[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Mobile interaction design: Integrating individual and organizational perspectives

Published: 01 April 2008 Publication History

Abstract

While mobile computing provides organizations with many information systems implementation alternatives, it is often difficult to predict the potential benefits, limitations, and problems with mobile applications. Given the inherent portability of mobile devices, many design and use issues can arise which do not exist with desktop systems. While many existing rules of thumb for design of stationary systems apply to mobile systems, many new ones emerge. Issues such as the security and privacy of information take on new dimensions, and potential conflicts can develop when a single mobile device serves both personal and business needs. This paper identifies potential issues and problems with the use of mobile information systems by examining both personal and organizational perspectives of mobile devices and applications. It provides a set of guidelines that can assist organizations in making decisions about the design and implementation of mobile technologies and applications in organizations.

References

[1]
E.B. Andrade, V. Kaltcheva and B. Weitz, Self-disclosure on the web: The impact of privacy policy, reward, and company reputation, in: Advances in Consumer Research, (Vol. 29), S.M. Broniarczyk and K. Nakamoto, eds, 2002, pp. 350-353.
[2]
N.F.Awad and M.S. Krishnan, The personalization-privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly 30(1) (2006), 13-28.
[3]
R. Basole, Transforming enterprises through mobile applications: A multi-phase framework, Proceedings of the Americas Conference on Information Systems (2005), 1935-1939.
[4]
R. Basole, Strategic planning for enterprise mobility: A readiness-centric approach, Proceedings of the 2007 Americas Conference on Information Systems, 2007.
[5]
M. Bienfang and B. Egan, Handheld device trends in the US retail brokerage advisory industry, TowerGroup Research, Available at: itresearch.forbes.com/detail/RES/1167062441 284.html, 2006.
[6]
A. Blackler, V. Popovic and D. Mahar, The nature of intuitive use of products: an experimental approach, Design Studies 24(6) (2003), 491-506.
[7]
S. Brewster, Overcoming the lack of screen spaces on mobile computers, Personal and Ubiquitous Computing 6 (2002), 188-205.
[8]
P. Britt, Mobile security for those on-the-go, Information Today 23(9) (2006), 32. Retrieved November 20, 2007, from Academic Search Premier database.
[9]
S. Chan, X. Fang, J. Brzezinski, Y. Zhou, S. Xu and J. Lam, Usability For mobile commerce across multiple form factors, Journal of Electronic Commerce Research 3(3) (2002), 187-199.
[10]
K.C. Cousins and D. Robey, Human agency in wireless world: patterns of technology use in nomadic computing environments, Information and Organization 15 (2005), 151-180.
[11]
P. Crosman, The BlackBerry as workhorse - To increase productivity, Merrill Lynch, Blackstone Group and others are putting more mission-critical applications on handheld devices, Wall Street & Technology 25(7) (2007), 147.
[12]
M.J. Culnan and P.K. Armstrong, Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation, Organization Science 10(1) (1999), 104-115.
[13]
J. Cummings, Mobile device lockdown, Network World 24(11) (2007), 40-44.
[14]
T. Dinev and P. Hart, An extended privacy calculus model for e-commerce transactions, Information Systems Research 17(1) (2006), 61-80.
[15]
A. Dix, T. Rodden, N. Davis, J. Trevor, A. Friday and K. Palfreyman, Exploiting space and location as a design framework for interactive mobile systems, ACM Transactions on Computer-Human Interaction 7(3) (2000), 285-321.
[16]
P. Dourish, R.E. Grinter, J.D. de la Flor and M. Joseph, Security in the wild: User strategies for managing security as an everyday, practical problem, Personal and Ubiquitous Computing 8 (2004), 391-401.
[17]
FFIEC, Authentication in an electronic banking environment. Available at: www.ffiec.gov/pdf/pr080801.pdf, 2001.
[18]
E.R. Fontana and C. Sørensen, From idea to BLAH! Understanding mobile services development as interactive innovation, Journal of Information Systems and Technology Management 2(2) (2005), 101-120.
[19]
H. Galanxhi-Janaqi and F. Nah, U-commerce: emerging trends and research issues, Industrial Management and Data Systems 104(9) (2004), 744-755.
[20]
H. Galanxhi and F. Nah, Privacy issues in the era of ubiquitous commerce, Electronic Markets 16(3) (2006), 222-232.
[21]
V.M. González. M.E. Tentori, E.B. Moran, J. Favela and A.I. Martinez, Understanding mobile work in a distributed information space: Implications for the design of ubicomp technology, Proceedings of the 2005 Latin American Conference on Human-computer Interaction (2005), 52-63.
[22]
L. Gorienko and R. Merrick, No wires attached: Usability challenges in the connected mobile world, IBM System Journal 42(4) (2003), 639-651.
[23]
G. Gross, Are security threats really overhyped? PC World, Available at: pcworld.about.com/news/Jun132005id121364. htm, 2005.
[24]
K. Hinckley, J. Pierce, M. Sinclair and E. Horvitz, Sensing techniques for mobile interaction, Proceedings of the 13th Annual ACM Symposium on User Interface Software and Technology, (2000), 91-100.
[25]
J. Hakkila and J. Mantyjarvi, Developing design guidelines for context-aware mobile applications, Proceedings of the 3rd international conference on Mobile technology, applications & systems (2006), 1-7.
[26]
K. Hawkey and K.M. Inkpen, Keeping up appearances: understanding the dimensions of incidental information privacy, Proceedings of CHI 2006 (2006), 821-830.
[27]
J. Ho and S.S. Intille, Using context-aware computing to reduce the perceived burden of interruptions from mobile devices, Proceedings of the SIGCHI conference on human factors in computing systems (2005), 909-918.
[28]
S. Holland and D.R. Morse, Audio GPS: Spatial audio in a minimal attention interface, Proceedings of Human Computer Interaction with Mobile Devices (2001), 28-33.
[29]
E.A. Inglis, A. Szymkowiak, P. Gregor, A.F. Newell, N. Hine, P. Shah, B.A. Wilson and J. Evans, Issues surrounding the user-centred development of a new interactive memory aid, Universal Access in the Information Society 2(3) (2003), 226-234.
[30]
P. Isokoski and R. Raisamo, Device independent text input: a rationale and an example, Proceedings of the Working Conference on Advanced Visual Interfaces AVI2000 (2000), 76-83.
[31]
P. Johnson, Usability and mobility: Interactions on the move, Proceedings of the 1st Workshop on Human Computer Interaction for Mobile Devices, 1998.
[32]
I. Junglas and R. Watson, The u-constructs: Four information drives, Communications of AIS 17 (2006), 569-592.
[33]
C.-M. Karat, J. Karat, C. Brodie and J. Feng, Evaluating interfaces for privacy policy rule authoring, Proceedings of CHI (2006), 83-92.
[34]
J. Kavanagh, Plans into action, Computer Weekly (13 September 2005), 52-54.
[35]
H. Kim, J. Kim, Y. Lee, M. Chae and Y. Choi, An empirical study of the use contexts and usability problems in mobile internet, Proceedings of the 35th Hawaii International Conference on System Sciences 5 (2002), 132.
[36]
R. King, Corporate e-mail on the iPhone, Business Week Online, 29 August 2007.
[37]
S.Y.X. Komiak and I. Benbasat, The effects of personalization and familiarity on trust and adoption of recommendation agents, MIS Quarterly 30(4) (2006), 941-960.
[38]
S. Kristoffersen and F. Ljungberg, Making place to make IT work: Empirical explorations of HCI for mobile CSCW, Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work (1999), 276-285.
[39]
K.S. Lee, H.S. Lee and S.Y. Kim, Factors influencing the adoption behavior of mobile banking: A south Korean perspective, Journal of Internet Banking & Commerce 12(2) (2007), 1-9.
[40]
Y.C. Lu, J.K. Lee, Y. Xiao, A. Sears, J.A. Jacko K. Charters, Why don't physicians use their personal digital assistants? Proceedings of the AMIA Annual Symposium (2003), 405-409.
[41]
J. Lu, C.-S. Yu and C. Liu, Facilitating conditions, wireless trust and adoption intention, Journal of Computer Information Systems 46(1) (2005), 17-24.
[42]
J.M. Lyons, C. Chan and N. Tetsutani, MouthType: text entry by hand and mouth, Extended Abstracts of CHI 2004 (2004), 1383-386.
[43]
K. Lyytinen and Y. Yoo, Research commentary: the next wave of nomadic computing, Information Systems Research 13(4) (2002), 377-388.
[44]
K. Lyytinen, U. Varshney, M.S. Ackerman, G. Davis, M. Avital, D. Robey, S. Sawyer and C. Sørensen, Surfing the next wave: design and implementation challenges of ubiquitous computing environments, Communications of the Association for Information Systems 31 (2004), 697-716.
[45]
I.S. MacKenzie, Mobile text entry using three keys, Proceedings of the 2nd Nordic Conference on Human-Computer Interaction (2002), 27-34.
[46]
I.S. MacKenzie and R.W. Soukoreff, Text entry for mobile computing: Models and methods, theory and practice, Human-Computer Interaction 17 (2002), 147-198.
[47]
P. Mahatanankoon, H.J. Wen and B.B.L. Lim, Evaluating the technological characteristics and trust affecting mobile device usage, International Journal of Mobile Communications 4(6) (2006), 662-681.
[48]
J. Mathew, S. Sarker and U. Varshney, M-commerce services: Promises and challenges, Communications of the Association for Information Systems 14 (2004), Article 26.
[49]
A.S. McAlearney, S.B. Schweikhart and M.A. Medow, Doctors' experience with handheld computers in clinical practice: A qualitative study, British Medical Journal 328(7449) (2004), 1162-1166.
[50]
S.K. Miller, Defending mobile devices from viruses, spyware, and malware, TechTarget. Available at: www.bitpipe.com/ detail/RES/1167560102 718.html, 2007.
[51]
G.R. Milne, Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue, Journal of Public Policy and Marketing 19(2) (2000), 238-249.
[52]
G.R. Milne and A.J. Rohm, Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives, Journal of Public Policy and Marketing 19(2) (2000), 238-249.
[53]
F. Nah and S. Davis, HCI research issues in electronic commerce, Journal of Electronic Commerce Research 3(3) (2002), 98-113.
[54]
F. Nah, K. Siau and H. Sheng, The value of mobile applications: A study on a public utility company, Communications of the ACM 48(2) (2005), 85-90.
[55]
J. Nielsen, Traditional dialogue design applied to modern user interfaces, Communications of the ACM 33(10) (1990), 109-118.
[56]
D.A. Norman, Emotion and design: Attractive things work better, Interactions Magazine ix(4) (2002), 36-42.
[57]
D. Norman, Emotional design, New York: Basic Books, 2004.
[58]
A. Oulasvirta and L. Sumari, Mobile kits and laptop trays: Managing multiple devices in mobile information work, Proceedings of the SIGCHI conference on Human factors in computing systems (2007), 1127-1136.
[59]
S. Oviatt, Human-centered design meets cognitive load theory: designing interfaces that help people think, Proceedings of the 14th Annual ACM International Conference on Multimedia (2006), 871-880.
[60]
J. Paradise, E.D. Mynatt, C. Williamsand J. Goldthwaite, Designing a cognitive aid for the home: A case-study approach, Proceedings of the 6th international ACM SIGACCESS conference on Computers and accessibility (2004), 140-146.
[61]
J. Pascoe, N. Ryan and D. Morse, Issues in developing context-aware computing, Proceedings of the 1st International Symposium on Handheld and Ubiquitous Computing (1999), 208-221.
[62]
J. Pereira, How credit-card data went out wireless door, Wall Street Journal - Eastern Edition 249(104) (4 May 2007), A1-A12.
[63]
J. Phelps, G. Nowak and E. Ferrell, Privacy concerns and consumer willingness to provide personal information, Journal of Public Policy and Marketing 19(1) (2000), 27-41.
[64]
D. Pica and C. Sørensen, On mobile technology in context: Exploring police work, Journal of Computing and Information Technology 12(4) (2004), 287-295.
[65]
I. Poupyrev, S. Maruyama and J. Rekimoto, Ambient touch: Designing tactile interfaces for handheld devices, Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (2002), 51-60.
[66]
P. Rysavy, Device diversity, Network Computing 15(7) (2004), 36-50.
[67]
K.S. Saidi, C.T. Haas and N.A. Balli, The value of handheld computers in construction, Proceedings of the 19th International Symposium on Automation and Robotics in Construction (2002), 557-562.
[68]
M. Satyanarayanan, Fundamental challenges in mobile computing, Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing (1996), 1-7.
[69]
J.W. Satzinger and L. Olfman, User interface consistency across end-user applications: the effects on mental models, Journal of Management Information Systems 14(4) (1988), 167-193.
[70]
A. Schmidt, Implicit human computer interaction through context, Personal Technologies 4(2) (2000), 191-199.
[71]
D.S.S. Seong, Usability guidelines for designing mobile learning portals, ACM international conference proceeding series: Proceedings of the 3rd international conference on mobile technology, applications & systems 270 (2006).
[72]
H. Sheng, F. Nah and K. Siau, Strategic implications of mobile technology: A case study using value-focused thinking, Journal of Strategic Information Systems 14(3) (2005), 269-290.
[73]
H. Sheng, F. Nah and K. Siau, (forthcoming). An experimental study on u-commerce adoption: Impact of personalization and privacy concerns, Journal of Association for Information Systems.
[74]
B. Shneiderman, Designing the user interface-strategies for effective human-computer interaction, Reading, MA: Addison-Wesley, 2004.
[75]
B.P. Shoemaker, Designing interfaces for handheld computers, Extended abstracts of CHI 1999 (1999), 126-127.
[76]
K. Siau, E. Lim and Z. Shen, Mobile commerce: Promises, challenges, and research agenda, Journal of Database Management 12(3) (2001), 4-13.
[77]
K. Siau and Z. Shen, Building customer trust in mobile commerce, Communications of the ACM 46(4) (2003), 91-94.
[78]
K. Siau and Z. Shen, Mobile communications and mobile services, International Journal of Mobile Communications 1(1/2) (2003), 3-14.
[79]
K. Siau and Z. Shen, Mobile healthcare informatics, Medical Informatics & the Internet in Medicine 31(2) (2006), 89-99.
[80]
K. Siau, H. Sheng and F. Nah, Development of a framework for trust in mobile commerce, Proceedings of the Second Annual Workshop on HCI Research in MIS (HCI/MIS) (2003), 85-89. Available at: sigs.aisnet.org/sighci/Research/ ICIS2003/HCI03 14.pdf.
[81]
K. Siau, H. Sheng and F. Nah, The value of mobile commerce to customers, Proceedings of the Third Annual Workshop on HCI Research in MIS, Washington, D.C., 2004, 5-69.
[82]
K. Siau, H. Sheng, F. Nah and S. Davis, A qualitative investigation on consumer trust in mobile commerce, International Journal of Electronic Business 2(3) (2004), 283-300.
[83]
M.B. Skov and R.T. Høegh, Supporting information access in a hospital ward by a context-aware mobile electronic patient record, Personal and Ubiquitous Computing 10(4) (2006), 205-214.
[84]
C. Sørensen and D. Gibson, Ubiquitous visions and opaque realities: Professionals talking about mobile technologies, INFO - The Journal of Policy, Regulation and Strategy for Telecommunication, Information and Media 6(3) (2004), 188-196.
[85]
B. Sullivan, All veterans at risk of ID theft after data heist. Available at: www.msnbc.msn.com/id/12916803, 2006.
[86]
H. Sun and P. Zhang, Causal relationships between perceived enjoyment and perceived ease of use: An alternative approach, Journal of the Association for Information Systems 7(9) (2006), 618-644.
[87]
J.C. Tang, J. Lin, J. Pierce, S. Whittaker and C. Drews, Recent shortcuts: using recent interactions to support shared activities, Proceedings of the 2007 SIGCHI conference on human factors in computing systems (2007), 1263-1272.
[88]
P. Tarasewich, Wireless devices for mobile commerce: user interface design and usability, in: Mobile commerce: Technology, Theory, and Applications, B.E. Mennecke and T.J. Strader eds, Hershey, PA: Idea Group Publishing, 2002, pp. 25-50.
[89]
P. Tarasewich, Designing mobile commerce applications, Communications of the ACM 46(12) (2003), 57-60.
[90]
P. Tarasewich, J. Gong and R. Conlan, Protecting private data in public, Adjunct proceedings of CHI 2006 (2006), 1409-1414.
[91]
G. Thomas and R.A. Botha, Secure mobile device use in healthcare guidance from HIPPA and ISO17799, Information Systems Management 24(4) (2007), 333-342.
[92]
N. Tractinsky, Toward the study of aesthetics in information technology, Proceedings of the Twenty-Fifth International Conference on Information Systems, Washington, D.C., 2004, 11-20.
[93]
H. Van der Heijden, User acceptance of hedonic information systems, MIS Quarterly 28(4) (2004), 695-704.
[94]
J. Vijayan, Five things to know about U.S. border laptop searches, PC World, Available at: www.pcworld.com/ businesscenter/article/142429/five_things_to_know_about_us_border_laptop_searches.html, 12 February 2008.
[95]
Y.D. Wang and H.H. Emurian, Trust in e-commerce: Considerations of interface design factors, Journal of Electronic Commerce in Organizations 3(4) (2005), 42-60.
[96]
R.T. Watson, U-commerce: The ultimate, Ubiquity. Available at: www.acm.org/ubiquity/views/r_watson_1.html, 2000.
[97]
G.O. Wiredu and C. Sørensen, The dynamics of control and mobile computing in distributed activities, European Journal of Information Systems 15(3) (2006), 307-319.
[98]
P. Zhang and N. Li, The importance of affective quality, Communications of the ACM 48(9) (2005), 105-108.
[99]
C.M. Zimmermann and R.S. Bridger, Effects of dialogue design on automatic teller machine (ATM) usability: transaction times and card loss, Behaviour & Information Technology 19(6) (2000), 441-449.

Cited By

View all
  • (2020)COVID-19 Pandemic – Role of Technology in Transforming Business to the New NormalHCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media10.1007/978-3-030-60152-2_43(585-600)Online publication date: 19-Jul-2020
  • (2017)Collaboration in Virtual WorldsJournal of Database Management10.4018/JDM.201710010428:4(60-78)Online publication date: 1-Oct-2017
  • (2010)Managing smart phone security risks2010 Information Security Curriculum Development Conference10.1145/1940941.1940971(145-155)Online publication date: 1-Oct-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information-Knowledge-Systems Management
Information-Knowledge-Systems Management  Volume 7, Issue 1,2
Enterprise Mobility: Applications, Technologes and Strategies
April 2008
254 pages

Publisher

IOS Press

Netherlands

Publication History

Published: 01 April 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)COVID-19 Pandemic – Role of Technology in Transforming Business to the New NormalHCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media10.1007/978-3-030-60152-2_43(585-600)Online publication date: 19-Jul-2020
  • (2017)Collaboration in Virtual WorldsJournal of Database Management10.4018/JDM.201710010428:4(60-78)Online publication date: 1-Oct-2017
  • (2010)Managing smart phone security risks2010 Information Security Curriculum Development Conference10.1145/1940941.1940971(145-155)Online publication date: 1-Oct-2010
  • (2010)Understanding the values of mobile technology in educationACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1795377.179538041:2(25-44)Online publication date: 12-May-2010
  • (2009)Exploring Employee Perspectives on Information Privacy and Security in the Mobile EnvironmentProceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 200910.1007/978-3-642-02556-3_20(171-180)Online publication date: 14-Jul-2009

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media