Tuesday, 15 November 2016

Response to Information Privacy


What does the EU's "right to be forgotten" ruling require and not require?

The decision handed down by the ECJ in a dispute between a Spanish man, who was suing a Spanish newspaper (to be precise, its website), and Google Spain has sent shockwaves through the internet industry. In effect, the judges have reiterated that in Europe there is a "right to be forgotten" - which applies specifically to search engines but not to news websites (or other journalistic endeavour) and that people can therefore ask to be removed from search indexes.

What arguments did the NPR panelists make in favor and against the idea of adopting similar legislation in the USA?




@Arguments against the idea

 There main point was brought by stating that the "right to be forgotten" is censorship. That ability, that right to remember is one of the most fundamental rights of being a human being. By suppressing true information, not libel, not defamation, not hate speech. True information intrudes into our collective memory by trying to suppress thedocuments that constitute that memory. So, it talks about the regulation ofspeech and, really, the regulation of thought which is ultimately what memory is. So,the law is more like the right to force people to forget true information.The problem, though, is that people have the right to control what they remember. theyhave the right to control what they say. they do not have the right to control what othersremember. People do not have the right to control what others say. And so for that reason, wemust treat the "right to be forgotten" as it is, which is a form of censorship. So, as said,censorship in a free and democratic society needs to clear a very high bar to bejustified. The "right to be forgotten" does not meet that bar.         
  
      "First of all, it's way too prone to abuse. It is vague, it is subjective.


The better way to do it is that wecould have some kind of court mechanism adjudicate the "right to be forgotten" andcome up with a body of case law that would define the bounds of the right, flush it outand so forth.



@Arguments in favor

 One can control data about him and his profile. When you putin the name of an individual, Google gives you more than anything else, any othersource of information about this person, and the law made in EU requires that in the same way that people can ask data brokers, the bank, they can ask in school after acertain time for things to be deleted, they should be able to ask Google fordeletion. Now, the person in question who brought this case from Spain, he had notpaid some social contributions and therefore his house had been confiscated and it wasa legal obligation in Spain to have a publication in a newspaper of this fact in order tomake the auctioning of the house to cover the social contributions better and attractivefor the Spanish state, because if it's in the newspaper there will be more people biddingfor this house.So, the court said you cannot ask the newspaper to take down the information becausethey have a legal obligation to publish, but Google you can ask. And this is a principlewhich also applies when it comes to free speech and democracy. It may well be thatGoogle has to put things -- take things down, but it doesn't mean the informationdisappears. It will stay in the newspaper. It stays on the website of the newspaper ofthe BBC, of the television station, all this stays around, but Google is subject to the samelaw of self-control of information, of self-determination of individuals, which allowsthem to ask first what do you have about me and second, please delete.


 

Where do you stand? Should we have similar legislation in the US? What would be the benefits and what would be the drawbacks?


In a free country, you as an individual must have the right to control what others know aboutyou. You must be able to ask “What do you have?” and you must be able to ask fordeletion, of course within reason. You cannot ask a doctor to delete the medicalrecords, because the doctor must keep them either to show what he has done or shehas done in terms of liability. Of course you can't ask the press to delete a bad review ifyou are a concert pianist, or for that matter if you are someone who has donemalpractice or if you are a politician. There are limits to this, which are limits which areimportant in a democratic society, because that's what you will hear from the otherside, that this is an attack on democracy.I believe democracy needs both. We needs privacy. We need the ability of theindividual to decide himself or herself what the state in particular knows about them,because if you don't have the privacy, how can you organize dissent? How can youorganize a new political party, which maybe wants to, if already thegovernment always knows everything about you. So, we need privacy in a free society as we need free speech.





Tuesday, 8 November 2016

Response to Data Science

  • The application of machine learning to hiring and promoting employees promises to alleviate some of the biases created by current techniques that rely more on human intuition. What biases in the HR hiring and promotion process are the people analytics systems trying to eliminate, and how do they do itWhat new biases might these algorithms introduce?

  • There are many significant biases in the HR hiring and promotion process that the people analytics systems trying to eliminate. One of them being appearance,Tall men get hired and promoted more frequently than short men, and make more money. Beautiful women get preferential treatment, too. one of the best example being survey done by Duke’s Fuqua School of Business where they found that there was no relationship  between how competent a CEO looked and the financial performance of his or her company.

    "Now days hiring managers just don’t even want to interview anymore they just want to hire the people with the highest scores."

    Companies want great Aptitude, skills, personal history, psychological stability, discretion and loyalty which can not be tested with just looking at one’s resume but machine learning helps them to go through this and choose the best.And algorithms helps them to do so perhaps the most exotic development in people analytics today is the creation of algorithms to assess the potential of all workers, across all companies, all the time.

    Hiring managers  assess the way coders use language on social networks from LinkedIn to Twitter; companies have determined that certain phrases and words used in association with one another can distinguish expert programmers from less skilled ones. Over time, better job-matching technologies are likely to begin serving people directly, helping them see more clearly which jobs might suit them and which companies could use their skills, this will surely allow hiring companies as well as people finding jobs to connect and save time.

    The application of machine learning to hiring and promoting employees is certainly alleviating some of the biases created by current techniques that rely more on human intuition.

    “Consider knack”, a tiny start-up based in Silicon Valley came up with a great idea to hire people, they created games. These games aren’t just for play: they’ve been designed by a team of neuroscientists, psychologists, and data scientists to suss out human potential.
    Without ever seeing the ideas, without meeting or interviewing the people who’d proposed them, without knowing their title or background or academic pedigree, algorithm had identified the people whose ideas had panned out.
    It offers a way for the hiring managers to avoid wasting time on the 80 people out of 100—nearly all of whom look smart, well-trained, and plausible on paper—whose ideas just aren’t likely to work out and then they can devote much more careful attention to the 20 people out of 100 whose ideas have the most merit.
    In the late 1990s, as these assessments shifted from paper to digital formats and proliferated, data scientists started doing massive tests of what makes for a successful customer-support technician or salesperson. This has unquestionably improved the quality of the workers at many firms.

    Company called Xerox switched to an online evaluation that incorporates personality testing, cognitive-skill assessment, and multiple-choice questions about how the applicant would handle specific scenarios that he or she might encounter on the job. An algorithm behind the evaluation analyzes the responses, along with factual information gleaned from the candidate’s application, and spits out a color-coded rating: red (poor candidate), yellow (middling), or green (hire away). Those candidates who score best, I learned, tend to exhibit a creative but not overly inquisitive personality, and participate in at least one but not more than four social networks, among many other factors.When Xerox started using the score in its hiring decisions, the quality of its hires immediately improved. The rate of attrition fell by 20 percent in the initial pilot period, and over time, the number of promotions rose

    The potential power of this data-rich approach is obvious. What begins with an online screening test for entry-level workers ends with the transformation of nearly every aspect of hiring, performance assessment, and management. In theory, this approach enables companies to fast-track workers for promotion based on their statistical profiles; to assess managers more scientifically; even to match workers and supervisors who are likely to perform well together, based on the mix of their competencies and personalities.

    But there is even a different side to it, there are some new biases that these algorithms might introduce We are leaving the evaluation on specific algorithms that are already set and choose specifically. Don’t you think ‘data signature’ of natural leaders play a role in promotion. These are all live questions today, and they prompt heavy concerns: that we will cede one of the most subtle and human of skills, the evaluation of the gifts and promise of other people, to machines; that the models will get it wrong; that some people will never get a shot in the new workforce.


    • Considering that most of you will be interviewing for jobs soon, does this application of machine learning to human resources seem fair to you? What's your reaction?


    It is pretty true that over the past couple of generations, colleges and universities have become the gatekeepers to a prosperous life. A degree has become a signal of intelligence and conscientiousness, one that grows stronger the more selective the school and the higher a student’s GPA, that is easily understood by employers, and that, until the advent of people analytics, was probably unrivaled in its predictive powers. But this relationship is likely to loosen in the coming years and hiring using algorithms will take over future.  The use of machine learning to choose human resource is a definitely a good idea but, I think that sometimes it is also important for the hirer to understand one more than his brain, like one’s body language can tell a lot of things about one. So a mixture of both algorithms and human intuition will work best.  

Thursday, 3 November 2016

Response to Information Architecture




  • According to Morville and Rosenfeld, what are the basic schemes one can use to organize information? As you describe each scheme, also describe what kind of information the scheme is best suited for.

What is an organization scheme? 
“Organization scheme defines the shared characteristics of content items and influences the logical grouping of those items.”
We navigate through organization schemes every day. Telephone books, supermarkets, and television programming guides all use organization schemes to facilitate access.

               1.    Exact Organization Schemes

The scheme is best suited for the users who know the specific name of the resource they are looking for. The schemes won’t  work very well if user is looking for a general type, for example electrician, plumber, etc. It will show you what you have saved with specific name and words.

1. Alphabetical

As the name suggests an alphabetical organization scheme uses alphabetical order to find something. This scheme is the primary organization scheme for encyclopedias and dictionaries.

2. Chronological 

Sometimes information has to be saved with reference to date and the event that had happened on a specific date. Usually History books, magazine archives, diaries, and television guides tend to be organized chronologically.

3. Geographical

Schemes that uses location to organize data like weather, shops located, and the most latest news around the world is organized Geographically. With the exception of border disputes, geographical organization schemes are fairly straightforward to design and use. 

                2.   Ambiguous Organization Schemes

Again, as the name suggests Ambiguous or “subjective” organization schemes divide information into categories that defy exact definition. Although they are difficult to design, they are mired in the ambiguity of language and organization, not to mention human subjectivity. Here the user can search the whole group without being specific. 

1. Topic


This scheme is the most common and useful scheme as it organizes information by subject or topic which makes it challenging approaches to develop. Academic courses and departments, newspapers, and the chapters of most nonfiction books are all organized along topical lines.

2. Task


Task-oriented schemes organize content and applications into a collection of processes, functions, or tasks. These schemes are appropriate when it’s possible to anticipate a limited number of high-priority tasks that users will want to perform.

3. Audience

In cases where there are two or more clearly definable audiences for a web site or intranet, an audience-specific organization scheme may make sense. This type of scheme works best when the site is frequented by repeat visitors who can bookmark their particular section of the site. It also works well if there is value in customizing the content for each audience.

4. Metaphor

It means creating similar options for similar tasks. Metaphors are commonly used to help users understand the new by relating it to the familiar. for example using trash can as the icon to delete files on computer.

5. Hybrids

The perfect combinations of all the schemes bring us to Hybrid scheme. The power of a pure organization scheme derives from its ability to suggest a simple mental model that users can quickly understand. One of the best example can be google search bar.


  • Why did Netflix develop their microgenre feature, and how did they categorize their movies? Why didn't they just let end-users tag movies like Flickr or YouTube allow?




Netflix possesses 76,897 unique ways to describe types of movies.
Netflix makes it wonderful program work by using large teams of people specially trained to watch movies. They are paid people to watch films and tag them with all kinds of metadata. This process is so sophisticated and precise that taggers receive a 36-page training document that teaches them how to rate movies on their sexually suggestive content, goriness, romance levels, and even narrative elements like plot conclusiveness.

They capture dozens of different movie attributes. They even rate the moral status of characters. When these tags are combined with millions of users viewing habits, they become Netflix's competitive advantage. These tags are then run down in a algorithm which helps Netflix to distribute movies in specific categories.  The company's main goal as a business is to gain and retain subscribers. And the genres that it displays to people are a key part of that strategy as it makes the interface user friendly and allows user to quickly select the best movie they could watch at that point of time, which definitely increases the numbers of views and users.
And now, they have a terrific advantage in their efforts to produce their own content: Netflix has created a database of American cinematic predilections.
“Yellin said that the genres were limited by three main factors: 1) they only want to display 50 characters for various UI reasons, which eliminates most long genres; 2) there had to be a "critical mass" of content that fit the description of the genre, at least in Netflix's extended DVD catalog; and 3) they only wanted genres that made syntactic sense.” This kind of categorization is actually very good and is based on hybrid organizational scheme.

They didn’t just let end-users tag movies like Flickr or YouTube allow because 
Netflix had decided to "go beyond the 5 stars," which is where the personalized genres come in and made this a whole new experience.

Thursday, 27 October 2016

Response to Security




What were the critical system design and operational flaws that allowed hackers to gain control over Mat Honan's accounts? What lessons should we learn from this about designing secure systems?


It is pretty clear that in the real world, public-key encryption is practically never used to encrypt actual messages. The reason is that it requires so much computation—even on computers, public-key is very slow. According to a widely cited estimate by Schneier, public-key crypto is about a thousand times slower than conventional cryptography. As a result, public-key cryptography is more often used as a solution to the key-management problem, rather than as direct cryptography. People employ public-key to distribute regular, symmetric keys, which are then used to encrypt and decrypt actual messages. In other words, Alice and Bob send each other their public keys.
To investigate further, we looked to existing software to find a program that was representative of the best current user interface design for security, an exemplar of general user interface design as applied to security software
 This, along with much of the detail from our evaluation results, supports our hypothesis that security-specific user interface design principles and techniques are needed
There are several reasons behind the perfectly done hack. The main reason why hackers were able to access all the accounts of Mr Mat Honan is because all his accounts were inter connected somehow. The accounts were daisy-chained together. Getting into Amazon let hackers get into Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had Mat Honana used two-factor authentication for his Google account, it’s possible that none of this would have happened. But the verifications were not active. The second reason is that because of poor security concern and precaution it made easy for hackers to enter in system and brust it.
The third and most important reason is that all the tech support from apple and amazon made the work of hackers easy and allowed them to enter even if the security questions were provided wrong and they just told about address and phone number, which enabled them access.
Over this all his data was backed up
"Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s "
One should setup strong security access and multiple entries should be required by the tech support.

Why do Whitten and Tygar think that end-user email encryption software is so difficult to use? What is their suggestion for a better design strategy?


It is pretty clear that in the real world, public-key encryption is practically never used to encrypt actual messages. The reason is that it requires so much computation—even on computers, public-key is very slow. According to a widely cited estimate by Schneier, public-key crypto is about a thousand times slower than conventional cryptography. As a result, public-key cryptography is more often used as a solution to the key-management problem, rather than as direct cryptography. People employ public-key to distribute regular, symmetric keys, which are then used to encrypt and decrypt actual messages. In other words, Alice and Bob send each other their public keys.
To investigate further, we looked to existing software to find a program that was representative of the best current user interface design for security, an exemplar of general user interface design as applied to security software
 This, along with much of the detail from our evaluation results, supports our hypothesis that security-specific user interface design principles and techniques are needed
There are several reasons behind the perfectly done hack. The main reason why hackers were able to access all the accounts of Mr Mat Honan is because all his accounts were inter connected somehow. The accounts were daisy-chained together. Getting into Amazon let hackers get into Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had Mat Honana used two-factor authentication for his Google account, it’s possible that none of this would have happened. But the verifications were not active. The second reason is that because of poor security concern and precaution it made easy for hackers to enter in system and brust it.
The third and most important reason is that all the tech support from apple and amazon made the work of hackers easy and allowed them to enter even if the security questions were provided wrong and they just told about address and phone number, which enabled them access.
Over this all his data was backed up
"Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s "
One should setup strong security access and multiple entries should be required by the tech support.

Tuesday, 25 October 2016

DRONE PLAYGROUND DESIGN

I have explained all my design using drawing and explaining it on white board, handwritten.
These are the photos.

before I start to explain my design, I was curious to know about the existence designs, one of the best one is DJI's South Korean Drone Playground.

But this needs some changes and advancement. So what do we need?




MY DESIGN IS AS FOLLOW.







Let's talk about stake holders,

Stake Holders 
A person, group or organization that has interest or concern in an organization.
Stakeholders can affect or be affected by the organization's actions, objectives and policies. Some examples of key stakeholders are creditors, directors, employees, government (and its agencies), owners (shareholders), suppliers, unions, and the community from which the business draws its resources.

Direct stakeholders are entities that have a visible role in the organization, regulation, operation and support of the bus service; or people, communities and entities that use the service or are impacted by it. 
Here they are : 
   
  • Children 
  • Professional drone drivers
  • people who wants to learn driving drone
  • Drone gammers 
Indirect stakeholders refer to all other individuals who are otherwise affected by the use of the system. Often the latter are ignored in the design process.
  • Drone making companies 
  • Staff working to repair 
  • Security agencies 

The best part of the assignment was to explain it using white board and designing the ground. I enjoyed doing the project and research associated with it.




Thursday, 13 October 2016

UX and Interaction Design

Norman's concept of doors: Pretty Interesting. 


  • How did Disney use Norman's concepts of affordances, signifiers, and feedback to help patrons understand how to use the Magic Band? Define each of those terms and provide specific examples of each from the MagicBand system.

Their MagicBands, tech-studded wristbands available to every visitor to the Magic Kingdom, feature a long-range radio that can transmit more than 40 feet in every direction. The hostess, on her modified iPhone, received a signal when the family was just a few paces away. MagicBands and triangulated their location using another receiver in the ceiling. The server—as in waitperson, not computer array—knew what they ordered before they even approached the restaurant and knew where they were sitting.

This term can be stated as a relationship between the object and the how it works with person using it. The presence of an affordance is jointly determined by the qualities of the object and the abilities of the agent that is interacting.
It should be clearly understood that it is not a property although it creates properties in a way to have better affordance for people using the object. An affordance is a relationship. Whether an affordance exists depends upon the properties of both the object and the agent.
The example from disney world can be that if you’re wearing your Disney MagicBand it shows that you’ve made a reservation, you can access the places with the band, you preordered food will come where ever you are sitting. This is a perfect example of affordance as it allows people of any age to wear a band and enjoy the services at disney. 
One need not to carry cash, as the MagicBand is already linked to the credit card. The users are already pre registered and don’t need to wait in long lines. This technology fits the relationship between the object and the how it works with person using it.

A well defined affordance help people figure out what actions are possible without
the need for labels or instructions. But if this task is not completed we use the different other means to make it more accessible and easy to understand, methods used to do so can be stated as “Signifiers”. Affordances determine what actions are
possible where as signifiers communicate where the action should take place.

Their MagicBands, tech-studded wristbands, is provided to every person visiting the Magic Kingdom. It  feature a long-range radio that can transmit more than 40 feet in every direction. The hostess gets notified when you pretty near to them and can note where you sit and what have you preordered. MagicBands and triangulated their location using another receiver in the ceiling. The service is a Signifiers as it can usually used by the costumer easily,  as a access card, credit card and of course a Disney visit band.

Feedback can be defined as communicating the results of an action. It must be immediate: even a delay of a tenth of a second can be disconcerting
The example can be stated from the disney as they have all access just taping the band which allows them to go on rides as well get food, pick parking. All with just a tap of band and instantly.



  • How did they use the MagicBand device to deliver a frictionless experience for their patrons?
The perfect balance of  affordances, signifiers, mappings, and feedback led the the MagicBand device to deliver a frictionless experience for their patrons. It allowed the cutovers to do every thing effortlessly and with ease. They not even realized that when patron came to know that they are coming and have already be seated and without any call got their food at the place they were sitting.

Though the team behind this sprawling platform eventually swelled to more than 1,000 people, the idea started years ago with a handful of insiders.
The Fab Five drew particular inspiration from the then-nascent wearables market
“The whole system gave Disney a way of understanding the business,” says Franklin  "

Tuesday, 11 October 2016

Just Enough Research by Erika Hall

Hall advocates the use of "design ethnography"—what is that, and how does one do it? What specific user research methods does she suggest?


It is a study to understand the mental model, activities, habits and social relation for a targeted group of people. The study enables us to know a particular cultural group who are observed going about their ordinary activities in their habitual environment. The information can be used differently, from making their life better by making a product to just gathering information. The study here specifically helps in designing as this helps us to know how people actually wants to interact?, what makes them feel more comfortable and easy to use? how they usually use it? what exactly is a common need that needs to be enhanced? and many other observations through ethnography. This is the most important part doing user research. 


Erika Hall states four D’s of design technology. She suggests these methods for more successful user research.

First one is Deep drive, here i would like to state a word from “Design thinking”, empathy.

Deep drive here means same as empathy, it suggests us to understand the situation of the targeted people. “ Walk in their shoes, live in their skins, see through their eyes.” This would not only allow a better user research but also allow an in depth knowledge about their lives and what they really expect.


Second one suggests to get into their daily life schedule and watch them when they enter creepy situations where it is difficult for a person to be normal and relaxed. This will give you a better understanding for the subject and the way their behaviors fluctuates with respect to the situations they fall in.

“The most interesting insights will come when you keep your eyes open and go of script.”

The third one is data analysis, this is a important step to work over. Once you are done with collection of data, sit down try to connect the dots and see how better have understood your subject. The analysis will surely take your understanding to new level. Take your time in analyzing each data.

This step takes the product down to real world and gives you a chance to test its abilities You should remember that you are designing the product for the targeted people not for yourself and only the targeted people can better tell you about the final product assuming that you are not one of the targeted person for the product. 



What is a "user persona" and why are they useful? What sort of danger might a user persona create, and how could you mitigate that danger?

A persona is a fictional user archetype, it is completely user centered and explains the a prototype of what user want. It is in other words is a imaginary model you develop after data analysis. This could be connected to the last method for enhancing design technology. Creating a user persona helps designer and developers to make their product in every aspect. It certainly helps creating a empathetic mind set rather a specific point of view from one person. 

The literal meaning of persona is “the aspect of someone's character that is presented to or perceived by others.”

The persona description should have just enough detail to showcase the perfect example of a target user and what important aspects designers should keep in mind. It should not be very lengthy with all the marks but should be as short as possible with all important difference that makes a difference on the product and some how helps the developer. The persona should  as small as possible, while representing all plausible behavior patterns.

"Design targets are not marketing targets" - Erika Hall

This statement clearly explains that people who may be highly valuable to your business may not be so valuable for your user persona and design.  
The persona should be created after relating this to many real targeted people, more the data has been collected better the persona will be.

It is important to understand that once you’ve created a set of personas, you can reuse them over time, even for different products and make most of the use out f them as data gathering takes a lot of time and work. 


I want to quote this sedately that a persona should be User Centered only.

Thursday, 6 October 2016

"Design Thinking" is much more than Art and Craft !

Coffee problem in INFO 200 Class


When people think of a "designer" they often imagine someone in a black turtleneck who makes already-designed products look more pretty. How does this differ from the portrayal of design thinking and user-centered design in the article by Tim Brown of IDEO and the shopping cart redesign video? Use one of the examples from the article or video to help explain how user-centered design is much more than making products look attractive.

An open mind, a boss who demands fresh ideas who clashes his own, a chaos which can be constructive and team work are the recipe for a great innovation.”

The article enables us to think about the “ Design thinking”  in a very clear cut way. It defines a “designer” not just as a person in a a black turtleneck making changes to a saturated designed product but, portrays a designer whose skills include that of psychologist, physicist, biologist, artisan and many more.
Design thinking is a discipline that uses the designer’s sensibility and
ideas to meet with people’s needs with what is technologically
feasible and is worth buying for the consumers, which may even create market opportunities.
According to Tim Brown, these are different characteristic which puts designers and thinkers into a different pack and makes them unique.

The first one is Empathy, this in my view is the mother of an idea for Design thinkers. By giving people preference and taking care of different perspectives, they can imagine what problems are need to be solved and what design fits best for a specific group of people. It allows a Design thinker to take into view the needs of some unrepresented people. “ Aravind eye care system ” is a brilliant example of how Design thinkers use empathy.

The second one is Integrative thinking. This allows a design thinker to take into account both the sides of an idea and put this into prospective using empathy. They not only rely on analytical processes and data analysis but also exhibit the ability to see all of the salient.

The most important one for a Design thinker is “Optimism”, being optimistic not only increases the chances of being successful in creating the idea into reality but also acts as a booster if the idea fails. This helps one find a better solution to an alternative we already have.

The forth and the last one according to Tim brown is collaboration, also know as team work.

“Pick good people, use a team and give them great tools and they are ready to bring change” - Bill Gates
 
Rather than making one person with all the skills of a psychologist, physicist, idealist make a team having each one of them with specialized knowledge. This will not only bring great designers together but will rather make the whole team as a “Design Thinker”

“ At IDEO we employ people who are engineers and marketers, anthropologists and industrial designers, architects and psychologists” - Tim Brown


The video explaining how Design thinkers work at IDEO makes it very clear that user-centered design is much more than making products look attractive. The way the team working on the shopping cart enhanced the ability of a cart from what it was before avows that Design thinkers not only bring art into a product but also increases its worth value and consumer value. This enables the consumers to be more comfortable and this directly effects the business market. This video clear shows the interconnection between designing, consumer satisfaction, change and business enrichment