IA3

Required Data

User must be able to query a database

QLD police data will be used

Crime rates CSV downloaded from QLD open datasets website

User Features

Select a search query for the database

Data is returned in a table format

Users are able to select a graph option to represent the data

Only one screen required for data

Target Audience

People of all ages

The application would not be made for children but students and adults may use the app

The application is not affliliated with a government body or organisation

Needs to cater to different levels of technological proficiency

Must cater to the different uses for the data by users

Usability Principles

Safety

Learnability

Accessibility

Effectiveness

Usefulness

Does the application achieve it's purpose?

No sensitive or personal data is entered by the user

How quickly can users learn to find information, complete tasks and navigate the digital solution

Intuitive because the user can immediately grasp how to interact with it

Meets the accessiblity guidlines listed by the client

Outputs must be presented in a way that is easily interpreted by the user

User should be able to interact with the digital solution quickly and easily

Allows users to complete their interactions accurately and efficiently without requiring a detailed understanding of the complexities of the underlying program

Window

include buttons to initiate events

use appropriate font type, size and colours

have a heading and sub-heading (where appropriate)

have an appropriate logo and window title

use the grid manager to layout elements

be an appropriate size and not be resizable

include images (where appropriate)

include the use of a wide variety of widgets as appropriate for the application

Accessibility guidlines

Accessibility options include: General instructions for user input at the top of the window or section to which they relate, appropriate contrast between text and background (colour contrast)

Error messages (or validation message): Are clear and specific, do not cause the window to be completely reset

Elements: Input that is mandatory are clearly indicated, with required formats, such as dates (day, month, year) are clearly indicated

Window titles: must appear at the top of each window, be appropriate for the window and be different for each window

Window headings: Are on each window, levels on each page have a meaningful hierarchy

Non-mouse navigation (keystrokes or tabs): Are available for entry, radio buttons, checkboxes, buttons etc. and allow sequential access to window elements (mentioned above)

Screens

Only one screen needed after log in

Main screen to enter and display the queries

Log in needed for the application to verify users are subscribers of the Daily Trumpeter newspaper

Assets

QLD open data sets

Logo

Related images

Cannot utilitse QLD police imagery (non-affiliate)

Made initially for the reporters of the Daily Trumpeter

Log in required to verify users are subscibers of the Daily Trumpeter Newspaper

Research and Investigation

Data formats

Different data formats must be explored in order to determine which is the most suitable for the task

Data exchange protocols

Various data exchange protocols will be researched, to gain a further understanding of how data would be transmitted

Data set analysis

Data safety protocols

The dataset used for the task must be analysed to ensure full understanding of the requirements of the task and how the data structures would impact the development

Safety factors need to be explored so that the task needs can be met in a way that stores and utilises a user's data in an appropriate manner, minimising risk

Visual communication

In order to meet the needs of the task in the best way possible, visual communication and design principles must be investigated so that the solution is accessible and easy to use

Australian Privacy Principles

The Australian Privacy Principles (APPs) will be explored to ensure that the application development will incorporate safe data practises, to protect users' personal and sensitive information

Encryption techniques

Encryption techniques should be investigated to further understand how to safely store and transfer any personal or sensitive information