Ron Henderson
University of Canberra
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ron Henderson.
Interacting with Computers | 2000
Peter Roberts; Ron Henderson
Abstract The Technology Acceptance Model (TAM) [37] model, a derivative of the Theory of Reasoned Action (TRA) [26], attempts to explain the psychological determinants of attitudes, and subsequent acceptance behaviour, towards Information Technology (IT) in the workplace. The present study examined the efficacy of this psychologically based TAM within two samples of government workers experienced in the use of computers (N=108). All participants completed a self-report questionnaire consisting of both previously developed and purpose derived scales. The study achieved its purpose of replicating and validating a development of the TAM, although only moderate support for the model was found. The applied implications of the research and wider theoretical implications of the study are discussed.
Computers & Security | 1997
Julie Bunnell; John Podd; Ron Henderson; Renee Napier; James Kennedy-Moffat
The present paper investigated the viability of cognitive passwords and word associations as techniques that might supplement conventional alphanumeric passwords. Results from 86 participants showed that fact-based cognitive items were better recalled than opinion-based items, but people socially close to the participants were able to guess many of the fact-based items. Guessing rates for the word associations were low but so also were the recall rates. It is concluded that selected cognitive items can yield acceptable recall and guessing rates while being less susceptible to forgetting than conventional passwords. Word associations require more research to isolate the best method of generating them.
Interacting with Computers | 1998
Ron Henderson; Debra Rickwood; Peter Roberts
Abstract This paper presents findings of a beta test of an electronic supermarket. It first reports qualitative information elicited during interviews and focus groups conducted with the beta test user group. A total of 57 users who had tested the system participated in the qualitative component of the study. Interviews and focus groups addressed what the users considered the best and worst features of the system and what things they would do differently if they were the management of the electronic supermarket. Results generated a number of suggestions for improvement and concerns. Interestingly, it became apparent that the electronic supermarket, rather than being considered an impersonal form of shopping, was considered a very personalized form of shopping, akin to the corner grocery market. The paper then reports the results of a quantitative survey that aimed to predict intentions to use the electronic supermarket are reported. Construct measurement was loosely based on the technology acceptance model, a derivative of the theory of reasoned action, and further supplemented by industry specific relevant constructs. Constructs tapped, therefore, consisted of perceived usefulness, enjoyment, peer-group norms, usability and perceptions of the electronic shopping experience. Biographical and situational data were also recorded. Analysis was conducted on 64 completed questionnaires. Results indicated a high level of intention to use the system in the future. Not surprisingly, many of the hypothesised predictors of intention to use the system were inter-correlated. Multivariate regression analyses revealed, however, that two variables contributed significantly to the intention to use the system in the future: enjoyment in using the system and peer-group norms, together accounting for 61% of the variance in intentions to use the system in the future. The implications of the research for theory and practice are discussed. The paper concludes by presenting a theoretical model of the factors identified as being important in the use of electronic supermarkets.
Interacting with Computers | 1995
Ron Henderson; John Podd; Mike Smith; Hugo Varela-Alvarez
Abstract Usability has become an important factor in the design of interactive software. In the quest to develop usable software, user participation in the design and evaluation process has been advocated. Four methods; logged data, questionnaires, interviews, and verbal protocol analyses have been the prominent base evaluation methods used, sometimes being combined in an attempt to provide a comprehensive evaluation. However, little is known about the strengths and weaknesses of these methods. In this study, these four methods were used to evaluate three different software types (spreadsheet, word processor, and database) with 148 subjects participating. The data obtained enabled a number of conclusions to be drawn regarding the usefulness of the methods when used individually and in combination.
Computers in Human Behavior | 1998
Frank P. Deane; John Podd; Ron Henderson
Abstract Self-report estimates of frequency and duration of computer use are used extensively in research related to computer and information systems acceptance. Despite concerns that self-report estimates are inferior to computer log data there is a paucity of research investigating the relationship between self-report and log data measures of computer use. The present study compared self-report estimates and six months of electronic log data for 62 health care workers using a new Community Services Information System. There were moderate to strong correlations between the self-report and electronic log estimates of frequency and duration of system use. Self-report estimates were relatively accurate in that they were quite similar in magnitude to log data values. The merits of combinations of frequency and duration data (composites) were also assessed.
Interacting with Computers | 1995
Frank P. Deane; Ron Henderson; Doug Mahar; Anthony Saliba
Abstract Computerised biometric systems are automated methods of verifying or recognising the identity of a user on the basis of some physiological characteristic, like a fingerprint or some aspects of behaviour such as keystroke patterns. Behaviourally based biometric systems include signature, speaker and keystroke verification. The investigation of psychological factors which might impact on the efficiency of a behavioural biometric computer security monitoring system has to our knowledge not been conducted. Of particular concern in the present paper are the potential effects of state anxiety on individuals physiological and performance responses. It is suggested that in a behaviourally based biometric computer security monitoring system, state anxiety may have sufficient effects to alter typical physiological and performance responses, resulting in an increased risk of security challenges, interruption of work-flow and resultant poor performance. It is also proposed that behaviourally based biometric systems may have the potential to be used as electronic performance monitoring systems, and typical responses to such systems need to be examined when developing and implementing any behaviourally based biometric security system.
Interacting with Computers | 1998
Doug Mahar; Ron Henderson; William Laverty; Renee Napier
Abstract The performance of Napier et al.s typist verification algorithm (Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm, International Journal of Human-Computer Studies 43 (1995) 213-222) was assessed in a text-dependent setting. Twenty-nine subjects typed a 17 character password 50 times. False acceptance and false rejection rates were then calculated as the number of repetitions of the password included in the reference profile was increased from 6 to 20 and the number of digraphs from the password included in the verification process was increased from 2 to 16. The performance of the system (12% total error rate) was found to be comparable with the best results reported in other studies using text-dependent algorithms, and substantially better than that reported in studies using a text-independent paradigm with passwords of this length. The relationship between password length and reference profile size was found to conform to an exponential decay function, which accounted for 92% of the variability in verification error rates.
international conference on human computer interaction | 1997
Kylie O'Hare; Ron Henderson
The aim of the study was to examine attitudes towards computers full filling what would be labelled traditional human roles. A total of 114 individuals completed a questionnaire examining their attitudes and the hypothesised predictors of attitudes. It was found that there was marked differences in attitudes toward computers full filling traditional human roles and that key psychological variables were statistically, but weakly, related towards these attitudes.
international conference on human computer interaction | 1997
Peter Roberts; Ron Henderson; Debra Rickwood
36 users of a prototype electronic supermarket answered open ended questions regarding beliefs, social pressures and perceived control relating to the service. Results indicated mainly positive salient beliefs about the service, perceived behavioral control dominated by concerns about the system and the importance of social pressures on usage. Analysis revealed that convenience, time saving and money saving were the primary positive beliefs with lack of sensory cues the primary negative belief. The implications of the study for the use of predictive theoretical models are discussed.
Personality and Individual Differences | 1997
Doug Mahar; Ron Henderson; Frank P. Deane