Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prof Jim Warren with reference to sections 7.1 and 7.2 of The Resonant Interface.

Slides:



Advertisements
Similar presentations
User Modeling CIS 376 Bruce R. Maxim UM-Dearborn.
Advertisements

Models and Theories. GOMS Example Photocopying an article Create a GOMS description of the task of photocopying an article from a journal. Assume –copy.
Task Analysis (continued). Task analysis Observations can be done at different levels of detail fine level (primitives, e.g. therbligs, keystrokes,GOMS.
3. Memory and Human Computer Interaction. Memory memory 4 The multi-store model of memory describes how the processes of the stage model of HCI are interconnected.
Cognition in the virtual world. Which is easiest to read? What is the time?
Fitts’ Law and the Model Human Processor
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
CS160 Discussion Section Fitts Law and KLM David Sun Sept 26 th 2007.
KLM and GOMS Professor: Tapan Parikh TA: Eun Kyoung Choe
Objectives Define predictive and descriptive models and explain why they are useful. Describe Fitts’ Law and explain its implications for interface design.
CIS465: Adv. Info. Sys. Memory Systems Min Song Information Systems Dept.
Predictive Evaluation Predicting performance. Predictive Models Translate empirical evidence into theories and models that can influence design. Performance.
Chapter 4 Cognitive Engineering HCI: Designing Effective Organizational Information Systems Dov Te’eni Jane M. Carey.
Predictive Evaluation Simple models of human performance.
Psychology of HCI Brian P. Bailey Fall 2004.
Chapter 3 – Human Information Processing
Chapter 5 Models and theories 1. Cognitive modeling If we can build a model of how a user works, then we can predict how s/he will interact with the interface.
Topics Introduction Hardware and Software How Computers Store Data
User Models Predicting a user’s behaviour. Fitts’ Law.
Chapter 1: Introduction to Computers and Programming.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Introduction to Computers and Programming.
1 Rensselaer Cognitive Science Keystroke-Level Model: Intro The simplest of all GOMS models: OM only!!!  No explicit goals or selection rules  Operators.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley C H A P T E R 1 Introduction to Computers and Programming.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley The Resonant Interface HCI Foundations for Interaction Design First Edition.
1 Cognitive Models CS 160, Spring 2004 February 18.
GOMS Keystroke analysis When (fine-grained) speed matters.
Keystroke-Level Model IST 331 Gaurav Dubey Based on ‘The ABCs of Users’, Ritter et al 2011.
Chapter 12 cognitive models. 2 Cognitive models goal and task hierarchies linguistic physical and device.
Gary MarsdenSlide 1University of Cape Town Human-Computer Interaction - 6 User Models Gary Marsden ( ) July 2002.
GOMs and Action Analysis and more. 1.GOMS 2.Action Analysis.
© Copyright 1992–2004 by Deitel & Associates, Inc. and Pearson Education Inc. All Rights Reserved. Chapter 2 Chapter 2 - Introduction to C Programming.
Evaluation of User Interface Design 4. Predictive Evaluation continued Different kinds of predictive evaluation: 1.Inspection methods 2.Usage simulations.
Understanding Users The Design process From an individual cognitive perspective From an organisational and social perspective From an art and design perspective.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prof Jim Warren with reference to sections 7.3 and 7.5 of The Resonant Interface.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prof Jim Warren with reference to sections 7.4 and 7.6 of The Resonant Interface.
Cognitive Modeling 1 Predicting thougts and actions
Task Analysis CSCI 4800/6800 Feb 27, Goals of task analysis Elicit descriptions of what people do Represent those descriptions Predict difficulties,
Copyright © 2010, Pearson Education Inc., All rights reserved.  Prepared by Katherine E. L. Norris, Ed.D.  West Chester University of Pennsylvania This.
© Simeon Keates 2009 Usability with Project Lecture 14 – 30/10/09 Dr. Simeon Keates.
ITM 734 Introduction to Human Factors in Information Systems
Human Abilities 2 How do people think? 1. Agenda Memory Cognitive Processes – Implications Recap 2.
Evaluation Using Modeling. Testing Methods Same as Formative Surveys/questionnaires Interviews Observation Documentation Automatic data recording/tracking.
1 Cognitive Modeling GOMS, Keystroke Model Getting some details right!
Cognitive Models Lecture # March, 2008Human Computer Intercation Spring 2008, Lecture #10 2 Agenda Cognitive models –KLM –GOMS –Fitt’s Law –Applications.
Unit 3 – Neurobiology and Communication
© Copyright 1992–2004 by Deitel & Associates, Inc. and Pearson Education Inc. All Rights Reserved. 1 Chapter 2 - Introduction to C Programming Outline.
1 1 ITM 734 Introduction to Human Factors in Information Systems Cindy Corritore This material has been developed by Georgia Tech HCI.
GOMS as a Simulation of Cognition Frank Ritter, Olivier Georgeon 28 oct 2014.
Unit 3 - Neurobiology and Communication CfE Higher Human Biology 18. Memory.
A Survey on User Modeling in HCI PRESENTED BY: MOHAMMAD SAJIB AL SERAJ SUPERVISED BY: PROF. ROBERT PASTEL.
Copyright 2006 John Wiley & Sons, Inc Chapter 5 – Cognitive Engineering HCI: Developing Effective Organizational Information Systems Dov Te’eni Jane Carey.
Human Computer Interaction Lecture 23 Cognitive Models
Chapter 5 – Cognitive Engineering
Human Computer Interaction
Task Analysis CSCI 4800/6800 Feb 27, 2003.
CEN3722 Human Computer Interaction Cognition and Perception
CIS 376 Bruce R. Maxim UM-Dearborn
GOMS Adapted from Berkeley Guir.
Models and Theories.
15. Human-Computer Interaction
GOMS as a Simulation of Cognition
GOMS as a Simulation of Cognition
Cognitive Models CS 160, Spring 2003 February 24, /11/2002
Cognitive models linguistic physical and device architectural
Model based design NGOMSL and CPM- GOMS
Model based design keystroke level model
Chapter 12 cognitive models.
Human Computer Interaction Lecture 24 Cognitive Models
Chapter 12 cognitive models.
Presentation transcript:

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Prof Jim Warren with reference to sections 7.1 and 7.2 of The Resonant Interface HCI Foundations for Interaction Design First Edition by Steven Heim Lecture 13 Design Models 1 – MHP and KLM

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-2 Chapter 7 Interaction Design Models Model Human Processor (MHP) Keyboard Level Model (KLM) GOMS Modeling Structure Modeling Dynamics Physical Models

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-3 Predictive/Descriptive Models Predictive models such as the Model Human Processor (MHP) and the Keyboard Level Model (KLM), are a priori (pre-experience) models – They give approximations of user actions before real users are brought into the testing environment. Descriptive models, such as state networks and the Three-State Model, provide a framework for thinking about user interaction –They can help us to understand how people interact with dynamic systems.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-4 Model Human Processor (MHP) The Model Human Processor can make general predictions about human performance The MHP is a predictive model and is described by a set of memories and processors that function according to a set of principles (principles of operation)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-5 Model Human Processor (MHP) Perceptual system (sensory image stores) –Sensors eyes ears –Buffers Visual image store (VIS) Auditory image store (AIS) –Cognitive system Working memory (WM)—Short-term memory Long-term memory (LTM) –Motor system arm-hand-finger system head-eye system

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-6 Model Human Processor (MHP)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-7 MHP – Working Memory (WM) WM consists of a subset of “activated” elements from LTM (long-term memory) The SISs (Sensory Image Stores – visual and audio) encode only the nonsymbolic physical parameters of stimuli. Shortly after the onset of a stimulus, a symbolic representation is registered in the WM

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-8 MHP – Working Memory The activated elements from LTM are called “chunks” –Chunks can be composed of smaller units like the letters in a word –A chunk might also consist of several words, as in a well-known phrase

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-9 MHP – Working Memory BCSBMICRA

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-10 MHP – Working Memory BCSBMICRA CBSIBMRCA

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley MHP – Working Memory Thus, how well you can remember something in WM will depend on how you think about it –Can you combine details into larger chunks? E.g., noting “double-3” “triple-7” in a phone number will make it easier to keep in memory while you dial 1-11

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-12 MHP – Long-Term Memory The cognitive processor can add items to WM but not to LTM The WM must interact with LTM over a significant length of time before an item can be stored in LTM This increases the number of cues that can be used to retrieve the item later Items with numerous associations have a greater probability of being retrieved

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley MHP – Processor Timing You can run a ‘program’ on the MHP and estimate its time –People vary, so MHP allows ‘Slowman’, ‘Fastman’ and (typical) ‘Middleman’ values for MHP steps 1-13

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-14 MHP – Processor Timing Perceptual—The perceptual system captures physical sensations by way of the visual and auditory receptor channels Perceptual decay is shorter for the visual channel than for the auditory channel (δ VIS < δ AIS ) Perceptual processor cycle time is variable according to the nature of the stimuli (τ p = 100 [50 ~ 200]ms)

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-15 MHP – Processor Timing Cognitive—The cognitive system bridges the perceptual and motor systems It can function as a simple conduit or it can involve complex processes, such as learning, fact retrieval, and problem solving Cognitive coding in the WM is predominantly visual and auditory

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-16 MHP – Processor Timing Cognitive coding in LTM is involved with associations and is considered to be predominantly semantic Cognitive decay time of WM requires a large range… δ WM = 7 [5 ~ 226]s Cognitive decay is highly sensitive to the number of chunks involved in the recalled item –δ WM (1 chunk) = 73 [73 ~ 226]s –δ WM (3 chunks) = 7 [5 ~ 34]s

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-17 MHP – Processor Timing Cognitive decay of LTM is considered infinite Cognitive processor cycle time is variable according to the nature of the stimuli τ C = 70 [25 ~ 170]ms Motor—The motor system converts thought into action Motor processor cycle time is calculated in units of discrete micromovements τ M = 70 [30 ~ 100]ms

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley MHP – Processor Timing Total time is the sum of time for the subsystem actions Total time = τ P + τ C + τ M 1-18

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-19 Keyboard Level Model (KLM) The KLM is a practical design tool that can capture and calculate the physical actions a user will have to carry out to complete specific tasks The KLM can be used to determine the most efficient method and its suitability for specific contexts.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-20 Keyboard Level Model (KLM) Given: –A task (possibly involving several subtasks) –The command language of a system –The motor skill parameter of the user –The response time parameters Predict: The time an expert user will take to execute the task using the system –Provided that he or she uses the method without error

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-21 Keyboard Level Model (KLM) The KLM is comprised of: –Operators –Encoding methods –Heuristics for the placement of mental (M) operators

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-22 KLM - Operators Operators –K Press a key or button Varies with task and typing skill, typically 0.28s –P Point with mouse Can apply Fitts’ Law – on average, 1.10s –B Mouse button Down or up – 0.10s Click – 0.20s –H Home hands to keyboard or peripheral device 0.4s –D Draw line segments 0.9 x # of segments total length in cm –M Mental preparation 1.35s –R System response Depends on the system

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-23 KLM – Encoding Methods Encoding methods define how the operators involved in a task are to be written MK[i] K[p] K[c] K[o] K[n] K[f] K[i] K[g] K[RETURN] It would be encoded in the short-hand version as M 8K [ipconfig RETURN] This results in a timing of 1.35s+8 x 0.20s = 2.95 seconds for an average skilled typist.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 24 Rules for Placing Mental (M) Operators Use Rule 0 to place candidate M’s and then cycle through Rules 1 to 4 for each M to see whether it should be deleted Rule 0 Insert M’s in front of all K’s and B’s that are not part of text or numeric argument strings proper (e.g., text or numbers). Place M’s in front of all P’s that select commands (not arguments). Rule 1 If an operator following an M is fully anticipated in an operator just previous to M, then delete the M. –E.g., point with mouse then click PMB -> PB Rule 2 If a string of MK’s belongs to a cognitive unit (e.g., the name of a command) then delete all M’s but the first. Rule 3 If a K is a redundant terminator (e.g., the terminator of a command immediately following the terminator of its argument) then delete the M in front of it. –E.g., terminate argument and then command MKMK -> MKK Rule 4 If a K terminates a constant string (e.g., a command name) then delete the M in front of it; but if the K terminates a variable string (e.g., an argument string) then keep the M in front of it.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 25 KLM exercise Delete a file using drag to trash method Delete a file using delete key method

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 26 KLM exercise answer Drag to trashDelete key P[to file]1.1P[to file]1.1 B[LEFT down]0.1B[click]0.2 M1.35H[to keyboard]0.4 P[to trash]1.1M1.35 B[LEFT up]0.1 K[Delete key]0.28 ===M s H[to mouse]*0.4 M1.35 P[to Yes button]1.1 B[click]0.2 === 7.73 s * using the mouse for the Yes (confirm) Assume that the user’s hand starts on the mouse. Also assume that the trash icon is visible at the time the user wishes to delete the file.

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1-27 What the KLM Does Not Do The KLM was not designed to consider the following: –Errors –Learning –Functionality –Recall –Concentration –Fatigue –Acceptability