<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Measuring Computer Literacy without Questionnaires</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roeland H.P. Kegel</string-name>
          <email>r.h.p.kegel@utwente.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roel J. Wieringa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Twente</institution>
          ,
          <addr-line>Enschede</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>61</fpage>
      <lpage>65</lpage>
      <abstract>
        <p>Behavior Change Support Systems (BCSS) benefit from understanding the user: a user profile can help select the right way to formulate an argument, selecting the right tone, format and content. Part of such a profile is an adequate representation of the computer literacy of a user. Unfortunately, computer literacy is commonly measured by asking the user to fill in a questionnaire. This an obstacle to the adoption of a BCSS, and as such is not a good way to build a model of a user's computer literacy. In this paper we describe the setup of a series of experiments intended to identify indicators that can be measured automatically and that correlate well with a relevant concept of computer literacy.</p>
      </abstract>
      <kwd-group>
        <kwd>Persuasive Technology</kwd>
        <kwd>Computer Literacy</kwd>
        <kwd>Behavior Change Support Systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The concept of using the computer as a means to persuade users originated from the
90s, with Captology, or Computers as Persuasive Technologies coined as a term in a
special interest group meeting in CHI '97 [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Since then, both computer technologies
and applications have evolved to the point where computers play an ever greater role
in our lives. Many elements that contribute to the persuasiveness of a system have
been examined and identified: Oinas-Kukkonen and Harjumaa have presented an
overview of specific methods by which a persuasive systems may be designed [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
containing both a way to analyse the context of a persuasive system, as well as
techniques to use when implementing it.
      </p>
      <p>
        A persuasive system with the intent to change attitudes or behaviour conveys
messages designed to influence the user in some way. Whether the intent is to change an
attitude, behaviour, or just to garner short-term compliance, these messages use
persuasive techniques designed to influence users, explicitly or implicitly, to affect a
change in their view or behaviour. To do so, it is important to understand the user:
certain persuasive techniques can backfire when applied to the wrong person (for
example, using Cialdini's Authority principle [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] may cause an adverse reaction if the
person is not well-disposed towards accepting advice from authority figures). To
understand a user, systems can use persuasive profiles, using past observations about the
user to adapt the means they use when communicating. Kaptein has called such
systems Adaptive-means Persuasive Systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Beyond online shopping preferences,
however, Kaptein does not give an implementation in this paper.
1.1
      </p>
      <sec id="sec-1-1">
        <title>Goal</title>
        <p>We propose a system for measuring theoretical construct of computer literacy in an
automated fashion, based on published definitions of these measurements in existing
literature. Computer literacy influences a user’s perception of technology, as well as
the user’s comprehension of any computer related message. This can influence the
persuasiveness of a system: communicating on the wrong technical level, or with the
wrong medium (such as written text, or a virtual agent) can cause an adverse reaction.
In the context of the Personal Information Security Assistant (PISA) project, we aim
to implement a system to measure computer literacy, with the goal of using these
measurements to tailor interactions with the user, which should improve the
persuasive power of the system. In this workshop paper, we restrict ourselves to the
description of experiments to correlate automated measurements of Computer Literacy to
more traditional measurement by questionnaire. These experiments aim to answer the
following research questions:
• RQ1: How can we translate mental constructs to automated measurements based
on user observation?
• RQ2: How can we compare such automated measurements to existing
measurement methods?
Answering these research question allows us to answer the following research
question as a part of future work:
• RQ3: Can we use these measured mental constructs to construct a persuasive
profile, improving the persuasive power of a system?
1.2</p>
      </sec>
      <sec id="sec-1-2">
        <title>Defining Computer Literacy</title>
        <p>
          A comprehensive overview of literacies including a discussion about computer
literacy has been published by Bawden [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. In order to update this overview, we first
performed a thorough literature study, examining the exact nature of computer literacy as
it occurs within existing literature [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. This study includes a more detailed look at how
computer literacy is measured in practice, as well as how it is defined in theory. For
this study, 189 documents using computer literacy or related concepts were consulted
and a list of 371 concepts related to computer literacy was created based on these
documents. After several refinement steps, these concepts were organised in a tree
diagram denoting the functional decomposition of computer literacy into measurable
elements. This diagram was constructed by performing a manual categorization of
concepts and subsequently validated by subjecting it to an inter-rater agreement
process between three researchers. While this diagram is too large to show in this
document, it is available upon request from the authors.
        </p>
        <p>
          Computer literacy contains several dimensions within literature. Throughout our
literature review, we find the five most important dimensions of computer literacy to
be the following, based on their frequency of occurrence within literature:
• Skills: The skills associated with computers. This includes basic computer
operation skills such as knowing how to use a keyboard and mouse, but can also contain
more advanced concepts such as programming skills.
• Knowledge: Knowledge of the characteristics, capabilities and context of the
computer. This includes general computer terminology and software concepts, but
also the social and ethical context in with computers reside.
• Attitude: The collection of Cognitive, Behavioural and Affective attitudes that a
person can have towards computers. This includes well covered concepts such as
computer anxiety, but also computer interest and beliefs about computers.
• Experience: The measure of time and frequency a person uses a computer. It is
assumed that time spent using the computer leads to associated knowledge and
skills.
• Information: Argued by some to be "distinct but interrelated" [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] with computer
literacy, information literacy (the skill in sourcing, processing and communicating
information) is frequently measured alongside computer literacy. Most, if not all
applications of computers involve the manipulation of information and so it is
included as a dimension of computer literacy.
        </p>
        <p>There are no elements common to all definitions and/or measurements of computer
literacy that we reviewed. However, the Computer Skills and Computer Knowledge
dimensions are present in most of the consulted documents, and we regard these as
the central elements of computer literacy.
2</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Measuring Computer Literacy</title>
      <p>The PISA is personal assistant designed as a BCSS for Privacy and Security, aiming
to change behaviours and attitudes relating to personal information management and
personal security. In this context, measuring Computer Literacy serves a dual
purpose: it a) allows for communication with the user on a technically appropriate level,
and b) helps in the assessment of the risks a user is subject to such as phishing and
viruses. We have implemented a system that can collect measurements related to
computer literacy described in section 1.2. These measurements include elements
such as browsing behaviour, typing speed and installation activity. Our goal is now to
investigate if systematic relations exist between these measurements on the one hand,
and CL as measured by a questionnaire, on the other. To the extent that these relations
exist, we can replace the measurement of computer literacy by questionnaire with the
measurement of computer literacy by our software.</p>
      <p>Of the five dimensions of computer literacy listed in section 1.2, elements of the
Computer Skills, Experience and Information dimensions are measured by our
system. It is unsurprising that Skills, Experience and Information lend themselves to
automated observation, as these dimensions come the closest to observable actions.
Computer Knowledge and Computer Attitude, on the on the other hand, are theoretical
constructs within the mind of the user rather than actions observable by the computer,
and we expect these to correlate less well with our automated measurements.</p>
      <p>
        Figure 1 shows a fragment of the larger diagram which describes how computer
literacy is measured. This fragment contains all of the elements of computer literacy
that our system can collect. This diagram uses the same functional decomposition
approach to describe how the concepts are related. The colours indicate whether the
concept is a Theoretical Construct (shades of grey), or a Variable containing an
operationalized measurement. The numbers next to the diagram indicate how often the
concept occurs within the 189 documents investigated over the course of the
preceding literature review [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>The experiment detailed below aims to investigate how well such a subset of
related concepts measures computer literacy compared to the existing practice of using
questionnaires.</p>
      <p>Computer
Literacy
74</p>
      <p>Internet
Surfing Skill</p>
      <p>Search
Engines</p>
      <p>Internet
Activity Type
41
8
5
Availability
of IT facilities</p>
      <p>6
26
12
7
4</p>
      <p>Gaming
Frequency
Keyboard</p>
      <p>Skills
Privacy
Skills
4
7
4</p>
      <p>Availability of
Computers</p>
      <p>9
Computer 12
at Home</p>
      <p>CaotmWpourtker 5
16
36
Computer
Experience</p>
      <p>Computer Use</p>
      <p>Frequency
Internet Surfing</p>
      <p>Frequency
17
9
Computer</p>
      <p>Skills</p>
      <p>Application
Specific Skills
Basic Computer
Operation Skills
Digital Security</p>
      <p>Skills</p>
      <p>Computer</p>
      <p>Maintenance Skills
To validate the system, a two week test is planned. Before this time, subjects will
install the experimental system on the computers that they use for their daily work
and private life, capturing information about the elements shown in Figure 1. Internet
browsing information is captured using browser plugins that cooperate with the
experimental system. The system itself measures typing speed, active and focused
applications and installed software. All gathered data will be anonymized and sent to a
central server using a pre-generated pseudonym as identifier. Alongside this, a
questionnaire will be handed to the subjects that will incorporate questions taken from
existing, validated computer literacy questionnaires. This questionnaire will contain
questions clustered along the same dimensions as were found in existing literature, with
additional questions for the dimensions that are measured through the experimental
system. This questionnaire will be validated in a separate experiment. The
questionnaires are sent and stored using the same pseudonym, linking the experimental system
and the questionnaire for comparison purposes while preserving anonymity.</p>
      <p>The data gathered by the experimental systems will then be compared to the data
gathered by the questionnaires distributed at the start of the experiment. We are
currently planning to then perform a cluster analysis along the dimensions of computer
literacy. Since this comparison is a non-trivial task however, the details of this
analysis are currently still under consideration and beyond the scope of this article.</p>
      <p>Should this approach prove effective, we speculate that a similar literature analysis
could then be performed to measure other theoretical concepts. This would allow for
the usage of cognitive models in persuasive profiles in a novel, real-time manner,
improving the detail of persuasion profiles and, by extension, the persuasive power of
a system.</p>
      <sec id="sec-2-1">
        <title>Acknowledgments</title>
        <p>The PISA project is sponsored by NWO and KPN under contract 628.001.001.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bawden</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Information and digital literacies: a review of concepts</article-title>
          .
          <source>Journal of documentation</source>
          ,
          <volume>57</volume>
          (
          <issue>2</issue>
          ),
          <fpage>218</fpage>
          -
          <lpage>259</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cialdini</surname>
          </string-name>
          , R.B.:
          <article-title>Influence: the psychology of persuasion</article-title>
          .
          <source>HarperCollins</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Fogg</surname>
            ,
            <given-names>B.J.: Persuasive</given-names>
          </string-name>
          <string-name>
            <surname>Technologies</surname>
          </string-name>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>42</volume>
          (
          <issue>5</issue>
          ),
          <volume>27</volume>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kaptein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eckles</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Selecting effective means to any end: Futures and ethics of persuasion profiling</article-title>
          . In: Ploug,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Hasle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Oinas-Kukkonen</surname>
          </string-name>
          , H. (eds.)
          <article-title>Persuasive technology</article-title>
          ,
          <source>LNCS</source>
          , vol
          <volume>6137</volume>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>93</lpage>
          . Springer, Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kegel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barth</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klaassen</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wieringa</surname>
          </string-name>
          , R. J.:
          <article-title>Computer Literacy: an overview of definitions and measurements</article-title>
          . [In Progress]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lynch</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Information literacy and information technology literacy: new components in the curriculum for a digital culture</article-title>
          .
          <source>Committee on Information Technology Literacy</source>
          ,
          <volume>8</volume>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harjumaa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Persuasive systems design: Key issues, process model, and system features</article-title>
          .
          <source>Communications of the Association for Information Systems</source>
          ,
          <volume>24</volume>
          (
          <issue>1</issue>
          ),
          <fpage>485</fpage>
          -
          <lpage>500</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>