Mobile Phone Usage by Low Literate Users

We describe a qualitative study conducted using Contextual Inquiry of 60 low-literate users in India. For the purpose of this study, we define low-literate as those users whose education is equal or more than Standard Four and less than or equal to Standard Eight in the Indian State education system. Our users were recruited primarily from the contractual house-keeping staff of a very large Private Organization and an Educational Institute (42 Male, 3 Female), household help (3 Female), drivers (5 Male), guards (1 Male), shopkeepers (1 Male, 1 Female) and homemakers (4 Female). Our objective was to develop an understanding of information security issues in the context of the mobile phone, identification of problems and design ideas for design of interventions. Our methodology included Contextual Inquiry and Analysis with notes pertaining to User Statements, Task Breakdowns, Observations and Design Ideas. The notes across the study were consolidated using Affinity Diagrams. We found that users have an elementary understanding of asset valuation and response. Literacy impedes adoption of an appropriate response to the threats using the mechanisms provided by the mobile phone since conceptual models are not clearly comprehended. It is also impeded because the users are unable to articulate a structured response to the landscape of threats. Due to the cognitive load induced by the possible factors which may get involved in risk articulation, users tend to adopt mitigation techniques propagated by the micro-networks without complete comprehension of risks or due analysis. Belief systems are more likely to drive a response than a more reasoned, well-aware response. Information or awareness is propagated via social mechanisms -- however, these are not necessarily correct most of the times, primarily due to the inappropriate conceptual models formulated. The interface and conceptual model complexity of a modern touch screen smartphone compounds matters. Mobile Learning aids or Gamification of concepts can help users adopt more appropriate response mechanism to perceived threats to privacy and security issues. Interfaces built with single sign-on, local language display and text input would also help in building more safe environments for users to use the mobile phone. While more-literate users are likely to mimic a 'plan-do-check-act' model low-literate are more likely to have a 'do' or a 'do' or a 'do-act' cycle due to non-awareness or non-comprehension of 'plan-check' components.

[1]  Anirudha N. Joshi,et al.  Supporting treatment of people living with HIV / AIDS in resource limited settings with IVRs , 2014, CHI.

[2]  Paul Dourish,et al.  How HCI interprets the probes , 2007, CHI.

[3]  Alan S. Brown,et al.  Generating and remembering passwords , 2004 .

[4]  Sebastian Möller,et al.  On the need for different security methods on mobile phones , 2011, Mobile HCI.

[5]  Randall Craig Reid,et al.  Using the Parkerian Hexad to introduce security in an information literacy class , 2010, InfoSecCD.

[6]  Joseph Bonneau,et al.  Linguistic Properties of Multi-word Passphrases , 2012, Financial Cryptography Workshops.

[7]  Antonella De Angeli,et al.  Introducing ATMs in India: a contextual inquiry , 2004, Interact. Comput..

[8]  Joyojeet Pal,et al.  Computing security in the developing world: a case for multidisciplinary research , 2011, NSDR '11.

[9]  Gabriel White FEATUREDesigning for the last billion , 2008, INTR.

[10]  Karen Renaud,et al.  Predicting technology acceptance and adoption by the elderly: a qualitative study , 2008, SAICSIT '08.

[11]  M. Six Silberman,et al.  When the implication is not to design (technology) , 2011, CHI.

[12]  Sead Muftic,et al.  Mobile ATM for developing countries , 2008, MobiArch '08.

[13]  Charmain Cilliers,et al.  Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology , 2008 .

[14]  BlomJan,et al.  Contextual and cultural challenges for user mobility research , 2005 .

[15]  Ming Yang,et al.  Learning mobile security with android security labware , 2013, SIGCSE '13.

[16]  Pascal Junod,et al.  Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables , 2008, TSEC.

[17]  Edward Cutrell Technology for emerging markets at MSR india , 2011, CSCW '11.

[18]  Kentaro Toyama,et al.  Intermediated technology use in developing communities , 2010, CHI.

[19]  R. Abraham Mobile Phones and Economic Development: Evidence from the Fishing Industry in India , 2006 .

[20]  Reuben Abraham,et al.  Mobile Phones and Economic Development: Evidence from the Fishing Industry in India , 2006, 2006 International Conference on Information and Communication Technologies and Development.

[21]  Kentaro Toyama Reflections on HCI for development , 2013, INTR.

[22]  Lorrie Faith Cranor,et al.  Human selection of mnemonic phrase-based passwords , 2006, SOUPS '06.

[23]  Jon A. Geater Security composition in the real world: squaring the circle of mobile security with contemporary device economics , 2013, SPSM '13.

[24]  Cormac Herley,et al.  A large-scale study of web password habits , 2007, WWW '07.

[25]  Jan Chipchase How do you manage your contacts if you can't read or write? , 2006, INTR.

[26]  Robert Schaefer,et al.  The epistemology of computer security , 2009, SOEN.

[27]  Melissa Densmore,et al.  Real mobiles: Kenyan and Zambian smallholder farmers' current attitudes towards mobile phones , 2015, ICTD.

[28]  Matthew Kam,et al.  An exploratory study of unsupervised mobile learning in rural India , 2010, CHI.

[29]  Soon Ae Chun,et al.  Smart SecureGov: mobile government security framework , 2014, DG.O.

[30]  Tapan S. Parikh,et al.  Understanding and designing for intermediated information tasks in India , 2006, IEEE Pervasive Computing.

[31]  Jacki O'Neill,et al.  The times they are a-changin': mobile payments in india , 2011, CHI.

[32]  Edward Cutrell,et al.  Usably secure, low-cost authentication for mobile banking , 2010, SOUPS.

[33]  Nikhil Welankar,et al.  Rangoli: a visual phonebook for low-literate users , 2008, Mobile HCI.

[34]  Anirudha Joshi,et al.  Keylekh: a keyboard for text entry in indic scripts , 2004, CHI EA '04.

[35]  Gunnar Harboe,et al.  Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap , 2015, CHI.

[36]  Adrian David Cheok,et al.  22nd International Conference on Human-Computer Interaction with Mobile Devices and Services , 2007, Lecture Notes in Computer Science.

[37]  Kentaro Toyama,et al.  Designing mobile interfaces for novice and low-literacy users , 2011, TCHI.

[38]  Ponnurangam Kumaraguru,et al.  The paper slip should be there!: perceptions of transaction receipts in branchless banking , 2013, MobileHCI '13.

[39]  Kentaro Toyama,et al.  Where there's a will there's a way: mobile media sharing in urban india , 2010, CHI.

[40]  Karen Holtzblatt Designing for the Mobile Device: Experiences, Challenges, and Methods , 2005 .

[41]  Nithya Sambasivan,et al.  Cutting Chai, Jugaad, and Here Pheri: towards UbiComp for a global community , 2011, Personal and Ubiquitous Computing.

[42]  Ali Ndiwalana,et al.  ICT usage and its impact on profitability of SMEs in 13 African Countries , 2006, 2006 International Conference on Information and Communication Technologies and Development.

[43]  Claire Heffernan,et al.  The livestock guru: The design and testing of a tool for knowledge transfer among the poor , 2007 .

[44]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[45]  Jeffrey Huang,et al.  Text is not the enemy: How illiterates' use their mobile phones , 2012 .

[46]  Gary Marsden,et al.  After access: challenges facing mobile-only internet users in the developing world , 2010, CHI.

[47]  Charles Steinfield,et al.  The mobile divide revisited: mobile phone use by smallholder farmers in Malawi , 2015, ICTD.

[48]  Janice Redish,et al.  User and task analysis for interface design , 1998 .

[49]  Jan Blom,et al.  Contextual and cultural challenges for user mobility research , 2005, CACM.

[50]  Kentaro Toyama,et al.  A comparison of mobile money-transfer UIs for non-literate and semi-literate users , 2009, CHI.