IA3
Required Data
User must be able to query a database
QLD police data will be used
Crime rates CSV downloaded from QLD open datasets website
User Features
Select a search query for the database
Data is returned in a table format
Users are able to select a graph option to represent the data
Only one screen required for data
Target Audience
People of all ages
The application would not be made for children but students and adults may use the app
The application is not affliliated with a government body or organisation
Needs to cater to different levels of technological proficiency
Must cater to the different uses for the data by users
Usability Principles
Safety
Learnability
Accessibility
Effectiveness
Usefulness
Does the application achieve it's purpose?
No sensitive or personal data is entered by the user
How quickly can users learn to find information, complete tasks and navigate the digital solution
Intuitive because the user can immediately grasp how to interact with it
Meets the accessiblity guidlines listed by the client
Outputs must be presented in a way that is easily interpreted by the user
User should be able to interact with the digital solution quickly and easily
Allows users to complete their interactions accurately and efficiently without requiring a detailed understanding of the complexities of the underlying program
Window
include buttons to initiate events
use appropriate font type, size and colours
have a heading and sub-heading (where appropriate)
have an appropriate logo and window title
use the grid manager to layout elements
be an appropriate size and not be resizable
include images (where appropriate)
include the use of a wide variety of widgets as appropriate for the application
Accessibility guidlines
Accessibility options include: General instructions for user input at the top of the window or section to which they relate, appropriate contrast between text and background (colour contrast)
Error messages (or validation message): Are clear and specific, do not cause the window to be completely reset
Elements: Input that is mandatory are clearly indicated, with required formats, such as dates (day, month, year) are clearly indicated
Window titles: must appear at the top of each window, be appropriate for the window and be different for each window
Window headings: Are on each window, levels on each page have a meaningful hierarchy
Non-mouse navigation (keystrokes or tabs): Are available for entry, radio buttons, checkboxes, buttons etc. and allow sequential access to window elements (mentioned above)
Screens
Only one screen needed after log in
Main screen to enter and display the queries
Log in needed for the application to verify users are subscribers of the Daily Trumpeter newspaper
Assets
QLD open data sets
Logo
Related images
Cannot utilitse QLD police imagery (non-affiliate)
Made initially for the reporters of the Daily Trumpeter
Log in required to verify users are subscibers of the Daily Trumpeter Newspaper
Research and Investigation
Data formats
Different data formats must be explored in order to determine which is the most suitable for the task
Data exchange protocols
Various data exchange protocols will be researched, to gain a further understanding of how data would be transmitted
Data set analysis
Data safety protocols
The dataset used for the task must be analysed to ensure full understanding of the requirements of the task and how the data structures would impact the development
Safety factors need to be explored so that the task needs can be met in a way that stores and utilises a user's data in an appropriate manner, minimising risk
Visual communication
In order to meet the needs of the task in the best way possible, visual communication and design principles must be investigated so that the solution is accessible and easy to use
Australian Privacy Principles
The Australian Privacy Principles (APPs) will be explored to ensure that the application development will incorporate safe data practises, to protect users' personal and sensitive information
Encryption techniques
Encryption techniques should be investigated to further understand how to safely store and transfer any personal or sensitive information