Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ron Henderson is active.

Publication


Featured researches published by Ron Henderson.


Interacting with Computers | 2000

Information technology acceptance in a sample of government employees: a test of the technology acceptance model

Peter Roberts; Ron Henderson

Abstract The Technology Acceptance Model (TAM) [37] model, a derivative of the Theory of Reasoned Action (TRA) [26], attempts to explain the psychological determinants of attitudes, and subsequent acceptance behaviour, towards Information Technology (IT) in the workplace. The present study examined the efficacy of this psychologically based TAM within two samples of government workers experienced in the use of computers (N=108). All participants completed a self-report questionnaire consisting of both previously developed and purpose derived scales. The study achieved its purpose of replicating and validating a development of the TAM, although only moderate support for the model was found. The applied implications of the research and wider theoretical implications of the study are discussed.


Computers & Security | 1997

Refereed paper: Cognitive, associative and conventional passwords: Recall and guessing rates

Julie Bunnell; John Podd; Ron Henderson; Renee Napier; James Kennedy-Moffat

The present paper investigated the viability of cognitive passwords and word associations as techniques that might supplement conventional alphanumeric passwords. Results from 86 participants showed that fact-based cognitive items were better recalled than opinion-based items, but people socially close to the participants were able to guess many of the fact-based items. Guessing rates for the word associations were low but so also were the recall rates. It is concluded that selected cognitive items can yield acceptable recall and guessing rates while being less susceptible to forgetting than conventional passwords. Word associations require more research to isolate the best method of generating them.


Interacting with Computers | 1998

The beta test of an electronic supermarket

Ron Henderson; Debra Rickwood; Peter Roberts

Abstract This paper presents findings of a beta test of an electronic supermarket. It first reports qualitative information elicited during interviews and focus groups conducted with the beta test user group. A total of 57 users who had tested the system participated in the qualitative component of the study. Interviews and focus groups addressed what the users considered the best and worst features of the system and what things they would do differently if they were the management of the electronic supermarket. Results generated a number of suggestions for improvement and concerns. Interestingly, it became apparent that the electronic supermarket, rather than being considered an impersonal form of shopping, was considered a very personalized form of shopping, akin to the corner grocery market. The paper then reports the results of a quantitative survey that aimed to predict intentions to use the electronic supermarket are reported. Construct measurement was loosely based on the technology acceptance model, a derivative of the theory of reasoned action, and further supplemented by industry specific relevant constructs. Constructs tapped, therefore, consisted of perceived usefulness, enjoyment, peer-group norms, usability and perceptions of the electronic shopping experience. Biographical and situational data were also recorded. Analysis was conducted on 64 completed questionnaires. Results indicated a high level of intention to use the system in the future. Not surprisingly, many of the hypothesised predictors of intention to use the system were inter-correlated. Multivariate regression analyses revealed, however, that two variables contributed significantly to the intention to use the system in the future: enjoyment in using the system and peer-group norms, together accounting for 61% of the variance in intentions to use the system in the future. The implications of the research for theory and practice are discussed. The paper concludes by presenting a theoretical model of the factors identified as being important in the use of electronic supermarkets.


Interacting with Computers | 1995

An examination of four user-based software evaluation methods

Ron Henderson; John Podd; Mike Smith; Hugo Varela-Alvarez

Abstract Usability has become an important factor in the design of interactive software. In the quest to develop usable software, user participation in the design and evaluation process has been advocated. Four methods; logged data, questionnaires, interviews, and verbal protocol analyses have been the prominent base evaluation methods used, sometimes being combined in an attempt to provide a comprehensive evaluation. However, little is known about the strengths and weaknesses of these methods. In this study, these four methods were used to evaluate three different software types (spreadsheet, word processor, and database) with 148 subjects participating. The data obtained enabled a number of conclusions to be drawn regarding the usefulness of the methods when used individually and in combination.


Computers in Human Behavior | 1998

Relationship between Self-Report and Log Data Estimates of Information System Usage.

Frank P. Deane; John Podd; Ron Henderson

Abstract Self-report estimates of frequency and duration of computer use are used extensively in research related to computer and information systems acceptance. Despite concerns that self-report estimates are inferior to computer log data there is a paucity of research investigating the relationship between self-report and log data measures of computer use. The present study compared self-report estimates and six months of electronic log data for 62 health care workers using a new Community Services Information System. There were moderate to strong correlations between the self-report and electronic log estimates of frequency and duration of system use. Self-report estimates were relatively accurate in that they were quite similar in magnitude to log data values. The merits of combinations of frequency and duration data (composites) were also assessed.


Interacting with Computers | 1995

Theoretical examination of the effects of anxiety and electronic performance monitoring on behavioural biometric security systems

Frank P. Deane; Ron Henderson; Doug Mahar; Anthony Saliba

Abstract Computerised biometric systems are automated methods of verifying or recognising the identity of a user on the basis of some physiological characteristic, like a fingerprint or some aspects of behaviour such as keystroke patterns. Behaviourally based biometric systems include signature, speaker and keystroke verification. The investigation of psychological factors which might impact on the efficiency of a behavioural biometric computer security monitoring system has to our knowledge not been conducted. Of particular concern in the present paper are the potential effects of state anxiety on individuals physiological and performance responses. It is suggested that in a behaviourally based biometric computer security monitoring system, state anxiety may have sufficient effects to alter typical physiological and performance responses, resulting in an increased risk of security challenges, interruption of work-flow and resultant poor performance. It is also proposed that behaviourally based biometric systems may have the potential to be used as electronic performance monitoring systems, and typical responses to such systems need to be examined when developing and implementing any behaviourally based biometric security system.


Interacting with Computers | 1998

The effects of password length and reference profile size on the performance of a multivariate text-dependent typist verification system

Doug Mahar; Ron Henderson; William Laverty; Renee Napier

Abstract The performance of Napier et al.s typist verification algorithm (Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm, International Journal of Human-Computer Studies 43 (1995) 213-222) was assessed in a text-dependent setting. Twenty-nine subjects typed a 17 character password 50 times. False acceptance and false rejection rates were then calculated as the number of repetitions of the password included in the reference profile was increased from 6 to 20 and the number of digraphs from the password included in the verification process was increased from 2 to 16. The performance of the system (12% total error rate) was found to be comparable with the best results reported in other studies using text-dependent algorithms, and substantially better than that reported in studies using a text-independent paradigm with passwords of this length. The relationship between password length and reference profile size was found to conform to an exponential decay function, which accounted for 92% of the variability in verification error rates.


international conference on human computer interaction | 1997

Acceptance of computers in human roles

Kylie O'Hare; Ron Henderson

The aim of the study was to examine attitudes towards computers full filling what would be labelled traditional human roles. A total of 114 individuals completed a questionnaire examining their attitudes and the hypothesised predictors of attitudes. It was found that there was marked differences in attitudes toward computers full filling traditional human roles and that key psychological variables were statistically, but weakly, related towards these attitudes.


international conference on human computer interaction | 1997

Assessment of modal beliefs about using an electronic supermarket

Peter Roberts; Ron Henderson; Debra Rickwood

36 users of a prototype electronic supermarket answered open ended questions regarding beliefs, social pressures and perceived control relating to the service. Results indicated mainly positive salient beliefs about the service, perceived behavioral control dominated by concerns about the system and the importance of social pressures on usage. Analysis revealed that convenience, time saving and money saving were the primary positive beliefs with lack of sensory cues the primary negative belief. The implications of the study for the use of predictive theoretical models are discussed.


Personality and Individual Differences | 1997

The effects of computer anxiety, state anxiety, and computer experience on users' performance of computer based tasks

Doug Mahar; Ron Henderson; Frank P. Deane

Collaboration


Dive into the Ron Henderson's collaboration.

Top Co-Authors

Avatar

Doug Mahar

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Frank P. Deane

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Renee Napier

Australian National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

William Laverty

University of Saskatchewan

View shared research outputs
Top Co-Authors

Avatar

Anthony Saliba

Defence Science and Technology Organisation

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge