified, and the project is tested and evaluated to identify and mitigate potential issues. The assignment also includes a review of Steensen’s (2011) work on the technological impact on journalism, as well as case studies on ISP activities in Australia and the ElectroVote machine. The ElectroVote case study examines the feasibility and evaluation of the voting machine, addressing security measures and potential counter-measures for system failures. The assignment references relevant academic sources to support its analyses and recommendations.
Document Page
Running head: HUMAN FACTOR IN IT
HUMAN FACTOR IN IT
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1HUMAN FACTOR IN IT
Jelly bean case study
Answer to question (a) Is the project feasible? Could it be changed? If not why not?
According to the HCI (Human Computer Interaction) techniques and its principles the
project is quite feasible as it follow all the principle and techniques of HCI. The mood of an
individual was recognized and according to the situation the color of the icon was displayed to
other members of the group. Thus, the project is feasible according to the HCI techniques.
Changes in the proposed project cannot be handled as it can harm the whole project
operation complex and will also consume more time to alter the system according to the changes
that will be made to the project. The operations of the proposed project depends on each other
and thus, a change can harm the whole system which can alter the basic operations of the project.
Answer to question (b) How to evaluate the process
The evaluation process of the proposed project is carried out by DECIDE framework
which help us to justify the project (Remy, Gegenbauer & Huang, 2015).
Determination of the goals: The proposed project will be designed after proper
justification and was designed achieve the project goal.
Explore: The Stakeholders and the respective users of the project was clearly identified
and the method of operation was also justified.
Choose: The proposed project was tested properly before the final implementation to the
clients and the feedback of the users are also collected for the development.
Identification: The problems of the project was identified.
Decide the mitigating methods: The various mitigating methods was selected to reduce
the issues of the project for the proper evaluation of the project.
Document Page
2HUMAN FACTOR IN IT
Evaluation: The data was studied and interpreted for the final evaluation of the project.
Thus, after the DECIDE framework, the project issues will be handled accordingly and will
be mitigated by using various methods and prepare a countermeasure for different issues that
can arise regarding the project.
Steensen’s (2011) critical review on the technological impact on the
journalism
According to the author, examines the various technological oriented research on the
online journalism. The paper is based on two ideas, firstly the technological impact on the
journalism and lastly, it is based on the limitations of the technological oriented research
(Steensen, 2011).
Various technological methods that impact journalism are like Digital Cameras, Podcasts,
You tube, Smartphones, Notepads. Email, Cloud sourcing, social media and so on.
ISP in Australia
The government of Australia effectively made a decision to record all the internet
activities of the clients of ISP. The security agency can ask for the activities from the ISP, this
activity cannot be justified or accepted by the society because it can contain some sensitive
information regarding the clients. The information can be achieved by the agency after sending
some notice to the clients and after the approval by the clients, the ISP should handover the
information to the security agency.
Document Page
3HUMAN FACTOR IN IT
ElectroVote case study
Feasibility:
The proposed machine is feasible as it provides security to the voting method. The votes
are kept in the encrypted file and the vote collector have special shape which fits to the machine
and collect the votes easily.
Evaluation Process:
The proposed machine will provide security to the Australian government but in case if
the machine is broken or stop working then in that case some counter measures should also be
introduced by the designer to overcome such issues and allow the machine to operate effectively
and efficiently. The voting machine also contains voting collector which can collect all the
polled votes. The absence of physical network in the machine reduces the complexity and allow
the technicians to easily recover the system in case of any damage.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4HUMAN FACTOR IN IT
References:
Remy, C., Gegenbauer, S., & Huang, E. M. (2015, April). Bridging the theory-practice gap:
Lessons and challenges of applying the attachment framework for sustainable hci design.
In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing
Systems (pp. 1305-1314). ACM.
Steensen, S. (2011). Online journalism and the promises of new technology: A critical review
and look ahead. Journalism studies, 12(3), 311-327.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]