What steps could you take to ensure the success of project

Assignment Help Computer Engineering
Reference no: EM131164437

PUBLIC SAFETY DEPENDS ON A GOOD USER INTERFACE

Police officers in San Jose, California, experienced a number of problems with a new mobile dispatch system that included a Windows-based touch-screen computer in every patrol car. Routine tasks were difficult to perform, and the essential call for assistance was considered needlessly complicated. The new system, costing $4.7 million, was an off-the shelf system purchased from Intergraph Corp. It replaced a 14-year-old text-based system that was custom developed. Initially, the system was unstable, periodically crashing a day or two after installation and down for the next several days. At the request of the San Jose police union, a user interface design consulting firm was brought in to evaluate the new system. A number of errors were discovered in the system, including inaccurate map information, screens cluttered with unnecessary information, difficult-to-read onscreen type, and difficult-to-perform basic tasks, such as license plate checks. In addition, the police officers themselves were not consulted about the design of the interface. Many users felt that the Windows desktop GUI with its complex hierarchical menu structure was not suitable for in-vehicle use. While driving, officers found that the repeated taps on the screen required to complete tasks were very distracting, and one officer crashed his vehicle into a parked car because of the distraction of working with the system. Further complicating the transition to the new system was the bare-bones training program. Just three hours of training were given on a desktop system, using track pads on the keyboards, not the 12-inch touch screen that would be found in the patrol cars. After the rocky start, the software vendor worked closely with the city of San Jose to fix bugs and smooth out work flows. It seems clear, however, that the rollout could have been much easier if the officers and dispatchers had been involved in planning the system in the first place.

QUESTION:

If you were involved in the acquisition of a new system for the police force in your community, what steps could you take to ensure the success of the project?

Reference no: EM131164437

Questions Cloud

Develop the nonfunctional requirements design for the system : Some contractors and companies prefer to remain anonymous until they meet face-to face. Develop the nonfunctional requirements and architecture design for the system.
Possible about the country : The first step is to learn as much as possible about the country where you plan to market the product. Check almanacs, encyclopedias, the Internet, and library databases for the most recent information, paying particular attention to descriptions ..
How may each of these types of torts relate to business : Please define 1 intentional tort 2 negligence and 3 strick liability. Please give an example of each. What are the biggest differences between these torts? How may each of these types of torts relate to business? Which one do you think is the most..
What trade-offs were involved in the decision : Why do you think the team chose to use a language prototype rather than a storyboard or HTML prototype? What trade-offs were involved in the decision?
What steps could you take to ensure the success of project : If you were involved in the acquisition of a new system for the police force in your community, what steps could you take to ensure the success of the project?
Compare and contrast remedies at law and equitable remedies : Compare and contrast remedies at law and equitable remedies. Give a definition for each. Give examples for each. Can you request and receive both in the same case? Around 400 words
What concerns could the problem raise : I helped a university department develop a small decision support system to analyze and rank students who applied to a specialized program. What concerns could this problem raise about the rest of the system?
Determine whether the liquidated damages clause is valid : Gump refuses to perform any work until the problem issolved. In this situation, can Alabama Sports Marketing seek specific performance of the contract? If yes, why? If no, whynot?2. How would the court determine whether the liquidated damages clau..
God purpose or design : In Module/Week 6, you will post written responses to at least 2 students' threads from Module/Week 5. Responses should include a new topic that was not discussed in the thread, including the page number of the concept, its benefit(s) to the organi..

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is new deployment technology for the .net 2005

what is new deployment technology for the .NET 2005

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  Malware paper - how effective it is at evading detection

Malware Paper, Note three kinds of malware that are active threats today. Note the following for each type: How common it is, A brief explanation of how it works and How effective it is at evading detection

  Classify enterprise wide system in hospitals today

Classify enterprise wide system in hospitals today. Classify all external system that interface with the facility or organization.

  Write a reflection report about the role of cryptography

Write a reflection report in 100 words about the role of cryptography in securing communication of confidential documents.

  What is missing, incomplete, inaccurate

Email clients have to enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic would not expose any data to network eavesdropping techniques.

  How many function of three variable are there of n variables

There exist four Boolean functions of a single variable and 16 functions of two vari- ables. How many functions of three variables are there? Of n variables?

  Analze the letter grade the student has earned

suppose the full score for each assignment is 100. Student will get 0 for each unsubmitted assignment.

  Who are the victims of the cybercrimes

Who are the victims of the cybercrimes that are your examples? What sorts of problems do the acts described create for the victims

  Why using uml graphical notation

Using UML graphical notation, develop the design for the following system to explain the object classes and show the interaction of the data collection sub-systems (sequence diagrams).

  Fom an accountants viewpoint separation of duties is

from an accountants perspective separation of duties is self-explanatory. how do small companies that have minimal

  Altering the dijkstra’s algorithm

Alter Dijkstra’s algorithm in order to compute the shortest paths from the source vertex s in O(W·|V|+|E|) time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd