SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

The Pure-Emic User Interface Design Methodology for an Online
Community Policing Hub
Chinedu Pascal Ezenkwu
Dept. of Electrical/Electronic and Computer Engineering,
University of Uyo, Akwa Ibom , Nigeria.
Tel: 234-7034471962 E-mail: edusco4@gmail.com
Simeon Ozuomba
Dept. of Electrical/Electronic and Computer Engineering,
University of Uyo, Akwa Ibom , Nigeria.
Tel: 234-7030345527 E-mail: simeonoz@yahoo.com
Obinwa Christian Amaefule
Department of Electrical Engineering,
Imo State University, Owerri.
E-mail: littlekrix222@yahoo.com
Abstract
The pervasiveness of the internet and internet-ready devices has greatly facilitated the rapid and unprecedented
adoption of online social networks and their attendant online communities. In this case, an online community is a
group of people who are tied together by a common interest, purpose, goal, practice, etc. Hence, the centre of
attraction to an online community is the interest, the purpose or the goal that the members share or will stand to
achieve either collectively or individually. Online Community Hub (OCH) is a collaborative virtual platform on
the web where the entire people, institutions, technologies, tools, resources and service delivery frameworks that
are relevant for any community are made visible and accessible. Online Community Policing Hub (OCPH) is an
Online Community Hub where the shared community interest, purpose or goal is community policing. The thrust
of the work in this paper is to present a methodical approach to a community centered user interface design for
an Online Community Policing Hub (OCPH). The paper presents a Pure-Emic User Interface Design (PEUID)
approach underpinned by knowledge from various fields such as ergonomics, cognitive psychology,
anthropology and software engineering in ensuring the well-being of the system users and the need for zerotraining without deviations from the users’ mental model of the system.
Keywords: Geo-Community, Online community, Community policing, Community Hub, Ergonomics,
Anthropology, Software Engineering
1. Introduction
An Online Community Policing Hub (OCPH) is a collaborative virtual platform where all the people, institutions,
technologies, tools and strategies that are relevant for effective community policing are made available and
accessible. The conceptualisation of the OCPH is based on the Context Model Of Community Informatics Social
Network System (CISNS) developed by Ozuomba et al., (2013). Community policing is a policing strategy that
encourages active partnership between the law enforcement agencies and the community in devising strategic
approach to minimize the rates of crimes in the community. According to Weigand (1997), “the police are the
public and the public are the police; the police being only members of the public who are paid to give full time
attention to duties which are incumbent on every citizen in the interest of community welfare and existence.”
The emergence of an OCPH is targeted at provided solutions to the underlying reasons for the non-involvement
of the citizens in crime mitigation exercises. Among various reasons for this poor community participation are
fear on the part of the citizens of being noted as police informants by hoodlums; certain negative beliefs about
the police; risks of favouritism, nepotism and development of corrupt networks due to police closeness with the
people, etc. Moreover, poor system quality and noncompliant system interface may as well contribute to factors

14
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

that may tend to inhibit the effective realization of the vision of the OCPH.
The goal in this paper is to present a methodical approach to a community centred user interface design for an
Online Community Policing Hub (OCPH). Undeniably, every system user requires a user interface that is
tolerant, consistent and compliant. According to Galitz (2007), “the goals of interface design are simple: to make
working with a computer easy, productive, and enjoyable.” Consequently, the issue of system user interface
should not by anyway be trivialised in a system of this nature that involves a community of various users of
different ages, technical experiences, health status and other human factors. The system targets a user interface
that will be tolerant, learnable and compliant with even the less technical users without being boring to the
experienced users.
Furthermore, the usability of any software-based system is a metric function of its user-friendliness, interactivity
and simplicity measured from the users’ viewpoints. Pressman (2010) defined usability as “the degree to which a
software is easy to use as indicated by the following sub-attributes: understandability, learnability,
operability.“ In ISO 9241-11, Usability is defined as “the extent to which a product can be used by specified
users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.” For
this to be possible, the user interface must portend the users’ mental model of the system. The usability of a
software product is a major concern of software ergonomics. Ergonomics is derived from two Greek words;
“Ergon,” meaning work and “nomois” meaning natural laws. The International Ergonomics Association
(IEA,2003) defines “ergonomics (human factors) as the scientific discipline concerned with the understanding of
the interactions among humans and other elements of a system, and the profession that applies theory, principles,
data, and methods to design in order to optimize human well-being and overall system performance.” Simply put,
ergonomics is the study of how to make a product or a process comfortable, efficient and appear natural.
Consequently, in this paper, a methodical approach to system user interface design known as the Pure-Emic User
Interface Design (PEUID) approach is adopted for the interface design for the Online Community Policing Hub
(OCPH). “Emic” is a term often used by anthropologists in referring to the study of culture based on the people’s
perspective. In addition to the ‘emical’ nature of PEUID are the following underlying guidelines for achieving a
user-defined user interface for the proposed system: interface consistency, interface forgiveness and interface
adaptability. The approach involves of Software Requirement Engineering (SRE) and Software Ergonomic
Engineering (SEE) in ensuring that a system that befits the environment; stakeholders requirements, skills and
health status is realised. In addition, a WYSIWYG (What-You-See-Is-What-You-Get) prototype of the system
interface is employed to facilitate the designer’s in-depth understanding of the users’ perception of the system.
The prototype undergoes series of evaluations, analyses and modifications until the users’ resultant mental model
is finally represented in the prototype.
Finally, the arrangement of the rest of the paper is such that section two presents a review of relevant literatures.
Description of the online Community Policing Hub (OCPH) is presented in section three. In section four, the
user interface design methodology for the online community policing hub (OCPH) is presented. Lastly, the
conclusion is presented in section five.
2. REVIEW OF RELEVANT LITERATURES
2.1 Online Community:
An online community is a virtual platform that provides communication tools and technologies to facilitate
interaction among people who wish to share information without having to meet one another face-to-face. It may
as well serve as a supplemental medium of communication among people who may have known one another in
real life. Furthermore, the growth of an online community is underpinned by the relative interests of the
members of the online community. Amy Jo Kim (2000) defined an online community as “a group of people with
a common purpose, interest, or activity, who get to know each other better over time.” According to Howard
Rheingold, “ a virtual community is a group of people who may or may not meet one another face to face, and
who exchange words and ideas through the mediation of computer bulletin boards and networks.” Online
community is categorised into the following: Community Of Practice (COPs)-where individuals share the same
profession; Community Of Circumstance (COC)-where individuals share a personal situation; Community Of
Purpose (COP) – where individuals share a common objective or purpose; Community Of Interest(COI)- where
individuals share a common interest. Irrefutably, critical observations of these categories of online community
will reveal that interest is the underlined factor and determinant of participation of members in any online

15
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

community.
2.2 Community Policing:
Dempsey and Forst(2008) opined that “Community policing is a strategy of crime management that deals with
the basic causes of crime with the view to developing and applying longer term solutions to resolving issues
through improved police community partnership and communication.” According to Weigand (1997), “The
police are the public and the public are the police; the police being only members of the public who are paid to
give full time attention to duties which are incumbent on every citizen in the interest of community welfare and
existence.” The traditional policing has three operational pillars: the pillar of random or unstructured routine
community patrols, usually within a designated geographical location; the pillar of rapid response to calls from
community residents; and the pillar of retroactive past crime investigations (Godwin et al, 2009). However,
community policing is a proactive “approach toward crime that addresses the underlying causes of crime and
endeavours to apply long term problem-solving to issues through improved police-community partnerships and
communications” (Dempsey and Forst, 2008). In other words, the traditional policing is incident-driven
(Goldstein,1997) while community policing is cause-driven. Weigand(1997) suggests that “the police are the
public and the public are the police; the police being only members of the public who are paid to give full time
attention to duties which are incumbent on every citizen in the interest of community welfare and existence”.
Chene(2012) opined that community policing comprises of three key components: community partnership,
organisational transformation and problem-solving. This synergistic approach to policing is tailored to the
following goals:
(a) creation of a conducive environment where everyone can particpate in curbing crimes
(b) maintenance of trust between the citizens and the law enforcement agencies
(c) development of a framework that will make it convenient for the citizens to relate information
pertaining to possible terrorists’ threats and infrastructure vulnerabilities
(d) efficient anaysis of information from the citizens and the development of the optimal response strategy.
Moore (1992) asserts that thought and analysis is fundamental to problem-oriented policing in order to
effectively respond to the cause of the problem
(e) Integration of the community policing philosophy into the mission statement of the law enforcement
agencies.
3. Description of the Online Community Policing Hub (OCPH)
3.1 The Concept Of Online Community Policing Hub, (OCPH)
In view of the rapid and unprecedented adoption of online social networks and their attendant online
communities, attention of social workers and community development experts, researchers, and practitioners
have turned to social networks and online communities as tools and strategies for facilitating effective
participation and collaborations of the target stakeholders. In this case, an online community is defined as a
group of people who are tied together by a common interest, purpose, goal, practice, etc. Hence, the centre of
attraction to an online community is the interest, the purpose or the goal that the members share or will stand to
achieve either collectively or individually. This paper extends the idea of social networks and their attendant
online communities to include online community hub. Specifically, an Online Community Hub (OCH) is a
collaborative virtual platform on the web where the entire people, institutions, technologies, tools, resources and
service delivery frameworks that are relevant for any community are made visible and accessible. Community
Policing Hub (OCPH) is an Online Community Hub where the shared community interest, purpose or goal is
community policing. A generic community hub is depicted in Fig. 1.

16
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Fig. 1: Generic Community Hub
3.2 Context Model Of Community Informatics Social Network System (CISNS)
The CISNS was conceptualized by Ozuomba et al (2013) as depicted in Fig. 2. Essentially, SNWA when tailored
and applied to facilitate local community development purpose and processes becomes a part of Community
Informatics Social Network System (CISNS). The model puts into consideration the people and institutions, as
well as the political, economic, socio-cultural, technical, legal and other environmental factors that affect may
affect the system. The model consists of two broad categories of information; the environment/context
information and the online community information. The context information lays emphasis on contextual issues
and the need to tailor social technologies to the situated context of use in the various localities where the system
operates .The online community information includes the SNWA which supports the purpose, policies, contents,
technologies and people that make up the online community.

17
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Fig 2: Context Model Of Community Informatics Social Network System (CISNS)
3.3 The Conceptual Framework Of The Community Policing Hub (OCPH)
The conceptual framework of the OCPH is presented in Fig. 2. Framework of OCPH in Fig. 3 shows the diverse
stakeholders of the OCPH who can access and participate in the system through the various technologies that it
supports. The facilitator initiates and drives the community policing goals and objectives by moderating the
connection, interaction and activities of the various users groups or stakeholders in the OCPH. In order to foster
active participation of the expected diverse user groups, the system requires a user interface that will be tolerant
and compliant with the health status, age and level of technical experience of each user. Thus, extensive Software
Requirement Engineering (SRE), Software Ergonomic Engineering (SEE) and the Pure-Emic User Interface
Design (PEUID) are used in this paper to develop suitable user interface for the OCPH.

18
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Fig.3: Conceptual Framework of OCPH as a part of Community Informatics Social Network, CISN

4.

Design Methodology for the User Interface of the Online Community Policing Hub (OCPH)

4.1 Software Requirement Engineering (SRE)
In order to develop suitable user interface for the OCPH, Software Requirement Engineering (SRE) is conducted
to enhance the understanding of the system functional and non-functional requirements. The system functional
requirements include all properties of the system that a user can use to achieve specific goals while the nonfunctional requirements include specific properties of the system such as system performance, efficiency,
operability, usability, etc that characterise the system quality. Interview, questionnaire, focus group discussion,
and low fidelity prototyping were used to elicit the users’ and system’s requirements. The requirements gathered
so far, are analysed, evaluated until a satisfactory requirement model or specification for the system is realised.
The Non-functional and the functional requirements for the system are provided in Tables 1 and 2 respectively.

19
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Table 1 Functional Requirements Of The System
FUNCTIONAL REQUIREMENTS
S/N

Requirement
Requirement Description
/Modules

1.

Crime Report

This module allows users to report both emergency and non-emergency
crime information to the facilitator.
•
The Emergency crime reports category provides faster, secured
and free way of reporting crimes that require immediate attentions. Tollfree anonymous hotlines are provided for easy communication of crimes
info to the facilitator.
•
The non-emergency crime reports category provides crime
reporting techniques for crimes that do not require immediate attention.
These crimes are reported by the aid of an incident report form. This
form supports multimedia message, and allows the reporter to send the
coordinate of the incident area for crime mapping.

2.

Missing
Persons/Things

3.

Help-Me

4.

Partnership

This system module permits users to appeal for information about the
whereabouts of lost persons or properties as well as to report lost but
found persons or properties. The pictures as well as other necessary
descriptions of the persons or things that are lost or found are provided
as guides.
The ‘HELP-ME’ module presents rehabilitation, counselling, support
and protection opportunities to community members who wish to
renounce their evil gangs, addictions, anti-social behaviours, etc. A
well-structured ‘HELP-ME’ form is provided for collection of vital
information from such persons, who are availed with the services of
rehabilitation centres and other partnering experts depending on the
area of help.
The system must be flexible to correction of defects, integration of new
technologies and enhancement of This module provides partnership
opportunities to law enforcement agencies, churches, social service
organisations, companies, NGOs, businesses, institutions and other
stakeholders. The module is categorized into:
•
Inquiry: This allows the intending partners or sponsors to ask
questions about terms, conditions and also visualize necessary
programmes, schemes, activities and events where their sponsorships
and supports may be needed.
•
Application: This provides application forms for the partners to
sign up their memberships or partnerships.

5.

Discussion
Forum

This is a collaborative platform where the community members and
other users can meet, collaborate and exchange ideas using Instant
Messaging(IM) and other social networking services. The discussion
forum is categorized into Crime Chat Forum and Public Chat forum.
• The Crime chat forum allows a user to appear as unknown or with an
alias in order to keep him/her unknown from other users. This platform

20
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

is the best for discussions pertaining to crimes in the community.
• The public chat forum is mainly to build active community networks
and trust among the community members. The community members
meet, know one another and discuss other personal issues that may not
be crime related.
6.

Evaluation

7.

Crime
Appeal

The impact assessment of this system on the community is achieved
through this module. The module provides a ‘feedback questionnaire’
which enables the community members to state their expectations as
well as the areas of deficiencies of the system. The information collected
are collated and the results are used as a veritable tool for decision
support.
Info

This module enables the police and other law enforcement agencies to
appeal for certain crime information and information about most wanted
persons. It also helps the facilitator to verify more about certain crime
reports.
•
The crime appeal form is provided for this purpose. This
module supports multimedia message which enables the pictures of the
most wanted persons to be displayed for identifications.
•
Users can view the appeal, make their comments or use the
communication channels provided in the crime report module to relate
the info which they feel should be private.

21
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Table 2 Non Functional Requirements Of The System
NON-FUNCTIONAL REQUIREMENTS
S/
N

Requirement

Requirement Description

1.

Reliability

The system services shall have an availability of 99%. This implies that out of every
100 requests for these services 99 must be available and produce reliable results.

2.

Security

Unauthorised access to the system and its data is not allowed.

3.

Usability

The system must have:
•

Well-structured user manuals

•

Informative error messages

•

Help facilities

•

Well-informed graphical user interfaces

4.

Maintainability

The system must be flexible to correction of defects, integration of new technologies
and enhancement of the system functionalities

5.

Performance

•

The system should be able to support a large user base at any time.

•

The system will be designed to process every incoming transaction in 1 second
or less.

4.2 Software Ergonomic Engineering (SEE) for the System
Software Ergonomic Engineering (SEE) is an approach employed by a software developer or designer in
ensuring that the those human factors that may affect a system’s usability, “comfortability”, “learnability”,
efficiency as well as the users health are well addressed. SEE begins with the issuance of a Software Ergonomic
Questionnaire (SEQ) for the purpose of gathering the necessary ergonomic data from the users. A model of a
SEQ is presented in Fig. 4.

22
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Fig. 4: A model of a SEQ
The information captured by the SEQ is analysed and triangulated in the first stage of the interface design –
interface analysis. Focus group discussion and meetings can equally be conducted for further clarification and
resolution of conflicting data. Moreover, a WYSIWYG-based prototype is equally deployed before the final
interface design in order to explore further ergonomic data that might be omitted in the SEQ. The interface
design methodology is presented in next section.
4.3

The Pure-Emic User Interface Design (PEUID) approach

The activities in the Pure-Emic User Interface Design (PEUID) approach include interface analysis, prototyping,
user evaluation, evaluation result analysis by the designer and prototype modification. Fig. 5 represents the
PEUID model showing the algorithmic implementation of the activities therein as well as the deliverables that
are realized for each activity.
Interface analysis encompasses all the activities that are necessary for understanding the users’ perceptions
(mental model) of the system. Use of SEQ, focus group discussions and interviews are used for this purpose.
Besides, the users are categorized based on their technical capabilities. Understanding the users’ mental model
for the proposed system will serve as a guide for developing a prototype for the system. In this work, a
WYSIWYG prototyping is used for this purpose. The prototype is presented to the stakeholders for evaluation.
The result of the evaluation is studied and analysed by the designer in order to pin down the limitations. Based
on this understanding, the prototype is modified to accommodate the users’ expectations. These processes keep
on iterating until a final and satisfactory prototype is produced for the user interface design.

23
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

Fig. 5: The PEUID Model
A sample of a WYSIWYG prototype is presented in Fig. 6. The prototype depicts the developer’s
perception of the system based on the information gathered through SRE and SEE. The positions of the system
elements or components, background colour, text colour, etc are shown in the prototype in order to understand
what the stakeholders actually want from the system. The prototype is improved until a more satisfactory
prototype is achieved for the system design.

Fig. 6:

A WYSIWYG prototype showing the Home page of the OCPH

5. Conclusion
In this paper, Pure-Emic User Interface Design (PEUID) methodology tailored to developing an interactive and
user compliant interface for an Online Community Policing (Hub) is presented. The PEUID methodology

24
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.11, 2013

www.iiste.org

employed knowledge from devise fields such as ergonomics, cognitive psychology, anthropology and software
engineering in ensuring the usability of the system for the diverse target users groups. Specifically, the PEUID
approach seeks to capture and effectively utilise the users’ mental model of the system in the user interface
design. The PEUID is preceded by extensive Software Requirement Engineering (SRE) and Software
Ergonomics Engineering (SEE). Finally, a model of Software Ergonomics Questionnaire (SEQ) and PEUID
model are also presented.
References
J. S. Dempsey and L. S. Forst.( 2008). An introduction to policing,4th ed., Madison and Wadswort: Belmont.
O. U. Godwin, R. O. Arop and A.F. Ahmed. (2009). POS102 - Police community relations and interpersonal
relations and awareness, Lagos: National Open University Of Nigeria.
H. Goldstein. ( 1997). Towards community-oriented policing: potential, basic requirements and threshold
questions. Crime delinquency (Volume 33), pp 6-36.
C. H. Weigand. (1997). Combining tactical and community policing considerations. Law and Order,
71.

pp 70-

M. Chene. (2012. ). Community policing as a tool against corruption, Transparency International, pp 2.
M. H. Moore. (1993). Problem solving and community policing: A preliminary assessment of form ISBN 0-20160870-7
Amy Jo Kim. 2000. Community Building on the Web : Secret Strategies for Successful Online Communities,
Peachpit Press. ISBN 0-201-87484-9
Howard Rheingold. (1996). The Virtual
Community: Homesteading On The Electronic Frontier, (free in
HTML DIS 9241-11), Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11
Guidance on usability.
ISO new strategies of policing,” “Modern policing crime and justice volume 15”, eds.
S. Ozuomba, A. C. Gloria, K.O. Felix and N. Michael.( 2013). Social Networking Technology: A frontier of
communication for development,. Available at: http://epromac.com.ng/onddc/paper/GeoHubNet.pdf
IEA. (2003). IEA Triennial Report, 2000–2003,

IEA Press, Santa Monica, CA.

Karwowski, W., Ed. (2001), International Encyclopedia of Ergonomics and Human Factors, Taylor & Francis,
London.
R.S. Pressman. (2010). Software Engineering: A practitioner’s approach. 7th ed., Mc Graw Hill. Morris (Chicago:
University of Chicago Press, 1992), 1992, 99-158.

25
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Was ist angesagt?

June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...dbpublications
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
 
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...Steve McCarty
 
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...IJERA Editor
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...journalBEEI
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...IJECEIAES
 
Mobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutionsMobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutionsSpringer
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesIJCI JOURNAL
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overvieweSAT Publishing House
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 

Was ist angesagt? (20)

June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
HULREPORT
HULREPORTHULREPORT
HULREPORT
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...
Malaysia keynote "Ubiquitous Computing and Online Collaboration for Open Educ...
 
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...
Extending Aural and Music Interfaces to Mobile Device Interaction Design Arch...
 
J017555559
J017555559J017555559
J017555559
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
 
Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...Opportunistic mobile social networks: architecture, privacy, security issues ...
Opportunistic mobile social networks: architecture, privacy, security issues ...
 
Mobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutionsMobile speech and advanced natural language solutions
Mobile speech and advanced natural language solutions
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overview
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 

Ähnlich wie The pure emic user interface design methodology for an online community policing hub

Cog infocom2014opening
Cog infocom2014openingCog infocom2014opening
Cog infocom2014openingGyörgy Persa
 
Emerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computingEmerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computingijcsa
 
Cog infocom2014opening
Cog infocom2014openingCog infocom2014opening
Cog infocom2014openingGyörgy Persa
 
seminar report on ambient intelligent
seminar report on ambient intelligentseminar report on ambient intelligent
seminar report on ambient intelligentAnkita Srivastava
 
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...IDES Editor
 
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdfA Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdfKayla Smith
 
Published Paper
Published PaperPublished Paper
Published PaperFaeza Noor
 
Usability guidelines for usable user interface
Usability guidelines for usable user interfaceUsability guidelines for usable user interface
Usability guidelines for usable user interfaceeSAT Publishing House
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...CSCJournals
 
An IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAn IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAI Publications
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
Human Computer Interaction: Trends and Challenges
Human Computer Interaction: Trends and ChallengesHuman Computer Interaction: Trends and Challenges
Human Computer Interaction: Trends and ChallengesIRJET Journal
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
Demonstration of visual based and audio-based hci system
Demonstration of visual based and audio-based hci systemDemonstration of visual based and audio-based hci system
Demonstration of visual based and audio-based hci systemeSAT Journals
 

Ähnlich wie The pure emic user interface design methodology for an online community policing hub (20)

Cog infocom2014opening
Cog infocom2014openingCog infocom2014opening
Cog infocom2014opening
 
C0353018026
C0353018026C0353018026
C0353018026
 
Emerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computingEmerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computing
 
Cog infocom2014opening
Cog infocom2014openingCog infocom2014opening
Cog infocom2014opening
 
seminar report on ambient intelligent
seminar report on ambient intelligentseminar report on ambient intelligent
seminar report on ambient intelligent
 
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...
 
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdfA Mobile Expert System Application for Solving Personal Computer Problems.pdf
A Mobile Expert System Application for Solving Personal Computer Problems.pdf
 
Published Paper
Published PaperPublished Paper
Published Paper
 
Usability guidelines for usable user interface
Usability guidelines for usable user interfaceUsability guidelines for usable user interface
Usability guidelines for usable user interface
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
 
Platform Strategy & Ecosystems
Platform Strategy & EcosystemsPlatform Strategy & Ecosystems
Platform Strategy & Ecosystems
 
An IOT based Smart Traffic Management System
An IOT based Smart Traffic Management SystemAn IOT based Smart Traffic Management System
An IOT based Smart Traffic Management System
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
Human Computer Interaction: Trends and Challenges
Human Computer Interaction: Trends and ChallengesHuman Computer Interaction: Trends and Challenges
Human Computer Interaction: Trends and Challenges
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Demonstration of visual based and audio-based hci system
Demonstration of visual based and audio-based hci systemDemonstration of visual based and audio-based hci system
Demonstration of visual based and audio-based hci system
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The pure emic user interface design methodology for an online community policing hub

  • 1. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org The Pure-Emic User Interface Design Methodology for an Online Community Policing Hub Chinedu Pascal Ezenkwu Dept. of Electrical/Electronic and Computer Engineering, University of Uyo, Akwa Ibom , Nigeria. Tel: 234-7034471962 E-mail: edusco4@gmail.com Simeon Ozuomba Dept. of Electrical/Electronic and Computer Engineering, University of Uyo, Akwa Ibom , Nigeria. Tel: 234-7030345527 E-mail: simeonoz@yahoo.com Obinwa Christian Amaefule Department of Electrical Engineering, Imo State University, Owerri. E-mail: littlekrix222@yahoo.com Abstract The pervasiveness of the internet and internet-ready devices has greatly facilitated the rapid and unprecedented adoption of online social networks and their attendant online communities. In this case, an online community is a group of people who are tied together by a common interest, purpose, goal, practice, etc. Hence, the centre of attraction to an online community is the interest, the purpose or the goal that the members share or will stand to achieve either collectively or individually. Online Community Hub (OCH) is a collaborative virtual platform on the web where the entire people, institutions, technologies, tools, resources and service delivery frameworks that are relevant for any community are made visible and accessible. Online Community Policing Hub (OCPH) is an Online Community Hub where the shared community interest, purpose or goal is community policing. The thrust of the work in this paper is to present a methodical approach to a community centered user interface design for an Online Community Policing Hub (OCPH). The paper presents a Pure-Emic User Interface Design (PEUID) approach underpinned by knowledge from various fields such as ergonomics, cognitive psychology, anthropology and software engineering in ensuring the well-being of the system users and the need for zerotraining without deviations from the users’ mental model of the system. Keywords: Geo-Community, Online community, Community policing, Community Hub, Ergonomics, Anthropology, Software Engineering 1. Introduction An Online Community Policing Hub (OCPH) is a collaborative virtual platform where all the people, institutions, technologies, tools and strategies that are relevant for effective community policing are made available and accessible. The conceptualisation of the OCPH is based on the Context Model Of Community Informatics Social Network System (CISNS) developed by Ozuomba et al., (2013). Community policing is a policing strategy that encourages active partnership between the law enforcement agencies and the community in devising strategic approach to minimize the rates of crimes in the community. According to Weigand (1997), “the police are the public and the public are the police; the police being only members of the public who are paid to give full time attention to duties which are incumbent on every citizen in the interest of community welfare and existence.” The emergence of an OCPH is targeted at provided solutions to the underlying reasons for the non-involvement of the citizens in crime mitigation exercises. Among various reasons for this poor community participation are fear on the part of the citizens of being noted as police informants by hoodlums; certain negative beliefs about the police; risks of favouritism, nepotism and development of corrupt networks due to police closeness with the people, etc. Moreover, poor system quality and noncompliant system interface may as well contribute to factors 14
  • 2. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org that may tend to inhibit the effective realization of the vision of the OCPH. The goal in this paper is to present a methodical approach to a community centred user interface design for an Online Community Policing Hub (OCPH). Undeniably, every system user requires a user interface that is tolerant, consistent and compliant. According to Galitz (2007), “the goals of interface design are simple: to make working with a computer easy, productive, and enjoyable.” Consequently, the issue of system user interface should not by anyway be trivialised in a system of this nature that involves a community of various users of different ages, technical experiences, health status and other human factors. The system targets a user interface that will be tolerant, learnable and compliant with even the less technical users without being boring to the experienced users. Furthermore, the usability of any software-based system is a metric function of its user-friendliness, interactivity and simplicity measured from the users’ viewpoints. Pressman (2010) defined usability as “the degree to which a software is easy to use as indicated by the following sub-attributes: understandability, learnability, operability.“ In ISO 9241-11, Usability is defined as “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.” For this to be possible, the user interface must portend the users’ mental model of the system. The usability of a software product is a major concern of software ergonomics. Ergonomics is derived from two Greek words; “Ergon,” meaning work and “nomois” meaning natural laws. The International Ergonomics Association (IEA,2003) defines “ergonomics (human factors) as the scientific discipline concerned with the understanding of the interactions among humans and other elements of a system, and the profession that applies theory, principles, data, and methods to design in order to optimize human well-being and overall system performance.” Simply put, ergonomics is the study of how to make a product or a process comfortable, efficient and appear natural. Consequently, in this paper, a methodical approach to system user interface design known as the Pure-Emic User Interface Design (PEUID) approach is adopted for the interface design for the Online Community Policing Hub (OCPH). “Emic” is a term often used by anthropologists in referring to the study of culture based on the people’s perspective. In addition to the ‘emical’ nature of PEUID are the following underlying guidelines for achieving a user-defined user interface for the proposed system: interface consistency, interface forgiveness and interface adaptability. The approach involves of Software Requirement Engineering (SRE) and Software Ergonomic Engineering (SEE) in ensuring that a system that befits the environment; stakeholders requirements, skills and health status is realised. In addition, a WYSIWYG (What-You-See-Is-What-You-Get) prototype of the system interface is employed to facilitate the designer’s in-depth understanding of the users’ perception of the system. The prototype undergoes series of evaluations, analyses and modifications until the users’ resultant mental model is finally represented in the prototype. Finally, the arrangement of the rest of the paper is such that section two presents a review of relevant literatures. Description of the online Community Policing Hub (OCPH) is presented in section three. In section four, the user interface design methodology for the online community policing hub (OCPH) is presented. Lastly, the conclusion is presented in section five. 2. REVIEW OF RELEVANT LITERATURES 2.1 Online Community: An online community is a virtual platform that provides communication tools and technologies to facilitate interaction among people who wish to share information without having to meet one another face-to-face. It may as well serve as a supplemental medium of communication among people who may have known one another in real life. Furthermore, the growth of an online community is underpinned by the relative interests of the members of the online community. Amy Jo Kim (2000) defined an online community as “a group of people with a common purpose, interest, or activity, who get to know each other better over time.” According to Howard Rheingold, “ a virtual community is a group of people who may or may not meet one another face to face, and who exchange words and ideas through the mediation of computer bulletin boards and networks.” Online community is categorised into the following: Community Of Practice (COPs)-where individuals share the same profession; Community Of Circumstance (COC)-where individuals share a personal situation; Community Of Purpose (COP) – where individuals share a common objective or purpose; Community Of Interest(COI)- where individuals share a common interest. Irrefutably, critical observations of these categories of online community will reveal that interest is the underlined factor and determinant of participation of members in any online 15
  • 3. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org community. 2.2 Community Policing: Dempsey and Forst(2008) opined that “Community policing is a strategy of crime management that deals with the basic causes of crime with the view to developing and applying longer term solutions to resolving issues through improved police community partnership and communication.” According to Weigand (1997), “The police are the public and the public are the police; the police being only members of the public who are paid to give full time attention to duties which are incumbent on every citizen in the interest of community welfare and existence.” The traditional policing has three operational pillars: the pillar of random or unstructured routine community patrols, usually within a designated geographical location; the pillar of rapid response to calls from community residents; and the pillar of retroactive past crime investigations (Godwin et al, 2009). However, community policing is a proactive “approach toward crime that addresses the underlying causes of crime and endeavours to apply long term problem-solving to issues through improved police-community partnerships and communications” (Dempsey and Forst, 2008). In other words, the traditional policing is incident-driven (Goldstein,1997) while community policing is cause-driven. Weigand(1997) suggests that “the police are the public and the public are the police; the police being only members of the public who are paid to give full time attention to duties which are incumbent on every citizen in the interest of community welfare and existence”. Chene(2012) opined that community policing comprises of three key components: community partnership, organisational transformation and problem-solving. This synergistic approach to policing is tailored to the following goals: (a) creation of a conducive environment where everyone can particpate in curbing crimes (b) maintenance of trust between the citizens and the law enforcement agencies (c) development of a framework that will make it convenient for the citizens to relate information pertaining to possible terrorists’ threats and infrastructure vulnerabilities (d) efficient anaysis of information from the citizens and the development of the optimal response strategy. Moore (1992) asserts that thought and analysis is fundamental to problem-oriented policing in order to effectively respond to the cause of the problem (e) Integration of the community policing philosophy into the mission statement of the law enforcement agencies. 3. Description of the Online Community Policing Hub (OCPH) 3.1 The Concept Of Online Community Policing Hub, (OCPH) In view of the rapid and unprecedented adoption of online social networks and their attendant online communities, attention of social workers and community development experts, researchers, and practitioners have turned to social networks and online communities as tools and strategies for facilitating effective participation and collaborations of the target stakeholders. In this case, an online community is defined as a group of people who are tied together by a common interest, purpose, goal, practice, etc. Hence, the centre of attraction to an online community is the interest, the purpose or the goal that the members share or will stand to achieve either collectively or individually. This paper extends the idea of social networks and their attendant online communities to include online community hub. Specifically, an Online Community Hub (OCH) is a collaborative virtual platform on the web where the entire people, institutions, technologies, tools, resources and service delivery frameworks that are relevant for any community are made visible and accessible. Community Policing Hub (OCPH) is an Online Community Hub where the shared community interest, purpose or goal is community policing. A generic community hub is depicted in Fig. 1. 16
  • 4. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Fig. 1: Generic Community Hub 3.2 Context Model Of Community Informatics Social Network System (CISNS) The CISNS was conceptualized by Ozuomba et al (2013) as depicted in Fig. 2. Essentially, SNWA when tailored and applied to facilitate local community development purpose and processes becomes a part of Community Informatics Social Network System (CISNS). The model puts into consideration the people and institutions, as well as the political, economic, socio-cultural, technical, legal and other environmental factors that affect may affect the system. The model consists of two broad categories of information; the environment/context information and the online community information. The context information lays emphasis on contextual issues and the need to tailor social technologies to the situated context of use in the various localities where the system operates .The online community information includes the SNWA which supports the purpose, policies, contents, technologies and people that make up the online community. 17
  • 5. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Fig 2: Context Model Of Community Informatics Social Network System (CISNS) 3.3 The Conceptual Framework Of The Community Policing Hub (OCPH) The conceptual framework of the OCPH is presented in Fig. 2. Framework of OCPH in Fig. 3 shows the diverse stakeholders of the OCPH who can access and participate in the system through the various technologies that it supports. The facilitator initiates and drives the community policing goals and objectives by moderating the connection, interaction and activities of the various users groups or stakeholders in the OCPH. In order to foster active participation of the expected diverse user groups, the system requires a user interface that will be tolerant and compliant with the health status, age and level of technical experience of each user. Thus, extensive Software Requirement Engineering (SRE), Software Ergonomic Engineering (SEE) and the Pure-Emic User Interface Design (PEUID) are used in this paper to develop suitable user interface for the OCPH. 18
  • 6. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Fig.3: Conceptual Framework of OCPH as a part of Community Informatics Social Network, CISN 4. Design Methodology for the User Interface of the Online Community Policing Hub (OCPH) 4.1 Software Requirement Engineering (SRE) In order to develop suitable user interface for the OCPH, Software Requirement Engineering (SRE) is conducted to enhance the understanding of the system functional and non-functional requirements. The system functional requirements include all properties of the system that a user can use to achieve specific goals while the nonfunctional requirements include specific properties of the system such as system performance, efficiency, operability, usability, etc that characterise the system quality. Interview, questionnaire, focus group discussion, and low fidelity prototyping were used to elicit the users’ and system’s requirements. The requirements gathered so far, are analysed, evaluated until a satisfactory requirement model or specification for the system is realised. The Non-functional and the functional requirements for the system are provided in Tables 1 and 2 respectively. 19
  • 7. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Table 1 Functional Requirements Of The System FUNCTIONAL REQUIREMENTS S/N Requirement Requirement Description /Modules 1. Crime Report This module allows users to report both emergency and non-emergency crime information to the facilitator. • The Emergency crime reports category provides faster, secured and free way of reporting crimes that require immediate attentions. Tollfree anonymous hotlines are provided for easy communication of crimes info to the facilitator. • The non-emergency crime reports category provides crime reporting techniques for crimes that do not require immediate attention. These crimes are reported by the aid of an incident report form. This form supports multimedia message, and allows the reporter to send the coordinate of the incident area for crime mapping. 2. Missing Persons/Things 3. Help-Me 4. Partnership This system module permits users to appeal for information about the whereabouts of lost persons or properties as well as to report lost but found persons or properties. The pictures as well as other necessary descriptions of the persons or things that are lost or found are provided as guides. The ‘HELP-ME’ module presents rehabilitation, counselling, support and protection opportunities to community members who wish to renounce their evil gangs, addictions, anti-social behaviours, etc. A well-structured ‘HELP-ME’ form is provided for collection of vital information from such persons, who are availed with the services of rehabilitation centres and other partnering experts depending on the area of help. The system must be flexible to correction of defects, integration of new technologies and enhancement of This module provides partnership opportunities to law enforcement agencies, churches, social service organisations, companies, NGOs, businesses, institutions and other stakeholders. The module is categorized into: • Inquiry: This allows the intending partners or sponsors to ask questions about terms, conditions and also visualize necessary programmes, schemes, activities and events where their sponsorships and supports may be needed. • Application: This provides application forms for the partners to sign up their memberships or partnerships. 5. Discussion Forum This is a collaborative platform where the community members and other users can meet, collaborate and exchange ideas using Instant Messaging(IM) and other social networking services. The discussion forum is categorized into Crime Chat Forum and Public Chat forum. • The Crime chat forum allows a user to appear as unknown or with an alias in order to keep him/her unknown from other users. This platform 20
  • 8. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org is the best for discussions pertaining to crimes in the community. • The public chat forum is mainly to build active community networks and trust among the community members. The community members meet, know one another and discuss other personal issues that may not be crime related. 6. Evaluation 7. Crime Appeal The impact assessment of this system on the community is achieved through this module. The module provides a ‘feedback questionnaire’ which enables the community members to state their expectations as well as the areas of deficiencies of the system. The information collected are collated and the results are used as a veritable tool for decision support. Info This module enables the police and other law enforcement agencies to appeal for certain crime information and information about most wanted persons. It also helps the facilitator to verify more about certain crime reports. • The crime appeal form is provided for this purpose. This module supports multimedia message which enables the pictures of the most wanted persons to be displayed for identifications. • Users can view the appeal, make their comments or use the communication channels provided in the crime report module to relate the info which they feel should be private. 21
  • 9. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Table 2 Non Functional Requirements Of The System NON-FUNCTIONAL REQUIREMENTS S/ N Requirement Requirement Description 1. Reliability The system services shall have an availability of 99%. This implies that out of every 100 requests for these services 99 must be available and produce reliable results. 2. Security Unauthorised access to the system and its data is not allowed. 3. Usability The system must have: • Well-structured user manuals • Informative error messages • Help facilities • Well-informed graphical user interfaces 4. Maintainability The system must be flexible to correction of defects, integration of new technologies and enhancement of the system functionalities 5. Performance • The system should be able to support a large user base at any time. • The system will be designed to process every incoming transaction in 1 second or less. 4.2 Software Ergonomic Engineering (SEE) for the System Software Ergonomic Engineering (SEE) is an approach employed by a software developer or designer in ensuring that the those human factors that may affect a system’s usability, “comfortability”, “learnability”, efficiency as well as the users health are well addressed. SEE begins with the issuance of a Software Ergonomic Questionnaire (SEQ) for the purpose of gathering the necessary ergonomic data from the users. A model of a SEQ is presented in Fig. 4. 22
  • 10. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Fig. 4: A model of a SEQ The information captured by the SEQ is analysed and triangulated in the first stage of the interface design – interface analysis. Focus group discussion and meetings can equally be conducted for further clarification and resolution of conflicting data. Moreover, a WYSIWYG-based prototype is equally deployed before the final interface design in order to explore further ergonomic data that might be omitted in the SEQ. The interface design methodology is presented in next section. 4.3 The Pure-Emic User Interface Design (PEUID) approach The activities in the Pure-Emic User Interface Design (PEUID) approach include interface analysis, prototyping, user evaluation, evaluation result analysis by the designer and prototype modification. Fig. 5 represents the PEUID model showing the algorithmic implementation of the activities therein as well as the deliverables that are realized for each activity. Interface analysis encompasses all the activities that are necessary for understanding the users’ perceptions (mental model) of the system. Use of SEQ, focus group discussions and interviews are used for this purpose. Besides, the users are categorized based on their technical capabilities. Understanding the users’ mental model for the proposed system will serve as a guide for developing a prototype for the system. In this work, a WYSIWYG prototyping is used for this purpose. The prototype is presented to the stakeholders for evaluation. The result of the evaluation is studied and analysed by the designer in order to pin down the limitations. Based on this understanding, the prototype is modified to accommodate the users’ expectations. These processes keep on iterating until a final and satisfactory prototype is produced for the user interface design. 23
  • 11. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org Fig. 5: The PEUID Model A sample of a WYSIWYG prototype is presented in Fig. 6. The prototype depicts the developer’s perception of the system based on the information gathered through SRE and SEE. The positions of the system elements or components, background colour, text colour, etc are shown in the prototype in order to understand what the stakeholders actually want from the system. The prototype is improved until a more satisfactory prototype is achieved for the system design. Fig. 6: A WYSIWYG prototype showing the Home page of the OCPH 5. Conclusion In this paper, Pure-Emic User Interface Design (PEUID) methodology tailored to developing an interactive and user compliant interface for an Online Community Policing (Hub) is presented. The PEUID methodology 24
  • 12. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.11, 2013 www.iiste.org employed knowledge from devise fields such as ergonomics, cognitive psychology, anthropology and software engineering in ensuring the usability of the system for the diverse target users groups. Specifically, the PEUID approach seeks to capture and effectively utilise the users’ mental model of the system in the user interface design. The PEUID is preceded by extensive Software Requirement Engineering (SRE) and Software Ergonomics Engineering (SEE). Finally, a model of Software Ergonomics Questionnaire (SEQ) and PEUID model are also presented. References J. S. Dempsey and L. S. Forst.( 2008). An introduction to policing,4th ed., Madison and Wadswort: Belmont. O. U. Godwin, R. O. Arop and A.F. Ahmed. (2009). POS102 - Police community relations and interpersonal relations and awareness, Lagos: National Open University Of Nigeria. H. Goldstein. ( 1997). Towards community-oriented policing: potential, basic requirements and threshold questions. Crime delinquency (Volume 33), pp 6-36. C. H. Weigand. (1997). Combining tactical and community policing considerations. Law and Order, 71. pp 70- M. Chene. (2012. ). Community policing as a tool against corruption, Transparency International, pp 2. M. H. Moore. (1993). Problem solving and community policing: A preliminary assessment of form ISBN 0-20160870-7 Amy Jo Kim. 2000. Community Building on the Web : Secret Strategies for Successful Online Communities, Peachpit Press. ISBN 0-201-87484-9 Howard Rheingold. (1996). The Virtual Community: Homesteading On The Electronic Frontier, (free in HTML DIS 9241-11), Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability. ISO new strategies of policing,” “Modern policing crime and justice volume 15”, eds. S. Ozuomba, A. C. Gloria, K.O. Felix and N. Michael.( 2013). Social Networking Technology: A frontier of communication for development,. Available at: http://epromac.com.ng/onddc/paper/GeoHubNet.pdf IEA. (2003). IEA Triennial Report, 2000–2003, IEA Press, Santa Monica, CA. Karwowski, W., Ed. (2001), International Encyclopedia of Ergonomics and Human Factors, Taylor & Francis, London. R.S. Pressman. (2010). Software Engineering: A practitioner’s approach. 7th ed., Mc Graw Hill. Morris (Chicago: University of Chicago Press, 1992), 1992, 99-158. 25
  • 13. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar