Prairienet Banner

Recommendations/Plans for Implementation

Maximizing Technology Adoption

There are five key elements that must be addressed to encourage the adoption of new technology. We focused on these elements throughout the design and implementation of computer labs with our community partners.

  • Observability – For technology to be used, it must be observable. The four computers we installed in the Word Café are visible from the door after just entering the room.
  • Trialability – The computers have been configured with a range of software and bookmarked web sites, all available from the start menu or web browser. The immediate availability of these resources, and the decision not to password protect the main user account, combined with the central location of the computers, leads to their immediate accessibility and draws interested customers to the computers to play with the software.
  • Complexity – While there is no way to entirely do away with the complexity involved with computer technology, we approached this in a way to minimize the inherent difficulty. Most of the use these computers will receive is probably going to occur through the web browser. By configuring Firefox with custom user profiles specifically designed for this site (see below), we minimized much of the difficulty in navigating the Internet and finding information. We also provided many links to technical support documentation so that when problems do arise, there is a chance they can be dealt with directly on site from the computers.
  • Compatibility – We chose to equip the computers with Microsoft Windows XP Professional, as it is the operating system most users will be familiar with. We then installed a range of software and web links that are relevant to the needs of this community. Above all, we tried to build with the community in mind, seeking to understand and meet their needs and expectations regarding the technology.
  • Relative Advantage – We equipped these computers to be as powerful and efficient as possible within our means. This included configuring the software loaded when the computer boots into Windows and changing application defaults to make sure that as many resources as possible are directed toward fulfilling the requirements of the computer user. As a result, the computers will continue to provide good service for years to come.

 

Hardware Tests

After acquiring the donated computers, we ran a series of tests to ensure that the components were stable and reliable. This included an extensive burn-in period, tests on the memory and hard drive/storage, audio, optical drives, and USB ports. We also configured the computers with one gigabyte of RAM to improve the user experience.

 

User Accounts

We configured each machine with three user accounts: an administrator account for LIS 451 students to work on the computers, an administrator account for our community partners, and a standard user account for the site users. The two administrator accounts were password protected, while the user account was not, to permit ease of use.

The user account should be used as much as possible for the everyday use of the machines. It has important restrictions which help prevent the machine from getting cluttered up with unused software or catching viruses. When logged in to the user account, you can run existing programs, save files, and do most or all of what you’ll want to do in a normal computer session. The main things it prevents you from doing are installing new software and changing important system settings. By using this account, you ensure that the only major changes to the software will be ones that you intended to make.

 

Security

Viruses and malware are always a concern in a public computer lab environment, but we think we have taken good precautions that should prevent the vast majority of problems in these areas. As part of our configuration process, we set the operating system and software application defaults to be as secure as possible while still allowing the widest possible range of uses. This involved configuring the Windows Firewall, adding antivirus and anti-malware programs (please see Justification of Technology Choices for details), configuring and password protecting the BIOS, and configuring the web browsers for safe default operation.

The first line of defense is the user account system. Running the machines as “Word User” as much as possible will prevent a lot of potential problems from ever having a chance to happen. The next most important thing is keeping software updated (discussed below). Using Firefox as the primary web browser is the next step. Firefox is much less vulnerable than Internet Explorer by design, and we’ve also added some protection in the form of something called Adblock, which should take care of most advertisements and popups while you surf in Firefox. Finally, we’ve installed three varieties of antivirus or anti-malware software to take care of the remaining routes for infection with a virus or other malware.

 

Software Updates

We configured the operating system and all applicable software to automatically download and install software updates, to keep the computers up to date. This relieves the burden of administering individual software from the community partners as much as possible. Software updates mostly exist to fix the bugs and vulnerabilities that hackers exploit to make viruses and malware, and so the more up to date you are, the fewer weak spots you are going to have that are vulnerable to attack.

 

Firefox Profiles

Because the web browser is likely to be the primary platform on these machines, we devoted a lot of time and consideration to customizing the web browsing experience. To accomplish this, we created a custom Firefox profile with specialized privacy settings, over 40 bookmarks that should be relevant and helpful to the likely patrons of the lab (people with religious interests in line with the Word Cafe’s offerings, people who want to learn basic Windows computing skills)  and custom search engines with sources likely to be of use for those same audiences. We then copied that profile to each machine, so as to have a consistent and identical setup across the whole lab.

 

Privacy

With lots of different people using the machines, there are bound to be worries about people potentially entering personal information while surfing the web that the next person to use the computer could then see and take advantage of. We’ve taken precautions against this by setting the web browsers to not save any personal data, including browsing history, search history, passwords, form data, basically anything you might type while browsing the web. Once you close your browser window or log off of your account, everything you’ve just done disappears without a trace.

 

Custom Furniture

We built, primed, and painted three movable computer desks for the Word Cafe, as well as helped build the other nine desks for other sites during the time spent at Martin’s workshop. Those that were to be used at the local site (The New Free Will Baptist Church) were finished, while all desks going to East St. Louis were left dissassembled for easy transport downstate. In East St. Louis members of various teams assembled the desks at Pirtle’s, and then transported them to their respective sites.

The mobile desks should help provide an attractive and collaborative community environment, and also to maintain the flexibility of the space so it can be reconfigured for meetings and other activities.