Appendix 4.5             Sample result sheet from reading protocol
 

The chart below contains the columns, in order:

  1. ID: Serial no. for this datasheet
  2. IDUser: ID no. for each individual volunteer (can be tracked to ‘demographics’ questions but not to e-mails).
  3. Title: The title chosen for this text (choice: 1,2,3)
  4. Comments: Summary of main idea
  5. Ease: Value given to the ‘ease of reading’ question (“The text presents its main points clearly.”) Choice: 1-6
  6. Progress: Value given to the ‘progression of ideas’ question (“The text progresses easily from one point to the next.”) Choice: 1-6
  7. Improve: Value given to the ‘easy to improve’ question (“This text could be made easier to read.”) Choice: 1-6
  8. Visited: time and date of when the volunteer completed this page
  9. Time taken: length of time between submitting this and previous page

 

1

2

3

4

5

6

7

8

9

1

6

3

It is an introduction to much more detailed information, giveing a brief history of the topic as well as an idea of what will come.

3

2

2

20/12/2007 20:29:25

00:04:00

2

9

3

This is a introdution of a book about securities in electronic world

2

4

2

20/12/2007 21:41:01

00:07:16

3

13

3

Securites in the electronic world

3

4

2

20/12/2007 22:18:16

 

4

15

1

to introduce the concept of seurity measures and why they are necessary

3

2

1

21/12/2007 00:58:30

00:03:19

5

17

2

In short this chapter tells about the mechanism for the protection of data and other computer based resources and off course securing the network transactions. The whole of section 7.1 talks about the

2

2

2

21/12/2007 02:51:09

00:08:23

6

21

3

security of electronic data and the associated policies for its use

4

2

3

21/12/2007 11:04:16

00:02:41

7

22

2

That information and resources held electronically need to be security protected

2

2

2

21/12/2007 12:16:38

00:02:31

8

27

2

Describes the need for security of electronic data

2

2

1

21/12/2007 12:42:06

00:02:23

9

30

2

Highlights the need for systems security

2

2

3

21/12/2007 13:00:44

00:02:31

10

29

1

Security for computers users

2

2

3

21/12/2007 13:01:37

00:06:03

11

31

3

He makes the introduction about data security and distinguishes security policy from security mechansms.

2

2

4

21/12/2007 13:11:40

00:09:46

12

37

2

To introduce the idea that secrity for computers is  necessary in today's world where we want to share data with more people, and that Security policies and Mechanisims can help in this area.

2

2

3

21/12/2007 13:50:13

00:09:45

13

39

3

To highlight the importance of computer security

3

5

1

21/12/2007 14:07:20

00:02:27

14

50

3

Various/different levels and types of security involved in allowing sharing of data safely.

2

3

4

21/12/2007 18:28:38

00:02:35

15

51

2

informative nature

2

3

2

21/12/2007 18:30:16

00:01:36

16

52

3

The security of data within computer systems and networks, and the importance of appropriate measures to ensure this security.

5

5

1

21/12/2007 18:51:30

00:03:39

17

56

3

security  measures through the years.

3

2

2

21/12/2007 21:23:51

00:03:31

18

60

3

Explaining security systems for computers.

2

3

1

21/12/2007 23:29:25

00:01:56

19

67

3

To discuss security measures in computer systems and introduce the rest of the text

4

3

2

22/12/2007 15:21:18

00:03:04

20

68

3

SEcurity measures for computer information systems

2

3

2

22/12/2007 15:49:09

 

21

69

3

The increasing distinction between security policies and security mechanisms, enhanced by the somewhat new electronic environment

2

2

3

22/12/2007 16:22:35

00:04:50

22

79

3

Giving an overview of security measures in the IT domain.

3

3

1

23/12/2007 19:46:56

00:03:36

23

85

3

To introduce security in computing, why it is neded and what types

2

4

2

24/12/2007 20:09:23

00:01:25

24

89

3

To outline the security risks of information sharing on computers.

1

2

5

26/12/2007 15:48:03

00:03:39

25

93

1

It is about "security mechanisms" for electronic information

3

3

2

26/12/2007 23:42:35

00:04:03

26

116

3

Computer Security and information protection

2

2

2

29/12/2007 19:07:25

00:02:33

27

119

3

discussing the importance of security measures in computer system. and the difference between the security programs and security protocols

2

2

3

30/12/2007 04:38:43

00:03:07

28

144

3

An argument for computer security including descriptions of how, exaples of why and a history of how the need developed

3

2

3

01/01/2008 23:03:18

00:05:21

29

145

3

The evolution and refinement of security measures for computers, driven in part by advances in technology and accessibility.

3

3

3

02/01/2008 00:41:59

00:04:35

30

146

3

To explain why security measures are needed in computer systems.

2

2

3

02/01/2008 01:28:51

00:01:54

31

147

3

Security for networks

3

3

2

02/01/2008 02:43:05

00:01:37

32

148

3

Security policies for computer systems

3

4

2

02/01/2008 09:13:44

00:04:16

33

152

3

To discuss and compare virtual and actual security policies and systems and examine how computer security has evolved

3

4

2

02/01/2008 13:37:23

00:03:10

34

162

3

Security systems for computers and how they have evolved.

5

5

1

02/01/2008 17:40:49

00:01:17

35

164

3

Security of computer systems

2

3

2

02/01/2008 20:12:00

00:02:01

36

168

3

The importance of having security measure in computer systems no matter what kind of system they are.

2

2

3

02/01/2008 22:18:59

00:03:29

37

172

2

security polices and mechanisms are especially necessary with the advent of wide-area, open distributed systems

2

3

2

03/01/2008 13:25:39

00:07:49

38

175

1

To introduce an article/report discussing computing security techniques.

2

2

3

03/01/2008 15:39:49

00:03:05

39

176

3

to outline the mechanisms ans policies used to provide security on computer systems

6

5

1

03/01/2008 16:17:21

00:05:11

40

184

3

Security measures for computer systems and how they have evolved with the change in usage.

2

3

2

03/01/2008 20:17:42

00:04:45

41

192

3

what is the purpose of security systems on computers and introducing further text on how they were and how they should be implemented nowadays

3

3

1

04/01/2008 20:15:11

00:04:17

42

193

3

Data Security

5

5

2

04/01/2008 20:31:02

00:02:51

43

201

1

The provision of mechanisms for the protection of data and other computer-based resources and for securing networked transactions

2

3

2

06/01/2008 14:33:52

00:08:37

44

205

3

security of computers under attack and the importance sharing information in modern world. Then the idea that security polices are the way forward at computer protection

4

4

2

07/01/2008 12:06:49

00:02:57

45

215

3

Protecting data held in computers

3

3

2

07/01/2008 20:23:12

00:01:21

46

217

3

To provide background information on security in the tchnological world and the reasons for security to be used as well as an example of when and why different security measures are used.

2

2

2

07/01/2008 23:50:39

00:04:46

47

247

3

Security policies and mechanisms for electronic systems.

2

2

4

14/01/2008 14:31:51

00:09:37

48

252

3

An introduction to both the increasing need for computer security, (making a distinction between security policies and mechanisms), and the discussion of  appropriate security mechanisms.

3

5

1

14/01/2008 14:49:01

00:07:20

49

253

3

Highlights the need to have clear security policies and the adequate security mechanisms to enforce these policies in today's shared information networks.

2

1

3

14/01/2008 14:52:15

00:05:19

50

259

3

concerns about security in computer systems

3

2

2

14/01/2008 15:15:16

00:08:39

51

263

3

security measures for computer systems

3

3

2

14/01/2008 16:33:14

00:01:50

52

275

2

It is a piece of text given an overview of security issues in computer systems and given some preview of the contents of a book or a chapter on the topic.

5

5

3

14/01/2008 20:11:11

00:02:56

53

277

3

To introduce some ideas of computer security with reference to real-life security examples

2

2

3

14/01/2008 21:03:05

00:02:39

54

306

1

difference between security mechanisms and policies

3

2

3

15/01/2008 13:51:50

00:04:18

55

312

3

to explain the need for security in computer systems and how the measures work

2

5

1

15/01/2008 15:47:50

00:06:02

56

319

3

To show the type of security threats there are, the history behind the development of security programmes.

2

2

1

15/01/2008 17:52:11

 

57

320

3

Discussing security measures for computers.

2

2

2

15/01/2008 19:00:02

00:02:41

58

333

3

The increased need for security of computer based data

4

4

2

16/01/2008 13:14:51

00:05:24

59

334

1

It explains the need for security in computer systems and how implementing a mechanism is not necessaarily secure unless there is a clear policy regarding its use.

5

5

2

16/01/2008 14:05:56

00:02:59

60

338

3

Looking at the development and need for security measures on computers.

5

3

1

16/01/2008 20:48:48

00:01:14

61

352

3

description of need for and possible limitations of computer security system

6

6

1

17/01/2008 20:58:10

00:07:56

62

353

1

Security

2

2

4

18/01/2008 02:05:19

00:01:50

63

356

3

It is argueing about the different approach of internet security as compared to physical security.

2

2

2

18/01/2008 16:13:45

00:03:20

Average

 

2.62

 

2.81

2.97

2.19

 

04:08

Std. dev

 

0.71

 

1.13

1.16

0.91