ETSI DEG 202 416 V 0.0.4 (2005-04-28) Early DRAFT ETSI Guide

Your comments and input is welcome - please e-mail them to the STF285 Leader, [email protected]

Human Factors; User Interfaces; Setup procedure design guidelines for mobile terminals and e-services

2 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Reference

Keywords

ETSI

650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88

Important notice

Individual copies of the present document can be downloaded from: http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp

If you find errors in the present document, please send your comment to one of the follwoing services: http://portal.etsi.org/chaircor/ETSI_support.asp

Copyright Notification

No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute yyyy. All rights reserved.

DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.

ETSI 3 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Contents

Intellectual Property Rights...... 5 Foreword...... 5 Introduction...... 5 1 Scope...... 8 2 References...... 8 3 Definitions, symbols and abbreviations...... 10 3.1 Definitions...... 10 3.2 Symbols...... 10 3.3 Abbreviations...... 10 4 Background and motivation...... 10 4.1 Why are setup procedures important in mobile environments?...... 10 4.2 What is a mobile setup activity?...... 11 4.3 Bridging the digital divide...... 11 4.4 Known problems and sources of this information...... 11 5 Previous work on setup procedures...... 12 5.1 Low-level setup activities...... 12 6 Non-exhaustive description of use cases and scenarios...... 13 6.1 Introduction to the use-case approach...... 13 6.1.1 Why employ use-cases?...... 13 6.1.2 What use cases do not describe...... 13 6.1.3 High-level versus low-level setup use cases...... 13 6.1.4 A template for defining use cases...... 14 6.2 From use cases to guidelines: the process...... 17 6.3 A framework to ensure use-case coverage...... 18 6.3.1 Usage, context and lifecycle...... 18 6.3.2 Positioning use cases within the framework...... 19 6.4 Use-Case Brainstorm...... 19 7 End user requirements...... 21 7.1 Generic users...... 21 7.2 Other users...... 21 8 Design guidelines for the setup of terminals...... 21 9 Design guidelines for the setup of e-services...... 21 10 Specific Design-for-all user interface guidelines for setup procedures...... 21 11 Concluding remarks and future work...... 21 Annex A (informative): List and detailed aalysis of use cases considered...... 21 A.1 Setup of voice-mail box...... 21 A.2 Settings of MMS services...... 22 Annex B (informative): Title of informative annex...... 22 B.1 First clause of the annex...... 22 B.1.1 First subdivided clause of the annex...... 22

ETSI 4 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Annex N (informative): Bibliography...... 23 Temporary reminder reference: What’s been done in EG 202 132...... 24 8 Configuration and guidance for terminal and service access, interworking, portability and error handling...... 24 8.1 General configuration procedures for service access...... 24 8.1.1 Generic configuration...... 24 8.1.2 Pre-configuration...... 27 8.1.3 Guided configuration...... 27 8.1.4 Manual configuration...... 29 8.2 Configuration procedures for access to specific services...... 29 8.3 Interworking and portability...... 30 8.4 Error handling guidance...... 31 History...... 33

ETSI 5 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document.

Foreword This ETSI Guide (EG) is being produced by ETSI Technical Committee Human Factors, Specialist Task Force 285, during March 2005- September 2006.

The ETSI Membership Voting Procedure is foreseen to take place during September-November 2006; the published version is anticipated for December 2006.

Intended users of the present document are user experience and interaction design professionals, developers of mobile terminals, services and applications, mobile network and system providers, terminal approvers and standard writers and developers.

Introduction Already today, information and communication technologies (ICT) play a key role in the daily activities of many people. The mobile telephone is a highly successful device that also corresponds to a deep human communication urge. New applications and services are increasingly used to perform necessary and entertaining tasks. With the technical development offering seamless and more continuous access to broadband networks, the vision of a world where ICT resources around us improve the quality of our lives is more realistic than ever.

Connectivity and interoperability between telecommunications networks, personal computing, the Internet and ever-smarter mobile devices and services offer enormous potential for improving life, if used as intended and used by all. However, there is concern about whether these new products, services and their content will be fully accessible to all people, including children, ageing and disabled users. An effective eSociety relies on the fact that all citizens are granted access. Users who cannot get over the hurdle of the first installation and set-up of their devices and configuration of services and integrated or additionally offered applications will be perpetually excluded from the eSociety. Ensuring access to mobile communication for all is a common goal of vendors, operators, service providers, user associations, as well as politicians, often talking about the creation of the e- inclusive information society.

In the past, the question of the “digital divide” defined the “haves” and “have-nots” mainly in economic terms, dividing those who can afford new technology from those who cannot. As technological progress in network and infrastructure deployment and manufacturing and economy-

ETSI 6 ETSI DEG 202 416 V 0.0.4 (2005-04-28) of-scale effects in household availability and service provision make access to services affordable to the largest proportion of the European society, a new facet of a possible “digital divide” becomes visible, namely the one that is related to the comprehension of how to use new devices and services. This latter aspect of the “digital divide” has direct economic and societal consequences as the uptake of mobile services will only be at a successful level if the new devices and services can actually be accessed, set up and used by the European citizens.

Most users of mobile communication solutions experience serious difficulties trying to access data services like e-mail, Internet or messaging (SMS, MMS, Voicemail) through their mobile devices. Users lack the expertise necessary to configure and set up their devices, services and applications appropriately. Furthermore, even the configuration of device properties to the desired behaviour is often beyond the users’ abilities. Many settings can be stored on the SIM card or the USIM of the mobile device, or in a future, managed by the communication system as user profiles. Even so, problems are abundant when new services are introduced, when moving from one network provider to another, when SIM or USIM cards reach a certain age and the stored information becomes outdated or when a user changes service provider. While many settings may be achieved through “Over-The-Air” (OTA) or “Over-The-Line” (OTL) configuration, there is still a problem of individualization and personalization and, moreover, the problem of inadvertent resetting of individual parameters through OTA or OTL procedures. Other open issues are the matters of privacy and security, e.g. if the service provider is able to control specific parameters and to which grade these should provide trusted and fully functional solutions for the end user.

It has to be recognized that many existing services (both broadband and narrowband) cannot be fully utilized by many users due to problems in either installing and configuring services on their devices or understanding the full potential of these services. These obstacles to a full use of broadband services are even more emphasized by a number of developments in society:  Changing population demographics: The number of elderly people and people with special needs is growing rapidly, requiring additional support and dedicated efforts for those unable to cope with every day’s technology.  Population mobility: As more and more people access services from mobile devices only offering limited user interface capabilities, it is required to optimize the user experience of terminals with focus on service access and use of the accessed services themselves.  Increasing user expectations: Users are getting used to plug-and-play systems with fully configured components. Similar, natural expectations are automatically projected to mobile e- services and must therefore be addressed.  Advanced services deployed with a social interest (e.g. Telecare services) without a certain level of pre-requisites these often advanced services build on (e.g. comfort of use, development of a trusted relation, basic skills and familiarity), such services will not be able to launch.  Access to services by all: In order to close the accessibility gap between technology-aware and conservative or less skilled user groups, it is necessary to offer access to services for everyone.  Increasing variability in the segmentation of customers: from children at the age of 6 or 7 years to senior users aged over 80, members of the entire community will develop specific reasons and request access to broadband e-services.

ETSI 7 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

 User’s inability and lack of interest to cover important (but in a normal, user-centred, functionality-oriented scenario, less relevant) aspects of their communication such as security aspects: according to recent reports (Gartner Group Conference 2004: IT Security Summit), more than two thirds of the successful hacker attacks on wireless clients are due to unsatisfactory configuration of access points and clients.  Human resource limitations: The complexity of mobile services exceeds the ability of many users while personal assistance and support cannot be easily afforded at an affordable cost. As the hurdle to using remote services is the highest for first-time users with limited pre-requisites, it is required that first access to services is simplified as far as possible and clear guidance on how to configure and use a service, as well as a description of features and limitations of specific services are made available.

Therefore, understandable set-up procedures and the availability of educational material become very important. Even with fully automated set-up procedures, user guides and quick reference guides will be necessary for day-to-day use, as fully self-explanatory user interfaces are far from becoming reality on today’s devices with their user interface restrictions and limitations. Furthermore, human memory is far from perfect - users will always have a tendency to forget already learned usage procedures or specific subsets of them (e.g. passwords or commands) over time.

The major goal of this document is to provide clear guidance on the design, implementation and provision of set-up procedures for devices and services such that those can be set up and used by the largest possible range of users, with a continuity of access and use. In particular, the present work shall help to define, specify and design configuration procedures for user groups with special requirements (including young, elderly and disabled users) to configure and use their devices and services at their potential, with maximum efficiency, as stipulated in the e- Inclusion Action 13 in the mid-term review (“guidelines …. To increase access to and widen use of e-Services”).

Furthermore, the work will “put priority on the use of the potential of new technologies to foster the economic and social integration of people with disabilities, promote e-Accessibility and (help to) avoid “info-exclusion”, as required by the eEurope mid-term reviews Commission Staff Working Background Paper.

ETSI 8 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

1 Scope The present document develops and presents user interface design guidelines for the implementation of setup procedures for narrowband and emerging broadband services, with an emphasis on mobile access to these services. It identifies best-practice solutions for configuration of devices and services throughout the product and service life-cycle. Based on these solutions, the document develops guidelines which can be used to develop systems usable to every user.

Wherever possible, a design-for-all approach has been adopted, taking special needs of children, elderly users or users with physical, cognitive, or sensory impairments into account. When appropriate, specific guidelines for these groups are presented, otherwise exisiting guideline documents are referenced.

The design guidelines provided by the present document are focused towards mass-market consumer services and devices. They are, however, equally applicable to professional services and users. For the purpose of the present document, access to these services is achieved through handheld devices which are typically characterized by limited screensize, a 12 key-keypad plus possibly some additional function keys or, alternatively, a stylus and/or touchscreen.

2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document.  References are either specific (identified by date of publication and/or edition number or version number) or non-specific.  For a specific reference, subsequent revisions do not apply.  For a non-specific reference, the latest version applies.

Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference.

[1] ETSI EG 202 132: "Guidelines for generic user interface elements for mobile terminals and services".

[2] ETSI TR 102 125: "Human Factors (HF); Potential harmonized UI elements for mobile terminals and services".

[3] ETSI ETS 300 907: "Digital cellular telecommunications system (Phase 2+) (GSM); Man-Machine Interface (MMI) of the Mobile Station (MS) (GSM 02.30 version 5.7.1 Release 1996)".

[4] ETSI TR 102 068: "Human Factors (HF); Requirements for assistive technology devices in ICT".

[5] ETSI ES 202 076: "Human Factors (HF); User Interfaces; Generic spoken command vocabulary for ICT devices and services".

[1] ETSI ES 202 130: "Human Factors (HF); User Interfaces; Character repertoires, ordering rules and assignments to the 12-key telephone keypad".

ETSI 9 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

[2] ETSI EG 202 116: "Human Factors (HF); Guidelines for ICT products and services; "Design for All"".

[3] ETSI TR 102 133: "Human Factors (HF); Access to ICT by young people: issues and guidelines".

[4] ETSI SR 002 180: "Requirements for communication of citizens with authorities/organizations in case of distress (emergency call handling)".

[5] ETSI ETR 297: "Human Factors (HF); Human Factors in Video telephony".

[11] ETSI EG 202 191: "Human Factors (HF); Multimodal interaction, communication and navigation guidelines".

[62] ETSI EG 201 379: "Human Factors (HF); Framework for the development, evaluation and selection of graphical symbols".

[13] ETSI TR 101 767: "Human Factors (HF); Symbols to identify telecommunications facilities for deaf and hard of hearing people; Development and evaluation".

[74] ETSI ES 201 381: "Human Factors (HF); Telecommunications keypads and keyboards; Tactile identifiers".

[15] ETSI ETR 095: "Human Factors (HF); Guide for usability evaluations of telecommunications systems and services".

[16] ETSI ETR 329: "Human Factors (HF); Guidelines for procedures and announcements in Stored Voice Services (SVS) and Universal Personal Telecommunication (UPT) ".

[17] ETSI TS 122 101: "Universal Mobile Telecommunications System (UMTS); Service aspects; Service principles (3GPP TS 22.101 version 5.13.0 Release 5)".

[8] ETSI ETR 187: "Human Factors (HF); Recommendation of characteristics of telephone services tones when locally generated in telephony terminals".

[19] ETSI TR 101 041-1: "Human Factors (HF); European harmonization of network generated tones; Part 1: A review and recommendations".

[20] ETSI EN 301 462: "Human Factors (HF); Symbols to identify telecommunications facilities for the deaf and hard of hearing people".

[21] ETSI EG 201 013: "Human Factors (HF); Definitions, abbreviations and symbols".

[22] will be added, be sure!

ETSI 10 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

3 Definitions, symbols and abbreviations

3.1 Definitions For the purposes of the present document, the [following] terms and definitions [given in ... and the following] apply: 3.2 Symbols 3.3 Abbreviations CLI Calling Line Identification EMS Enhanced Message Service GPRS General Packet Radio Service GSM Global System for Mobile telecommunication ICT Information and Communication Technologies ISP Internet Service Provider ITU-T International Telecommunications Union - Telecommunication standardization sector MMI Man-Machine Interface MMS Multimedia Message Service M-Services Mobile data Services OMA Open Mobile Alliance OTA Over-The-Air configuration P3P Privacy Preferences Protocol PIN Personal Identity Number PoC Push-to-talk over Cellular PSAP Public Safety Answering Point SMS Short Message Service UG User Guide UI User Interface UMTS Universal Mobile Telecommunication System WAP Wireless Application Protocol WCDMA Wideband Code Division Multiple Access Wi-Fi Wireless-Fidelity (ISO/IEC local area network standard family 802.11, also known as WLAN)

4 Background and motivation

4.1 Why are setup procedures important in mobile environments? Users change devices, services, providers, location Operators change services, networks, protocols; new non-voice services are emerging Interaction between various devices and centralised services, issue of “minimal UI” service access.

Without good setup of services uptake of mobile services will be blocked/delayed

ETSI 11 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Non-use of user guides requires: automation?, information in the device/service.

Automated setup as “promotion” for a service

4.2 What is a mobile setup activity?

For the purposes of these guidelines, a setup procedure is defined as:

“an end-user/system activity which sets a parameter in the service/device/network that allows the satisfactory completition of end-user tasks"

The user interaction related to setting up a device or service may occur at a number of points in device usage which correspond to our Life-Cycle ideas. The device life-cycle can be defined in the following steps.

 initial setup / reparameterisation of a device/bearer/service

- when a device/service is first purchased, e.g. set up MMS - a preloaded setting which is reparameterised, e.g. change IM nick-name

 a problem occurs during normal use of a device/service OR user paramerisation is required

- identified by the user, e.g. user wants to select a lower cost version of service. user wants to change home page - identified by the system, e.g. tell user to activate GPS unit before being able to use LBS.

 phase-out

- the termination/transfer to a new device of data or a service, e.g. user changes phone, user cancels service subscription

4.3 Bridging the digital divide Setup procedures should not be designed for experts; haves and have-nots of digital services Overcome initial user frustration if service access fails on first try. 4.4 Known problems and sources of this information Call and support centers get contacted because of setup failures: service not activiated, variables not set correctly, underlying services not available or not properly configured.

Perceived cost of services: users do not try to use/setup a service since they do not know the actual cost of a service: interviews with users, questionnaires.

Problems in the phone UIs: statement from operators.

Inconsistency between services, handsets, contracts.

Inconsistent language and terminology (across devices and services)

Missing online help and information.

ETSI 12 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

5 Previous work on setup procedures

Extrapolate from other technologies, professional domains.

Consider Pekka’s article, including the references.

5.1 Low-level setup activities

It is likely that the same low-level setup "buidling-blocks" will be required in multiple use-cases. In addition, generic guidelines can be extrapolated, e.g. the "user authentifaction" setup will require security guidelines for presentation and encoding. Many of these low level activities should be completed by "preconfiguration" but there may be cases where user intervention is required.

Examples "building-blocks" are as follows:

Setup related to Network/Bearer , e.g .GSM, UMTS, GPRS, CDMA, MobileTV, Bluetooth, GPS

- data-rate - name - accuracy - cost thresholds - band

Setup related to Server , e.g. MMS, SMS, IM, Blog, Email, WAP, HTTP

- user name - password - nickname - server name/address - address

Set up related to Service

- user authentification - cost requirement - quality of service requirement

Setup related to User Profile

- skin - credit card number/payment method - physical address - likes/dislikes - image - email - location - home page - permissions/certificates/contracts

Setup related to user Data

- contacts - multimedia

ETSI 13 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

6 Non-exhaustive description of use cases and scenarios

6.1 Introduction to the use-case approach

6.1.1 Why employ use-cases? Use-cases provide a common non-technical language for investigating user activities and their relation to system behaviours. By focusing on a “functional view” of the user-system interaction they allow special focus on situations where “ideal” or “happy days” interaction breaks down. By focusing on such non-ideal cases, guidelines can be extrapolated from the use cases to improve the design of set-up interactions.

Thanks to their clarity, use cases are easily understood UI designers and marketing experts who would most likely benefit from this report.

Finally, use-cases clearly present the motivation behind the guidelines presented in this report.

6.1.2 What use cases do not describe

As already mentioned, use-cases rely on a “functional” view of users and systems. If one considers a user interface to be constituted by the following:

1 .Information architecture: the underlying information constructs controlled by the user and system. The schematic of information in the visual, auditory or haptic media.

2. Interaction design: the dynamic aspect of the user system dialogue. In particular the interaction elements handled by the user and system ( menus, points, dialogues, etc.), the task sequence and allocation of tasks to user, device or network,.

3. Presentation design: the “rendering” of the user interface in the visual, auditory and haptic media.

Use cases provide guidance predominantly in area 1 and 2 but have little to say about area 3.

HOW TO ADDRESS PRESENTATION GUIDELINES??

6.1.3 High-level versus low-level setup use cases In Section 4 the range and current problems of setup activities were described. It is clear that setup activities can form part of any mobile task and are rarely an end in itself.

In the rare cases where setp-up is the main task, e.g. configuring a new service, automated set up is preferred thus the use case becomes very simple.

Use cases should therefore be addressed at high-level goals rather than low-level set-up activities.

ETSI 14 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Each low-level use cases shown in Table 1 is likely to form part of the resolution of many high- level tasks. It is therefore more productive to address a number of high-level use cases which may ultimately result in similar set-up activities.

Example High-Level Use-Cases Low-level Use Cases and Categories

MARTIN HAS TAKEN A PICTURE AND WANTS TO Setup related to Network/Bearer , e.g .GSM, UMTS, SEND IT TO HIS FRIEND. GPRS, CDMA, MobileTV, Bluetooth, GPS

SOPHIE WANTS TO "CHAT" WITH HER BEST - data-rate FRIEND - name - accuracy SIMON WANTS TO RETRIEVE AN MMS A FRIEND - cost thresholds HAS SENT TO HIM - band

JANE WANTS TO POST TO HER DAILY BLOG. HER Setup related to Server , e.g. MMS, SMS, IM, Blog, POSTING INCLUDES TEXT IMAGES AND AUDIO. Email, WAP, HTTP SHE IS MOBILE - user name CINZIA WANTS TO UPDATE THE ADDRESS ON - password HER E-BOOK SERVICE - nickname - server name/address - address - community name

Set up related to Service

- user authentification - cost requirement - quality of service requirement

Setup related to User Profile

- skin - credit card number/payment method - physical address - likes/dislikes - image - email - location - home page - permissions/certificates/contracts

Setup related to user Data

- contacts - multimedia

6.1.4 A template for defining use cases A number of use-case templates have been proposed (Refs: Daiper, Green, etc.). The selected template was defined by Cockburn [Pls provide full reference 1997!]. A number of beneifits of this template were idenitified:

1) Simplicty: the use case can be tabulated or written in prose form

ETSI 15 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

2) Error Handling: The “EXTENSIONS” sections gives a straightforward way to define error cases 3) Industry Acceptance: The method has been used with success by industrial UI teams.

USE CASE 1 Goal in Context Scope & Level Preconditions  Success End Condition  Failed End Condition  Primary, Secondary Actors Trigger  DESCRIPTION Step Action (Main success 1 scenario) 2 3

EXTENSIONS in user Step Branching Action. actions These are also potential problem and error cases (Potential problem and 1 error cases) 2 3

VARIATIONS in the Branching Action. phone states and These are also behaviour potential problem and error cases 1 2 3

Figure xx: Cockburn’s (1997) use-case template

Use Case: high-level goal which is often not connected with a setup activity, e.g. "Bob wants to send an MMS", not "Bob wants to setup MMS" Goal in Context/preconditions: here we can define when the setup issue occurs (initial, normal use, end of life) and user location/motion, as well as the state of the user/device/system. Description: the ideal flow in sufficient detail to have jump-off points for exceptions/subflows Exceptions/sub flows: here we can define different kinds of problems that can occur related to set-up, For example, problems might be:

User Problems

 Out of range of network/bearer/service  Feature not activated, e.g. bluetooth  Permissions not available  SIM card lost  Password lost  Doesnt understand terminology  Lost in menu  Entered wrong value  Do not know value  User doesnt know what is wrong

System Problems

 Hardware problem with device/network/service  Server and device out of sync so correct value is rejected

ETSI 16 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

 Value(s) missing  User not recognised  User does not have permissions  Device cannot display content  Not enough memory  Reparameterisation required  User has not paid

To demonstrate Cockburn’s template, an example is shown below.

Use Case Recover phonebook and picture content that was stored on a lost mobile phone and place on new mobile phone that has recently been purchased.

Goal in Context

User had owned the phone for 1 year before the phone was lost. The user has a contract with their service provider (likely to be UK).The phone allows syncronisation of content with a PC.

Preconditions 1. user had stored 100 numbers on the phone and/or SIM card 2. user had stored 40 pictures taken with the phones camera. some pictures were attached to phonebook entries 3. the new mobile phone chosen is a different brand from the original phone

Success End Condition.: User has new phone with all old contact number and photo data

Failed End Condition: User has new phone without old data.

Primary Actor: End user

Trigger: phone lost

DESCRIPTION

0. User realises that phone is lost 1. User goes to service provider POS 2. User selects new phone of different brand 3. User explains that old phone was lost but that content was synchronised on PC. User has memory stick with content on it. 4. Assistant checks compatability between old phone and new phone data format 5 Data uploaded onto new phone

Extensions

1a1. User has a second phone of a different brand and remembers how to make a back-up thanks to annimated avatar in old phone 1a2. User access operator WAP site and navigates to "back up" 1a3 User enters account name and password 1a4 user enters phone type and is notified that a subset of information can be downloaded 1a5 User downloads content

3a.1 Content was backed up on network. 3a.2 Asssistant access operator network and obtains user data

3b.1 Content was not backed-up 3b.2 User leaves store with new phone but no data (FAIL)

4a.1 Format of data is not compatible with new phone/tool 4a.2 Assistant converts data into standard format but loses picture/phone number connection. 4a.3. Assistant is able to explain exactly what has been restored and what has not

ETSI 17 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

4a.4 User choses another phone that is compatible??

Variations

1a2a1 User does not know WAP address of back-up service 1a2a2 user access operator website on-line with PC

1a2b1 User cannot find back up menu item 1a2b2 goes on line with PC and accesses website with PC

1a2c1 User doesnt know how to make a backup 1a2c2 user goes to service centre

1a3a1 user does not have an account 1a3a2 user goes to service centre

1a4a1 phone type is not available 1a4a2 user goes to service centre

RELATED INFORMATION (optional) Priority: high for user Performance Target: 10 minutes at POS Frequency: rare (IF RARE - PERHAPS WE SHOULDNT CONSIDER IT??) Superordinate Use Case: Setting up BACK UP Channel to primary actor: web, face to face Secondary Actors: POS assistant,back up system, file conversion tools Channel to Secondary Actors: web, face to face

6.2 From use cases to guidelines: the process The generation of use cases and resulting guidelines will be an iterative task based on expert knowledge, data sources and industry-expert feedback. A high-level process is define in Figure xx.

Brainstorm relevant uses cases within a framework (see 6.1.3) (motivated by expert experience, real data from call-centres, etc) | Draft descriptions focusing on error cases. | Define initial user requirements/guidelines | Consult with service providers and user representatives | Revise use case list and requirements/guidelines.

Figure x : From Initial Use-Cases to Requirements/Guidelines

ETSI 18 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Extropolation from user-cases to guidelines is not a schematic process but requires expert insight. For example, use use case defined earlier could generate the following guidelines (refernce to use case step is shown in brackets).

User Requirements (with reference to use cases)

 All phones should have SIM backup facility to network or POS (3a1)  Service providers should have POS facility for back-up (1)  Service providers should train personnel (4a2, 4a3)  Manufactures should use common data structures to allow data transfer (4a2)  Users should be prompted for periodic back-ups to network or POS. If approved backup process should be automatic (1a1)  Backup setup should be part of phone purchase or subscription (1a1)  Mobile and Web content should support each other (1a2a1)

6.3 A framework to ensure use-case coverage

6.3.1 Usage, context and lifecycle

Given that high-level use cases will be considered, the next step is to ensure the choice of use cases gives the coverage necessary to capture the most important set-up problems that are experienced by users.. To ensure coverage, an initial framework is proposed. The framework tasks into account a number of dimensions that have already been addressed in Section 5.

Figure xx: Use-Case Space

a) The Life-cycle of device usage

 initial setup / reparameterisation of a device/bearer/service

 a problem occurs during normal use of a device/service OR user paramerisation is required

 phase-out b) Types of User Activities *

ETSI 19 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

 Communication - person to person

 Communication - person to community

 Communication - person to service

 Communication - service to person

 Filling "Grey-time"/Fun (non-communication)

 Free Content gathering,

 M-Commerce (including content)

 Personalising (can be done without network)

* Emerging services and technologies should also be considered, e.g. video call and download, music, community c) The Context of Usage

 Mobile, e.g. walking, stading

 Static but in transit, e.g. train

 Static sitting, e.g. airport/home/hotel

 With PC/Latop (??)

6.3.2 Positioning use cases within the framework

Use cases should widely populate this space. For example, the use-case: “MARTIN HAS TAKEN A PICTURE AND WANTS TO SEND IT TO HIS FRIEND” can be positioned on the “user activity” axis as “communication person to person”. In addition, the use-case could be a “first use” or “normal use” position with a variety of “usage contexts”.

The Context section of the use-case can be used to place the use-case on the other axis. For example, the context description we might say: “Martin has recently purchased a new telephone and SIM card [first use]. Travelling sitting on a train [context of use]”

6.4 Use-Case brainstorm Using the “user activty” dimension defined in the previous section, an initial use case brainstorm provided the following use-cases (in capitals). a) Communication - person to person

- SMS/multimedia messages - single message vs. IM/chat - Local networking, e.g. Bluetooth/WiFi

ETSI 20 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

MARTIN HAS TAKEN A PICTURE AND WANTS TO SEND IT TO HIS FRIEND. SOPHIE WANTS TO "CHAT" WITH HER BEST FRIEND SIMON WANTS TO RETRIEVE AN MMS A FRIEND HAS SENT TO HIM b) Communication - person to group

- SMS/multimedia messages

PETER WANTS TO SHARE THE DETAILS OF A NEW BAR WITH HIS FRIENDS WHO MIGHT BE INTERESTED MARCO WANTS TO FIND OUT WHERE HIS FRIENDS ARE d) Communication - person to service (BLOG)

- SMS/multimedia messages

JANE WANTS TO POST TO HER DAILY BLOG. HER POSTING INCLUDES TEXT IMAGES AND AUDIO. SHE IS MOBILE CINZIA WANTS TO UPDATE THE ADDRESS ON HER E-BOOK SERVICE d) Communication – service to person

DAVID WANTS TO RECEIVE NEWS HEADLINES EVERY DAY FOR HIS SPECIALIST FIELD e) Filling "Grey-time"/Fun (non communication)

- playing games - browsing

FABIO IS RIDING ON THE SUBWAY ON THE WAY HOME. HE WANTS TO PLAY A GAME THAT A FRIEND HAS SENT TO HIM. STEPHANIE WANTS TO BROWSE THE INTERNET FOR THE FIRST TIME f) Free Content gathering, e.g. games, apps, news, ring tones, music, services...

- browse - select - download content

WHILST TRAVELLING, SIMONA WANTS TO FIND THE LATEST NEWS HEADLINES IN HER HOME COUNTRY PETER IS LOOKING FOR INFORMATION ON AN MP3 PLAYER HE WOULD LIKE TO BUY THIBAULT WANTS TO FIND AND DOWNLOAD A SAMPLE FROM A NEW ALBUM

- moving data between phones

JESPER WANTS TO TRANSFER DATA FROM HIS OLD PHONE TO HIS NEW PHONE ARNOD WANTS TO BACKUP HIS DATA ON HIS SERVICE PROVIDORS NETWORK g) M-Commerce (including content)

ARCHIBALD WANTS TO BUY A BOOK HE HAS HEARD ABOUT JURGEN WOULD LIKE TO CHANGE HIS CREDIT CARD DETAILS ON AN E-SHOPPING SITE

- browse - select - identify myself - pay

ETSI 21 ETSI DEG 202 416 V 0.0.4 (2005-04-28) h) Personalising (can be done without network)

- device - services

LOTHER WANTS TO SET THE RING TONE OF HIS PHONE MIKE WANTS TO SHARE A CONTACT VIA BLUETOOTH DANIELA WANTS TO CHANGE HER NETWORK VOICEMAIL GREETING

7 End user requirements 7.1 Generic users

7.2 Other users Elderly, children, disabled, less literate, other cultures, etc.

8 Design guidelines for the setup of terminals

9 Design guidelines for the setup of e-services Define e-services (mobile, web, fixed, profiles?, etc)

10 Specific Design-for-all user interface guidelines for setup procedures If we don’t have good input, we may delete this chapter

11 Concluding remarks and future work Reference to E-Europe, propose follow-up activities: e.g. PC-based setup of services provided. Has to typically go to an Annex!

Annex A (informative): List and detailed aalysis of use cases considered

Each annex shall start on a new page (insert a page break between annex A and B, annex B and C, ...). Use the Heading 8 style for the title and the Normal style for the text.

A.1 Setup of voice-mail box

ETSI 22 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

A.2 Settings of MMS services

......

Annex B (informative): Title of informative annex

Each annex shall start on a new page. Use the Heading 8 style for the title and the Normal style for the text.

B.1 First clause of the annex B.1.1 First subdivided clause of the annex

ETSI 23 ETSI DEG 202 416 V 0.0.4 (2005-04-28)

Annex N (informative): Bibliography

The annex entitled "Bibliography" is optional. Each annex shall start on a new page. Use the Heading 8 style for the title and B1+ or Normal for the text.  : "". OR <Publication>: "<Title>". <PAGE BREAK></p><p>ETSI 24 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p>Temporary reminder reference: What’s been done in EG 202 132</p><p>8 Configuration and guidance for terminal and service access, interworking, portability and error handling</p><p>8.1 General configuration procedures for service access To be able to access common services, users should ideally not have to be exposed to configuration procedures. Configuration should be as automatic and transparent as possible, demanding minimal interaction from the user. For many services, however, users are still expected to put up with some configuration. This configuration may often be complex and may thus present a barrier both to getting started immediately with a service as well as to utilizing its potential in the long term. In order to widen and simplify user access to services the following recommendations on configuration procedures are proposed. Configuration procedures can be arranged along a continuum of increasing user interaction and hence complexity for the user. The types of procedure referred to in the present document are:  pre-configuration;  guided configuration;  manual configuration. Configuration guidelines that apply to services in general, according to the above types of procedure, will follow in the remainder of this clause. Guidelines specific to configuration of certain services will be the topic of clause 8.2. The scope of this clause does not include details on user guides and reference documentation, which often form an important part of the information needed for configuration procedures for terminal and service access (see also clause 7.4). Transferring information from one terminal to a replacement constitutes a special case of configuration. Recommendations relevant to this type of configuration are analogous to synchronization as covered in clause 9.11. 8.1.1 Generic configuration The Terminal Management Working Group of the Open Mobile Alliance (see bibliography) specifies protocols and mechanisms that achieve management of mobile terminals. The most recent versions of OMA Terminal Management protocols and mechanisms, with corresponding UI elements, are the recommended, generic technical solution for configuration for terminal and service access. In addition, the below guidelines apply to more than one of the configuration procedures mentioned in clause 8.1:.  Provide all configuration information in the user's language, e.g. non-English speaking users should not have to learn English to be able to access services.  Provide a clear description of what equipment and information the user needs to have ready to hand during the configuration procedure, and if necessary, how to obtain it. The terminal manufacturer, operator and service provider may not be the same entity and may provide only their respective part of the total equipment and information needed by the user to </p><p>ETSI 25 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p> configure the service. For example, to configure an e-mail client in a terminal the user may need: - a terminal with an e-mail client, support for Over The Air (OTA) delivery of settings, and necessary communication enablers like GPRS; as well as - a service plan with the operator that supports e-mail; and/or  The user may need to know or find out: - the terminal brand; - model name or number; - subscription terminal number; - configuration information from the operator; and - configuration information specific to the e-mail service from the e-mail service provider.  Convey what settings need to be configured and what effect configuring a setting will have by providing natural entry points into the configuration procedure. For example, it may not be apparent to a user that some general connectivity enabler settings must be configured in order to gain access to a specific service. Whereas users may see the relevance of configuring MMS or WAP, the relevance of configuring GPRS-based services may not be understood even though it may be a necessary part of enabling access to MMS or WAP (cf. meta-user requirement 1 in clause 6.3). In such a case, the menu structure could be organized to provide a natural mapping between the settings to be configured and the service they enable access to. Similarly, when accessing for the first time a service that has not yet been configured, the user could be guided through a configuration procedure ("just- in-time configuration", see clause 8.1.3).  Configuration should be kept to the minimum number of steps. Any additional step introduces the potential for errors. See meta-user requirement 3 in clause 6.3.  Indicate the progress of the configuration procedure to the user.  Where necessary, provide explanations of concepts that need to be understood by the user during configuration. Provide a natural mapping between concepts and the terminology used, especially for the configuration settings. For example, a user may need to understand the difference and distinguish between the concepts of "network operator" and "MMS service provider" in order to be able to find the proper information and enter it during the configuration procedure. Further, a distinction should be made, where necessary, between settings that reside on the terminal as opposed to in the network.  As far as possible, hide technical concepts that the user does not need to understand during configuration, e.g. through pre-configuration and to some extent guided configuration.  The user should be informed at an appropriate level and through appropriate channels of the costs connected to the service to be configured. It is important that costs are sufficiently transparent to users, or they may be hesitant to access a service. However, the user may also be unnecessarily deterred if the cost is displayed for every single micro payment. See also meta-requirement 7 in clause 6.3.</p><p>ETSI 26 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p> Provide consistent terminology across all sources of configuration information. The terminology used by service provider, operator and terminal manufacturer should not differ if the concepts referred to by the terms are the same. It is unlikely that the user will have sufficient knowledge to be able to decipher and translate between different terms that denote the same concept, in order to be able to configure the settings correctly. For example, to configure an e-mail client in a terminal the user may need to use the user interface and manual of the particular terminal, a configuration wizard on the operator web site, and information specific to the e-mail service from the e-mail service provider. The terminology used by all of these should be consistent. See also clauses 8.2 and 7.1.  As far as possible, avoid forcing the user to input entries for settings. Provide appropriate default entries for settings.  Provide clear indication and differentiation of what the setting is and what the actual entry of the setting is.  Provide examples of the correct format for the required setting entries and support for handling the formats, e.g. do not use blank spaces in phone numbers if the terminal or service cannot handle it (see also clause 9.9.2) and prevent incorrect input of entries, respectively.  Provide error handling to prevent a change of setting entries which would in turn prevent access to basic services, primarily voice telephony which would be needed to contact a customer support helpline. Recommendations: R 8.1.1.a The most recent versions of management protocols and mechanisms, as specified in OMA working documents and reference specifications (see bibliography), with corresponding UI elements, are the recommended, generic technical solutions for configuration for terminal and service access. R 8.1.1.b Provide all configuration information in the user's language. R 8.1.1.c Provide a clear description of what equipment and information the user needs to have ready to hand during the configuration procedure, and if necessary, how to obtain it. R 8.1.1.d Convey what settings need to be configured and what effect configuring a setting will have by providing natural entry points into the configuration procedure. R 8.1.1.e Configuration should be kept to the minimum number of steps. R 8.1.1.f Indicate the progress of the configuration procedure to the user. R 8.1.1.g Where necessary, provide explanations of concepts that need to be understood by the user during configuration. R 8.1.1.h As far as possible, hide technical concepts that the user does not need to understand during configuration. R 8.1.1.i The user should be informed at an appropriate level and through appropriate channels of the costs connected to the service to be configured. R 8.1.1.j Provide consistent terminology across all sources of configuration information. R 8.1.1.k As far as possible, avoid forcing the user to input entries for settings. Provide appropriate default entries for settings. R 8.1.1.l Provide clear indication and differentiation of what the setting is and what the actual entry of the setting is. R 8.1.1.m Provide examples of the correct format for the required setting entries and support for handling the formats. R 8.1.1.n Provide error handling to prevent a change of setting entries which would in turn prevent access to basic services.</p><p>ETSI 27 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p>8.1.2 Pre-configuration When access is pre-configured the user may access the service or application immediately, i.e. from the user's perspective there is no need for configuration. Subsequent updates of settings could be made OTA, transparent to the user. One of the reasons for the increased uptake of SMS was the pre-configuration on the SIM card of the SMS Centre phone number, which previously had to be entered manually by users. It can be assumed that similar pre-configuration for other services would remove a barrier preventing use. Furthermore, in order to ensure access for all users, pre-configuration makes dedicated service configuration solutions unnecessary for children, elderly, or disabled users.  Pre-configuration is the preferred solution for configuration of access to services.  Provide information to the user on which settings are pre-configured. This may include e.g. which services are set as default for data communication, which options are default for the service (e.g. voice-mail waiting indication via SMS or voice call), and whether certain functionality or content is included or not.  If the user is permitted to change the setting entries, resetting the terminal to factory settings should present the user with a choice of whether to keep or reset the current settings for terminal and service access. In some cases the user may not wish for the reset function to adversely affect access to services, e.g. force the user to re-configure the settings for terminal and service access. In other cases it may be the explicit desire of the user to remove the setting entries from the terminal (e.g. when changing to another operator or service provider).  Subsequent updates of settings, e.g. OTA, should provide the default entries for terminal or service resets. Recommendations: R 8.1.2.a Pre-configuration is the preferred solution for configuration of terminal and service access. R 8.1.2.b Provide information to the user on which settings are pre-configured. R 8.1.2.c If the user is permitted to change the setting entries, resetting the terminal to factory settings should present the user with a choice of whether to keep or reset the current settings for terminal and service access. R 8.1.2.d Subsequent updates of settings, e.g. OTA, should provide the default entries for terminal or service resets. 8.1.3 Guided configuration The user may initiate configuration with guidance from, for example, the terminal UI, a mobile Internet site accessed via the terminal, a web site accessed via a PC, or software on a PC connected to the terminal. A guided configuration procedure could also be initiated when the user tries to access a service that has not yet been configured ("just-in-time configuration"). The user may be required to walk through a sequence of instructions and choices, and to input certain entries (e.g. terminal brand, model number and name, operator, subscription phone number, etc.). Based on the user's input, the service will then be automatically configured. In the case of network-based services, configuration settings may be delivered OTA to the terminal, possibly requiring the user to accept the settings. Alternatively, the user may send an SMS containing a command to a certain phone number in order to receive the settings OTA. In the case of using software on a PC, settings could be transferred to the terminal via local connection. An example of a guided configuration procedure is a setup wizard. The following constitute recommendations on guided configuration for terminal and service access:</p><p>ETSI 28 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p> If pre-configuration cannot be achieved, some means of guided configuration should be provided, taking into consideration the needs of all users (including young, elderly or disabled users, see EG 202 116 [2] and TR 102 133 [3]). For example, users with poor eyesight or motor impairments would benefit from a web site or software on a PC that could offer speech input/output, or simply the larger keyboard and display for better text input/output capabilities.  Optionally, and depending on factors such as legislation, it may be necessary to request a password to be delivered to the terminal e.g. via SMS. The password will then be used to log in to the configuration procedure on a web site. Such a step may also improve the user's feelings of trust and security against threats such as fake installation settings from a sender whose stated identity may not be accurate. However, this additional step also imposes a hurdle to convenient terminal and service access by adding extra steps to the configuration procedure.  Provide a clear overview of the steps of the configuration sequence.  Provide a logical and consistent order to the configuration procedure. For example, group together steps pertaining to the terminal, the operator subscription, and the provided service, respectively, since this will likely map to the respective information sources the user has ready at hand for the configuration procedure.  Only provide steps that involve instructions, choices or feedback relevant to the configuration procedure. All other steps are redundant. See meta-user requirement 3 in clause 6.3.  Navigation should be under user control throughout the configuration procedure. There should be no time-outs that automatically continue to the next configuration step. Timeouts may however be warranted when the configuration procedure presumes a network connection that incurs costs on the user, so that the user will not face a large bill should the user's attention be diverted from the configuration procedure for some period of time.  Provide "back", "next", "cancel", and "finish" as well as "help" functionality and controls. The "cancel" and "help" controls are especially important when the user is not able to proceed for whatever reason.  Provide clear instructions on what type of information is required at each step of the configuration procedure, i.e. what input information is expected from the user. Provide illustrative examples.  Clearly describe the means by which the setting entries will be delivered to the terminal, e.g. via SMS.  For remote configuration via a web site, provide a "send" control with instructions to confirm that the terminal is switched on, before sending setting entries OTA.  Provide clear feedback when the configuration procedure ends.  Provide information on how to change settings later.  If the configuration procedure fails or is aborted the state of the terminal should revert to that previous to the start of the configuration procedure, i.e. no setting entries should be modified. The user should be informed on how to proceed in order to complete the configuration.</p><p>ETSI 29 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p>Recommendations: R 8.1.3.a If pre-configuration cannot be achieved, some means of guided configuration should be provided, taking into consideration the needs of all users (including elderly or disabled users). R 8.1.3.b Provide a clear overview of the steps of the configuration sequence. R 8.1.3.c Provide a logical and consistent order to the configuration procedure. R 8.1.3.d Only provide steps that involve instructions, choices or feedback relevant to the configuration procedure. All other steps are redundant. R 8.1.3.e Navigation should be under user control throughout the configuration procedure. R 8.1.3.f Provide "back", "next", "cancel", and "finish" as well as "help" controls. R 8.1.3.g Provide clear instructions on what type of information is required at each step of the configuration procedure. Provide illustrative examples. R 8.1.3.h Clearly describe the means by which the setting entries will be delivered to the terminal, e.g. via SMS. R 8.1.3.i For remote configuration via a web site, provide a "send" control with instructions to confirm that the terminal is switched on. R 8.1.3.j Provide clear feedback when the configuration procedure ends. R 8.1.3.k Provide information on how to change settings later. R 8.1.3.l If the configuration procedure fails or is aborted the state of the terminal should revert to that previous to the start of the configuration procedure. The user should be informed on how to proceed in order to complete the configuration. R 8.1.3.m It is recommended to undertake further, more detailed work in this area. 8.1.4 Manual configuration The user configures access to the service by manually inputting entries for the necessary configuration settings, possibly in arbitrary order, without guidance other than that available through support material such as user manuals or support Frequently Asked Questions (FAQ's).  If pre-configuration cannot be achieved, some means for guided and/or manual configuration should be provided by the terminal, since some users may not have access to guided configuration on the web via a PC.  Provide consistent and coherent categories of settings. The grouping of settings should be consistent across all sources of information, e.g. terminal UI, user guide, support web site. It may be necessary to provide entry points in different parts of the UI to the same set of settings. However, settings should not be distributed across different parts of the UI, or users may configure only parts of the settings needed to enable terminal and service access. Recommendations: R 8.1.4.a Provide means for guided and/or manual configuration in the terminal, if pre- configuration cannot be achieved. R 8.1.4.b Provide consistent and coherent categories of settings. 8.2 Configuration procedures for access to specific services In order to promote increased service usage, a large number of services might benefit from some form of harmonization at the user interface level with regards to configuration for basic access. Specifically, if pre-configuration (see clause 8.1.2) is not available, the user will be confronted with certain terms needed for guided or manual configuration of the service. As noted previously (see clause 8.1.1), such terminology may differ between the various sources of information used during the configuration procedure as provided by service provider, operator and terminal manufacturer. When configuring an e-mail client, the user will have a hard time sorting out</p><p>ETSI 30 ETSI DEG 202 416 V 0.0.4 (2005-04-28) terminology like "Login user name", "E-mail user name", "User name", and "Mailbox", whether they denote the same or different things, and what entries to input to which setting. This plethora of different terms denoting the same concepts or similar terms denoting different concepts likely imposes a barrier toward manual or guided configuration of services. These terms as used by service providers, operators and terminal manufacturers could thus be candidates for harmonization. At the same time, the choice of service-specific terminology may depend on factors such as the available screen size (enabling or constricting various text lengths), the way the service UI is arranged (providing different context to terms used), implementation of different sub-sets of service functionality across different terminals, or how the service is promoted in marketing. These and other issues may be regarded as brand-specific to manufacturers, operators or service providers. Nevertheless, a basic set of terms pertaining to common services (voice-mail, e-mail, MMS, SMS, WAP/Internet, and supporting GSM/GPRS data connections) is presented in clause 7.1.4, tables 1b through 1g, in order to highlight the aforementioned problems and to serve as a foundation for further harmonization efforts. Recommendations: R 8.2.a Tables 1b through 1g in clause 7.1.4 should be used. 8.3 Interworking and portability When outside the range of the home mobile telephony network (e.g. abroad and roaming) users will still prefer to have the same easy access to their familiar services, or at least some subset thereof, as in their home mobile telephony network. Such services can include but are not limited to mobile internet browsing, e-mail, MMS and other GPRS based services, positioning services and other information locally available via the home mobile telephony network, CLI, voice-mail access, assistance and directory services, and dialling certain numbers that use specific formats, e.g. toll-free/national green-number such as information services or shared cost calls such as retrieving bank account information. Currently, when roaming on another network and accessing network-based services, access may be denied from one instant to the next, due to switching between different roaming networks that may have different agreements with the home mobile telephony network operator. The reasons for this intermittent access to services will not be apparent to the user, who will however be concerned about costs and security. Dealing with issues of interworking and portability is thus important, ensuring that user requirements of trust, reliability, cost information and security are met across networks, terminals and services (cf. meta-user requirements 1, 2, 3, 5, 6, 7, 9 in clause 6.3; security issues in clause 9.8.2). The following constitutes recommendations for harmonization:  The aim should be for access to services to be seamless and transparent, providing the same access as in the home mobile telephony network, i.e. service mobility (see clause 4.2.3) should be achieved.  No further configuration on the part of the user should be needed for terminal and service access when roaming, beyond that already undertaken for access through the home mobile telephony network.  There should be no differences in access procedures compared to the home mobile telephony network. For example, if password and/or telephone number entry is not required to access voice-mail in the home mobile telephony network, it should not be required when roaming either. A further example is that when pressing a shortcut to access the voice-mail number, the terminal should detect that it is roaming on another network and use the roaming voice- mail number.</p><p>ETSI 31 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p> If the conditions for terminal and service access are different from the home mobile telephony network, the user should be informed. This could be if only a subset of the services accessible through the home mobile telephony network can be delivered when roaming, and/or if the procedures for accessing them are different (e.g. voice-mail and customer service phone numbers). Today, upon entering a roaming network, some networks send an SMS to the terminal informing the user of the services accessible, in some cases as a class 0 SMS which cannot be dismissed to be read later. This may however be done with some delay and may interrupt the user's current activity, which may annoy the user. Informative yet unobtrusive ways of communicating differences are called for (see also clause 10.6).  The user should be informed at an appropriate level and through appropriate channels of the costs involved when accessing services available in the roaming network. See meta-user requirement 7 in clause 6.3.  The user should be informed of the present level of security, or be warned if and when changes occur.  If a service can not be accessed when roaming, provide a correct explanation as to the reasons. Some services only ask the user to try again later, or ask for the service to be configured although it already has been. Such incorrect error message may be detrimental to the user's trust in the network and/or terminal. See clause 8.4 for more on help and error handling.  Indicate potential interoperability problems, e.g. a receiving terminal may not be able to display an MMS message of a certain size, or not at all (see clause 10.8.1.2). Recommendations: R 8.3.a The aim should be for access to services to be seamless and transparent, providing the same access as in the home mobile telephony network. R 8.3.b No further configuration on the part of the user should be needed for terminal and service access when roaming. R 8.3.c There should be no differences in access procedures compared to the home mobile telephony network. R 8.3.d If the conditions for terminal and service access are different from the home mobile telephony network, the user should be informed. R 8.3.e The user should be informed at an appropriate level and through appropriate channels of the costs involved when accessing services available in the roaming network. R 8.3.f The user should be informed of the present level of security, or be warned if and when changes occur. R 8.3.g If a service can not be accessed when roaming, provide a correct explanation as to the reasons. R 8.3.h Indicate potential interoperability problems. 8.4 Error handling guidance Interpreting the contents of error messages on mobile terminals is an inherently difficult task for many users. Reasons for this difficulty include:  The display size imposes serious restrictions on displaying error messages that can be understood by users.</p><p>ETSI 32 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p> Due to memory limitations, help information has been a scarce resource on mobile terminals in the past.  It is very difficult for users to correctly understand if an error situation and the corresponding message originates from the terminal, the network or a specific service being currently executed.  Users have little or no understanding of the boundaries between the SIM card, the terminal, the network or a specific service or application.  Service providers have to cope with a multitude of different displays and terminals when representing error messages. This, in turn, makes it quite difficult to offer generic error recovery procedures on mobile terminals. Nevertheless, a number of generic recommendations can be formulated that deal with the representation of error messages as well as the necessity of user intervention for error recovery. Recommendations: R 8.4.a Error messages should always be formulated using the vocabulary of the user, both in terms of the language selected and the complexity of the contents. Terminal, network or service-internal error messages should usually be avoided. R.8.4.b Where several error causes may result in a similar error from the user viewpoint, a specific error code may be appended to the simple error message. Such a code would assist a help-desk in identifying the real cause of an error when they assist a user. It is recommended to standardize these error codes, wherever possible. R 8.4.c Error recovery can be initiated with or without user confirmation. After starting an error recovery procedure no further user assistance should be required, if possible. R 8.4.d A terminal should always return to idle mode if turned off and then on again. There should never be persistent error modes. If possible, pressing the "end-key" (or one with a similar functionality, e.g. a long press on the "Cancel" key) should lead to the same behaviour, i.e. return to idle mode. R 8.4.e During an error recovery procedure, communication processes like accepting incoming calls and setting up emergency calls should be possible. R 8.4.f A terminal should clearly display the unavailability of specific network features or services and should prevent the user from trying to access these features by giving adequate information beforehand. This may be achieved by visibly invalidating menu entries ("greying out") or by supplying useful error messages on a user attempt to initiate a specific service (for further guidance on setting up network- related functionality, see clauses 8.1 and 8.2). If the above solution is not readily available, removing menu entries is a possible alternative.</p><p>ETSI 33 ETSI DEG 202 416 V 0.0.4 (2005-04-28)</p><p>History</p><p>This clause shall be the last one in the document. Document history Version Date Milestone 0.0.1 24 February, Created from EG skeleton by proactive STF Leader 2005 3.01 4 April, 2005 Modified scope 3.02 5 April, 2005 Scope section preliminarily agreed, new TOC 4.0 28 April, 2005 Post-meeting Master version 5.0 May, 2005 Tbd next- Post-input version</p><p>ETSI</p> </div> </article> </div> </div> </div> <script type="text/javascript" async crossorigin="anonymous" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-8519364510543070"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.1/jquery.min.js" crossorigin="anonymous" referrerpolicy="no-referrer"></script> <script> var docId = '5b8d0b8ae4db9f84548e878338d50f8b'; var endPage = 1; var totalPage = 33; var pfLoading = false; window.addEventListener('scroll', function () { if (pfLoading) return; var $now = $('.article-imgview .pf').eq(endPage - 1); if (document.documentElement.scrollTop + $(window).height() > $now.offset().top) { pfLoading = true; endPage++; if (endPage > totalPage) return; var imgEle = new Image(); var imgsrc = "//data.docslib.org/img/5b8d0b8ae4db9f84548e878338d50f8b-" + endPage + (endPage > 3 ? ".jpg" : ".webp"); imgEle.src = imgsrc; var $imgLoad = $('<div class="pf" id="pf' + endPage + '"><img src="/loading.gif"></div>'); $('.article-imgview').append($imgLoad); imgEle.addEventListener('load', function () { $imgLoad.find('img').attr('src', imgsrc); pfLoading = false }); if (endPage < 7) { adcall('pf' + endPage); } } }, { passive: true }); </script> <script> var sc_project = 11552861; var sc_invisible = 1; var sc_security = "b956b151"; </script> <script src="https://www.statcounter.com/counter/counter.js" async></script> </html><script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script>