Vous êtes sur la page 1sur 6

BUSI 1402: Introduction to Business Information and Communication Technologies

Assignment 1: Problem-Solving

Due: Sunday January 25 @10:00PM


Worth: 5%

Overview
E-mail is perhaps used all over the world and it has become almost indispensable. But, according
to Renault, Ramsay and Hair (2008) it is not without problems. Recently, they published an
article entitled:

Think Before You Link:


Controlling Ubiquitous Availability
Please read the article and then complete this assignment.

Deliverables
Please answer the following questions (in a Word Document) within the context of the
framework on Problem-solving discussed in class (total 50 points):

1. [25 points] IDENTIFY THE PROBLEM: According to you, what is the problem described in
this article. Clearly in one paragraph [100 words maximum] state the problem as you
understand it.

2. [22 points] Please write [150 words maximum] in one or two paragraphs indicating if you
AGREE (OR DISAGREE) with Renault et al.’s arguments AND WHY. You can make an
argument indicating partial agreement to some of their points as well.

3. [3 points] CREATIVELY identify alternative ways to solve the problem and write one
paragraph for each one of THREE POSSIBLE ALTERNATIVE SOLUTIONS [50 words
maximum per solution].

Save the word document with the following name: B1402W09S-A1-CUSN.docx, where S
represents your section (G, H or I) and CUSN is your Carleton University Student Number; e.g.,
if your student number is: 100111111 and you are in Section H, then your word document should
be saved as: B1402W09H-A1-100111111.docx

References:
Renault, Karen, Judith Ramsey, and Mario Hair (2008). Think before you link: Controlling
ubiquitous availability, Interactions, November – December, 65-68.

1
FEATURE

Think Before You Link:


Controlling Ubiquitous
Availability
Karen Renaud
University of Glasgow | karen@dcs.gla.ac.uk

Judith Ramsay
University of West Scotland | judith.ramsay@uws.ac.uk

Mario Hair
University of West Scotland | mario.hair@uws.ac.uk

The survival of the species order.” The kinds of issues that emailers, we forecast a gradual
depends upon communication might preoccupy people at the withdrawal from electronic
between its members. The mech- highest level are: which com- communication based on the
anisms underlying human com- puter to buy, whether to go on fact that people obviously are
munication have long been scru- holiday, or whether to purchase unable to be sensible about their
tinized, from Darwin’s examina- an iPhone. Communication, email interactions. For example,
tion of the role of emotion, to according to Maslow’s model, continually thinking about
later studies related to the ways becomes a need to be satisfied and monitoring email, just in
in which people form attach- only when physiological and case something interesting has
ments. Of particular interest are safety and security needs have arrived, is not productive. This
studies about how individuals been satisfied. However, experi- is exacerbated by the multitude
and groups communicate. Whole ence tells us that people have of other information we have to
journals are dedicated to human the need to communicate even deal with on a daily basis as part
communication and communica- when their lower-order needs are of our working day.
tion disorders. not satisfied, as evidenced by the Several studies have foreshad- [1] Nonnecke, B. and
J. Preece. “Lurker
Although survival is depen- behavior of people in concentra- owed this. Nonnecke and Preece Demographics:
Counting the Silent.”
dent upon communication, as tion camps. It is also well known found that the very great major-
Working paper, CHI
a species, we need to do more that solitary confinement is the ity of the members of online 2000, The Hague,
Netherlands, 2000.
than simply survive. Maslow most dreaded form of discipline technology and health support
i n t e r a c t i o n s   N o v e m b e r + D e c e m b e r 2 0 0 8

attempted to enhance under- in prison. We argue that despite groups were non-active members
standing of this with his pro- interaction being such a basic (“lurkers”) [1]. In this context,
posal of a number of “human need, the glut of communication people are refraining from inter-
needs,” which start off with media has overloaded us to such acting; however, we have not
the most basic, physiological an extent that the biggest luxury observed this kind of restraint
needs and progress to self- of all is to choose not to interact when it comes to emailing
actualization at the apex of the with others. behavior. What we have found is
pyramid. Only once a person The explosion in communica- that emailing behavior is often
feels that Maslow’s lower-level tion in the past few years has characterized by a kind of com-
needs have been satisfied can been facilitated by a number of pulsion, with emailers not even
they enjoy an “enhanced sur- innovations such as affordable being aware of how often they
vival status,” in which those mobile phones, social networking engage with their email client.
aspects of daily existence that sites, email, and BlackBerries. Individuals need to retreat
preoccupy them are of a “higher Based on our observations of from interaction, to engage in a

65
Cultural and Personal Impact

process of self-renewal and rein- or mobile phones. Many of us bility for tasks, informing those
vigoration so that they can cope check our email first thing in the who have little interest in the
with a hectic and demanding morning, regularly throughout topic of current developments,
world. The need for solitude is the day, last thing at night, and generally filling up inboxes with
undisputed [2]. Naturally, people during our holidays. Research impunity and with no thought
differ and have varying solitude that we have conducted over as to the consequences for those
requirements. Unfortunately, the past three years signals an who have to spend valuable time
not everyone feels empowered to urgent need to develop proto- dealing with the emails. The
make the decision not to interact. cols for managing interpersonal phrase “the tyranny of email”
There are institutional impera- interaction if the power of these is not so much humorous as
tives for communicating. Email communication technologies to it is tragic. Even worse are the
comes with your PC at work; you distract, interrupt, and pressur- senders who bully, terminate
can access it from home, and the ize is to be controlled. relationships, and deliver bad
pressure to check email is strong, Although the clear benefits of news by email. It is too easy to
ubiquitous, and attentionally email are apparent (person-to- send email; it aids and abets
demanding. Yet how many job person, personalizable, almost the avoidance of independent
descriptions explicitly mention instantaneous, archivable, with thinking and problem solving. A
the need to engage with email, ability to attach text and pic- commonly cited example in aca-
and how often is time formally tures, etc.) the research that our demia is the case of the student
allocated to it? team has conducted over the who reaches for a staff member’s
past three years has indicated email address before reaching
Problem No. 1: Unbidden Email- that user engagement with inter- for a textbook.
[2] Cramer, K. M. and R.
Related Thoughts, a “Recipient action technologies has now Many people have their email
P. Lake. “The Preference Generated” Phenomenon reached the high watermark. client running in the background
for Solitude Scale:
Psychometric proper- Email usage requires us to invest Partly, we suspect that the while they work on other tasks.
ties and factor struc-
ture.” Personality and
a significant amount of time and problem is their misuse. How Anecdotal reports have sug-
Individual Differences energy in reading, acting upon, much of the content of what gested that growing pressure
24, no. 2 (February
1998): l92-99. making decisions about, remem- we communicate is really truly to send, respond, and manage
bering, and removing emails. necessary? Often, we commu- increasing volumes of email
This takes place in one of two nicate simply because it makes has a potentially deleterious
ways. First, in the same way that us feel connected. What we call effect upon users. By tracking
alcohol researchers investigate small talk or gossip is the vitally the onscreen application-related
“alcohol-related cognitions,” we important grease of social life, behaviors of six volunteers, we
posit the existence of “email but not every technology and found that individuals switched
related thoughts” —unbid- every context, for example work- between other applications and
den thoughts that compel the place email, is appropriate for their email client continuously.
individual user to check email. this type of interaction. In fact, what appeared to be
i n t e r a c t i o n s   N o v e m b e r + D e c e m b e r 2 0 0 8

This reflects the wider debate happening was a monitoring of


about whether Internet addic- Problem No. 2: Unbidden incoming email, which super-
tion should be recognized as a Email Interruptions, a “Sender seded all other work. Continuous
clinical phenomenon. Email was Generated” Phenomenon monitoring of emails reflects
initially the plaything of aca- Unlike paper correspondence a high level of email-related
demics and technophiles, but it or telephone calls, email is thoughts, which may impact
has quickly become the de-facto unusual in that it imposes a task performance. Unbidden
communications technology of disproportionate amount of the email interruptions, on the other
choice for business, academia, cost related to communicating hand, make demands upon both
and personal users. It is ubiqui- onto the recipient, rather than limited memory and attentional
tous: available at work, at home, requiring the sender to carry the resources and time. Famously,
from “third party” locations such bulk of the cost. Some senders in 1956, Miller ascertained that
as Internet cafes, from mobile scatter emails as a sower scat- people can hold only a little
devices such as BlackBerries ters seed—transferring responsi- less or a little more than seven

66
FEATURE

separate items of information ences of email, the findings were higher self-esteem. Those with a
in mind (in what is termed revealing: a worrying mismatch stressed orientation find email
“working memory,” which is between what we had seen hap- more distracting than other [3] Cowan, N. “The
magical number 4 in
where information currently pens (study one) and what users forms of asynchronous com- short-term memory:
being used is temporarily held). are aware of (study two) [4]. munication such as letters or A reconsideration of
mental storage capac-
Recently, Cowan has suggested We concluded that while users instant messaging, for example. ity.” Behavioral and
that this number might be as believe themselves to be in con- This makes sense if we accept Brain Sciences 24, no. 1
(2001): 87-114.
low as four items [3]. Working trol of their email, they appear that the positive side of email is
i n t e r a c t i o n s   N o v e m b e r + D e c e m b e r 2 0 0 8

memory, being so limited, is to be in its thrall—mesmerized that we are in semi-continuous [4] Renaud, K.V., M.
very vulnerable to interrup- by the idea of incoming emails contact with other people, often Hair, and J. Ramsay.
“You’ve got email. Shall
tions. When an email interrupts awaiting perusal. like-minded, often geographi- I deal with it now?”
International Journal
an ongoing task, the person We developed a typology of cally disparate. We are commu- of Human-computer
focuses his or her attentional orientations to email [5]. Three nicating. Now, human beings as Interaction 21, no. 3
(2006): 313-332.
resources in an either “alternat- dimensions emerged: relaxed, a species need to communicate
ing” or “simultaneous” manner driven, and stressed. Those indi- to survive, but, even so, com- [5] Hair, M., K. V.
to the email. These modes of viduals with the orientation that munication is more important to Renaud, and J. Ramsay.
“The Influence of Self-
Photograph by Amancay Maahs

operation are far less effective we labeled driven also appear to some than to others. Those with esteem and Locus of
Control on Perceived
than focused attention. Just how have low self-esteem. In other low self-esteem often define
Email-related Stress.”
aware are email users of the words, those who suffer from themselves in terms of their Computers in Human
Behaviour 23 no. 6
price they are paying? lower self-esteem are impelled acceptance by others; they des- (2007): 2791-2803.
When we asked people around to engage with their email more perately need the communica-
the world about their experi- than those individuals who have tion fix. Those with higher self-

67
Cultural and Personal Impact

esteem are more self-contained; immediately, some when they day into tiny slices of activ-
they can take it or leave it. get the chance, and others will ity, interspersed with frequent
purposely not reply so as not to interactions with others, leaving
Solutions: Technical or Societal? seem too eager! Others deliber- you exhausted and unfulfilled
Solutions can be either techni- ately delay opening emails when by the end of the day. At the
cal or societal. In the case of they suspect the sender receives moment, only you can act to
email, we believe that both are “read receipts.” This latter behav- master your communication
required, that a two-pronged ior is a clear case of the attempt behavior and bring it under con-
approach is the only viable to manage sender expectations, trol. Communication technolo-
approach to the problem. For further confirming sender-recip- gies need to be tools, subjugated
example, current email clients ient inequity. Moreover, every- and made to work for you rather
such as Microsoft Outlook allow thing and anyone can appear in than being controlling tyrants,
users to request notification your inbox, and at any time. No preventing you from enjoying
upon arrival of every email. one inbox has the same traffic your day and invading your lei-
This appears to encourage on any two days, meaning that sure hours. Finally, linking with
and facilitate the monitoring we are constantly upgrading our others is positive and conducive
behavior we observed, which, in email behavior. to happy and healthy relation-
light of our research findings, ships but it is very important for
is detrimental. There is plenty What Can You Do About It? you to think before you link!
of evidence as to the negative Having considered our research
effects of continuous interrup- evidence, we believe that the About the Authors 
Dr. Karen Renaud is a
tions which cause stress and long-term solution will be a
senior lecturer in the
exhaustion and interfere with mixture of better business-wide department of computing
a person’s ability to complete communication policies linked to science at the University of
other tasks. On the other hand, a better software. However, in the Glasgow. She has a strong
software engineering background and has
business-wide email policy could meantime, how can the individ- an interest in making technology usable
state that employees need not ual users take ownership of the and useful to end-users. She is particularly
monitor their email all day but problem, since they are the ones interested in the use of email within organi-
zations and the effects of ubiquitous con-
policy makers are likely to find who are primarily affected? The
nectivity on individual employees.
that email is so enticing that this first step is for users to acknowl-
kind of policy is not adhered to, edge that communication tech- Dr. Judith Ramsay is a lec-
turer in the division of psy-
and might well prove counter- nologies are not only a great
chology at the University of
productive if enforced. So, for and good thing but can also be the West of Scotland. She
example, the implementation of a tyrant, and to understand that is a chartered psychologist
email-free Fridays by companies this can not only interfere with specializing in the psychol-
ogy of human-computer interaction. At
such as Intel may simply result their ability to do their jobs, home in interdisciplinary teams, her
in most of Monday being spent but also exacerbate their stress research is driven by the need to under-
i n t e r a c t i o n s   N o v e m b e r + D e c e m b e r 2 0 0 8

catching up. Part of the problem levels, increase their blood pres- stand individual differences in Internet-
based communication.
stems from the fact that email sure, and cause them to be more
is still an evolving communi- tired and irritable than neces- Mario Hair is a statistics
cation technology. Unlike the sary. In the case of email, users lecturer at the University of
West of Scotland and is
well-established norms related to should stand up (metaphorically)
also an active researcher
dealing with letters, memos, and and admit “my name is Jo and and consultant within the
phone calls, we are still in the I’m an email addict.” Once they Statistics Consultancy Unit
infancy of developing email eti- have acknowledged this, they based at the university. He is a fellow of the
Royal Statistical Society. His research inter-
quette. This leads to people hav- need to implement a personal ests include the use of mediated communi-
ing their own idiosyncratic email email management policy. cation technologies and the psychology of
behaviors. Some people archive Communication technologies survey response.
every email, others delete reli- can work either for or against
giously, still others let their inbox you—helping you to be more
DOI: 10.1145/1409040.1409057
fill to overflowing. Some reply productive or fragmenting your © 2008 ACM 1072-5220/08/1100 $5.00

68
Business 1402 Introduction to Business Information and Communication Technologies 

Winter 2009 

Assignment 1: Marking Scheme 

In assignment 1 you are required to read Renault et al.’s article and then answer the following questions (in a 
Word Document) within the context of the framework on Problem‐solving discussed in class (total 50 points): 

1. [25  points]  IDENTIFY  THE  PROBLEM:  According  to  you,  what  is  the  problem  described  in  this  article. 
Clearly in one paragraph [100 words maximum] state the problem as you understand it. 
□ LIMITED: up to 10 points – The problem statement is poorly written. [and/or] It is difficult to see how 
the statement you provided is related to the reading material. 
□ ADEQUATE: up to 14 points – The problem statement is written correctly. [and/or] There seems to be 
a disconnection between the statement written and the reading material. 
□ STRONG: up to 19 points – The problem statement is written correctly. [And] It is well connected to 
the reading material. 
□ EXCELLENT: up to 25 points – The problem statement is written correctly. [And]  It is well connected 
to the reading material. [As well as] It is well thought and it can be used a model for other assignments. 
2. [22  points]  Please  write  [150  words  maximum]  in  one  or  two  paragraphs  indicating  if  you  AGREE  (OR 
DISAGREE)  with  Renault  et  al.’s  arguments  AND  WHY.  You  can  make  an  argument  indicating  partial 
agreement to some of their points as well. 
□ LIMITED: up to 7 points – The problem statement is poorly written. [and/or] It is difficult to see how 
the statement you provided is related to the reading material. 
□ ADEQUATE: up to 11 points – The problem statement is written correctly. [and/or] There seems to be 
a disconnection between the statement written and the reading material. 
□ STRONG: up to 16 points – The problem statement is written correctly. [And] It is well connected to 
the reading material. 
□ EXCELLENT: up to 22 points – The problem statement is written correctly. [And]  It is well connected 
to the reading material. [As well as] It is well thought and it can be used a model for other assignments. 
3. [3  points] CREATIVELY identify alternative ways to solve the problem and write one paragraph for each 
one of THREE POSSIBLE ALTERNATIVE SOLUTIONS [50 words maximum per solution]. 
□ One point for each alternative, maximum three alternatives. 

Integrity 

Each assignment’s answer must be your own work. That is, except for properly cited quotations, every sentence 
and phrase must be in your own words. All interpretations, except for those properly cited, also must be your 
own. If you turn in someone else’s work, use a source’s exact words without placing these words in quotation 
marks,  or  use  an  interpretation  you  found  in  a  source  without  giving  credit  to  the  source,  you  are  guilty  of 
plagiarism and may fail this assignment. 

Vous aimerez peut-être aussi