Vous êtes sur la page 1sur 36

2515ICT

User Interface Design

Assessment
UI Design
Brief
Group Members

Student No:

s2793977

Name:

Jessica Ward

Student No:

s2897359

Name:

Josh Nissenbaum

Student No:

s2946011 Name:

Matthew Whittle

Hyperlinks to

Logos and Identifiers


Task Allocation
Task Completion
Reference

Contents
1.

Introduction .................................................................................................................................... 1
1.1

Purpose of this Document ...................................................................................................... 1

1.2

Scope ....................................................................................................................................... 1

2.

Background ..................................................................................................................................... 3

3.

Target Audience .............................................................................................................................. 5


3.1

Audience Beliefs ...................................................................................................................... 5

3.2

Audience Levels....................................................................................................................... 6

3.3

Audience Demographics ......................................................................................................... 6

3.4

Audience Expectations ............................................................................................................ 7

4.

Problem Statement ......................................................................................................................... 7

5.

Goals ............................................................................................................................................... 8
5.1

Usability Objectives................................................................................................................. 8

5.2 Single Message ........................................................................................................................... 8


5.3 Mandatory Elements ................................................................................................................. 9
5.4
6.

Deliverables............................................................................................................................. 9

Alpha Design ................................................................................................................................... 9


6.1

Structural Design ................................................................................................................... 13

6.2

Visual Design ......................................................................................................................... 14

6.3

Prototypes ............................................................................................................................. 15

7.Testing ................................................................................................................................................ 16
7.1.Test Plan.......................................................................................................................................... 16
7.2 Test Results ................................................................................................................................. 18
8.

Final Design ................................................................................................................................... 20


2

Loading Screen .............................................................................................................................. 21


Primary Screen .............................................................................................................................. 22
Tips Screen One ............................................................................................................................ 23
Tips Screen Two ............................................................................................................................ 24
Tips Screen Three .......................................................................................................................... 25
Tips Screen Four ............................................................................................................................ 26
Tips Screen Five............................................................................................................................. 27
Videos Screen................................................................................................................................ 28
Important Links Screen ................................................................................................................. 29
9.

Task Allocation .............................................................................................................................. 30


Section Completion ........................................................................................................................... 30
Task Progression ............................................................................................................................... 31

10.

References ................................................................................................................................ 33

1.

Introduction

Our group (think safety) has been given the task of proposing a User Design wireframe and
development model for Queensland Police Service Cyber Unit to aid them in expanding their
current model of fiscal the fighting ferret to include alternate media devices. The fiscals
program is currently aimed to encourage school students to learn about cyber safety, online
threats and responsible online behaviour.

1.1

Purpose of this Document

The purpose of this document is to present an app development model and plan for our
client the Queensland Police services cyber crime unit. The app development plan is
aimed to aid the Queenslands Police Services Cyber Crime Unit in their scheme of teaching
children and young teens about Fiscals 5 safety tips. The Queensland Police service requires
research to prove the model has a valid user interface design, acceptable to the final
audience, thus making it an acceptable addition into the current teaching model. This
document aims to demonstrate this by presenting design and functionality of how the app
intends to operate and why the user interface is appropriate, effective and efficient to the
audience levels to fulfil the client requirements.

1.2

Scope

The following documentation shall cover the discussion of the application design stages for
the proposal to the cybercrime unit including;
User Interface, Navigation and operation design
Relevant Information on the Target Audience
Project Goals
Design Structures shown through mud maps, wireframes and order of hierarchy
Visual and layout Design
Prototypes
Testing for user interface navigation and flow
The Project shall not cover;
App testing for audience level
How the app is to be implemented in current module
The Cyber Crime Unit is responsible for suppling;
Logos and Identifiers used within the app
Information to be used within the app including Fiscals 5 Safety tips
Relevant videos and audios to the project

Research methods to be used to gain relevant data for this document include:

Internet Searches

Surveys

2.

Background

The Cyber Crime Unit First developed the Fiscals Safety Program in 2010 when it became a
recognised safety hazard/threat for young internet users whom were using the internet to socialise.
At this time internet social and messaging sites where being largely used and acting as a social
environment.
Social Sites included;

Bebo, launched in 2005 accounts available to those aged 13 and up


Facebook, launched in 2004 accounts available to those aged 13 and up
Flickr, launched in 2004 accounts available to those aged 13 and up
Myspace, launched in 2003 accounts available to those aged 13 and up
Tumblr, launched in 2007 accounts available all
Twitter, launched in 2004 accounts available to all
(ref001)

Amongst many others including messages such as MSM. However none of these website required
proof of identity or age. By 2010 there became a concern and a recognised public need for
awareness in cyber safety across all ages, particularly in children whom either surf the internet with
or without parent supervision. By this time cyber safety, cyber bullying and identity theft, and adults
preying on young children, were becoming a foreseeable risk, and in some cases were occurring.
(ref005)
One avenue being explored to teach about cyber safety and prevent cyber bullying was tasked to the
Qld police whom decided on a ground up approach. The Queensland Police Cyber Unit chose to
teach the younger generation as they would continue to use social media networks in their daily
lives. The younger generation would grow up around using different technology and social media
platforms and thus would become the main future users.
This group was chosen because the younger generation were more adaptable to technology and its
adoption. In addition they could teach older family members and someday teach, their own children,
how to use technology and be safe using social media environments and surfing the web.
Younger internet and media users were seen to be better informed about the digital environment
and could be considered as responsible users. Younger Users were also considered to be targetable
by dishonest parties. Therefore the Fraud and Cyber Crime Unit set about developing and
introducing the Fiscal the fraud fighting ferret cyber safety program. Where the program was about
promoting awareness and teaching about appropriate online behaviour and being safe on the
internet to assist in protecting oneself.
In its initial stage the Fiscal program was introduced to 7 different schools across Queensland which
was coordinated by either school based Police Officers and the local Crime Prevention Coordinators.
The program used visual presentations such as videos which can be found on YouTube and activity
sheets. The program made use of interactive activities to engage students. One of the programs
concepts was to pass on five tips (ref006) to protect one-selfs identity.
3

By developing awareness the Cyber Safety Unit aimed to help people protect their self in a virtual
environment where you may not know;
the person on the other side of the screen, or
what they are going to do with your personal information

The Unit created the program to gain satisfaction by knowing that they have helped to teach minors
about being safe and knowing that, they have taught techniques to keep young social media users
safe.
By teaching and helping children with cyber safety whilst they are still young, the Unit can help
prevent occurrences such as cyber bullying, where the bully and the victim may have overlapping
roles in the virtual world. Placing preventive strategies at this time in a young persons life can assist
them later in life in social situations and avoid long term negative and potentially harmful
impacts.(Ref008)
The internet no longer remains operational via a computer screen. It is now accessible via
smartphone, ipod, tablets and other mobile devices. These devices uses wi-fi and have apps which
allow instant search and messaging allowing people to communicate easily in a virtual environment
in real time. Parents often allow these devices, so mobile technology is no longer kept to those
whom are able to sign a mobile phone contract, and therefore responsible use needs to taught to
the younger users.
To further improve the program and achieve the Cyber Safety Units aims Fiscal the Fighting Ferret
shall be develop into a mobile app to keep with the changing trends of the digital environment.

3. Target
Audience
The Primary Target Audience of our app in its initial
stage of development consists of students aged
between 8-15 years whom are currently attending a
Queensland School.
Queensland students have been chosen in the initial
stage of development as this app is being created for the Queensland Cyber Safety Unit and the
Australian states and territories have different regulations in which they must follow.
In 2013 on the last census the Queensland population consisted of approximately 2.24 million
people and 20% of these were children under 15 years of age as reported on the Australian Bureau
of Statistics. (Ref007) Overall there was approximately 14% between the ages 5 to 14.
Data on percentage of those with devices in our target audience range may have inaccuracies as
parents may be listed as the owner of the devices although they may not be the actual user. In 2013
it was reported that one in three primary school children held a smartphone device some as young
as 8 years old. (Ref009) This data did not include tablets and ipods which have access to the app
store and google play. The app store and google play are the main stores available on apple and
android devices which are the main platform used in Australia. (Ref010)

3.1

Audience Beliefs

The audience believes because they are in a safe environment physically then the virtual
environment cannot harm them. They do not realize that their physical environment and virtual
environment are on two different levels. Whilst the virtual environment cannot physically hurt a
person, it can harm on an emotional level or leave an opening for later physical harm. This is due to
being able to use social applications and the internet from a young age as it is primarily used for
simple tasks for example;

watching a maths video


researching an assignment
taking a photo and sending it to a friend
sending friends messages

But even on the surface of these simple tasks there are dangers hidden. Because it does not jump
out, immediately noticeable or affect their physical environment the audience is misinformed about
the importance of cyber safety and therefore misinformed about the importance of the application.

The target audience does not know about the Fiscal program specifically but have heard about other
types of internet safety programs. The parents of the children do not know about the Fiscal program
either specifically but know about cyber safety programs and understand how important these
safety programs are.

3.2

Audience Levels

The primary audience level is the students in the schools who will
benefit the most from the application and the app has been designed
to target the primary audience.
The secondary target audience is the parents of the children. It can
most likely be seen that parents will be receiving the information the
kids have learned. The parents can benefit also from the application
if they are new to using the internet.
Other than the audiences specified whom may use the app include those;
People on a tertiary level
the older generation
Or those who desire to;
learn to use the internet
unfamiliar with cyber safety
As there are many older people who are not experienced with the internet and could benefit greatly
from using the application. We plan to appeal to the existing market by upgrading the Fiscal Fighting
Ferret program into an app to be used on smaller devices such as phones. Using Information and
training designed to teach young uses about self-protection and targeted at apps used for social
media.

3.3

Audience Demographics

The primary target audience are males and females in the age range of 8 - 15. They have no income
stream and rely on their parents for purchases. Within this group grading from 4 to 7 (primary school
students) and grade 8 to 10 (High School students) are included. Due to the broad age range and our
app shall be most suitable for grades 3 to 5 (children who are ages 8, 9 and 10). Beginning with,
populated areas such as Queenslands cities and suburbs as this would be the most affected group.
The application will be themed to suit the target audience. The primary target audience is primary
school students with a lower education level and a lower level understanding of technology and the
internet. The user research which was conducted found that students in higher grades in primary
school would not be interested in the proposed application. The theme of the application and the
context does not match the maturity of a higher grade student.

Secondary and tertiary target audiences also would have a lower understanding of using technology
and the internet. The application is not suited for people in their older age; such as upwards of 5060. The application is themed to meet the requirements of younger, misinformed students, children
and parents. The user research found that people with a higher understanding of the internet do not
require the information delivered in the proposed application, due to the context of the application
and the way in which the information is delivered.

3.4

Audience Expectations

The primary target audience expect an application which is themed to match their maturity and
intelligence level. This target audience expects an application which is easy to use, understand and
learn with. The audience expects the application to be interactive, reliable, able to hold attention
and visually appealing so interest is not lost. The primary audience also expects an application which
is very educational. The student should not feel like they have wasted their time using the
application after they have reached the end. The Outcome is for students to learn Fiscals 5 Safety
Tips.
The secondary target audience - the parents - have similar expectations as the ones specified
previously. Considering the application has been designed and built for primary school students, the
parents expect an application which is easy to use, interactive and proves an educational purpose.

4. Problem Statement
The primary issue is the lack of public awareness of cyber safety. More specifically, the lack of
awareness found in primary school students. Queensland Police Service has introduced the Fiscal
program to educate school children on the various issues which exist within the internet. The
objective is to develop a user interface for an application that presents the five safety tips for
browsing the internet safely.
The app needs to be designed for a broad range of audience and to suit how different children have
different learning styles. (Learning styles include read/write, interactivity, sound and more)
In Addition technology is getting smaller and apps are now being used more often. Instead of going
online digital users are now going in the App Store or Google Play. People are using platforms such
as mobile phones, iPads and iPods. As the technology on these devices have become more advance
since Fiscal the Fighting Ferret first began, the original program also requires an upgrade. New apps
have also appeared such as snapchat. Apps are now asking for access to information such as photos
and contact lists registered in the devices being used. People especially younger users using these
need to be made re-aware of personal safety when using this new social media development.
The budget to build the application is $50,000 and must be completed in 2 months.

5. Goals
Primary Goals
To meet the learning needs of Queensland students
To teach Children about fiscals 5 Safety Tips
Secondary Goals
To have it preinstalled on every Samsung and Apple Smart Phone
measured by the amount of Samsung Smartphones being sold and how many people open
the app + the time spent looking through it

5.1

Usability Objectives

The Usability objectives for the app is to have children and adults looking through the app and take
notice of what the app contains. Overall, the Interface and usability of the application needs to
follow these guidelines:

Small and simple


Easy to use
The ability to be scanned and easily read at a glance
Passes across the most important points with the least amount of words
Small file size
Interactivity to engage the user
Educational

5.2 Single Message


Cyber-bullying could seem like nothing since there is not any physical contact, however really it will
hurt even more than the actual issue. Behind those monitors are real folks with real feelings; some
are driven to depression, some are driven to physical bullying, and a few are driven to suicide.
Just because you are behind a screen, doesn't mean you are safe

5.3 Mandatory Elements


Fiscals Logo
Links that are currently Important
Access to Fiscals Episodes
Access to Main Website
The Five Safety Tips
Limit the amount of information you post online
Make sure you update your antivirus
software
Never give out personal details
Change your password regularly,
dont give it away to anyone
Shred your documents don't just put
them in the bin

5.4

Deliverables

The Deliverables to be given to the client shall included


the interface of a mobile app which can be used in the
training the Cyber Crime Unit uses to teach young users
about social responsibility and safety when using social
media. We plan to deliver a fully developed
smartphone application that is essentially a vastly
increased interactive version of Fiscals website. The app will be able to be updated with new
information and programs that the end user can look through and learn from.

6. Alpha Design
Our Design revolved around our primary target audience as our app must reflect this. Our primary
source of content which we reviewed was our clients website of the fiscals website which can be
found at http://fiscalthefraudfightingferret.com.au/5-tips-to-help-protect-your-identity/
The tools which we used in our design phase for our application included;

pen and paper - where we created a paper model of our application and the flow of the
navigation
Brainstorming - where we drew graphs and layout plan for our paper model

Print Screen on the keyboard to receive mandatory elements


photoshop - where we created imagery for our design
Just in Mind- a program downloadable from the internet where we built the prototype
version of our application
Reviewing the website of the Fiscals program
Website Review
As our group looked at this website we found other tips from other characters contained within this
website. These Characters included:
Sofie Social Media Tips
Megan Cyber Bullying
Doris Home Safety
Bacchus Bad Behaviour
However the client only wishes to use Fiscals Protecting Your Identity within the first stage of the
app development.
As a group we found that You-tube Clips of Fiscal were available and User Interactivity was minimal.
The apps purpose is to rectify the user interactivity focus and engage 8 15 year olds interest and
teach them the following tips;
1. Limit the amount of information you post online. Never post your full name or Date of Birth
2. Make sure you update your antivirus software
3. Never give out personal details to anyone who calls you on the telephone or sends you an
email or text. Talk to your parents first.
4. Change your password regularly and never use your date of birth or anything too obvious
Never give your passwords to your friends (or anyone)
5. Shred documents containing personal Information. Never just put it in the bin.
While reading these tips we learned that although they seem simple to an adult, we must remember
that our audience are children who may be;

unable to read therefore the app must be simple and make use of sound in some areas to
aid in the interactivity
have a different perception on the words
used
Our Client also wishes us to use different personas to
aid in passing along the safety tips.
Pen and Paper Model
In our pen and paper model we found that although
it was quick and efficient to draw rough diagrams and
graphs, we lacked substance to gain the attention of
audience and interact with them.

10

Order of Hierarchy - Pen and Paper 1


In the initial design the order of hierarchy is shown to the side it is a mud map of the structure
which is used for the fiscals app. A few attempts were made at this, as, in the first design our group
included fiscals friends tips as well. However these were taken out as our client didnt wish to use
these in the final design. However there is room if desired to add them at a later stage.

Design Mud Map - Pen and Paper 2


Next we created a rough layout of what
our app could look like again we used
paper. On this we brainstormed what
our app may need to fit the audience
level. In this section we added ideas for
personas as our client would like to use
personas in the app to help with
interactivity. These personas are
required to adopt the issues we
addressed earlier in the brief.
One of our earlier problems and the
reason why the app is being created is
to address the issues children viewing
content without parental awareness and using new software and apps by downloading from the app
store or iTunes available on their iPods or tablets. Apps such as snapchat can leave open to the
wider community. We created new personas for fiscals team to avoid confusing characters later on
and teach children of the dangers that these other apps may pose. This is something as a group we
were aware of when designing our app and choosing the structure.

Sectioning & Grouping Information


Within the app we have grouped information under three main sections these being;
1. Fiscals Tips
2. Test your knowledge /Games Renamed how safe are you
3. Links

Development tools
During the first part of our app development we brainstormed what was required within the app.
This we completed on paper. We also used paper to map out our navigation structure and page
layouts. Once the paper plan was complete we used Photoshop to create the images or edit the
imagery which we took from our clients website. From here we exported the imagery and text to a

11

program called Just In Mind which we used to create our prototype. Which can be found futher on,
in section 6.3 of this report.
Just In Mind
We used Just in Mind for our prototype level. In this we could gain attention of our audience by
interacting with them and at the same time address recognizable problems.

Persona Plots - Brainstorming


Ivys New IPod
Ivy has just been given a new iPod and she is excited because now she can talk to and have fun with
her friends Sam and Vick when she isnt with them. The iPod has apps which allow her to be able to
do this one app in particular is snap chat.
Game Ideas
Ivys mum is worried that Ivy wont be safe using this app as it allows for Ivy to add anybody
to the contacts. Help Ivy to learn the safety tip to convince her mum that the app will be ok
Sams Snaps
Sam loves to take pictures to send to people. He isnt good at writing long messages or reading
them. However he isnt careful who he sends the pictures to and often posts things he is proud of so
that anybody can see.
Game Ideas
Lately he has been taking pictures of his school work that he is proud of with his name and
personal information included. Which safety tip is Sam breaking?
Vicks Videos
Vick is known for taking videos and including his friends Ivy and Sam in them. However he isnt
always behind the camera. Sometimes he lets his friends use his iPod to take them.
Game ideas
Vicks iPod has a timer so that the iPod locks itself until the password is entered. He gave his
password to his friends so they can take videos on his iPod too. Lately he thinks someone
has been in his iPod without his permission, when he asks his friends they say it isnt them.
o What can Vick do to stop someone playing on his iPod without permission?
o What can Vick learn from this?
The Game ideas once formed shall included voice over and the answers to the problems shall be on
the page and read to the users then the user clicks the correct answer. The game idea may be
12

presented in a visual clip, pictures or text. How the game idea is present depends on how well our
tip pages perform. The game ideas will link to the How safe are you section on the home page.

6.1

Structural Design

For the structural side of the design we have implemented back and next buttons. They are
necessary as the design of the iphone, unlike the Samsung the iphone doesn't have a built in back
button on the phone so we have to get the user the option to go back if needed. This is critical as it
will take up space on the screen, seeing as the phone is small all unimportant UI elements has to be
well placed and sized correctly.
Each page can be accessed with the use of the appropriate button to link the user to a specific page.
The user will have the ability to go back to the previous page through the use of the back button that
will be implemented within the app.

13

6.2

Visual Design
Background
The background to the fiscals app includes a Red/Maroon top and bottom
bar. A blue body section over the Queenslands Police logo, as they are
currently responsible for the fiscals fighting cyber crime project. The colours
have been chosen to keep with fiscals original colour theme. The blue from
fiscals hat and the red/maroon from fiscals clothing. This shall be continually
throughout the application as user research shows the continuity is important
as it allows people to see that they are within the same application and have
not accidently gone out of it. The colors have also been chosen to appeal to
our target audience especially the older people within the group of 8 to 15yrs.
The color will also appeal to our audience desires to be seen as more mature
and responsible.
Return Home Button
The white and green Think Safety sign is a reminder for users to be
consciously aware that users need to think safe to be safe when using
technology to interact with other people. The sign also shall return users back
to the home page. It also stands out from the rest of the content on the page.
Home Page
The texts for the buttons throughout the app are Cambria bold, size 12 and
colour white with a black drop shadow. A Picture of fiscal is planned to be in
the bottom of the app on the Home Page after functionality and testing of the
app has been completed.
Safety Tips Navigation
The navigation for the safety tips is simple and consists of buttons at the top of
the page with tips numbers. The navigation backgrounds are white boxes and
green numbers to
match with the logo which takes the user back to the
home page.
Tips Pages (example)
Once a number is selected it shall navigate to that page where a screen reader/
voiceover shall readout that tip. Images relating to the tip shall be included for
our younger audience to attract attention and aid in understanding. Links shall

14

be added later to take the user to either an episode or a quiz relating to the tip. These links shall be
white to allow it to be recognisable as a button at the bottom of the page.

Sound
The sound planned to go within the app shall include voice over. This voice over shall be tasked with
reading the script out to the children as they may find it difficult to read the text. Other sounds may
be added through the testing stages.
Imagery, Icons and Animations
Other Imagery, Icons and Animations used with the app shall consist primarily of Fiscal and thoses
approved of by our client the Queensland Cyber Crime Unit. The imagery shall match the text and
meet visual learning styles of our target audience.

6.3

Prototypes

When prototyping the design, a sketch was drawn up on a paper so that guidelines could be
made as to how big or small each element would appear on the iphone screen as well as how
well they would navigate together. We
then scanned and unloaded them into
illustrator and created mock ups for
what was going to become the UI.
The iPhone 6 was used as the default
border for the app as it will be
preinstalled on new iphones sold in
Australia. The iPhone 6 is the desired
model as it is the newest model
produced from apple with no newer
model in the horizon just yet. After the
designs were implemented into
Justinmind, we gave the prototype to
one of the developers younger siblings.
Our findings showed that the app was
basic and easy to use. Most children now days know how to navigate a smart device
(tablet/phone/tv) and they had no problem with navigating around the app. The apps design is
very universal with most menus built into the iPhones current pre installed apps which is what
the team was going for. We can safely say that the first prototype was a success with the target
audience.

15

7.Testing
7.1.Test Plan
Scope: The team is testing the Fiscal Cyber Safe App that has been developed
for the target audience of ages 8 to 15. We will cover the entire app testing all of it
functionality. We will be testing the functionality of the app through navigation and
usability.

Purpose: The purpose of this app is to discover any flaws in the UI design. Our
biggest question is can users navigate to important information from the
prototype's home page? We need to see if the the users can navigate from the
beginning of the app to the information they need to access and if they can, can
they return to the home page to navigate to the next section of information.

Schedule & Location: We would like the sessions to be in the middle of the day
in a enviroment the the target is familiar with e.g. School or home. We want to run
the test in at least five common locations that the target may be in.

Sessions: The sessions will be in a familiar environment e.g. School, home,


sports field. The time of the sessions will go for 20 minutes each to allow the child
to fully run though the app discovering all it has to offer. We will then take the app
away from the child and review between ourselves what he/she did and if there
can be any improvement e.g. navigation. The next step would be to take the child
to the next location and repeat the test taking note of any changes.

Equipment: The target will be handed a iPhone 6 with the app installed
somewhere on the front page of apps. We want to see if the target can navigate
to the app easily. Other equipment include the app and a microphone to record
anything that the target might say about the app that may be needed to rectify
any problems.

Participants: The participants will be younger sibling or children from the


client/developers who volunteer. We want to get at least 10 of the target
audience to participate in the test in order to get an even number and a decent
amount of data to take back and get around the problems that have been noticed.

Scenarios: First Session:We will be testing if they can get through the app
without our help in the first session. Second Session: Once the target is familiar

16

with the app we will ask the child to navigate to specific information in the app.
Third Session: We will let the target go through the at their own speed. We will
ask What would you like to see in the app and what do you think targets of your
age need to know about cyber bullying taking note of the answers. Fourth
Session: Once we have added the content that the target has brought up we will
ask Do you notice anything different and if yes what do you think of it. Fifth
Session: The final session will be a final thoughts and opinions on the app and if
the app appeals to them.

Metrics: Session 1: Nothing / Session 2: Please navigate to page () / Session 3:


What would you like to see in the app and what do you think targets of your age
need to know about cyber bullying / Session 4: Do you notice anything different
and if yes what do you think of it / Session 5: What are your final thoughts on the
app and what about the app appeals to them.

Roles: Jess: Observer and consultant, Josh: App help and function support,
Matthew: Note taker and questioner.

17

7.2 Test Results


Dates

1st May

8th May

15th May

22nd
May

29th May

Age

Name

Session 1

Session 2

Session 3

Session
4

Session 5

14

Josh

Navigated with ease

Successful

More colour should


be added.

Yes

Its good

12

Chloe

Navigated with ease

Successful

More animations in
the character's
movement

Yes

Friendly

10

Leo

Navigated with some


hiccups

Successful

Games. Fun puzzle


type games that the
user has to work
through to unlock a
prize

Yes

Helpful

Jess

Navigated with ease

Unsuccessful

Its perfect

Yes

Informative

11

Matthew

Navigated with ease

Successful

More characters.
Another character
should be added to to
the app explaining
something else about
cyber crimes and
safety

No

Cant find
anything wrong

Kate

Navigated with ease

Unsuccessful

Another story or a
animation for them to
watch

No

Funny

Alex

Navigated with some


hiccups

Successful

Space to ask
questions to people
who run the
application.

Yes

Impressive

Caitlyn

Navigated with some


hiccups

Unsuccessful

More navigational
tools

No

Could do with
some work

Kevin

Navigated with ease

Successful

Nothing

Yes

Easy and cool

18

Characteristic of Target audience

Number of
targets

Gender
Male :
Female:

5
4

Age brackets
8-10:
11-13:
14-17:
17-21:

6
2
1
0

Ability to use a mobile device


No experience:
Some experience:
Moderate experience:
Knowledgeable experience:

0
2
6
1

Daily usage (hours)


1 - 2 hours:
3 - 4 hours:
5 - 6 hours:
7 + hours:

2
1
6
0

Note on results
The outcomes of the test are pleasing. The targets wanted friendlier elements in the app as well as
more activities for them to do. This is pleasing at it shows that the kids would be interested if the
app changed around slightly. Almost all targets got through the app quickly and easily, a few had to
be explained to but a factor would come into play here. We tested on younger targets as the app is
more suited towards them as they are the least knowledgeable about cyber safety.
The majority of the complaints were that the app wasn't fun enough for the user which was obvious
when observing the user. The user became bored and a bit irritated that the app didn't have many
interactive features like the ones pointed out in the table above. We have to take the application
back and make sure that the target audience is more creatively involved with the app.

19

8.

Final Design

The final design has been improved with a consistent and easy colour theme on the eyes. The
maroon has been kept in some areas of the application, but an appealing blue colour has been
introduced and used across the application. The reason for this is because the vectors which the QPS
provided contain this blue colour predominantly. The blue goes well with a white background and
the new simplicity that has been introduced in the final design adds to the overall appeal of the
application.
The application has been implemented with the Fiscal vectors developed by the Queensland Police
Service. These vectors have been implemented to fulfill the expectations of the primary target
audience. The vectors help the application to be age appropriate and match the age of the primary
target audience. Other small objects such as speech callouts have been implemented for the same
reason. The final design of the application includes links to the videos on the Fiscal Crime Fighting
webpage developed by QPS so the user can continue their journey learning about cyber safety and
includes links to the various organisations which can help with cyber safety and mental health. These
implementations again, aim to meet the expectations of the primary, secondary and tertiary target
audience.

20

Loading Screen

The loading screen first appears when the user opens the application. There is a loading period of
roughly 4-5 seconds before the primary screen appears.

21

Primary Screen

22

Tips Screen One

23

Tips Screen Two

24

Tips Screen Three

25

Tips Screen Four

26

Tips Screen Five

27

Videos Screen

28

Important Links Screen

29

9.
Date

Task Allocation
ToC no.
1
1.1
1.2
2
3
3.1
3.2
3.3
3.4
4
5
5.1
5.2
5.3
5.4
6
6.1
6.2
6.3
7
7.1
7.2
8

Section
Introduction
Document Purpose
Scope
Background
Target Audience
Audience Beliefs
Audience levels
Audience Demographics
Audience Expectations
Problem Statement
Goals
Usability Objectives
Single Message
Mandatory Elements
Deliverables
Alpha Design
Structural Design
Visual Design
Prototypes
Testing
Test Plan
Test Results
Final Design

Task ID
0010
0020
0030
0040
0050
0060
0070
0080
0090
0100
0110
0120
0130
0140
0150
0160
0170
0180
0190
0200
0210
0220
0230

Section Completion
Section
1
2
3
4
5
6
7
8
Proofreading

30

Task IDs
001s - 003s
004s
005s-009s
010s
011s-015s
016s-019s
020s-021s
023s

Date
1/06/15
1/06/15
5/06/15
6/06/15
6/06/15
6/06/15
7/06/15
7/06/15
7/06/15

Members Contributing
Josh, Jess and Matt
Jess
Josh, Jess and Matt
Matt
Josh, Jess and Matt
Josh, Jess and Matt
Matt
Josh
Josh, Jess and Matt

Person
Josh
Josh
Matt
Jess
Jess
Matt
Josh
Jess
Matt
Jess
Matt
Josh
Josh
Jess
Josh
Jess
Jess
Jess
Josh
Matt
Matt
Matt
Josh

Task Progression
Task

ID

Version

Person

Status

Completed

Introduction

0010

Josh

completed

22/03/15

Introduction

0011

Jess

Edited

requires
name

Purpose of Document

0020

Josh

Completed

30/03/15

Scope

0030

Josh

Completed

30/03/15

Purpose of Document

0021

Jess

Edited

Scope

0031

Jess

Edited

Background

0040

Jess

Completed

Background

0041

Jess

Editing

Target Audience section 0050,0060,0070,0080, 1


0090

Josh/Jess
and Matt

completed

Target Audience

0051

Jess

Editing

Problem Statement

0100

Jess

Completed

30/03/15

Goals

0110

Matt

Completed

30/03/15

Audience levels

0071

Jess

Editing

Audience Demographics 0081

Josh

Edited

Audience Demographics 0082

Jess

Completed

Audience Expectations

0091

Matt

Edited

Audience Expectations

0092

Matt

Completed

Yes

Problem Statement

0100

Jess

Completed

Yes

Goals

0110

Matt

Edited

Usability Objectives

0120

Josh

Edited

Usability Objectives

0121

Jess

Completed

Single Message

0130

Josh

Version 1

Single Messages

0131

Jess

Edited

31

29/03/15

30/03/15

Yes

Yes

Yes

Mandatory Elements

0140

Jess

Version 1

Mandatory Elements

0141

Jess

Edited

Deliverables

0150

Josh

Version 1

Deliverables

0151

Jess

Edited

Alpha Design

0160

Jess

Version 1

Alpha Design

0161

Jess

Edited

Structural Design

0170

Jess

Version 1

Structural Design

0171

Matt

Edited

Visual Design

0180

Jess

Version 1

Visual Design

0181

Prototypes

0190

Josh

Version 1

Prototypes

0191

Matt

Edited

Yes

Testing

0200

Matt

Completed

Yes

Test Plan

0210

Matt

Completed

Yes

Test Results

0220

Matt

Completed

Yes

Final Design

0230

Josh

Completed

Final Design

0231

Josh

Completed

32

Edited

Yes

Yes

Yes

Yes

Yes

Yes

10. References
ID
Ref00
1
Ref00
2
Ref00
3
Ref00
4

Ref00
5
Ref00
6
Ref00
7
Cite to
Cyber
Bulling
Article

Site
http://en.wikipedia.org/wiki/List_of_social_networking_websites
http://www.communications.gov.au/__data/assets/pdf_file/0016/204064/Discussion_Paper__Enhancing_Online_Safety_for_Children.pdf
https://aifs.gov.au/cfca/publications/online-safety
http://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact=8&ved=
0CDYQFjAE&url=http%3A%2F%2Fwww.acma.gov.au%2Fwebwr%2F_assets%2Fmain%2Flib311959
%
2Facma_annual_report_2009-10_highlights.doc&ei=yolmVdHM4uZ8QWy6YKgAg&usg=AFQjCNG7BgPHA7GIy5d7IIx4Y5RR5xzOpA&sig2=MfHln9v5AIWwV_P1Xe1
ryw&bvm=bv.93990622,d.dGY
http://bienestaryproteccioninfantil.es/imagenes/tablaContenidos03SubSec/13_4_Keith_Martin.pd
f

http://fiscalthefraudfightingferret.com.au/5-tips-to-help-protect-your-identity/
http://www.abs.gov.au/AUSSTATS/abs@.nsf/Latestproducts/3235.0Main%20Features42013?
opendocument&tabname=Summary&prodno=3235.0&issue=2013&num=&view=#PARALINK4
Dorothy Wunmi Grigg (2010). Cyber-Aggression: Definition and Concept of Cyberbullying. .
Australian Journal of Guidance and Counselling, 20, pp 143-156. doi:10.1375/ajgc.20.2.143.
http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=8497649&fileId=
S1037291100001084
To cite this article: Price, Megan and Dalgleish, John. Cyberbullying: Experiences, Impacts and Coping Strategies as
Described by Australian Young People [online]. Youth Studies Australia, Vol. 29, No. 2, June 2010: 51-59. Availability: <
http://search.informit.com.au/documentSummary;dn=213627997089283;res=IELHSS> ISSN: 1038-2569. [cited

http://search.informit.com.au/fullText;dn=213627997089283;res=IELHSS

33

Vous aimerez peut-être aussi