Tangible user interface for increasing social interaction among rural women.
ABSTRACT The paper presents a case of tangible user interface (TUI), which has been designed using traditional metaphors to access personal health information through an ICT based health system. An evaluative study of the designed TUI was conducted with (n=175) rural women in western India. The interaction with TUI was compared with previously designed customized iconic keyboard of an existing personal health information system. The results from the study illustrate that proposed TUI increased social interaction due to enhanced product engagement, product attachment, and community decision-making. As a consequence of increased social interaction, sensitive health information has been disseminated successfully to the rural women.
- SourceAvailable from: Simone Cecchini[show abstract] [hide abstract]
ABSTRACT: In the poor and drought-prone rural district of Dhar in Madhya Pradesh, India, Gyandoot has tried to make government services more accessible to villagers through information and communications technology (ICT) since January 2000. Two recent surveys of this e-government project allow us to evaluate whether the local population is benefiting. Main findings are that service satisfaction is quite high, but usage is low, and Gyandoot is not reaching the poorest people. We conclude that much of the potential benefits of e-government are not being realized. Lessons for ICT projects that intend to benefit the rural poor include the use of appropriate technology, implementation of the project by agents who have incentives to serve the poor, community participation and ownership, availability of pro-poor services, and campaigns to raise awareness. Copyright (c) 2005 The Massachusetts Institute of Technology Information Technologies and International Development.Information Technologies and International Development 01/2004; 2(2):65-75.
- [show abstract] [hide abstract]
ABSTRACT: Involving stakeholders is often seen as a means to more successful information and communication technologies for development (ICT4D) projects. Hence, it can be appropriate to research ICT4D projects by taking both the perspective of stakeholder theory and using the tools of stakeholder analysis. This paper uses the example of telecenter projects to illustrate the application of a stake- holder perspective, selecting the specific case of the Gyandoot telecenters in Madhya Pradesh, India. It finds stakeholder analysis can be used both as a best practice template to assess what has been done with stakeholders on an ICT4D project and as an analytical tool to understand who stakeholders are, their behaviors, and the ways in which they are managed. However, it also finds there are problems with applying a stakeholder perspective that must be understood including lack of openness among stakeholders, the problems of identifying who stakeholders are, and the subjectivity of stakeholder classification. (c) 2007 by The Massachusetts Institute of Technology.Information Technologies and International Development 01/2007; 3(3):61-80.
- [show abstract] [hide abstract]
ABSTRACT: As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are increasingly a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives-institutional, legislative, technical, interactional, and more. In this article, we wish to contribute toward a broad understanding of privacy and security not simply as technical phenomena but as embedded in social and cultural contexts. Privacy and security are difficult concepts to manage from a technical perspective precisely because they are caught up in larger collective rhetorics and practices of risk, danger, secrecy, trust, morality, identity, and more. Reductive attempts to deal with these issues separately produce incoherent or brittle results. We argue for a move away from narrow views of privacy and security and toward a holistic view of situated and collective information practice.Human-Computer Interaction. 09/2006; 21(3):319-342.