Hci PDF
Hci PDF
INTER, ,CTIOW
DESIGN I
Figure 1.2 Novel forms of interactive products embedded with computational power (clockwise from top left):
ENTER
Figure 1.1 1 2D and 3D buttons. Which are easier to distin-
guish between?
Color Plate 2
-
. -
I.. , .
Color Plate 3
(b), (c) Crayoland (Dave Pape, www.ncsa.uiuc.eduNis/) is an interactive virtual environment where the child
in the image on the right uses a joystick to navigate through the space. The child is interacting with an avatar in
the flower world.
Color Plate 4
Figure 3.7 Dynalinking used in the PondWorld software. In the background is a simulation
of a pond ecosystem, comprising perch, stickleback, beetles, tadpoles, and weeds. In the
foreground is a food web diagram representing the same ecosystem but at a more abstract
level. The two are dynalinked: changes made to one representation are reflected in the
other. Here the user has clicked on the arrow between the tadpole and the weed rep-
resented in the diagram. This is shown in the PondWorld simulation as the tadpole eating
the weed. The dynalinking is accompanied by a narrative explaining what is happening and
sounds of dying organisms.
Figure 5.3 Examples of aesthetically pleasing interactive products: iMac, Nokia cell phone
and IDEO's digital radio for the BBC.
1
Figure 5.9 Virtual screen characters:
Figure 5.1 1
I-lerman the bug
watches as a stu-
dent chooses
roots for a plant
in a n Alpinc
meadow.
This book was set in 10112 Times Ten by UG I GGS Information Services, Inc., and printed
and bound by R. R. DonnelleylCrawfordsville.The cover and the color insert were printed
by Phoenix Color Corporation.
Copyright O 2002 John Wiley & Sons, Inc. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
either the prior written permission of the Publisher, or authorization through payment of the
appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA
01923, (508) 750-8400, fax (508) 750-4470. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New
York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail:
[email protected].
To order books or for customer service please call 1(800)225-5945.
eration of the issues, and that they need to learn to weigh-up the pros and cons and
be prepared to make trade-offs. We particularly want readers to realize that there
is rarely a right or wrong answer although there are good designs and poor designs.
This book is accompanied by a website, which provides a variety of resources
and interactivities, The website offers a place where readers can learn how to design
websites and other kinds of multimedia interfaces. Rather than just provide a list of
guidelines and design principles, we have developed various interactivities, includ-
ing online tutorials and step-by-step exercises, intended to support learning by
doing.
Special features
We use both the textbook and the web to teach about interaction design. To pro-
mote good pedagogical practice we include the following features:
Chapter design
Each chapter is designed to motivate and support learning:
Aims are provided so that readers develop an accurate model of what to ex-
pect in the chapter.
Key points at the end of the chapter summarize what is important.
Activities are included throughout the book and are considered an essential
ingredient for learning. They encourage readers to extend and apply their
knowledge. Comments are offered directly after the activities, because peda-
gogic research suggests that turning to the back of the text annoys readers
and discourages learning.
An assignment is provided at the end of each chapter. This can be set as a
group or individual project. The aim is for students to put into practice and
consolidate knowledge and skills either from the chapter that they have just
studied or from several chapters. Some of the assignments build on each
other and involve developing and evaluating designs or actual products.
Hints and guidance are provided on the website.
Boxes provide additional and highlighted information for readers to reflect
upon in more depth.
Dilemmas offer honest and thought-provoking coverage of controversial or
problematic issues.
Further reading suggestions are provided at the end of each chapter. These
refer to seminal work in the field, interesting additional material, or work
that has been heavily drawn upon in the text.
Interviews with nine practitioners and visionaries in the field enable readers
to gain a personal perspective of the interviewees' work, their philosophies,
their ideas about what is important, and their contributions to the field.
Cartoons are included to make the book enjoyable.
How to use this book vii
ID-Book.com website
The aim of the website is to provide you with an opportunity to learn about inter-
action design in ways that go "beyond the book." Additional in-depth material,
hands-on interactivities, a student's corner and informal tutorials will be provided.
Specific features planned include:
Hands-on interactivities, including designing a questionnaire, customizing a
set of heuristics, doing a usability analysis on 'real' data, and interactive tools
to support physical design.
Recent case studies.
Student's corner where you will be able to send in your designs, thoughts,
written articles which, if suitable, will be posted on the site at specified times
during the year.
Hints and guidance on the assignments outlined in the book.
Suggestions for additional material to be used in seminars, lab classes, and
lectures.
Key terms and concepts (with links to where to find out more about them).
Readership
This book will be useful to a wide range of readers with different needs and
aspirations.
Students from Computer Science, Software Engineering, Information Systems,
Psychology, Sociology, and related disciplines studying courses in Interaction De-
sign and Human-Computer Interaction will learn the knowledge, skills, and tech-
niques for designing and evaluating state-of-the-art products, and websites, as well
as traditional computer systems.
Web and Interaction Designers, and Usability Professionals will find plenty to
satisfy their need for immediate answers to problems as well as for building skills to
satisfy the demands of today's fast moving technical market.
Users, who want to understand why certain products can be used with ease
while others are unpredictable and frustrating, will take pleasure in discovering
that there is a discipline with practices that produce usable systems.
Researchers and developers who are interested in exploiting the potential of the
web, wireless, and collaborative technologies will find that, as well as offering guid-
ance, techniques, and much food for thought, a special effort has been made to in-
clude examples of state-of-the-art systems.
In the next section we recommend various routes through the text for different
kinds of readers.
work through chapter by chapter. Readers will also have different needs. For ex-
ample, students in Psychology will come with different background knowledge and
needs from those in Computer Science. Similarly, professionals wanting to learn
the fundamentals in a one-week course have different needs. This book and the
website are designed for using in various ways. The following suggestions are pro-
vided to help you decide which way is best for you.
These chapters cover key issues that are important when designing and evaluating
the usability of websites. A worked assignment runs through these chapters.
Acknowledgements
Many people have helped to make this book a reality. We have benefited from the
advice and support of our many professional colleagues across the world, our stu-
dents, friends, and families and we thank you all. We also warmly thank the following
people for reviewing the manuscript and making many helpful suggestions for im-
provements: Liam Bannon, Sara Bly, Penny Collings, Paul Dourish, Jean Gasen,
Peter Gregor, Stella Mills, Rory O'Connor, Scott Toolson, Terry Winograd, Richard
Furuta, Robert J.K. Jacob, Blair Nonnecke, William Buxton, Carol Traynor, Blaise
Liffich, Jan Scott, Sten Hendrickson, Ping Zhang, Lyndsay Marshall, Gary Perlman,
Andrew Dillon, Michael Harrison, Mark Crenshaw, Laurie Dingers, David Carr,
Steve Howard, David Squires, George Weir, Marilyn Tremaine, Bob Fields, Frances
Slack, Ian Graham, Alan O'Callaghan, Sylvia Wilbur, and several anonymous re-
viewers. We also thank Geraldine Fitzpatrick, Tim and Dirk from DSTC (Australia)
for their feedback on Chapters 1 and 4, Mike Scaife, Harry Brignull, Matt Davies,
the HCCS Masters students at Sussex University (2000-2001), Stephanie Wilson
and the students from the School of Informatics at City University and Information
Systems Department at UMBC for their comments.
We are particularly grateful to Sara Bly, Karen Holtzblatt, Jakob Nielsen, Abi-
gail Sellen, Suzanne Robertson, Gitta Salomon, Ben Shneiderman, Gillian Cramp-
ton Smith, and Terry Winograd for generously contributing in-depth interviews.
Lili Cheng and her colleagues allowed us to use the Hutchworld case study.
Bill Killam provided the TRZS case study. Keith Cogdill supplied the MEDLZNE-
plus case study. We thank Lili, Bill, and Keith for supplying the basic reports and
commenting on various drafts. Jon Lazar and Dorine Andrews contributed mater-
ial for the section on questionnaires, which we thank them for.
We are grateful to our Editors Paul Crockett and Gaynor Redvers-Mutton and
the production team at Wiley: Maddy Lesure, Susannah Barr, Anna Melhorn,
Gemma Quilter, and Ken Santor. Without their help and skill this book would not
have been produced. Bill Zobrist and Simon Plumtree played a significant role in
persuading us to work with Wiley and we thank them too.
About the authors xi
The authors are all senior academics with a background in teaching, researching,
and consulting in the UK, USA, Canada, Australia, and Europe. Having worked
together on two other successful text books, they bring considerable experience in
curriculum development, using a variety of media for distance learning as well as
face-to-face teaching. They have considerable knowledge of creating learning texts
and websites that motivate and support learning for a range of students.
All three authors are specialists in interaction design and human-computer in-
teraction (HCI). In addition they bring skills from other discipline~.Yvonne
Rogers is a cognitive scientist, Helen Sharp is a software engineer, and Jenny
Preece works in information systems. Their complementary knowledge and skills
enable them to cover the breadth of concepts in interaction design and HCI to pro-
duce an interdisciplinary text and website. They have collaborated closely, sup-
porting and commenting upon each other's work to produce a high degree of
integration of ideas with one voice. They have shared everything from initial con-
cepts, through writing, design and production.
Contents
References 493
Credits 503
Index 509
I
by Gary Perlman
focus. A user-centered focus requires close work with users (not just customer-buy-
ers), from analysis through design, evaluation, and maintenance. A lack of user-
centered focus results in products and services that often do not meet the needs of
their intended users. Don Norman's design books have convinced many that these
problems are not unique to software, so this book's focus on interaction design feels
right.
To help software teams adopt a user-centered focus, I've searched for books
with end-to-end coverage from analysis, to design, to implementation (possibly of
prototypes), to evaluation (with iteration). Some books have tried to please all au-
diences and have become encyclopedias of user interface development, covering
topics worth knowing, but not in enough detail for readers to understand them.
Some books have tried to cover theory in depth and tried to appeal to developers
who have little interest in theory. Whatever the reasons for these choices, the re-
sults have been lacking. This book has chosen fewer topics and covered them in
more depth; enough depth, I think, to put the ideas into practice. I think the mater-
ial is presented in a way that is understandable by a wide audience, which is impor-
tant in order for the book to be useful to whole multidisciplinary teams.
A recommended book . . .
I've been waiting for this book for many years. I think it's been worth the wait.
As the director of the HCI Bibliography project (www.hcibib.org), a free-ac-
cess HCI portal receiving a half-million hits per year, I receive many requests for
suggestions for books, particularly from students and software development man-
agers. To answer that question, I maintain a list of recommended readings in ten
categories (with 20,000 hits per year). Until now, it's been hard to recommend just
one book from that list. I point people to some books for motivation, other books
for process, and books for specific topics (e.g., task analysis, ergonomics, usability
testing). This book fits well into half the categories in my list and makes it easier to
recommend one book to get started and to have on hand for development.
I welcome the commitment of the authors to building a website for the book.
It's a practice that has been adopted by other books in the field to offer additional
information and keep the book current. The site also presents interactive content
to aid in tasks like conducting surveys and heuristic evaluations. I look forward to
seeing the book's site present new materials, but as director of www.hcibib.org, I
hope they use links to instead of re-inventing existing resources.
Gary Perlman
Columbus
October 2001
Foreword xxiii
1.1 Introduction
How many interactive products are there in everyday use? Think for a minute
about what you use in a typical day: cell phone, computer, personal organizer, re-
mote control, soft drink machine, coffee machine, ATM, ticket machine, library in-
formation system, the web, photocopier, watch, printer, stereo, calculator, video
game.. . the list is endless. Now think for a minute about how usable they are.
How many are actually easy, effortless, and enjoyable to use? All of them, several,
or just one or two? This list is probably considerably shorter. Why is this so?
Think about when some device caused you considerable grief-how much time
did you waste trying to get it to work? Two well-known interactive devices that
cause numerous people immense grief are the photocopier that doesn't copy the
way they want and the VCR that records a different program from the one they
thought they had set or none at all. Why do you think these things happen time and
time again? Moreover, can anything be done about it?
Many products that require users to interact with them to carry out their tasks
(e.g., buying a ticket online from the web, photocopying an article, pre-recording a TV
program) have not necessarily been designed with the users in mind. Typically, they
have been engineered as systems to perform set functions. While they may work effec-
tively from an engineering perspective, it is often at the expense of how the system will
be used by real people. The aim of interaction design is to redress this concern by
2 Chapter 1 What is interaction design?
bringing usability into the design process. In essence, it is about developing interactive
products1 that are easy, effective, and enjoyable to use-from the users' perspective.
In this chapter we begin by examining what interaction design is. We look at
the difference between good and poor design, highlighting how products can differ
radically in their usability. We then describe what and who is involved in interac-
tion design. In the last part of the chapter we outline core aspects of usability and
how these are used to assess interactive products. An assignment is presented at
the end of the chapter in which you have the opportunity to put into practice what
you have read, by evaluating an interactive product using various usability criteria.
The main aims of the chapter are to:
Explain the difference between good and poor interaction design.
Describe what interaction design is and how it relates to human-computer
interaction and other fields.
Explain what usability is.
Describe what is involved in the process of interaction design.
Outline the different forms of guidance used in interaction design.
Enable you to evaluate an interactive product and explain what is good and
bad about it in terms of the goals and principles of interaction design.
'We use the term interactive products generically to refer to all classes of interactive systems,
technologies, environments, tools, applications,and devices.
1.2 Good and poor design 3
You wait to hear how to listen to a recorded message. But there are no further
instructions from the phone. You look down at the instruction sheet again and
read:
"2. Touch*, your room number, and #". You do so and the system replies,
"You have reached the mailbox for room 106. To leave a message type in your
password."
You type in the room number again and the system replies, "Please enter room
number again and then your password."
You don't know what your password is. You thought it was the same as your
room number. But clearly not. At this point you give up and call reception for help.
The person at the desk explains the correct procedure for recording and listening
to messages. This involves typing in, at the appropriate times, the room number
and the extension number of the phone (the latter is your password, which is differ-
ent from the room number). Moreover, it takes six steps to access a message and
five steps to leave a message. You go out and buy a new cell phone.
What is problematic with this voice-mail system?
It is infuriating.
It is confusing.
It is inefficient, requiring you to carry out a number of steps for basic tasks.
It is difficult to use.
It has no means of letting you know at a glance whether any messages have
been left or how many there are. You have to pick up the handset to find out
and then go through a series of steps to listen to them.
It is not obvious what to do: the instructions are provided partially by the
system and partially by a card beside the phone.
Now consider the following phone answering machine. Figure 1.1 shows two
small sketches of an answering machine phone. Incoming messages are represented
using physical marbles. The number of marbles that have moved into the pinball-
like chute indicates the number of messages. Dropping one of these marbles into a
slot in the machine causes the recorded message to play. Dropping the same mar-
ble into another slot on the phone dials the caller who left the message.
How does the "marble" answering machine differ from the voice-mail system?
It uses familiar physical objects that indicate visually at a glance how many
messages have been left.
It is aesthetically pleasing and enjoyable to use.
It only requires one-step actions to perform core tasks.
It is a simple but elegant design.
It offers less functionality and allows anyone to listen to any of the messages.
The marble answering machine was designed by Durrell Bishop while a stu-
dent at the Royal College of Art in London (described by Crampton-Smith, 1995).
One of his goals was to design a messaging system that represented its basic func-
tionality in terms of the behavior of everyday objects. To do this, he capitalized on
people's everyday knowledge of how the physical world works. In particular, he
made use of the ubiquitous everyday action of picking up a physical object and
putting it down in another place. This is an example of an interactive product de-
signed with the users in mind. The focus is on providing them with an enjoyable ex-
perience but one that also makes efficient the activity of receiving messages.
However, it is important to note that although the marble answering machine is a
very elegant and usable design, it would not be practical in a hotel setting. One of
the main reasons is that it is not robust enough to be used in public places, for ex-
ample, the marbles could easily get lost or taken as souvenirs. Also, the need to
identify the user before allowing the messages to be played is essential in a hotel
setting. When considering the usability of a design, therefore, it is important to
take into account where it is going to be used and who is going to use it. The marble
answering machine would be more suited in a home setting-provided there were
no children who might be tempted to play with the marbles!
Comment (a) Public phones are designed to be used by the general public. Many have Braille em-
bossed on the keys and speaker volume control to enable people who are blind and
hard of hearing to use them.
Cell phones are intended for all user groups, although they can be difficult to use for
people who are blind or have limited manual dexterity.
(b) Most phone boxes are designed with a simple mode of interaction: insert card or
money and key in the phone number. If engaged or unable to connect the money or
card is returned when the receiver is replaced. There is also the option of allowing the
caller to make a follow-on call by pressing a button rather than collecting the money
and reinserting it again. This function enables the making of multiple calls to be more
efficient.
I 6 Chapter 1 What is interaction design?
Cell phones have a more complex mode of interaction. More functionality is provided,
requiring the user to spend time learning how to use them. For example, users can save
phone numbers in an address book and then assign these to "hotkeys," allowing them
to be called simply through pressing one or two keys.
(c) Phone boxes are intended to be used in public places, say on the street or in a bus sta-
tion, and so have been designed to give the user a degree of privacy and noise protec-
tion through the use of hoods and booths.
Cell phones have have been designed to be used any place and any time. However, lit-
tle consideration has been given to how such flexibility affects others who may be in
the same public place (e.g.,sitting on trains and buses).
I
1.3 What is interaction design?
I By interaction design, we mean
designing interactive products to support people in their everyday and working lives.
I
In particular, it is about creating user experiences that enhance and extend the way
people work, communicate and interact. Winograd (1997) describes it as "the de-
sign of spaces for human communication and interaction." In this sense, it is about
finding ways of supporting people. This contrasts with software engineering, which
focuses primarily on the production of software solutions for given applications. A
simple analogy to another profession, concerned with creating buildings, may clar-
ify this distinction. In his account of interaction design, Terry Winograd asks how
architects and civil engineers differ when faced with the problem of building a
house. Architects are concerned with the people and their interactions with each
other and within the house being built. For example, is there the right mix of family
and private spaces? Are the spaces for cooking and eating in close proximity? Will
people live in the space being designed in the way it was intended to be used? In
contrast, engineers are interested in issues to do with realizing the project. These
include practical concerns like cost, durability, structural aspects, environmental
aspects, fire regulations, and construction methods. Just as there is a difference
between designing and building a house, so too, is there a distinction between in-
teraction design and software engineering. In a nutshell, interaction design is re-
lated to software engineering in the same way as architecture is related to civil
engineering.
One of the biggest challenges at that time was to develop computers that could
be accessible and usable by other people, besides engineers, to support tasks in-
volving human cognition (e.g., doing sums, writing documents, managing accounts,
drawing plans). To make this possible, computer scientists and psychologists be-
came involved in designing user interfaces. Computer scientists and software engi-
neers developed high-level programming languages (e.g., BASIC, Prolog), system
architectures, software design methods, and command-based languages to help in
such tasks, while psychologists provided information about human capabilities
(e.g., memory, decision making).
The scope afforded by the interactive computing technology of that time (i.e.,
the combined use of visual displays and interactive keyboards) brought about
many new challenges. Research into and development of graphical user inter-
faces (GUI for short, pronounced "goo-ee") for office-based systems took off in
a big way. There was much research into the design of widgets (e.g., menus, win-
dows, palettes, icons) in terms of how best to structure and present them in a
GUI.
In the mid '80s, the next wave of computing technologies-including speech
recognition, multimedia, information visualization, and virtual reality-presented
even more opportunities for designing applications to support even more people.
Education and training were two areas that received much attention. Interactive
learning environments, educational software, and training simulators were some of
the main outcomes. To build these new kinds of interactive systems, however, re-
quired a different kind of expertise from that of psychologists and computer pro-
grammers. Educational technologists, developmental psychologists, and training
experts joined in the enterprise.
As further waves of technological development surfaced in the '90s-network-
ing, mobile computing, and infrared sensing-the creation of a diversity of applica-
tions for all people became a real possibility. All aspects of a person's life-at
home, on the move, at school, at leisure as well as at work, alone, with family or
friends-began to be seen as areas that could be enhanced and extended by design-
ing and integrating various arrangements of computer technologies. New ways of
learning, communicating, working, discovering, and living were envisioned.
8 Chapter 1 What is interaction design?
In the mid '90s, many companies realized it was necessary again to extend their
existing multidisciplinary design teams to include professionals trained in media
and design, including graphical design, industrial design, film, and narrative. Sociol-
ogists, anthropologists, and dramaturgists were also brought on board, all having
quite a different take on human interaction from psychologists. This wider set of
1.3 What is interaction design? 9
people were thought to have the right mix of skills and understanding of the differ-
ent application areas necessary to design the new generation of interactive systems.
For example, designing a reminder application for the family requires understand-
ing how families interact; creating an interactive story kit for children requires un-
derstanding how children write and understand narrative, and developing an
interactive guide for art-gallery visitors requires appreciating what people do and
how they move through public spaces.
Now in the 'OOs, the possibilities afforded by emerging hardware capabilities-
e.g., radio-frequency tags, large interactive screens, and information appliances-
has led to a further realization that engineers, who know about hardware, software,
and electronics are needed to configure, assemble, and program the consumer elec-
tronics and other devices to be able to communicate with each other (often re-
ferred to as middleware).
practice, the makeup of a given design team depends on the kind of interactive product
ing built. Who do you think would need to be involved in developing:
(a) a public kiosk providing information about the exhibits available in a science
museum?
(b) an interactive educational website to accompany a TV series?
Comment Each team will need a pumber of different people with different skill sets. For example, the
first interactive product would need:
(a) graphic and inteiaction designers, museum curators, educational advisors, software
engineers, software designers, usability engineers, ergonomists
The second project would need:
(b) TV producers, graphic and interaction designers, teachers, video experts, software
engineers, software designers, usability engineers
In addition, as both systeds are being developed for use by the general public, representa-
tive users, such as school children and parents, should be involved.
In practice, design teams often end up being quite large, especially if they are working on a
big project to meet a fixed deadline. For example, it is common to find teams of fifteen peo-
ple or more working on a website project for an extensive period of time, like six months.
This means that a number of people from each area of expertise are likely to be working as
part of the project team.
One infamous dot.com fashion clothes company that failed to appreciate the im-
portance of good interaction design paid heavily for its oversight, becoming
bankrupt within a few months of going public.' Their approach had been to go
for an "all singing and all dancing," glossy 3D graphical interface. One of the
problems with this was that it required several minutes to download. Further-
more, it often took more than 20 minutes to place an order by going through a
painfully long and slow process of filling out an online form-only to discover
that the order was not successful. Customers simply got frustrated with the site
and never returned.
In response to the growing demand for interaction design, an increasing
number of consultancies are establishing themselves as interaction design ex-
perts. One such company is Swim, set up by Gitta Salomon to assist clients with
the design of interactive products (see the interview with her at the end of this
chapter). She points out how often companies realize the importance of interac-
tion design but don't know how to do it themselves. So they get in touch with
companies, like Swim, with their partially developed products and ask them for
help. This can come in the form of an expert "crit" in which a detailed review of
the usability and design of the product is given (for more on expert evaluation,
see Chapter 13). More extensively, it can involve helping clients create their
products.
Another established design company that practices interaction design is IDEO,
which now has many branches worldwide. Drawing on over 20 years of experience
in the area, they design products, services, and environments for other companies,
pioneering new user experiences (Spreenberg et al., 1995). They have developed
thousands of products for numerous clients, each time following their particular
brand of user-centered design (see Figure 1.5).
in questionnaires, and even asking them to become co-designers. The findings from
the different ways of engaging and eliciting knowledge from users are then inter-
preted with respect to ongoing design activities (we give more detail about all these
aspects of evaluation in Chapters 10-14).
Equally important as involving users in evaluating an interactive product is un-
derstanding what people currently do. This form of research should take place be-
fore building any interactive product. Chapters 3,4, and 5 cover a lot of this ground
by explaining in detail how people act and interact with one another, with informa-
tion, and with various technologies, together with describing their strengths and
weaknesses. Such knowledge can greatly help designers determine which solutions
to choose from the many design alternatives available and how to develop and test
these further. Chapter 7 describes how an understanding of users' needs can be
translated to requirements, while Chapter 9 explains how to involve users effec-
tively in the design process.
A main reason for having a better understanding of users is that different
users have different needs and interactive products need to be designed accord-
ingly. For example, children have different expectations about how they want
to learn or play from adults. They may find having interactive quizzes and cartoon
characters helping them along to be highly motivating, whereas most adults find
them annoying. Conversely, adults often like talking-heads discussions about top-
ics, but children find them boring. Just as everyday objects like clothes, food, and
games are designed differently for children, teenagers, and adults, so, too, must in-
teractive products be designed to match the needs of different kinds of users.
In addition to the four basic activities of design, there are three key character-
istics of the interaction design process:
1. Users should be involved through the development of the project.
2. Specific usability and user experience goals should be identified, clearly doc-
umented, and agreed upon at the beginning of the project.
3. Iteration through the four activities is inevitable.
We have already mentioned the importance of involving users and will return to
this topic throughout the book. Iterative design will also be addressed later when
we talk about the various design and evaluation methods by which this can be
achieved. In the next section we describe usability and user experience goals.
goals are concerned with meeting specific usability criteria (e.g., efficiency) and
user experience goals are largely concerned with explicating the quality of the user
experience (e.g., to be aesthetically pleasing).
kind of user in any kind of situation avoid the dangers of carrying out unwanted ac-
tions aceidentally. It also refers to the perceived fears users might have of the con-
sequences of making errors and how this affects their behavior. To make
computer-based systems safer in this sense involves (i) preventing the user from
making serious errors by reducing the risk of wrong keyslbuttons being mistakenly
activated (an example is not placing the quit or delete-file command right next to
the save command on a menu) and (ii) providing users with various means of re-
covery should they make errors. Safe interactive systems should engender confi-
dence and allow the user the opportunity to explore the interface to try out new
operations (see Figure 1.6a). Other safety mechanisms include undo facilities and
Color Settings b
lb)
Figure 1.6 (a) A safe and an unsafe menu. Which is which and why? (b) Warning dialog
message from Eudora.
16 Chapter 1 What is interaction design?
confirmatory dialog boxes that give users another chance to consider their inten-
tions (a well-known example used in e-mail applications is the appearance of a dia-
log box, after the user has highlighted messages to be deleted, saying: "Are you
sure you want to delete all these messages?" See Figure 1.6(b)).
Question: Does the system prevent users from making serious errors and, if
they do make an error, does it permit them to recover easily?
Utility refers to the extent to which the system provides the right kind of func-
tionality so that users can do what they need or want to do. An example of a system
with high utility is an accounting software package providing a powerful computa-
tional tool that accountants can use to work out tax returns. A example of a system
with low utility is a software drawing tool that does not allow users to draw free-
hand but forces them to use a mouse to create their drawings, using only polygon
shapes.
Question: Does the system provide an appropriate set of functions that enable
users to carry out all their tasks in the way they want to do them?
Learnability refers to how easy a system is to learn to use. It is well known that
people don't like spending a long time learning how to use a system. They want to
get started straight away and become competent at carrying out tasks without too
much effort. This is especially so for interactive products intended for everyday use
(e.g., interactive TV, email) and those used only infrequently (e.g., videoconferenc-
ing). To a certain extent, people are prepared to spend longer learning more com-
plex systems that provide a wider range of functionality (e.g., web authoring tools,
word processors). In these situations, CD-ROM and online tutorials can help by
providing interactive step-by-step material with hands-on exercises. However,
many people find these tedious and often difficult to relate to the tasks they want to
1.5 The goals of interaction design 17
accomplish. A key concern is determining how much time users are prepared to
spend learning a system. There seems little point in developing a range of function-
ality if the majority of users are unable or not prepared to spend time learning how
to use it.
Question: How easy is it and how long does it take (i) to get started using a sys-
tem t o perform core tasks and (ii) to learn the range of operations to perform a
wider set of tasks?
Memorability refers to how easy a system is to remember how to use, once
learned. This is especially important for interactive systems that are used infre-
quently. If users haven't used a system or an operation for a few months or longer,
they should be able to remember or at least rapidly be reminded how to use it.
Users shouldn't have to keep relearning how to carry out tasks. Unfortunately, this
tends to happen when the operations required to be learned are obscure, illogical,
or poorly sequenced. Users need to be helped to remember how to do tasks. There
are many ways of designing the interaction to support this. For example, users can
be helped to remember the sequence of operations at different stages of a task
through meaningful icons, command names, and menu options. Also, structuring
options and icons so they are placed in relevant categories of options (e.g., placing
all the drawing tools in the same place on the screen) can help the user remember
where to look to find a particular tool at a given stage of a task.
Question: What kinds of interface support have been provided to help users re-
member how to carry out tasks, especially for systems and operations that are used
infrequently?
How long do you think it should take to learn how to use the following interactive products
and how long does it actually take most people to learn them? How memorable are they?
(a) using a VCR to play a video
(b) using a VCR to pre-record two programs
(c) using an authoring tool to create a website
Comment (a) To play a video should be as simple as turning the radio on, should take less than 30
seconds to work out, and then should be straightforward to do subsequently. Most
people are able to fathom how to play a video. However, some systems require the
user to switch to the "video" channel using one or two remote control devices, select-
ing from a choice of 50 or more channels. Other settings may also need to be config-
ured before the video will play. Most people are able to remember how to play a video
once they have used a particular VCR.
(b) This is a more complex operation and should take a couple of minutes to learn how to
do and to check that the programming is correct. In reality, many VCRs are so poorly
designed that 80% of the population is unable to accomplish this task, despite several
attempts. Very few people remember how to pre-record a program, largely because
the interaction required to do this is poorly designed, with poor or no feedback, and is
often illogical from the user's perspective. Of those, only a few will bother to go
through the manual again.
18 Chapter 1 Whpt is interaction design?
(c) A well-designed authoring too1 should let the user create a basic page in about 20 min-
utes. Learning the full range of operations and possibilities is likely to take much
longer, possibly a few days. In reality, there are some good authoring tools that allow
the user to get started straight away, providing templates that they can adapt. Most
users will extend their repertoire, taking another hour or so to learn more functions.
However, very few people actually learn to use the full range of functions provided by
the authoring tool. Users will tend to remember frequently used operations (e.g., cut
and paste, inserting images), especially if they are consistent with the way they are car-
ried out in other software applications. However, less frequently used operations may
need to be relearned (e.g., formatting tables).
The usability goals discussed so far are well suited to the design of business systems
intended to support working practices. In particular, they are highly relevant for
companies and organizations who are introducing or updating applications running
on desktop and networked systems-that are intended to increase productivity by
improving and enhancing how work gets done. As well as couching them in terms
of specific questions, usability goals are turned into usability criteria. These are
specific objectives that enable the usability of a product to be assessed in terms of
how it can improve (or not) a user's performance. Examples of commonly used us-
ability criteria are time to complete a task (efficiency), time to learn a task (learn-
ability), and the number of errors made when carrying out a given task over time
(memorability).
----,
TfUn
satisfying
emotionally
/ fulfilling
efficient
enjoiable easy to
TI effective rewarding
remember to use
i 1
how to use
easy to safe
learn to use supportive
entertaining of creativity
\ /
havetgood
utility
\helpful /
aesthetically
motivating
Figure 1.7 Usability and user experience goals. Usability goals are central to interaction de-
sign and are operationalized through specific criteria. User experience goals are shown in
the outer circle and are less clearly defined.
20 Chapter 1 What is interaction design?
I
hammer to hit a virtual nail represented on the computer screen) compared with
using a more efficient way to do the same thing (e.g., selecting an option using com-
mand keys) may require more effort but could, conversely, result in a more enjoy-
able and fun experience.
Recognizing and understanding the trade-offs between usability and user expe-
rience goals is important. In particular, this enables designers to become aware of
the consequences of pursuing different combinations of them in relation to fulfill-
ing different users' needs. Obviously, not all of the usability goals and user experi-
ence goals apply to every interactive product being developed. Some combinations
will also be incompatible. For example, it may not be possible or desirable to de-
sign a process control system that is both safe and fun. As stressed throughout this
chapter, what is important depends on the use context, the task at hand, and who
the intended users are.
elow are a number of proposed interactive products. What do you think are the key usabil-
y goals and user experience goals for each of them?
(a) a mobile device that allows young children to communicate with each other and play
collaborative games
(b) a video and computer conferencing system that allows students to learn at home
(c) an Internet application that allows the general public to access their medical records
via interactive TV
(d) a CAD system for architects and engineers
(e) an online community that provides support for people who have recently been
bereaved
Comment (a) Such a collaborative device should be easy to use, effective, efficient, easy to learn
and use, fun and entertaining.
(b) Such a learning device should be easy to learn, easy to use, effective, motivating and
rewarding.
(c) Such a personal system needs to be safe, easy to use and remember how to use, effi-
cient and effective.
(d) Such a tool needs to be easy to learn, easy to remember, have good utility, be safe, ef-
ficient, effective, support creativity and be aesthetically pleasing.
(e) Such a system needs to be easy to learn, easy to use, motivating, emotionally satisfy-
ing and rewarding.
do next in their tasks. Design principles are derived from a mix of theory-based
knowledge, experience, and common sense. They tend to be written in a prescrip-
tive manner, suggesting to designers what to provide and what to avoid at the inter-
face-if you like, the do's and don'ts of interaction design. More specifically, they
are intended to help designers explain and improve the design (Thimbleby, 1990).
However, they are not intended to specify how to design an actual interface (e.g.,
telling the designer how to design a particular icon or how to structure a web por-
tal) but act more like a set of reminders to designers, ensuring that they have pro-
vided certain things at the interface.
A number of design principles have been promoted. The best known are con-
cerned with how to determine what users should see and do when carrying out
their tasks using an interactive product. Here we briefly describe the most common
ones: visibility, feedback, constraints, mapping, consistency, and affordances. Each
of these has been written about extensively by Don Norman (1988) in his bestseller
The Design of Everyday Things.
ing the user to only actions permissible at that stage of the activity (see Figure 1.8).
One of the advantages of this form of constraining is it prevents the user from se-
lecting incorrect options and thereby reduces the chance of making a mistake. The
use of different kinds of graphical representations can also constrain a person's in-
terpretation of a problem or information space. For example, flow chart diagrams
show which objects are related to which, thereby constraining the way the informa-
tion can be perceived.
Norman (1999) classifies constraints into three categories: physical, logical, and
cultural. Physical constraints refer to the way physical objects restrict the move-
ment of things. For example, the way an external disk can be placed into a disk
drive is physically constrained by its shape and size, so that it can be inserted in
only one way. Likewise, keys on a pad can usually be pressed in only one way.
Logical constraints rely on people's understanding of the way the world works
(cf. the marbles answering machine design). They rely on people's common-sense
reasoning about actions and their consequences. Picking up a physical marble and
placing it in another location on the phone would be expected by most people to
1.6 More on usability: design and usability principles 23
Figure 1.9 (a) Natural mapping between rewind, play, and fast forward on a tape recorder
device. (b) An alternative arbitrary mapping.
trigger something else to happen. Making actions and their effects obvious enables
people to logically deduce what further actions are required. Disabling menu op-
tions when not appropriate for the task in hand provides logical constraining. Jt al-
lows users to reason why (or why not) they have been designed this way and what
options are available.
Cultural constraints rely on learned conventions, like the use of red for warn-
ing, the use of certain kinds of audio signals for danger, and the use of the smiley
face to represent happy emotions. Most cultural constraints are arbitrary in the
sense that their relationship with what is being represented is abstract, and could
have equally evolved to be represented in another form (e.g., the use of yellow in-
stead of red for warning). Accordingly, they have to be learned. Once learned and
accepted by a cultural group, they become universally accepted conventions. Two
universally accepted interface conventions are the use of windowing for display-
ing information and the use of icons on the desktop to represent operations and
documents.
Mapping This refers to the relationship between controls and their effects in the
world. Nearly all artifacts need some kind of mapping between controls and effects,
whether it is a flashlight, car, power plant, or cockpit. An example of a good map-
ping between control and effect is the up and down arrows used to represent the up
and down movement of the cursor, respectively, on a computer keyboard. The
mapping of the relative position of controls and their effects is also important. Con-
sider the various musical playing devices (e.g., MP3, CD player, tape recorder).
How are the controls of playing, rewinding, and fast forward mapped onto the de-
sired effects? They usually follow a common convention of providing a sequence of
buttons, with the play button in the middle, the rewind button on the left and the
fast-forward on the right. This configuration maps directly onto the directionality
of the actions (see Figure 1.9a). Imagine how difficult it would be if the mappings in
Figure 1.9b were used. Look at Figure 1.10 and determine from the various map-
pings which is good and which would cause problems to the person using it.
Figure 1.10 Four possible combinations of arrow-key mappings. Which is the most natural
mapping?
24 Chapter 1 What is interaction design?
Consistency This refers to designing interfaces to have similar operations and use
similar elements for achieving similar tasks. In particular, a consistent interface is
one that follows rules, such as using the same operation to select all objects. For
example, a consistent operation is using the same input action to highlight any
graphical object at the interface, such as always clicking the left mouse button. In-
consistent interfaces, on the other hand, allow exceptions to a rule. An example of
this is where certain graphical objects (e.g., email messages presented in a table)
can be highlighted only by using the right mouse button, while all other operations
are highlighted using the left button. A problem with this kind of inconsistency is
that it is quite arbitrary, making it difficult for users to remember and making the
users more prone to mistakes.
One of the benefits of consistent interfaces, therefore, is that they are easier to
learn and use. Users have to learn only a single mode of operation that is applicable
to all objects. This principle works well for simple interfaces with limited operations,
like a mini CD player with a small number of operations mapped onto separate but-
tons. Here, all the user has to do is learn what each button represents and select ac-
cordingly. However, it can be more problematic to apply the concept of consistency
to more complex interfaces, especially when many different operations need to be
designed for. For example, consider how to design an interface for an application
that offers hundreds of operations (e.g. a word-processing application). There is
simply not enough space for a thousand buttons, each of which maps onto an indi-
vidual operation. Even if there were, it would be extremely difficult and time-
consuming for the user to search through them all to find the desired operation.
A much more effective design solution is to create categories of commands
that can be mapped into subsets of operations. For the word-processing applica-
tion, the hundreds of operations available are categorized into subsets of different
menus. All commands that are concerned with file operations (e.g., save, open,
close) are placed together in the same file menu. Likewise, all commands con-
cerned with formatting text are placed in a format menu. Selecting an operation
then becomes a matter of homing in on the right category (menu) of options and
scanning it for the desired one, rather than scrolling through one long list. How-
ever, the consistency rule of having a visible one-to-one mapping between com-
mand and operation is broken. Operations are not immediately visible at the
interface, but are instead hidden under different categories of menus. Furthermore,
some menu items are immediately visible, when a top-level menu is first pulled
down, while others remain hidden until the visible items are scrolled over. Thus,
users need to learn what items are visible in each menu category and which are hid-
den in submenus.
The way the items are divided between the categories of menu items can also
appear inconsistent to users. Various operations appear in menus where they do
not belong. For example, the sorting operation (very useful for listing references or
names in alphabetical order) in Microsoft Word 2001 is in the Table menu (the
Mac Version). In the previous Word 98 version, it was in both the Tools and Table
menus. I always thought of it as a Tool operation (like Word Count), and became
very frustrated to discover that as a default for Word 2001 it is only in the Table
menu. This makes it inconsistent for me in two ways: (i) with the previous version
and (ii) in the category it has been placed. Of course, I can customize the new ver-
1.6 More on usability: design and usability principles 25
sion so that the menus are structured in the way I think they should be, but this all
takes considerable time (especially when I use different machines at work, home,
and when travelling).
Another problem with consistency is determining what aspect of an interface
to make consistent with what else. There are often many choices, some of which
can be inconsistent with other aspects of the interface or ways of carrying out ac-
tions. Consider the design problem of developing a mechanism to let users lock
their files on a shared server. Should the designer try to design it to be consistent
with the way people lock things in the outside world (called external consistency)
or with the way they lock objects in the existing system (called internal consis-
tency)? However, there are many different ways of locking objects in the physical
world (e.g., placing in a safe, using a padlock, using a key, using a child safety lock),
just as there are different ways of locking electronically (e.g., using PIN numbers,
passwords, permissions, moving the physical switches on floppy disks). The prob-
lem facing designers is knowing which one to be consistent with.
an evaluation. Below are the ten main usability principles, developed by Nielsen
(2001) and his colleagues. Note how some of them overlap with the design principles.
1. Visibility of system status-always keep users informed about what is going
on, through providing appropriate feedback within reasonable time
2. Match between system and the real world-speak the users' language, using
words, phrases and concepts familiar to the user, rather than system-
oriented terms
3. User control and freedom-provide ways of allowing users to easily escape
from places they unexpectedly find themselves, by using clearly marked
'emergency exits'
4. Consistency and standards-avoid making users wonder whether different
words, situations, or actions mean the same thing
5. Help users recognize, diagnose, and recover from errors-use plain lan-
guage to describe the nature of the problem and suggest a way of solving it
6. error prevention-where possible prevent errors occurring in the first place
7. Recognition rather than recall-make objects, actions, and options visible
8. Flexibility and efficiency of use-provide accelerators that are invisible to
novice users, but allow more experienced users to carry out tasks more
quickly
9. Aesthetic and minimalist design-avoid using information that is irrelevant
or rarely needed
10. Help and documentation-provide information that can be easily searched
and provides help in a set of concrete steps that can easily be followed
One of the main design principles which Nielsen has proselytized, especially for website de-
sign, is simplicity. He proposes that designers go through all of their design elements and re-
move them one by one. If a design works just as well without an element, then remove it. Do
you think this is a good design principle? If you have your own website, try doing this and
seeing what happens. At what point does the interaction break down?
Comment Simplicity is certainly an important design principle. Many designers try to cram too much into
a screenful of space, making it unwieldy for people to find what they are interested in. Remov-
ing design elements to see what can be discarded without affecting the overall function of the
website can be a salutary lesson. Unnecessary icons, buttons, boxes, lines, graphics, shading,
and text can be stripped, leaving a cleaner, crisper, and easier-to-navigate website. However, a
certain amount of graphics, shading, coloring, and formatting can make a site aesthetically
pleasing and enjoyable to use. Plain vanilla sites with just lists of text and a few hyperlinks may
not be as appealing and may put certain visitors off returning. The key is getting the right bal-
ance between aesthetic appeal and the right amount and kind of information per page.
Design and usability principles have also been operationalized into even more spe-
cific prescriptions called rules. These are guidelines that should be followed. An ex-
ample is "always place the quit or exit button at the bottom of the first menu list in
an application."
28 Chapter 1 What is interaction design?
Assignment
This assignment is intended for you to put into practice what you have read about in this chap-
ter. Specifically, the objective is to enable you to define usability and user experience goals and
to use design and usability principles for evaluating the usability of an interactive product.
Find a handheld device (e.g. remote control, handheld computer, or cell phone) and ex-
amine how it has been designed, paying particular attention to how the user is meant to in-
teract with it.
(a) From your first impressions, write down what first comes to mind as to what is good
and bad about the way the device works. Then list (i) its functionality and (ii) the
range of tasks a typical user would want to do using it. Is the functionality greater,
equal, or less than what the user wants to do?
(b) Based on your reading of this chapter and any other material you have come across,
compile your own set of usability and user experience goals that you think will be
I Summary 29
most useful in evaluating the device. Decide which are the most important ones and
explain why.
(c) Translate the core usability and user experience goals you have selected into two or
three questions. Then use them to assess how well your device fares (e.g., Usability
goals. What specific mechanisms have been used to ensure safety? How easy is it to
learn? User experience goals: Is it fun to use? Does the user get frustrated easily? If
so, why?).
(d) Repeat (b) and (c) for design concepts and usability principles (again choose a rele-
vant set).
(e) Finally, discuss possible improvements to the interface based on your usability
evaluation.
Summary
In this chapter we have looked at what interaction design is and how it has evolved. We ex-
amined briefly its makeup and the various processes involved. We pointed out how the no-
tion of usability is fundamental to interaction design. This was explained in some detail,
describing what it is and how it is operationalized to assess the appropriateness, effective-
ness, and quality of interactive products. A number of high-level design principles were also
introduced that provide different forms of guidance for interaction design.
30 Chapter 1 What is interaction design?
Key points
Interaction design is concerned with designing interactive products to support people in
their everyday and working lives.
Interaction design is multidisciplinary, involving many inputs from wide-reaching disci-
plines and fields.
Interaction design is now big business: many companies want it but don't know how to
I
do it.
Optimizing the interaction between users and interactive products requires taking into
account a number of interdependent factors, including context of use, type of task, and
kind of user.
Interactive products need to be designed to match usability goals like ease of use and
learning.
User experience goals are concerned with creating systems that enhance the user experi-
ence in terms of making it enjoyable, fun, helpful, motivating, and pleasurable.
Design and usability principles, like feedback and simplicity, are useful heuristics for an-
alyzing and evaluating aspects of an interactive product.
Further reading
Here we recommend a few seminal readings. A more compre- NORMAN, D. (1999) ACM Interactions Magazine, MayIJune,
hensive list of useful books, articles, websites, videos, and 38-42. Affordances, conventions and design. This is a short
other material can be found at our website. and thought-provoking critique of design principles.
WINOGRAD, T. (1997) From computing machinery to inter- GRUDIN, J. (1990) The computer reaches out: the historical
action design. In P. Denning and R. Metcalfe (eds.) Beyond continuity of interface design. In CHZ'90 Proc. 261-268.
Calculation: the Next Fifty Years of Computing. New York: GRUDIN, J. (1989) The case against user interface consistency.
Springer-Verlag, 14S162. Terry Winograd provides an Communications of the ACM, 32(10), 1164-1173.
overview of how interaction design has emerged as a new Jonathan Grudin is a prolific writer and many of his earlier
area, explaining how it does not fit into any existing design works provide thought-provoking and well documented ac-
or computing fields. He describes the new demands and counts of topical issues in HCI. The first paper talks about
challenges facing the profession. how interface design has expanded to wver many more as-
pects in its relatively short history. The second paper, consid-
NORMAN, D. (1988) The Design of Everyday Things. New ered a classic of its time, discusses why the concept of
York: Doubleday, (especially Chapter 1). Norman's writing consistency-which had been universally accepted as good in-
is highly accessible and enjoyable to read. He writes exten- terface design up until then-was in fact highly problematic.
sively about the design and usability of everyday objects like
doors, faucets, and fridges. These examples provide much Interactions, JanuarylFebruary 2000, ACM. This special
food for thought in relation to designing interfaces. The issue provides a collection of visions, critiques, and sound
Voyager CD-ROM (sadly, now no longer published) of his bites on the achievements and future of HCI from a number
collected works ~rovidesadditional videos and animations of researchers, designers, and practitioners.
that illustrate in an entertaining way many of the problems, IDEO provides a well illustrated online archive of a range of
design ideas and issues raised in the text. interactive products it has designed. (see www.ideo.com)
Interview 31
Figure 1 Steelcase Worklife New York retail showroom. One of the projects Gitta Salomon was involved in
was to develop an interactive sales showroom for the company called Steelcase, based in New York. The sales
environment was developed to provide various sales tools, including an interactive device allowing salespeople
to access case-study videos that can be projected onto the large screens in the background.
often name the things that we all need to be talking YR. So this communication process is just as impor-
about. Then at least we all have a common termi- tant as the ideas?
nology to discuss things. It is a measure of our suc- GS: 1think it is, a lot of times.
cess if they start using the words that we gave them,
because we truly have influenced their thinking. A y ~so, , how do you start with a client?
lot of times we'll give them a diagram of what their
system is like, because nobody has ever visualized GS: For clients who already have something built, I
find that usually the best way for us to get started, is
it. We serve as the visualizers, taking a random as-
to begin with the client doing a comprehensive demo
sortment of vaguely defined concepts and giving
of their product for us. We will usually spend a whole
some shape to them. We'll make an artifact, which
day collecting information. Besides the demo, they
allows them to say "Yes, it is like that" or "No, it's
not like that, it's like this. . . ." Without something tell us about their target market, competitors, and a
to point to they couldn't even say to each other whole range of things. It then takes a longer period of
time for us to use the product and observe other peo-
"No, that is not what 1 mean" because they didn't
know if they were talking about the same thing. ple using it to get a much broader picture. Because
Many times we'll use schematic diagrams to repre- the client's own vision of their product is so narrow,
sent system behavior. Once they have these dia- we really have to step back from what they initially
.--
tell Ub.
grams then they can say "Oh no, we need all this
other stuff in there, we forgot to tell you." It seems
that nobody is writing complete lists of functional- YR: So do you writenotes, and then try and put it to-
ity, requirements specifications, or complete docu- gether afterwards,Orwhat?
mentation anymore. This means the product ideas GS: We use all kinds of things. We use notes and
stay in somebody's head until we make them tangi- video, and we sit around with tracing paper and
ble through visualization. marker pens. When reviewing the materials, 1 often
Interview 33
try and bring them together in some sort of thematic YR: Finally, how do you see interaction design mov-
way. It's often mind-boggling to bring a software ing in the next five years? More of the same kind of
product that's been thrown together into any kind of problems with new emerging technologies? Or do
coherent framework. It's easy to write a shopping list you think there are going to be more challenges, es-
of observations, but we want to assemble a larger pecially with the hardwarelsoftware integration?
structure and framework and that takes several weeks GS: I think there will be different constraints as new
to construct. We need time to reflect and stew on technologies arise. No matter what we are designing,
what was done and what maybe should have been we have to understand the constraints of the imple-
done. We need to highlight the issues and put them mentation. And yes, different things will happen when
into some kind of larger order. If you always operate we get more into designing hardwarelsoftware prod-
at a low level of detail, like worrying and critiquing ucts. There are different kinds of cost constraints and
the size of a button, you end up solving only local is- different kinds of interactions you can do when there is
sues. You never really get to the big interaction de- special purpose hardware involved. Whereas designing
sign problems of the product, the ones that should be the interaction for applications requires visual design
solved first. expertise, designing information appliances or other
hardware products requires experience with product
YR: If you're given a prototype or product to evalu- design. Definitely, there will be some new challenges.
ate and you discover that it is redly bad, what do you Hopefully, in the next few years, people will stop
do? looking for interaction design rules. There's been a bit
GS: Well, I never have the guts to go in and say of a push towards making interaction design a science
something is fundamentally flawed. And that's maybe lately. Maybe this has happened because so many peo-
not the best strategy anyway, because it's your word ple are trying to do it and they don't know where to
against theirs. Instead, I think it is always about mak- start because they don't have much experience. I'm
ing the case for why something is wrong or flawed. hoping people will start understanding that interaction
Sometimes I think we are like lawyers. We have to as- design is a design discipline-that there are some guide-
semble the case for what's wrong with the product. lines and ways to do good practice-and creativity com-
We have to make a convincing argument. A lot of bined with analytical thinking are necessary to arrive at
times I think the kind of argumentation we do is very good products. And then, even more so than now, it is
much like what lawyers do. going to get interesting and be a really exciting time.
Chapter 2
Understanding and
conceptualizing interaction
2.1 Introduction
2.2 Understanding the problem space
2.3 Conceptual models
2.3.1 Conceptual models based on activities
2.3.2 Conceptual models based on objects
2.3.3 A case of mix and match?
2.4 Interface metaphors
2.5 Interaction paradigms
2.6 From conceptual models to physical design
Introduction
Imagine you have been asked to design an application to let people organize,
store, and retrieve their email in a fast, efficient and enjoyable way. What would
you do? How would you start? Would you begin by sketching out how the inter-
face might look, work out how the system architecture will be structured, or
even just start coding? Alternatively, would you start by asking users about their
current experiences of saving email, look at existing email tools and, based on
this, begin thinking about why, what, and how you were going to design the
application?
Interaction designers would begin by doing the latter. It is important to real-
ize that having a clear understanding of what, why, and how you are going to de-
sign something, before writing any code, can save enormous amounts of time and
effort later on in the design process. Ill-thought-out ideas, incompatible and un-
usable designs can be ironed out while it is relatively easy and painless to do.
Once ideas are committed to code (which typically takes considerable effort,
time, and money), they become much harder to throw away-and much more
painful. Such preliminary thinking through of ideas about user needs1 and what
'User needs here are the range of possible requirements, including user wants and experiences.
36 Chapter 2 Understanding and conceptualizing interaction
how? In the above example, this involves finding out what is problematic with ex-
isting forms of navigating while driving (e.g., trying to read maps while moving the
steering wheel) and how to ensure that drivers can continue to drive safely without
being distracted.
Clarifying your usability and user experience goals is a central part of working
out the problem space. This involves making explicit your implicit assumptions and
claims. Assumptions that are found to be vague can highlight design ideas that
need to be better formulated. The process of going through them can also help to
determine relevant user needs for a given activity. In many situations, this involves
identifying human activities and interactivities that are problematic and working
out how they might be improved through being supported with a different form of
interaction. In other situations it can be more speculative, requiring thinking
through why a novel and innovative use of a new technology will be potentially
useful.
Below is another scenario in which the problem space focuses on solving an
identified problem with an existing product. Initial assumptions are presented first,
followed by a further explanation of what lies behind these (assumptions are high-
lighted in italics):
A large software company has decided to develop an upgrade of its web browser.
They assume that there is a need for a new one, which has better and more powerful
functionality. They begin by carrying out an extensive study of people's actual use of
web browsers, talking to lots of different kinds of users and observing them using
their browsers. One of their main findings is that many people do not use the
bookmarking feature effectively. A common finding is that it is too restrictive and
underused. In fathoming why this is the case, it was considered that the process of
placing web addresses into hierarchical folders was an inadequate way of supporting
the user activity of needing to mark hundreds and sometimes thousands of websites
such that any one of them could be easily returned to or forwarded onto other
people. A n implication of the study was that a new way of saving and retrieving web
addresses was needed.
In working out why users find the existing feature of bookmarking cumber-
some to use, a further assumption was explicated:
The existing way of organizing saved (favorite) web addresses into folders is
inefjicient because it takes too long and is prone to errors.
A number of underlying reasons why this was assumed to be the case were fur-
ther identified, including:
It is easy to lose web addresses by placing them accidentally into the wrong
folders.
I t is not easy to move web addresses between folders.
It is not obvious how .to move a number of addresses from the saved favorite
list into another folder simultaneously.
It is not obvious how to reorder web addresses once placed in folders.
38 Chapter 2 Understanding and conceptualizing interaction
Based on this analysis, a set of assumptions about the user needs for supporting
this activity more effectively were then made. These included:
If the bookmarking function was improved users would find it more useful
and use it more to organize their web addresses.
Users need a flexible way of organizing web addresses they want to keep for
further reference or for sending on to other people.
At the turn of the millennium, WAP-enabled (wireless application protocol) phones came
into being, that enabled people to connect to the Internet using them. To begin with, the
web-enabled services provided were very primitive, being text-based with limited graphics
capabilities. Access was very restricted, with the downloaded information being displayed
on a very small LCD screen (see Figure 2.2). Despite this major usability drawback, every
telecommunication company saw this technological breakthrough as an opportunity to cre-
ate innovative applications. A host of new services were explored, including text messaging,
online booking of tickets, betting, shopping, viewing movies, stocks and shares, sports events
and banking.
What assumptions were made about the proposed services? How reasonable are these
assumptions?
Comment The problem space for this scenario was very open-ended. There was no identifiable problem
that needed to be improved or fixed. Alternatively, the new WAP technology provided op-
portunities to create new facilities and experiences for people. One of the main assumptions
is that people want to be kept informed of up-to-the-minute news (e.g. sports, stocks and
share prices) wherever they are. Other assumptions included:
That people want to be able to decide what to do in an evening while on their way
home from work (e.g., checking TV listings, movies, making restaurant reservations).
That people want to be able to interact with information on the move (e.g., reading
email on the train).
That users are prepared to put up with a very small display and will be happy browsing
and interacting with information using a restricted set of commands via a small number
of tiny buttons.
That people will be happy doing things on a mobile phone that they normally do using
their PCs (e.g., reading email, surfing the web, playing video games, doing their
shopping).
It is reasonable to assume that people want flexibility. They like to be able to find out
about news and events wherever they are (just look at the number of people who take a
radio with them to a soccer match to find out the scores of other matches being played at the
same time). People also like to use their time productively when traveling, as in making
phone calls. Thus it is reasonable to assume they would like to read and send email on the
move. The most troublesome assumption is whether people are prepared to interact with the
range of services proposed using such a restricted mode of interactivity. In particular, it is
questionable whether most people are prepared to give up what they have been used to (e.g.
large screen estate, ability to type messages using a normal-sized keyboard) for the flexibility
of having access to very restricted Internet-based information via a cell phone they can keep
in their pocket.
One of the benefits of working through your assumptions for a problem space
before building anything is that it can highlight problematic concerns. In so doing,
it can identify ideas that need to be reworked, before it becomes too late in the de-
sign process to make changes. Having a good understanding of the problem space
can also help greatly in formulating what it is you want to design. Another key as-
pect of conceptualizing the problem space is to think about the overall structure of
what will be built and how this will be conveyed to the users. In particular, this in-
volves developing a conceptual model.
There are a number of different kinds of conceptual models. These can be bro-
ken down into two main categories: those based on activities and those based on
objects.
A company is building a wireless information system to help tourists find their way around
an unfamiliar city. What would they need to find out in order to develop a conceptual
model?
Comment To begin, they would need to ask: what do tourists want? Typically, they want to find out
lots of things, such as how to get from A to B, where the post office is and where a good Chi-
nese restaurant is. They then need to consider how best to support the activity of requesting
information. Is it preferable to enable the tourists to ask questions of the system as if they
were having a conversation with another human being? Or would it be more appropriate to
allow them to ask questions as if giving instructions to a machine? Alternatively, would they
prefer a system that structures information in the form of lists, maps, and recommendations
that they could then explore at their leisure?
42 Chapter 2 Understanding and conceptualizing interaction
1. Instructing
This kind of conceptual model describes how users carry out their tasks through in-
structing the system what to do. Examples include giving instructions to a system to
perform operations like tell the time, print a file, and remind the user of an ap-
pointment. A diverse r.?nge of devices has been designed based on this model, in-
cluding VCRs, hi-fi systems, alarm clocks, and computers. The way in which the
user issues instructions can vary from pressing buttons to typing in strings of char-
acters. Many activities are readily supported by giving instructions.
Operating systems like Unix and DOS have been specifically designed as com-
mand-based systems, to which the user issues instructions at the prompt as a com-
mand or set of commands. In Windows and other GUI-based systems, control keys
or the selection of menu options via a mouse are used. Well-known applications that
are command-based include word processing, email, and CAD. Typically, a wide
range of functions is provided from which users choose when they want to do some-
thing to the object they are working on. For example, a user writing a report using a
word processor will want to format the document, count the numbers of words typed,
and check the spelling. The user will need to instruct the system to do these opera-
tions by issuing apprbpriate commands. Typically, commands are carried out in a se-
quence, with the system responding appropriately (or not) as instructed.
One of the main benefits of an instruction-based conceptual model is that it
supports quick and efficient interaction. It is particularly suited to repetitive kinds
of actions performed on multiple objects. Examples include the repetitive actions
of saving, deleting, and organizing email messages or files.
There are many different kinds of vending machines in the world. Each offers a range of
goods, requiring the user initially to part with some money. Figure 2.3 shows photos of two
different vending machines, one that provides soft drinks and the other a range of snacks.
Both support the interaction style of issuing instructions. However, the way they do it is
quite different.
What instructions must be issued to obtain a can of soft drink from the first machine and
a bar of chocolate from the second? Why has it been necessary to design a more complex
mode of interaction for the second vending machine? What problems can arise with this
mode of interaction?
Comment The first vending machine has been designed on a very simple instruction-based conceptual
model. There are a small number of drinks to choose from and each is represented by a large
button displaying the label of each drink. The user simply has to press one button and
(hopefully) this will have the effect of returning the selected drink. The second machine is
more complex, offering a wider range of snacks. The trade-off for providing more choices,
however, is that the user can no longer instruct the machine by using a simple one-press ac-
tion but is required to use a more complex process, involving: (i) reading off the code (e.g.,
C12) under the item chosen, then (ii) keying this into the number pad adjacent to the dis-
played items, and (iii) checking the price of the selected option and ensuring that the
amount of money inserted is the same or more (depending on whether or not the machine
provides change). Problems that can arise from this mode of interaction are the customer
2.3 Conceptual models 43
Figure 2.3 Two vending machines, (a) one selling soft drinks, (b) the other selling a range of
snacks.
misreading the code and or mistyping in the code, resulting in the machine not issuing the
snack or providing the wrong sort.
A better way of designing an interface for a large number of choices of variable cost is to
continue to use direct mapping, but use buttons that show miniature versions of the snacks
placed in a large matrix (rather than showing actual versions). This would use the available
space at the front of the vending machine more economically. The customer would need
only to press the button of the object chosen and put in the correct amount of money.
Much research has been carried out on how to optimize command-based and
other instruction-giving systems with respect to usabilty goals. The form of the
commands (e.g., the use of abbreviations, full names, icons, and/or labels), their
syntax (how best to combine different commands), and their organization (e.g.,
how to structure options in different menus) are examples of some of the main
areas that have been investigated (Shneiderman, 1998). In addition, various cogni-
tive issues have been investigated that we will look at in the next chapter, such as
the problems people have in remembering the names of a set of commands. Less
44 Chapter 2 Understanding and conceptualizing interaction
research has been carried out, however, on the best way to design the ordering and
sequencing of button pressing for physical devices like cell phones, calculators, re-
mote controls and vending machines.
Another ubiquitous vending machine is the ticket machine. Typically, a number of instruc-
tions have to be given in a sequence when using one of these. Consider ticket machines de-
signed to issue train tickets at railway stations-how often have you (or the person in front
of you) struggled to work out how to purchase a ticket and made a mistake? How many in-
structions have to be given? What order are they given in? Is it logical or arbitrary? Could
the interaction have been designed any differently to make it more obvious to people how to
issue instructions to the machine to get the desired train ticket?
Comment Ticketing machines vary enormously from country to country and from application to appli-
cation. There seems to be little attempt to standardize. Therefore, a person's knowledge of
the Eurostar ticketing machine will not be very useful when buying a ticket for the Sydney
Monorail or cinema tickets for the Odeon. Sometimes the interaction has been designed to
get you to specify the type of ticket first (e.g. adult, child), the kind of ticket (e.g. single, re-
turn, special saver), then the destination, and finally to insert their money. Others require
that the user insert a credit card first, before selecting the destination and the type of ticket.
2. Conversing
This conceptual model is based on the idea of a person conversing with a system,
where the system acts as a dialog partner. In particular, the system is designed to
respond in a way another human being might when having a conversation with
someone else. It differs from the previous category of instructing in being intended
to reflect a more two-way communication process, where the system acts more like
a partner than a machine that simply obeys orders. This kind of conceptual model
has been found to be most useful for applications in which the user needs to find
out specific kinds of information or wants to discuss issues. Examples include advi-
sory systems, help facilities, and search engines. The proposed tourist application
described earlier would fit into this category.
The kinds of conversation that are supported range from simple voice-recognition
menu-driven systems that are interacted with via phones to more complex natural-lan-
guage-based systems that involve the system parsing and responding to user queries
typed in by the user. Examples of the former include banking, ticket booking, and
train time inquiries, where the user talks to the system in single-word phrases (e.g.,
yes, no, three) in response to prompts from the system. Examples of the latter include
search engines and help systems, where the user types in a specific query (e.g., how do
I change the margin widths?) to which the system responds by giving various answers.
A main benefit of a conceptual model based on holding a conversation is that it
allows people, especially novices, to interact with a system in a way they are already
familiar with. For example, the search engine "Ask Jeeves for Kids!" allows chil-
dren to ask a question in a way they would when asking their teachers or parents-
rather than making them reformulate their question in terms of key words and
Boolean logic. A disadvantage of this approach, however, is the misunderstandings
that can arise when the search engine is unable to answer the child's question in the
2.3 Conceptual models 45
, .
Where can I find a concise encvclo~ediaarticle on ?
centipedes?
- of the human
Where can I see an image
appendix?
way the child expects. For example, a child might type in a seemingly simple question,
like "How many legs does a centipede have?" which the search engine finds difficult
to answer. Instead, the search engine replies by suggesting a number of possible web-
sites that may be relevant but-as can be seen in Figure 2.4-can be off the mark.
Another problem that can arise from a conversational-based, conceptual
model is that certain kinds of tasks are transformed into cumbersome and one-
sided interactions. This is especially the case for automated phone-based systems
that use auditory menus to advance the conversation. Users have to listen to a
voice providing several options, then make a selection, and repeat through further
layers of menus before accomplishing their goal (e.g., reaching a real human, pay-
ing a bill). Here is the beginning of a dialog between a user who wants to find out
about car insurance and an insurance company's reception system:
<user dials an insurance company>
"Welcome to St. Paul's Insurance Company. Press 1 if new
customer, 2 if you are an existing customer".
<user presses 1>
"Thank you for calling St. Paul's Insurance Company. If you
require house insurance press 1, car insurance press 2,
travel insurance press 3 , health insurance press 4, other
press 5"
<user presses 2>
"You have reached the car insurance division. If you re-
quire information about fully comprehensive insurance press
1, 3rd-party insurance press 2 . . " .
46 Chapter 2 k
Understanding and conceptualizing intera ion
81 Randy Glasberw.
$ww.01asbergen.com 1
they are likely to be less forgiving of it (having been fooled into thinking the dialog
partner is more intelligent than it really is) than of a dialog partner that is repre-
sented as a cartoon character at the interface (having only assumed it was a simple
partner). The flip side of imbuing dialog partners with a physical presence at the in-
terface, however, is that they can turn out to be rather annoying (for more on this
topic see Chapter 5).
their assumptions was that people expect their physical actions to have physical
results, so when a drawing tool is used, a corresponding line should appear and
when a file is placed in the trash can a corresponding sound or visual cue show-
ing it has been successfully thrown away is used (Apple Computer Inc., 1987). A
number of specific visual and auditory cues were used to provide such feedback,
including various animations and sounds (e.g. shrinking and expanding icons ac-
companied with 'shhhlicc' and 'crouik' sounds to represent opening and closing
of files). Much of this interaction design was geared towards providing clues to
the user to know what to do, to feel comfortable, and to enjoy exploring the
interface.
Many other kinds of direct manipulation interfaces have been developed, in-
cluding video games, data visualization tools and CAD systems. Virtual environ-
ments and virtual reality have similarly employed a range of interaction
mechanisms that enable users to interact with and navigate through a simulated 3D
physical world. For example, users can move around and explore aspects of a 3D
environment (e.g., the interior of a building) while also moving objects around in
the virtual environment, (e.g., rearranging the furniture in a simulated living
room). Figure 2.6 on Color Plate 3 shows screen shots of some of these.
While direct manipulation and virtual environments provide a very versatile
mode of interaction, they do have a number of drawbacks. At a conceptual level,
some people may take the underlying conceptual model too literally and expect
certain things to happen at the interface in the way they would in the physical
world. A well known example of this phenomenon is of new Mac users being terri-
2.3 Conceptual models 49
fied of dragging the icon of their floppy disk to the trash can icon on the desktop to
eject it from the computer for fear of deleting it in the same way files are when
placed in the trash can. The conceptual confusion arises because the designers
opted to use the same action (dropping) on the same object (trash can) for two
completely different operations, deleting and ejecting. Another problem is that not
all tasks can be described by objects and not all actions can be done directly. Some
tasks are better achieved through issuing instructions and having textual descrip-
tions rather than iconic representations. Imagine if email messages were repre-
sented as small icons in your mailbox with abbreviations of who they were from
and when they were sent. Moreover, you could only move them around by drag-
ging them with a mouse. Very quickly they would take up your desk space and you
would find it impossible to keep track of them all.
Which conceptual model or combination of models do you think is most suited to supporting
the following user activities?
(a) downloading music off the web
(b) programming
Comment (a) The activity involves selecting, saving, cataloging and retrieving large files from an
external source. Users need to be able to browse and listen to samples of the music
and then instruct the machine to save and catalog the files in an order that they can
readily access at subsequent times. A conceptual model based on instructing and
navigating would seem appropriate.
(b) Programming involves various activities including checking, debugging, copying li-
braries, editing, testing, and annotating. An environment that supports this range of
tasks needs to be flexible. A conceptual model that allows visualization and easy ma-
nipulation of code plus efficient instructing of the system on how to check, debug,
copy, etc., is essential.
\ \ Dhad+antndtcatw d
mi^ keys wtll move
e w e rag sod down I( - /
/
Cursor Two w~ndawawhen the
$;? Jws81tw F~lma'c
screen 4 BP'*
Figure 2.7 Reference card showing annotated screen dump for VisiCalc
modeling. Key aspects of his conceptual model were: (i) to create a spreadsheet that
was analogous to a ledger sheet in the way it looked, with columns and rows, which
allowed people to capitalize on their familiarity with how to use this kind of repre-
sentation, (ii) to make the spreadsheet interactive, by allowing the user to input and
change data in any of the cells in the columns or rows, and (iii) to get the computer
to perform a range of different calculations and recalculations in response to user
input. For example, the last column can be programmed to display the sum of all the
cells in the columns preceding it. With the computer doing all the calculations, to-
gether with an easy-to-learn-and-use interface, users were provided with an easy-to-
understand tool. Moreover, it gave them a new way of effortlessly working out any
2.3 Conceptual models 53
number of forecasts-greatly extending what they could do before with existing
tools.
Another popular accounting tool intended for the home market, based on a con-
ceptual model of an object, is Quicken. This used paper checks and registers for its
basic structure. Other examples of conceptual models based on objects include most
operating environments (e.g., Windows and the Mac desktop) and web portals. All
provide the user with a familiar frame of reference when starting the application.
54 Chapter 2 Understanding and conceptualizing interaction
The down side of mixing interaction moqes is that the underlying conceptual
model can end up being more complex and ambiguous, making it more difficult
for the user to understand and learn. For example, some operating and word-pro-
cessing systems now make it possible for the user to carry out the same activity in
a number of different ways (e.g., to delete a file the user can issue a command
like CtrlD, speak to the computer by saying "delete file," or drag an icon of the
file to the recycle bin). Users will have to learn the different styles to decide
which they prefer. Inevitably, the learning curve will be steeper, but in the long
run the benefits are that it enables users to decide how they want to interact with
the system.
Interface metaphors are often actually composites, i.e., they combine quite different pieces
of familiar knowledge with the system functionality. We already mentioned the "search en-
gine" as one such example. Can you think of any others?
Can you think of any bizarre computing metaphors that have become common parlance
whose original source of reference is (or always was) obscure?
not matter whether rules are contravened. Once people understand why the bin is
on the desktop, they readily accept that the real-world rule had to be broken.
Moreover, the unexpected juxtaposition of the bin on the desktop can draw to the
user's attention the additional functionality that it provides.
Too constraining. Another argument against interface metaphors is that they
are too constraining, restricting the kinds of computational tasks that would be
useful at the interface. An example is trying to open a file that is embedded in
several hundreds of files in a directory. Having to scan through hundreds of icons
on a desktop or scroll through a list of files seems a very inefficient way of doing
this. As discussed earlier, a better way is to allow the user to instruct the computer
to open the desired file by typing in its name (assuming they can remember the
name of the file).
Conflicts with design principles. By trying to design the interface metaphor to
fit in with the constraints of the physical world, designers are forced into making
bad design solutions that conflict with basic design principles. Ted Nelson sets up
the trash can again as an example of such violation: "a hideous failure of consis-
tency is the garbage can on the Macintosh, which means either "destroy this" or
"eject it for safekeeping" (Nelson, 1990).
Not being able to understand the system functionality beyond the metaphor. It
has been argued that users may get fixed in their understanding of the system based
on the interface metaphor. In so doing, they may find it difficult to see what else
can be done with the system beyond the actions suggested by the interface
metaphor. Nelson (1990) also argues that the similarity of interface metaphors to
any real objects in the world is so tenuous that it gets in the way more than it helps.
We would argue the opposite: because the link is tenuous and there are only a cer-
tain number of similarities, it enables the user to see both the dissimilarities and
how the metaphor has been extended.
Overly literal translation of existing bad designs. Sometimes designers fall into
the trap of trying to create a virtual object to resemble a familiar physical object
that is itself badly designed. A well-known example is the virtual calculator,
which is designed to look and behave like a physical calculator. The interface of
many physical calculators, however, has been poorly designed in the first place,
based on poor conceptual models, with excessive use of modes, poor labeling of
functions, and difficult-to-manipulate key sequences (Mullet and Sano, 1995).
The design of the calculator in Figure 2.10(a) has even gone as far as replicating
functions needing shift keys (e.g., deg, oct, and hex), which could have been re-
designed as dedicated software buttons. Trying to use a virtual calculator that has
been designed to emulate a poorly designed physical calculator is much harder
than using the physical device itself. A better approach would have been for the
designers to think about how to use the computational power of the computer to
support the kinds of tasks people need to do when doing calculations (cf. the
spreadsheet design). The calculator in Figure 2.10(b) has tried to do this to some
extent, by moving the buttons closer to each other (minimizing the amount of
mousing) and providing flexible display modes with one-to-one mappings with
different functions.
2.4 Interface metaphors 59
(b)
Figure 2.10 Two virtual calculators where (a) has been designed too literally and
(b) more appropriately for a computer screen.
amine a web browser interface and describe the various forms of analogy and composite
erface metaphors that have been used in its design. What familiar knowledge has been
combined withnew functionality?
Comment Many aspects of a web browser have been combined to create a composite interface metaphor:
a range of toolbars, such as a button bar, navigation bar, favorite bar, history bar
tabs, menus, organizers
search engines, guides
bookmarks, favorites
icons for familiar objects like stop lights, home
These have been combined with other operations and functions, including saving, search-
ing, downloading, listing, and navigating.
Figure 2.1 1 Examples of new interaction paradigms: (a) Some of the original devices devel-
oped as part of the ubiquitous computing paradigm. Tabs are small hand-sized wireless
computers which know where they are and who they are with. Pads are paper-sized devices
connected to the system via radio. They know where they are and who they are with. Live-
boards are large wall sized devices. The "Dangling String" created by artist Natalie Jeremi-
jenko was attached directly to the ethernet that ran overhead in the ceiling. It spun around
depending on the level of digital traffic.
(b) Ishii and Ulmer, MIT Lab (1997) Tangible bits: from GUIs of desktop PCs to Tangible
User Interfaces. The paradigm is concerned with establishing a new type of HCI called
"Tangible User Interfaces" (TUIs). TUIs augment the real physical world by coupling digi-
tal information to everyday physical objects and environments.
(c) Affective Computing: The project, called "BlueEyes," is creating devices with embedded
technology that gather information about people. This face (with movable eyebrows, eyes
and mouth) tracks your movements and facial expressions and responds accordingly.
62 Chapter 2 Understanding and conceptualizing interaction
The Workaday World. In the new paradigms mentioned above, the emphasis is
on exploring how technological devices can be linked with each other and digital
information in novel ways that allow people to do things they could not do before.
In contrast, the Workaday World paradigm is driven primarily by conceptual and
mundane concerns. It was proposed by Tom Moran and Bob Anderson (1990),
when working at Xerox PARC. They were particularly concerned with the need to
understand the social aspects of technology use in a way that could be useful for
designers. The Workaday World paradigm focuses on the essential character of the
workplace in terms of people's everyday activities, relationships, knowledge, and
resources. It seeks to unravel the "set of patterns that convey the richness of the
settings in which technologies live-the complex, unpredictable, multiform rela-
tionships that hold among the various aspects of working life" (p. 384).
Many issues will need to be addressed when developing and testing initial pro-
totypes of conceptual models. These include:
the way information is to be presented and interacted with at the interface
what combinations of media to use (e.g., whether to use sound and
animations)
the kind of feedback that will be provided
what combinations of input and output devices to use (e.g., whether to use
speech, keyboard plus mouse, handwriting recognition)
whether to provide agents and in what format
whether to design operations to be hardwired and activated through physical
buttons or to represent them on the screen as part of the software
what kinds of help to provide and in what format
While working through these design decisions about the nature of the interac-
tion to be supported, issues concerning the actual physical design will need to be
addressed. These will often fall out of the conceptual decisions about the way infor-
mation is to be represented, the kind of media to be used, and so on. For example,
these would typically include:
information presentation
-which dialogs and interaction styles to use (e.g., form fill-ins, speech input,
menus)
-how to structure items in graphical objects, like windows, dialog boxes and
menus (e.g., how many items, where to place them in relation to each
other)
feedback
-what navigation mechanisms to provide (e.g., forward and backward
buttons)
media combination
-which kinds of icons to use
Many of these physical design decisions will be specific to the interactive prod-
uct being built. For example, designing a calendar application intended to be used
by business people to run on a handheld computer will have quite different con-
straints and concerns from designing a tool for scheduling trains to run over a large
network, intended to be used by a team of operators via multiple large displays.
The way the information will be structured, the kinds of graphical representations
that will be appropriate, and the layout of the graphics on the screens will be quite
different.
These kinds of design decisions are very practical, needing user testing to en-
sure that they meet with the usability goals. It is likely that numerous trade-offs will
surface, so it is important to recognize that there is no right or wrong way to resolve
these. Each decision has to be weighed with respect to the others. For example, if
you decide that a good way of providing visibility for the calendar application on
the handheld device is to have a set of "soft" navigation buttons permanently as
66 Chapter 2 Understonding and conceptualizing interaction
2.6 From conceptual models to physical design 67
68 Chapter 2 Understanding and conceptualizing interaction
part of the visual display, you then need to consider the consequences of doing this
for the rest of the information that needs to be interacted with. Will it still be possi-
ble to structure the display to show the calendar as days in a week or a month, all
on one screen?
This part of the design process is highly dependent on the context and essen-
tially involves lots of juggling between design decisions. If you visit our website you
can try out some of the interactivities provided, where you have to make such deci-
sions when designing the physical layout for various interfaces. Here, we provide the
background and rationale that can help you make appropriate choices when faced
with a series of design decisions (primarily Chapters 3-5 and 8). For example, we ex-
plain why you shouldn't cram a screen full of information; why certain techniques
are better than others for helping users remember how to carry out their tasks at the
interface; and why certain kinds of agents appear more believable than others.
Assignment
The aim of this assignment is for you to think about the appropriateness of different kinds of
conceptual model that have been designed for similar kinds of physical and electronic artifacts.
(a) Describe the conceptual model that underlie the design of:
a personal pocket-sized calendarldiary (one week to a page)
a wall calendar (one month to a page, usually with a picturelphoto)
a wall planner (displaying the whole year)
What is the main kind of activity and object they are based on? How do they differ
for each of the three artifacts? What metaphors have been used in the design of
their physical interface (think about the way time is conceptualized for each of
them)? Do users understand the conceptual models these are based on in the ways
intended (ask a few people to explain how they use them)? Do they match the dif-
ferent user needs?
(b) Now describe the conceptual models that underlie the design of:
an electronic personal calendar found on a personal organizer or handheld
computer
a shared calendar found on the web
How do they differ from the equivalent physical artifacts? What new functionality
has been provided? What interface metaphors have been used? Are the functions
and interface metaphor well integrated? What problems do users have with these
interactive kinds of calendars? Why do you think this is?
Summary
This chapter has explained the importance of conceptualizing interaction design before try-
ing to build anything. It has stressed throughout the need always to be clear and explicit
about the rationale and assumptions behind any design decision made. It described a taxon-
omy of conceptual models and the different properties of each. It also discussed interface
metaphors and interaction paradigms as other ways of informing the design of conceptual
models.
References 69
Key points
It is important to have a good understanding of the problem space, specifying what it is
you are doing, why and how it will support users in the way intended.
A fundamental aspect of interaction design is to develop a conceptual model.
There are various kinds of conceptual models that are categorized according to the activ-
ity or object they are based on.
Interaction modes (e.g., conversing, instructing) provide a structure for thinking about
which conceptual model to develop.
Interaction styles (e.g., menus, form fill-ins) are specific kinds of interfaces that should be
decided upon after the conceptual model has been chosen.
Decisions about conceptual design also should be made before commencing any physical
design (e.g., designing an icon).
Interface metaphors are commonly used as part of a conceptual model.
Many interactive systems are based on a hybrid conceptual model. Such models can pro-
vide more flexibility, but this can make them harder to learn.
3D realism is not necessarily better than 2D or other forms of representation when in-
stantiating a conceptual model: what is most effective depends on the users' activities
when interacting with a system.
General interaction paradigms, like WIMP and ubiquitous computing, provide a particu-
lar way of thinking about how to design a conceptual model.
Further reading
LAUREL, B. (1990) (ed.) The Art of Human Computer De- LANIER, J. (1995) Agents of alienation, ACM Interactions,
sign has a number of papers on conceptual models and inter- 2(3), 66-72. The Art of Human Computer Design also pro-
face metaphors. T W that
~ are definitely worth reading are: vides several thought-provoking articles, including one
Tom Erickson, "Working with interface metaphors" (pp. called "Interface agents: metaphors with character" by
65-74), which is a practical hands-on guide to designing in- Brenda Laurel (pp. 355-366) and another called "Guides:
terface metaphors (covered later in this book), and Ted Nel- characterizing the interface" by Tim Oren et al. (pp.
son's polemic, "The right way to think about software 367-382).
design" (pp. 229-234), which is a scathing attack on the use BANNON, L. (1977) "Problems in human-machine interac-
of interface metaphors. tion and communication." Proc HCI'97, San Francisco.
JOHNSON, M. AND LAKOFF,G. (1980) Metaphors We Live Bannon presents a critical review of the agent approach to
By. The University of Chicago Press. Those wanting to find interface design.
out more about how metaphors are used in everyday con- MIT's Media Lab (www.media.mit.edu) is a good starting
versations should take a look at this text. place to find out what is currently happening in the world of
There are many good articles on the topic of interface agents, wearables, and other new interaction paradigms.
agents. A classic is:
70 Chapter 2 Understanding and conceptualizing interaction
exposure. It is not the kind of thing you can set YR: Are there any classic case studies that stand out
down easily as, say, you can scientific formulas. A as good exemplars of interaction design?
lot of design tends to be methodological. It is not TW: You need to understand what has been impor-
about the design per se but is more about how you tant in the past. I still use the Xerox Star as an exem-
go about doing design, in particular, knowing what plar because so much of what we use today was there.
are the appropriate steps to take and how you put When you go back to look at the Star you see it in the
them together. context of when it was first created. I also think some
exemplars that are very interesting are ones that never
YR: How do you see the field of interaction design actually succeeded commercially. For example, I use
taking on board the current explosion in new tech- the PenPoint system that was developed for pen com-
nologies-for example mobile, ubiquitous, infrared, puters by Go. Again, they were thinking fresh. They
and so on? Is it different, say, from 20 years ago when set out to do something different and they were much
it was just about designing software applications to sit more conscious of the design issues than somebody
on the desktop? who was simply adapting the next version of something
TW: I think a real change in people's thinking has that already existed. Palmpilot is another good exam-
been to move from interface design to interaction de- ple, because they looked at the problem in a different
sign. This has been pushed by the fact that we do have way to make something work. Another interesting ex-
all kinds of devices nowadays. Interface design used emplar, which other people may not agree with, is Mi-
to mean graphical interfaces, which meant designing crosoft Bob--not because it was a successful program,
menus and other widgets. But now when you're talk- because it wasn't, but because it was a first exploration
ing about handheld devices, gesture interfaces, tele- of a certain style of interaction, using animated agents.
phone interfaces and so on, it is clear that you can't You can see very clearly from these exemplars what
focus just on the widgets. The widgets may be part of design trade-offs the designers were making and why
any one of these devices but the design thinking as a and then you can look at the consequences.
whole has to focus on the interaction.
YR: Finally, what are the biggest challenges facing
YR: What advice would you give to a student coming people working in this area?
into the field on what they should be learning and TW: I think one of the biggest challenges is what
looking for? Pelle Ehn calls the dialectic between tradition and
TW: I think a student who wants to learn this field transcendence. That is, people work and live in cer-
should think of it as a kind of dual process, that is tain ways already, and they understand how to adapt
what Donald Schon calls "reflection in action," that within a small range, but they don't have an un-
needing both the action and the reflection. It is im- derstanding or a feel for what it would mean to make
portant to have experience with trying to build a radical change, for example, to change their way of
things. That experience can be from outside work, doing business on the Internet before it was around,
projects, and courses where you are actually en- or to change their way of writing from pen and paper
gaged in making something work. At the same time when word processors weren't around. I think what
you need to be able to step back and look at it not as the designer is trying to do is envision things for users
"What do I need to d o next?" but from the perspec- that the users can't yet envision. The hard part is not
tive of what you are doing and how that fits into the fixing little problems, but designing things that are
larger picture. both innovative and that work.
Chapter 3
Understanding users
3.1 Introduction
3.2 What is cognition?
3.3 Applying knowledge from the physical world to the digital world
3.4 Conceptual frameworks for cognition
3.4.1 Mental models
3.4.2 Information processing
3.4.3 External cognition
3.5 Informing design: from theory to practice
Introduction
Imagine trying to drive a car by using just a computer keyboard. The four arrow
keys are used for steering, the space bar for braking, and the return key for acceler-
ating. To indicate left you need to press the F1 key and to indicate right the F2 key.
To sound your horn you need to press the F3 key. To switch the headlights on you
need to use the F4 key and, to switch the windscreen wipers on, the F5 key. Now
imagine as you are driving along a road a ball is suddenly kicked in front of you.
What would you do? Bash the arrow keys and the space bar madly while pressing
the F4 key? How would you rate your chances of missing the ball?
Most of us would balk at the very idea of driving a car this way. Many early
video games, however, were designed along these lines: the user had to press an ar-
bitrary combination of function keys to drive or navigate through the game. There
was little, if any, consideration of the user's capabilities. While some users regarded
mastering an arbitrary set of keyboard controls as a challenge, many users found
them very limiting, frustrating, and difficult to use. More recently, computer con-
soles have been designed with the user's capabilities and the demands of the activ-
ity in mind. Much better ways of controlling and interacting, such as through using
joysticks and steering wheels, are provided that map much better onto the physical
and cognitive aspects of driving and navigating.
In this chapter we examine some of the core cognitive aspects of interaction de-
sign. Specifically, we consider what humans are good and bad at and show how this
knowledge can be used to inform the design of technologies that both extend human
capabilities and compensate for their weaknesses. We also look at some of the influ-
ential cognitively based conceptual frameworks that have been developed for ex-
plaining the way humans interact with computers. (Other ways of conceptualizing
74 Chapter 3 Understanding users
human behavior that focus on the social and affective aspects of interaction design
are presented in the following two chapters.)
The main aims of this chapter are to:
Explain what cognition is and why it is important for interaction design.
Describe the main ways cognition has been applied to interaction design.
Provide a number of examples in which cognitive research has led to the de-
sign of more effective interactive products.
Explain what mental models are.
Give examples of conceptual frameworks that are useful for interaction design.
Enable you to try to elicit a mental model and be able to understand what it
means.
i1
perceiving
thinking
remembering
understanding others
talking with others
making decisions
Cognition has also been described in terms of specific kinds of processes. These
include:
attention
perception and recognition
memory
learning
reading, speaking, and listening
problem solving, planning, reasoning, decision making
It is important to note that many of these cognitive processes are interdepen-
dent: several may be involved for a given activity. For example, when you try to
learn material for an exam, you need to attend to the material, perceive, and recog-
nize it, read it, think about it, and try to remember it. Thus, cognition typically in-
volves a range of processes. It is rare for one to occur in isolation. Below we
describe the various kinds in more detail, followed by a summary box highlighting
core design implications for each. Most relevant (and most thoroughly researched)
for interaction design is memory, which we describe in greatest detail.
Attention is the process of selecting things to concentrate on, at a point in time,
from the range of possibilities available. Attention involves our auditory andlor vi-
sual senses. An example of auditory attention is waiting in the dentist's waiting
room for our name to be called out to know when it is our time to go in. An exam-
ple of attention involving the visual senses is scanning the football results in a news-
paper to attend to information about how our team has done. Attention allows us
to focus on information that is relevant to what we are doing. The extent to which
this process is easy or difficult depends on (i) whether we have clear goals and (ii)
whether the information we need is salient in the environment:
(i) O u r goals If we know exactly what we want to find out, we try to match this
with the information that is available. For example, if we have just landed at an air-
port after a long flight and want to find out who had won the World Cup, we might
scan the headlines at the newspaper stand, check the web, call a friend, or ask
someone in the street.
When we are not sure exactly what we are looking for we may browse through
information, allowing it to guide our attention to interesting or salient items. For
example, when we go to a restaurant we may have the general goal of eating a meal
but only a vague idea of what we want to eat. We peruse the menu to find things
that whet our appetite, letting our attention be drawn to the imaginative descrip-
tions of various dishes. After scanning through the possibilities and imagining what
each dish might be like (plus taking into account other factors, such as cost, who we
are with, what the specials are, what the waiter recommends, whether we want a
two- or three-course meal, and so on), we may then make a decision.
(ii) Information presentation The way information is displayed can also greatly in-
fluence how easy or difficult it is to attend to appropriate pieces of information.
Look at Figure 3.2 and try the activity. Here, the information-searching tasks are
very precise, requiring specific answers. The information density is identical in both
76 Chapter 3 Understanding users
displays. However, it is much harder to find the information in the bottom screen
than in t h e t o p screen. T h e reason for this is that t h e information is very poorly
structured in the bottom, making it difficult to find the information. In the top the
information has been ordered into meaningful categories with blank spacing be-
tween them, making it easier to select the necessary information.
Perception refers to how information is acquired from the environment, via the
different sense organs (e.g., eyes, ears, fingers) and transformed into experiences of
objects, events, sounds, and tastes (Roth, 1986). It is a complex process, involving
other cognitive processes such as memory, attention, and language. Vision is the
3.2 What is cognition? 77
most dominant sense for sighted individuals, followed by hearing and touch. With
respect to interaction design, it is important to present information in a way that
can be readily perceived in the manner intended. For example, there are many
ways to design icons. The key is to make them easily distinguishable from one an-
other and to make it simple to recognize what they are intended to represent (not
like the ones in Figure 3.4).
Combinations of different media need also to be designed to allow users to rec-
ognize the composite information represented in them in the way intended. The
use of sound and animation together needs to be coordinated so they happen in a
logical sequence. An example of this is the design of lip-synch applications, where
the animation of an avatar's or agent's face to make it appear to be talking, must be
carefully synchronized with the speech that is emitted. A slight delay between the
two can make it difficult and disturbing to perceive what is happening-as some-
times happens when film dubbing gets out of synch. A general design principle is
78 Chapter 3 Understanding users
forget things we would dearly love to remember and conversely remember things
we would love to forget. For example, we may find it difficult to remember every-
day things like people's names and phone numbers or academic knowledge like
mathematical formulae. On the other hand, we may effortlessly remember trivia or
tunes that cycle endlessly through our heads.
How does this filtering process work? Initially, encoding takes place, determin-
ing which information is attended to in the environment and how it is interpreted.
The extent to which it takes place affects our ability to recall that information later.
The more attention that is paid to something and the more it is processed in terms
of thinking about it and comparing it with other knowledge, the more likely it is to
be remembered. For example, when learning about a topic it is much better to re-
flect upon it, carry out exercises, have discussions with others about it, and write
notes than just passively read a book or watch a video about it. Thus, how informa-
tion is interpreted when it is encountered greatly affects how it is represented in
memory and how it is used later.
Another factor that affects the extent to which information can be subse-
quently retrieved is the context in which it is encoded. One outcome is that some-
times it can be difficult for people to recall information that was encoded in a
different context from the one they currently are in. Consider the following sce-
nario:
You are on a train and someone comes up to you and says hello. You don't recognize
him for a few moments but then realize it is one of your neighbors. You are only used to
seeing your neighbor in the hallway of your apartment block and seeing him out of
context makes him difficult to recognize initially.
Another well-known memory phenomenon is that people are much better at rec-
ognizing things than recalling things. Furthermore, certain kinds of information are
easier to recognize than others. In particular, people are very good at recognizing
thousands of pictures, even if they have only seen them briefly before.
Try to remember the dates of all the members of your family's and your closest friends'
birthdays. How many can you remember? Then try to describe what is on the cover of the
last DVDICD or record you bought. Which is easiest and why?
Comment It is likely that you remembered much better what was on the CD/DVD/record cover (the
image, the colors, the title) than the birthdays of your family and friends. People are very
good at remembering visual cues about things, for example the color of items, the location
of objects (a book being on the top shelf), and marks on an object (e.g., a scratch on a
watch, a chip on a cup). In contrast, people find other kinds of information persistently
difficult to learn and remember, especially arbitrary material like birthdays and phone
numbers.
Instead of requiring users to recall from memory a command name from a pos-
sible set of hundreds or even thousands, GUIs provide visually based options that
80 Chapter 3 Understanding users
users can browse through until they recognize the operation they want to perform
(see Figure 3.5(a) and (b)). Likewise, web browsers provide a facility of bookmark-
ing or saving favorite URLs that have been visited, providing a visual list. This
means that users need only recognize a name of a site when scanning through the
saved list of URLs.
File Folder
FJe Folder
File Pol&
- HWi
Comment People often write down what they need to remember on a piece of paper. They also ask
others to remind them. Another approach is to use various mental strategies, like mnemon-
ics. A mnemonic involves taking the first letters of a set of words in a phrase or set of con-
cepts and using them to make a more memorable phrase, often using bizarre and
idiosyncratic connections. For example, some people have problems working out where east
is in relation to west and vice versa (i.e., is it to the left or right). A mnemonic to help figure
this out is to take the first letters of the four main points of the compass and then use them in
the phrase "Never Eat Shredded Wheat" mentally recited in a clockwise sequence.
years. He suggests that it is profitable to view this process as involving two memory
processes: recall-directed, followed by recognition-based scanning. The first refers
to using memorized information about the required file to get as close to it as possi-
ble. The more exact this is, the more success the user will have in tracking down the
desired file. The second happens when recall has failed to produce what a user
wants and so requires reading through directories of files.
To illustrate the difference between these two processes, consider the following
scenario: a user is trying to access a couple of websites visited the day before that
compared the selling price of cars offered by different dealers. The user is able to re-
call the name of one website: "alwaysthecheapest.com". She types this in and the
website appears. This is an example of successful recall-directed memory. However,
the user is unable to remember the name of the second one. She vaguely remembers
it was something like 'autobargains.com'; but typing this in proves unsuccessful. In-
stead, she switches to scanning her bookmarks/favorites,going to the list of most re-
cent ones saved. She notices two or three URLs that could be the one desired, and on
the second attempt she finds the website she is looking for. In this situation, the user
initially tries recall-directed memory and when this fails, adopts the second strategy
of recognition-basedscanning-which takes longer but eventually results in success.
Lansdale proposes that file management systems should be designed to opti-
mize both kinds of memory processes. In particular, systems should be devel-
oped that let users use whatever memory they have to limit the area being
searched and then represent the information in this area of the interface so as to
maximally assist them in finding what they need. Based on this theory, he has
developed a prototype system called MEMOIRS that aims at improving users'
recall of information they had encoded so as to make it easier to recall later
(Lansdale and Edmunds, 1992). The system was designed to be flexible, provid-
ing the user with a range of ways of encoding documents mnemonically, includ-
ing time stamping (see Figure 3.6), flagging, and attribution (e.g., color, text,
icon, sound or image).
More flexible ways of helping users track down the files they want are now be-
ginning to be introduced as part of commercial applications. For example, various
search and find tools, like Apple's Sherlock, have been designed to enable the user
to type a full or partial name or phrase that the system then tries to match by listing
all the files it identifies containing the requested nametphrase. This method, how-
ever, is still quite limited, in that it allows users to encode and retrieve files using
only alphanumericals.
84 Chapter 3 Understanding users
I Full-Sized Document /
This is a full-sized document, an
TY~ssrMI-nudd4uxol..D
exact replica of the original ru,npl.rof,bon$,"d
ihuhxriruuxdlltolh
UEMOrnS .Ism70 """I.
which was scanned into the ,Y""r,2eb,,rdourumx.
u Full-sized Document
Figure 3.6 Memoirs tool.
3.2 What is cognition? 85
How else might banks solve the problem of providing a secure system while making the
memory load relatively easy for people wanting to use phone banking? How does phone
banking compare with online banking?
Comment An alternative approach is to provide the customers with a PIN number (it could be the
same as that of their ATM card) and ask them to key this in on their phone keypad, followed
by asking one or two questions like their zip or post code, as a backup. Online banking has
similar security risks to phone banking and hence this requires a number of security mea-
sures to be enforced. These include that the user sets up a nickname and a password. For ex-
ample, some banks require typing in three randomly selected letters from a password each
time the user logs on. This is harder to do online than when asked over the phone, mainly
86 Chapter 3 Understanding users
because it interferes with the normally highly automated process of typing in a password.
You really have to think about what letters and numbers are in your password; for example,
has it got two letter f's after the number 6, or just one?
Ask a grandparent, child, or other person who has not used a cell phone before to make and
answer a call using it. What is striking about their behavior?
Comment First-time users often try to apply their understanding of a land-line phone to operating a cell
phone. However, there are marked differences in the way the two phones operate, even for
the simplest of tasks, like making a call. First, the power has to be switched on when using a
cell phone, by pressing a button (but not so with land-line phones), then the number has to be
keyed in, including at all times the area code (in the UK), even if the callee is in the same area
(but not so with land-lines), and finally the "make a call" button must be pressed (but not so
with land-line phones). First-time users may intuitively know how to switch the phone on but
not know which key to hit, or that it has to be held down for a couple of seconds. They may
also forget to key in the area code if they are in the same area as the person they are calling,
and to press the "make a call" key. They may also forget to press the "end a call" button (this
is achieved through putting the receiver down with a land-line phone). Likewise, when an-
swering a call, the first-time user may forget to press the "accept a call" button or not know
which one to press. These additional actions are quick to learn, once the user understands the
need to explicitly instruct the cell phone when they want to make, accept, or end a call.
sentences or phrases is the same regardless of the mode in which it is conveyed. For
example, the sentence "Computers are a wonderful invention" essentially has the
same meaning whether one reads it, speaks it, or hears it. However, the ease with
which people can read, listen, or speak differs depending on the person, task, and
context. For example, many people find listening much easier than reading. Specific
differences between the three modes include:
Written language is permanent while listening is transient. It is possible to
reread information if not understood the first time round. This is not possi-
ble with spoken information that is being broadcast.
88 Chapter 3 Understanding users
about), discussion with others (or oneself), and the use of various kinds of artifacts,
(e.g., maps, books, and pen and paper). For example, when planning the best route
to get somewhere, say a foreign city, we may ask others, use a map, get instructions
from the web, or a combination of these. Reasoning also involves working through
different scenarios and deciding which is the best option or solution to a given
problem. In the route-planning activity we may be aware of alternative routes and
reason through the advantages and disadvantages of each route before deciding on
the best one. Many a family argument has come about because one member thinks
he or she knows the best route while another thinks otherwise.
Comparing different sources of information is also common practice when
seeking information on the web. For example, just as people will phone around for
a range of quotes, so too, will they use different search engines to find sites that
give the best deal or best information. If people have knowledge of the pros and
cons of different search engines, they may also select different ones for different
kinds of queries. For example, a student may use a more academically oriented one
when looking for information for writing an essay, and a more commercially based
one when trying to find out what's happening in town.
The extent to which people engage in the various forms of reflective cognition
depends on their level of experience with a domain, application, or skill. Novices
tend to have limited knowledge and will often make assumptions about what to do
using other knowledge about similar situations. They tend to act by trial and error,
exploring and experimenting with ways of doing things. As a result they may start
off being slow, making errors and generally being inefficient. They may also act ir-
rationally, following their superstitions and not thinking ahead to the consequences
of their actions. In contrast, experts have much more knowledge and experience
and are able to select optimal strategies for carrying out their tasks. They are likely
to be able to think ahead more, considering what the consequences might be of
opting for a particular move or solution (as do expert chess players).
90 Chapter 3 Understanding users
portable computer
an average citizen is likely t o have a reasonably good mental model of how to oper-
ate a T V but a "shallow" mental model of how it works.
Within cognitive psychology, mental models have been postulated as internal
constructions of some aspect of the external world that are manipulated enabling
predictions and inferences to be made (Craik, 1943). This process is thought to in-
volve the "fleshing out" and the "running" of a mental model (Johnson-Laird,
1983). This can involve both unconscious and conscious mental processes, where
images and analogies are activated.
o illustrate how we use mental models in our everyday reasoning, imagine the following
(a) You arrive home from a holiday on a cold winter's night to a cold house. You have a
small baby and you need to get the house warm as quickly as possible. Your house is
centrally heated. Do you set the thermostat as high as possible or turn it to the de-
sired temperature (e.g. 70°F)?
(b) You arrive home from being out all night, starving hungry. You look in the fridge and
find all that is left is an uncooked pizza. The instructions on the packet say heat the
oven to 375°F and then place the pizza in the oven for 20 minutes. Your oven is elec-
tric. How do you heat it up? Do you turn it to the specified temperature or higher?
Comment Most people when asked the first question imagine the scenario in terms of what they would
do in their own house and choose the first option. When asked why, a typical explanation
that is given is that setting the temperature to be as high as possible increases the rate at
which the room warms up. While many people may believe this, it is incorrect. Thermostats
work by switching on the-heat and keeping it going at a constant speed until the desired tem-
perature set is reached, at which point they cut out. They cannot control the rate at which
heat is given out from a heating system. Left at a given setting, thermostats will turn the heat
on and off as necessary to maintain the desired temperature.
When asked the second question, most people say they would turn the oven to the speci-
fied temperature and put the pizza in when they think it is at the desired temperature. Some
people answer that they would turn the oven to a higher temperature in order to warm it up
more quickly. Electric ovens work on the same principle as central heating and so turning
the heat up higher will not warm it up any quicker. There is also the problem of the pizza
burning if the oven is too hot!
Why do people use erroneous mental models? It seems that in the above sce-
narios, they are running a mental model based on a general valve theory of the way
something works (Kempton, 1986). This assumes the underlying principle of "more
is more": the more you turn or push something, the more it causes the desired ef-
fect. This principle holds for a range of physical devices, such as taps and radio con-
trols, where the more you turn them, the more water or volume is given. However,
it does not hold for thermostats, which instead function based on the principle of
an on-off switch. What seems to happen is that in everyday life people develop a
core set of abstractions about how things work, and apply these to a range of de-
vices, irrespective of whether they are appropriate.
I 94 Chapter 3 Understanding users
Input output
or or
stimuli response
(Hutchins, 1995). A central goal has been to look at how structures in the environ-
ment can both aid human cognition and reduce cognitive load. A number of alter-
native frameworks have been proposed, including external cognition and
distributed cognition. In this chapter, we look at the ideas behind external cogni-
tion-which has focused most on how to inform interaction design (distributed
cognition is described in the next chapter).
2. Computational offloading
Computational offloading occurs when we use a tool or device in conjunction with
an external representation to help us carry out a computation. An example is using
pen and paper to solve a math problem.
(a) Multiply 2 by 3 in your head. Easy. Now try multiplying 234 by 456 in your head.
Not as easy. Try doing the sum using a pen and paper. Then try again with a calcula-
tor. Why is it easier to do the calculation with pen and paper and even easier with a
calculator?
(b) Try doing the same two sums using Roman numerals.
Comment (a) Carrying out the sum using pen and the paper is easier than doing it in your head be-
cause you "offload" some of the computation by writing down partial results and
using them to continue with the calculation. Doing the same sum with a calculator is
even easier, because it requires only eight simple key presses. Even more of the com-
putation has been offloaded onto the tool. You need only follow a simple internal-
ized procedure (key in first number, then the multiplier sign, then next number and
finally the equals sign) and then read of the result from the external display.
(b) Using roman numerals to do the same sum is much harder. 2 by 3 becomes 11 x 111,
and 234 by 456 becomes CCXXXllll X CCCCXXXXXVI. The first calculation may
be possible to do in your head or on a bit of paper, but the second is incredibly diffi-
cult to do in your head or even on a piece of paper (unless you are an expert in using
Roman numerals or you "cheat" and transform it into Arabic numerals). Calculators
do not have Roman numerals so it would be impossible to do on a calculator.
Hence, it is much harder to perform the calculations using Roman numerals than alge-
braic numerals-even though the problem is equivalent in both conditions. The reason for
this is the two kinds of representation transform the task into one that is easy and more diffi-
cult, respectively. The kind of tool used also can change the nature of the task to being more
or less easy.
gramming bugs). In so doing, they can extend or amplify cognition, allowing people
to perceive and do activities that they couldn't do otherwise. For example, a num-
ber of information visualizations have been developed that present masses of data
in a form that makes it possible to make cross comparisons between dimensions at
a glance (see Figure 3.13). GUIs can also be designed to reduce memory load sig-
nificantly, enabling users to rely more on external representations to guide them
through their interactions.
Assignment
The aim of this assignment is for you to elicit mental models from people. In particular, the
goal is for you to understand the nature ofpeople's knowledge about an interactive product in
terms of how to use it and how it works.
(a) First, elicit your own mental model. Write down how you think a cash machine
(ATM) works. Then answer the following questions (abbreviated from Payne, 1991):
How much money are you allowed to take out?
If you took this out and then went to another machine and tried to withdraw the
same amount, what would happen?
What is on your card?
How is the information used?
What happens if you enter the wrong number?
Why are there pauses between the steps of a transaction?
How long are they? What happens if you type ahead during the pauses?
What happens to the card in the machine?
Why does it stay inside the machine?
Do you count the money? Why?
Next, ask two other people the same set of questions.
(b) Now analyze your answers. Do you get the same or different explanations? What
do the findings indicate? How accurate are people's mental models of the way
ATMs work? How transparent are the ATM systems they are talking about?
(c) Next, try to interpret your findings with respect to the design of the system. Are any
interface features revealed as being particularly problematic? What design recom-
mendations do these suggest?
(d) Finally, how might you design a better conceptual model that would allow users to
develop a better mental model of ATMs (assuming this is a desirable goal)?
This exercise is based on an extensive study carried out by Steve Payne on people's mental
models of ATMs. He found that people do have mental models of ATMs, frequently resorting
to analogies to explain how they work. Moreover, he found that people's explanations were
highly variable and based on ad hoc reasoning.
Summary
This chapter has explained the importance of understanding users, especially their cognitive
aspects. It has described relevant findings and theories about how people carry out their
everyday activities and how to learn from these when designing interactive products. It has
provided illustrations of what happens when you design systems with the user in mind and
what happens when you don't. It has also presented a number of conceptual frameworks
that allow ideas about cognition to be generalized across different situations.
Key points
Cognition comprises many processes, including thinking, attention, learning, memory,
perception, decision-making, planning, reading, speaking, and listening.
104 Chapter 3 Understanding users
The way an interface is designed can greatly affect how well people can perceive, attend,
learn, and remember how to carry out their tasks.
The main benefits of conceptual frameworks and cognitive theories are that they can ex-
plain user interaction and predict user performance.
T h e conceptual framework of mental models provides a way of conceptualizing the
user's understanding of the system.
Research findings and theories from cognitive psychology need t o b e carefully reinter-
preted in the context of interaction design t o avoid oversimplification and misapplication.
Further reading
MULLET, K., AND SANO,D. (1995) Designing Visual Inter- man provide many key findings and observations about peo-
faces. New Jersey: SunSoft Press. This is an excellent book ple's behavior and their use of artifacts. They are written in
on the do's and don'ts of interactive graphical design. It in- a stimulating and thought-provoking way, using many exam-
cludes many concrete examples that have followed (or not) ples from everyday life to illustrate conceptual issues. He
design principles based on cognitive issues. also presents a number of psychological theories, including
CARROLL, J. (1991) (ed.) Designing Interaction. Cambridge: external cognition, in an easily digestible form.
Cambridge University Press. This edited volume provides a ROGERS, Y., RUTHERFORD, A,, AND BIBBY,P. (1992) (eds.)
good collection of papers on cognitive aspects of interaction Models in the Mind. Orlando: Academic Press. This volume
design. provides a good collection of papers on eliciting, interpret-
NORMAN, D. (1988) The Psychology of Everyday Things. ing, and theorizing about mental models in HCI and other
New York: Basic Books. domains.
NORMAN, D. (1993) Things that Make Us Smart. Reading, For more on dynalinking and interactivity see
MA: Addison-Wesley. These two early books by Don Nor- www.cogs.susx.ac.uklEC0i
Chapter 4
4.1 Introduction
Imagine going into school or work each day and sitting in a room all by yourself
with no distractions. At first, it might seem blissful. You'd be able to get on with
your work. But what if you discovered you had no access to email, phones, the In-
ternet and other people? On top of that there is nowhere to get coffee. How long
would you last? Probably not very long. Humans are inherently social: they live to-
gether, work together, learn together, play together, interact and talk with each
other, and socialize. It seems only natural, therefore, to develop interactive systems
that support and extend these different kinds of sociality.
There are many kinds of sociality and many ways of studying it. In this chapter
our focus is on how people communicate and collaborate in their working and
everyday lives. We examine how collaborative technologies (also called group-
ware) have been designed to support and extend communication and collabora-
tion. We also look at the social factors that influence the success or failure of user
adoption of such technologies. Finally, we examine the role played by ethnographic
studies and theoretical frameworks for informing system design.
106 Chapter 4 Design for collaboration and communication
I
4.2 Social mechanisms in communication and collaboration
I
l
A fundamental aspect of everyday life is talking, during which we pass on knowl-
edge to each other. We continuously update each other about news, changes, and
developments on a given project, activity, person, or event. For example, friends
and families keep each other posted on what's happening at work, school, at the
pub, at the club, next door, in soap operas, and in the news. Similarly, people who
work together keep each other informed about their social lives and everyday hap-
penings-as well as what is happening at work, for instance when a project is about
to be completed, plans for a new project, problems with meeting deadlines, rumors
about closures, and so on.
The kinds of knowledge that are circulated in different social circles are di-
verse, varying among social groups and across cultures. The frequency with which
knowledge is disseminated is also highly variable. It can happen continuously
throughout the day, once a day, weekly or infrequently. The means by which com-
munication happens is also flexible-it can take place via face to face conversa-
tions, telephone, videophone, messaging, email, fax, and letters. Non-verbal
communication also plays an important role in augmenting face to face conversa-
tion, involving the use of facial expressions, back channeling (the "aha's" and
"umms"), voice intonation, gesturing, and other kinds of body language.
All this may appear self-evident, especially when one reflects on how we inter-
act with one another. Less obvious is the range of social mechanisms and practices
that have evolved in society to enable us to be social and maintain social order.
Various rules, procedures, and etiquette have been established whose function is to
let people know how they should behave in social groups. Below we describe three
main categories of social mechanisms and explore how technological systems have
been and can be designed to facilitate these:
the use of conversational mechanisms to facilitate the flow of talk and help
overcome breakdowns during it
the use of coordination mechanisms to allow people to work and interact
together
the use of awareness mechanisms to find out what is happening, what others
are doing and, conversely, to let others know what is happening
4.2 Social mechanisms in communication and collaboration 107
someone else taking part in the conversation may take up the opportunity and
offer a view on the matter. If this does not happen then the third rule is applied and
the current speaker continues talking. The rules are cycled through recursively
until someone speaks again.
To facilitate rule following, people use various ways of indicating how long
they are going to talk and on what topic. For example, a speaker might say right at
the beginning of their turn in the conversation that he has three things to say. A
speaker may also explicitly request a change in speaker by saying, "OK, that's all I
want to say on that matter. So, what do you think?" to a listener. More subtle cues
to let others know that their turn in the conversation is coming to an end include
the lowering or raising of the voice to indicate the end of a question or the use of
phrases like, "You know what I mean?" or simply, "OK?" Back channeling (uh-
huh, mmm), body orientation (e.g., moving away from or closer to someone), gaze
(staring straight at someone or glancing away), and gesture (e.g. raising of arms)
are also used in different combinations when talking, to signal to others when
someone wants to hand over or take up a turn in the conversation.
Another way in which conversations are coordinated and given coherence is
through the use of adjacency pairs (Shegloff and Sacks, 1973). Utterances are as-
sumed to come in pairs in which the first part sets up an expectation of what is to
come next and directs the way in which what does come next is heard. For exam-
ple, A may ask a question to which B responds appropriately:
A: So shall we meet at 8:00?
B: Um, can we make it a bit later, say 8:30?
Sometimes adjacency pairs get embedded in each other, so it may take some time
for a person to get a reply to their initial request or statement:
A: So shall we meet at 8:00?
B: Wow, look at him.
A: Yes, what a funny hairdo!
B: Um, can we make it a bit later, say 8:30?
For the most part people are not aware of following conversational mechanisms,
and would be hard pressed to articulate how they can carry on a conversation. Fur-
thermore, people don't necessarily abide by the rules all the time. They may inter-
rupt each other or talk over each other, even when the current speaker has clearly
indicated a desire to hold the floor for the next two minutes to finish an argument.
Alternatively, a listener may not take up a cue from a speaker to answer a question
or take over the conversation, but instead continue to say nothing even though the
speaker may be making it glaringly obvious it is the listener's turn to say some-
thing. Many a time a teacher will try to hand over the conversation to a student in a
seminar, by staring at her and asking a specific question, only to see the student
look at the floor, and say nothing. The outcome is an embarrassing silence, fol-
lowed by either the teacher or another student picking up the conversation again.
Other kinds of breakdowns in conversation arise when someone says something
that is ambiguous and the other person misinterprets it to mean something else. In
4.2 Social mechanisms in communication and collaboration 109
How do people repair breakdowns in conversations when using the phone or email?
Comment In these settings people cannot see each other and so have to rely on other means of repair-
ing their conversations. Furthermore, there are more opportunities for breakdowns to occur
and fewer mechanisms available for repair. When a breakdown occurs over the phone, peo-
ple will often shout louder, repeating what they said several times, and use stronger intbna-
tion. When a breakdown occurs via email, people may literally spell out what they meant,
making things much more explicit in a subsequent email. If the message is beyond repair
they may resort to another mode of communication that allows greater flexibility of expies-
sion, either telephoning or speaking to the recipient face to face.
1 10 Chapter 4 Design for collaboration and communication
Kinds of conversations
Conversations can take a variety of forms, such as an argument, a discussion, a
heated debate, a chat, a t6te-8-tete, or giving someone a "telling off." A well-
known distinction in conversation types is between formal and informal communi-
cation. Formal communication involves assigning certain roles to people and
prescribing a priori the types of turns that people are allowed to take in a conversa-
tion. For example, at a board meeting, it is decided who is allowed to speak, who
speaks when, who manages the turn-taking, and what the participants are allowed
to talk about.
In contrast, informal communication is the chat that goes on when people so-
cialize. It also commonly happens when people bump into each other and talk
briefly. This can occur in corridors, at the coffee machine, when waiting in line, and
walking down the street. Informal conversations include talking about impersonal
things like the weather (a favorite) and the price of living, or more personal things,
like how someone is getting on with a new roommate. It also provides an opportu-
nity to pass on gossip, such as who is going out to dinner with whom. In office set-
tings, such chance conversations have been found to serve a number of functions,
including coordinating group work, transmitting knowledge about office culture,
establishing trust, and general team building (Kraut et al, 1990). It is also the case
that people who are in physical proximity, such as those whose offices or desks are
close to one another, engage much more frequently in these kinds of informal chats
than those who are in different corridors or buildings. Most companies and organi-
zations are well aware of this and often try to design their office space so that peo-
ple who need to work closely together are placed close to one another in the same
physical space.
form of messaging. Media spaces are distributed systems comprising audio, video,
and computer systems that "extend the world of desks, chairs, walls and ceilings"
(Harrison et al., 1997), enabling people distributed over space and time to commu-
nicate and interact with one another as if they were physically present. The various
collaborative technologies have been designed to support different kinds of
communication, from informal to formal and from one-to-one to many-to-many
conversations. Collectively, such technologies are often referred to as computer-
mediated communication (CMC).
Do you think it is better to develop technologies that will allow people to talk at a dis-
tance as if they were face to face, or to develop technologies that will support new ways of
conversing?
Comment On the one hand, it seems a good idea to develop technologies supporting people communi-
cating at a distance that emulate the way they hold conversations in face to face situations.
After all, this means of communicating is so well established and second nature to people.
Phones and videoconferencing have been developed to essentially support face to face con-
versations. It is important to note, however, that conversations held in this way are not the
same as when face to face. People have adapted the way they hold conversations to fit in
with the constraints of the respective technologies. As noted earlier, they tend to shout more
when misunderstood over the phone. They also tend to speak more loudly when talking on
the phone, since they can't monitor how well the person can hear them at the other end of
the phone. Likewise, people tend to project themselves more when videoconferencing.
Turn-taking appears to be much more explicit, and greetings and farewells more ritualized.
On the other hand, it is interesting to look at how the new communication technologies
have been extending the way people talk and socialize. For example, SMS text messaging
has provided people with quite different ways of having a conversation at a distance. People
(especially teenagers) have evolved a new form of fragmentary conversation (called "tex-
ting") that they continue over long periods. The conversation comprises short phrases that
are typed in, using the key pad, commenting on what each is doing or thinking, allowing the
other to keep posted on current developments. These kinds of "streamlined" conversations
are coordinated simply by taking turns sending and receiving messages. Online chatting has
also enabled effectively hundreds and even thousands of people to take part in the same
conversations, which is not possible in face to face settings.
i. Synchronous communication
Where conversations in real time are supported by letting people talk with each other either using their voices
or through typing. Both modes seek to support non-verbal communication to varying degrees.
Examples:
Talking with voice: video phones, video conferencing (desktop or wall), media spaces.
Talking via typing: text messaging (typing in messages using cell phones), instant messaging (real-time
interaction via PCs) chatrooms, collaborative virtual environments (CVEs).
New kinds of functionality:
CVEs allow communication to take place via a combination of graphical representations of self (in the form
of avatars) with a separate chatbox or overlaying speech bubbles.
CVEs allow people to represent themselves as virtual characters, taking on new personas (e.g., opposite
gender), and expressing themselves in ways not possible in face-to-face settings.
CVEs, MUDSand chatrooms have enabled new forms of conversation mechanisms, such as multi-turn-taking,
where a number of people can contribute and keep track of a multi-streaming text-based conversation.
Instant messaging allows users to multitask by holding numerous conversations at once.
Benefits:
Not having to physically face people may increase shy people's confidence and self-esteem to converse more
in "virtual" public.
It allows people to keep abreast of the goings-on in an organization without having to move from their office.
It enables users to send text and images instantly between people using instant messaging.
In offices, instant messaging allows users to fire off quick questions and answers without the time lag of
email or phone-tag.
Problems:
Lack of adequate bandwidth has plagued video communication, resulting in poor-quality images that
frequently break up, judder, have shadows, and appear as unnatural images.
It is difficult to establish eye contact (normally an integral and subconscious part of face-to-face
conversations) in CVEs, video conferencing, and videophones.
Having the possibility of hiding behind a persona, a name, or an avatar in a chatroom gives people the
opportunity to behave differently. Sometimes this can result in people becoming aggressive or intrusive.
ii. Asynchronous communication
Where communication between participants takes place remotely and at different times. It relies not on time-
dependent turn-taking but on participants initiating communication and responding to others when they want
or are able to do so.
Examples:
email, bulletin boards, newsgroups, computer conferencing
New kinds offunctionality:
Attachments of different sorts (including annotations, images, music) for email and computer conferencing
can be sent.
Messages can be archived and accessed using various search facilities.
Benefits:
Ubiquity: Can read any place, any time.
Flexibility: Greater autonomy and control of when and how to respond, so can attend to it in own time
rather than having to take a turn in a conversation at a particular cue.
Powerful: Can send the same message to many people.
Makes some things easier to say: Do not have to interact with person so can be easier to say things than when
face to face (e.g., announcing sudden death of colleague, providing feedback on someone's performance).
(Continued)
112
Table 4.1 (Continued)
- - - -
Problems:
Flaming: When a user writes incensed angry email expressed in uninhibited language that is much stronger
than normally used when interacting with the same person face to face. This includes the use of impolite
statements, exclamation marks, capitalized sentences or words, swearing, and superlatives. Such "charged"
communication can lead to misunderstandings and bad feelings among the recipients.
Overload: Many people experience message overload, receiving over 30 emails or other messages a day.
They find it difficult to cope and may overlook an important message while working through their ever
increasing pile of email-especially if they have not read it for a few days. Various interface mechanisms
have been designed to help people manage their email better, including filtering, threading, and the use of
signaling to indicate the level of importance of a message (via the sender or recipient), through color coding,
bold font, or exclamation marks placed beside a message.
False expectations: An assumption has evolved that people will read their messages several times a day and
reply to them there and then. However, many people have now reverted to treating email more like postal
mail, replying when they have the time to do so.
iii. CMC combined with other activity
People often talk with each other while carrying out other activities. For example, designing requires people to
brainstorm together in meetings, drawing on whiteboards, making notes, and using existing designs. Teaching
involves talking with students as well as writing on the board and getting students to solve problems
collaboratively. Various meeting- and decision- support systems have been developed to help people work or
learn while talking together.
Examples:
Customized electronic meeting rooms have been built that support people in face-to-face meetings, via the
use of networked workstations, large public displays, and shared software tools, together with various
techniques to help decision-making. One of the earliest systems was the University of Arizona's
Groupsystem (see Figure 4.2).
-- - - -
Facilitator console
and network
file server
\
Work
/
Figure 4.2 Schematic diagram of a group meeting room, showing relationship of work-
station, whiteboards and video projector.
(Continued)
113
1 14 Chapter 4 Design for collaboration and communication
Networked classrooms: Recently schools and universities have realized the potential of using combinations
of technologies to support learning. For example, wireless communication, portable devices and interactive
whiteboards are being integrated in classroom settings to allow the teacher and students to learn and
communicate with one another in novel interactive ways (see Figure 4.3).
Argumentation tools which record the design rationale and other arguments used in a discussion that lead to
decisions in a design (e.g. gIBIS, Conklin and Begeman, 1989). These are mainly designed for people
working in the same physical location.
Shared authoring and drawing tools that allow people to work on the same document at the same time. This
can be remotely over the web (e.g., shared authoring tools like Shredit) or on the same drawing surface in
the same room using multiple mouse cursors (e.g., KidPad, Benford et al., 2000).
New kinds of functionality:
Allows new ways of collaboratively creating and editing documents.
Supports new forms of collaborative learning.
Integrates different kinds of tools.
Benefits:
Supports talking while carrying out other activities at the same time, allowing multi-tasking-which is what
happens in face-to-face settings.
Speed and efficiency: allows multiple people to be working a n same document at same time.
Greater awareness: allows users to see how one another are progressing in real time.
Problems:
WYSIWIS (what you see is what I see): It can be difficult to see what other people are referring to when in
remote locations, especially if the document is large and different users have different parts of the document
on their screens.
Floor control: Users may want to work on the same piece of text or design, potentially resulting in file
conflicts. These can be overcome by developing various social and technological floor-control policies.
4.2 Social mechanisms in communication and collaboration 1 15 I
e of the earliest technological innovations (besides the telephone and telegraph) devel-
ed for supporting conversations at a distance was the videophone. Despite numerous at-
1
tempts by the various phone companies to introduce them over the last 50 years (see Figure
4.4), they have failed each time. Why do you think this is so? 1
Comment One of the biggest problems with commercial videophones is that the bandwidth is too low, 1
resulting in poor resolution and slow refresh rate. The net effect is the display of unaccept-
able images: the person in the picture appears to move in sudden jerks; shadows are left be-
hind when a speaker moves, and it is difficult to read lips or establish eye contact. There is
also the social acceptability issue of whether people want to look at pocket-sized images of
each other when talking. Sometimes you don't want people to see what state you are in or
where you are.
Another innovation has been to develop systems that allow people to com-
municate and interact with each other in ways not possible in the physical world.
Rather than try to imitate or facilitate face to face communication (like the
above systems), designers have tried to develop new kinds of interactions. For ex-
ample, ClearBoard was developed to enable facial expressions of participants to
be made visible to others by using a transparent board that showed their face to
the others (Ishii et al., 1993). HyperMirror was designed to provide an environ-
ment in which the participants could feel they were in the same virtual place even
Figure 4.4 (a) One of British Telecom's early videophones and (b) a recent mobile "visual-
phone" developed in Japan.
- -
Figure 4.7 Hypermirror in action, showing perception of virtual personal space. (a) A I
woman is in one room (indicated by arrow on screen), (b) while a man and another woman
in the other room chat to each other. They move apart when they notice they are "overlap-
ping" her and (c) virtual personal space is established.
though they were physically in different places (Morikawa and Maesako, 1998).
Mirror reflections of people in different places were synthesized and projected
onto a single screen, so that they appeared side by side in the same virtual space.
In this way, the participants could see both themselves and others in the same
seamless virtual space. Observations of people using the system showed how
quickly they adapted to perceiving themselves and others in this way. For exam-
ple, participants quickly became sensitized to the importance of virtua1,personal
space, moving out of the way if they perceived they were overlapping someone
else on the screen (see Figure 4.7).
uch communication is non-verbal? Watch a soap opera on the TV and turn down the
and look at the kinds and frequency of gestures that are used. Are you able to un-
derstand what is going on? How do radio soaps compensate for not being able to use non-
verbal gestures? How do people compensate when chatting online?
Comment Soaps are good to watch for observing non-verbal behavior as they tend to be overcharged,
with actors exaggerating their gestures and facial expressions to convey their emotions. It is
often easy to work out what kind of scene is happening from their posture, body move-
ment, gestures, and facial expressions. In contrast, actors on the radio use their voice a lot
more, relying on intonation and surrounding sound effects to help convey emotions. When
chatting online, people use emoticons and other specially evolved verbal codes.
that allows students to attend the lectures and seminars for their given courses, tak-
ing into account numerous rules and constraints. These include:
A student cannot attend more than one lecture at a given time.
A professor cannot give more than one lecture or seminar at a given time.
A room cannot be allocated to more than one seminar or lecture at a given
time.
Only a certain number of students can be placed in a room, depending on its
size.
4.2 Social mechanisms in communication and collaboration 121
I
Other coordinating mechanisms that are employed by groups working together
are rules and conventions. These can be formal or informal. Formal rules, like the
compulsory attendance of seminars, writing monthly reports, and filling in of
timesheets, enable organizations to maintain order and keep track of what its mem-
bers are doing. Conventions, like keeping quiet in a library or removing meal trays
after finishing eating in a cafeteria, are a form of courtesy to others.
I
Figure 4.8 An external representation used to coordinate collaborative work in the form of
a print-out table showing who has completed the checking of files and who is down to do
what.
122 Chapter 4 Design for collaboration and communication
they may need to reschedule their work and annotate the shared workplan. In so
doing, these kinds of coordination mechanisms are considered to be tangible, pro-
viding important representations of work and responsibility that can be changed
and updated as and when needed.
Why are whiteboards so useful for coordinating projects? How might electronic whiteboards
be designed to extend this practice?
I
Comment Physical whiteboards are very good as coordinating tools as they display information that is
external and public, making it highly visible for everyone to see. Furthermore, the informa-
tion can be easily annotated to show up-to-date modifications to a schedule. Whiteboards
also have a gravitational force, drawing people to them. They provide a meeting place for
people to discuss and catch up with latest developments.
Electronic whiteboards have the added advantage that important information can be ani-
mated to make it stand out. Important information can also be displayed on multiple dis-
plays throughout a building and can be extracted from existing databases and software,
thereby making the project coordinator's work much easier. The boards could also be used
to support on-the-fly meetings in which individuals could use electronic pens to sketch out
ideas-that could then be stored electronically. In such settings they could also be interacted
with via wireless handheld computers, allowing information to be "scraped" off or
"squirted onto the whiteboard.
and so started announcing this to the passengers on the platform before controller
A had even finished talking with the train driver. At other times, the two con-
trollers keep a lookout for each other, monitoring the environment for actions and
events which they might have not noticed but may be important for them to know
about so that they can act appropriately.
hat d o you think happens when one person of a closely knit team does not see or hear
ething or misunderstands what has been said, while the others in the group assume they
have seen, heard, or understood what has been said?
Comment In such circumstances, the person is likely to carry on as normal. In some cases this will re-
sult in inappropriate behavior. Repair mechanisms will then need to be set in motion. The
knowledgeable participants may notice that the other person has not acted in the manner
expected. They may then use one of a number of subtle repair mechanisms, say coughing
or glancing at something that needs attending to. If this doesn't work, they may then re-
sort to explicitly stating aloud what had previously been signaled implicitly. Conversely,
the unaware participant may wonder why the event hasn't happened and, likewise, look
over at the other people, cough to get their attention or explicitly ask them a question.
The kind of repair mechanism employed at a given moment will depend on a number of
factors, including the relationship among the participants (e.g., whether one is more se-
nior than the others-this determines who can ask what), perceived fault or responsibility
for the breakdown and the severity of the outcome of not acting there and then on the
new information.
Figure 4.10 A screen dump of Portholes, showing low resolution monochrome images from
offices in the US and UK PARC sites. (Permission from Xerox Research Centre, Europe)
set-up suggested that having access to such information led to a shared sense of
community.
The emphasis in the design of these early awareness systems was largely on
supporting peripheral monitoring, allowing people to see each other and their
progress. Dourish and Bellotti (1992) refer to this as shared feedback. More recent
distributed awareness systems provide a different kind of awareness information.
Rather than place the onus on participants to find out about each other, they have
been designed to allow users to notify each other about specific kinds of events.
Thus, there is less emphasis on monitoring and being monitored and more on ex-
plicitly letting others know about things. Notification mechanisms are also used to
provide information about the status of shared objects and the progress of collabo-
rative tasks.
Hence, there has been a shift towards supporting a collective "stream of con-
sciousness" that people can attend to when they want to, and likewise provide in-
formation for when they want to. An example of a distributed awareness system is
Elvin, developed at the University of Queensland (Segall and Arnold, 1997), which
provides a range of client services. A highly successful client is Tickertape, which is
a lightweight instant messaging system, showing small color-coded messages that
scroll from right to left across the screen (Fitzpatrick et a]., 1999). It has been most
useful as a "chat" and local organizing tool, allowing people in different locations
to effortlessly send brief messages and requests to the public tickertape display (see
Figure 4.11). It has been used for a range of functions, including organizing shared
128 Chapter 4 Design for collaboration and communication
Figure 4.1 1 The Tickertape and Tickerchat interface for ELVIN awareness service.
A: Declare
1 31
1
A: Reject A: Withdraw
6:Withdraw \
Figure 4.13 Conversation for action (CfA) diagram (from Winograd and Flores, 1986, p. 65).
texts, the system failed because it was asking too much of the users to change the
way they communicated and worked. However, it should be noted that the Coordi-
nator was successful in other kinds of organizations, namely those that are highly
structured and need a highly structured system to support them. In particular, the
most successful use of the Coordinator and its successors has been in organizations,
like large manufacturing divisions of companies, where there is a great need for
considerable management of orders and where previous support has been mainly
in the form of a hodgepodge of paper forms and inflexible task-specific data pro-
cessing applications (Winograd, 1994). 1
processes
/
Inputs
(sensory)
Outputs
(motor behavior) representations
control center
alert
aob
Figure 4.16 A cognitive system in which information is propagated through different media.
they use, and the environment they are working in. An example of a cognitive sys-
tem is an airline cockpit, where a top-level goal is to fly the plane. This involves:
the pilot, co-pilot and air traffic controller interacting with one another
the pilot and co-pilot interacting with the instruments in the cockpit
the pilot and co-pilot interacting with the environment in which the plane is
flying (e.g., sky, runway).
A primary objective of the distributed cognition approach is to describe these
interactions in terms of how information is propagated through different media. By
this is meant how information is represented and re-represented as it moves across
individuals and through the array of artifacts that are used (e.g., maps, instrument
readings, scribbles, spoken word) during activities. These transformations of infor-
mation are referred to as changes in representational state.
This way of describing and analyzing a cognitive activity contrasts with other
cognitive approaches (e.g., the information processing model) in that it focuses not
on what is happening inside the heads of each individual but on what is happening
across individuals and artifacts. For example, in the cognitive system of the cockpit,
a number of people and artifacts are involved in the activity of "flying to a higher
altitude." The air traffic controller initially tells the co-pilot when it is safe to fly to
a higher altitude. The co-pilot then alerts the pilot, who is flying the plane, by mov-
ing a knob on the instrument panel in front of them, indicating that it is now safe to
fly (see Figure 4.16). Hence, the information concerning this activity is transformed
4.4 Conceptual Frameworks 135
through different media (over the radio, through the co-pilot, and via a change in
the position of an instrument).
A distributed cognition analysis typically involves examining:
the distributed problem solving that takes place (including the way people
work together to solve a problem)
the role of verbal and non-verbal behavior (including what is said, what is
implied by glances, winks, etc., and what is not said)
the various coordinating mechanisms that are used (e.g., rules, procedures)
the various communicative pathways that take place as a collaborative activ-
ity progresses
how knowledge is shared and accessed I
I
In addition, an important part of a distributed cognition analysis is to identify
the problems, breakdowns, and concomitant problem-solving processes that
emerge to deal with them. The analysis can be used to predict what would happen
to the way information is propagated through a cognitive system, using a different
arrangement of technologies and artifacts and what the consequences of this would
be for the current work setting. This is especially useful when designing and evalu-
ating new collaborative technologies.
136 Chapter 4 Design For collaboration and communication
There are several other well known conceptual frameworks that are used to
analyze how people collaborate and communicate, including activity theory, eth-
nomethodology, situated action and common ground theory.
Assignment
The aim of this design activity is for you to analyze the design of a collaborative virtual envi-
ronment (CVE) with respect to how it is designed to support collaboration and communication.
Visit an existing CVE (many are freely downloadable) such as V-Chat (vchat.microsoft.
com), one of the many Worlds Away environments (www.worlds.net), or the Palace
(www.communities.com). Try to work out how they have been designed to take into account
the following:
(a) General social issues
What is the purpose of the CVE?
What kinds of conversation mechanisms are supported?
What kinds of coordination mechanisms are provided?
What kinds of social protocols and conventions are used?
What kinds of awareness information is provided?
Does the mode of communication and interaction seem natural or awkward?
(b) Specific interaction design issues
What form of interaction and communication is supported (e.g., textlaudiolvideo)?
What other visualizations are included? What information do they convey?
How do users switch between different modes of interaction (e.g., exploring and
chatting)? Is the switch seamless?
Are there any social phenomena that occur specific to the context of the CVE that
wouldn't happen in face to face settings (e.g., flaming)?
(c) Design issues
What other features might you include in the CVE to improve communication
and collaboration?
Further reading 137
Summary
In this chapter we have looked at some core aspects of sociality, namely communication and
collaboration. We examined the main social mechanisms that people use in different settings
in order to collaborate. A number of collaborative technologies have been designed to sup-
port and extend these mechanisms. We looked at representative examples of these, high-
lighting core interaction design concerns. A particular concern is social acceptability that is
critical for the success or failure of technologies intended to be used by groups of people
working or communicating together. We also discussed how ethnographic studies and theo-
retical frameworks can play a valuable role when designing new technologies for work and
other settings.
Key points
Social aspects are the actions and interactions that people engage in at home, work,
school, and in public.
The three main kinds of social mechanism used to coordinate and facilitate social aspects
are conversation, coordination, and awareness.
Talk and the way it is managed is integral to coordinating social activities.
Many kinds of computer-mediated communication systems have been developed to en-
able people to communicate with one another when in physically different locations.
External representations, rules, conventions, verbal and non-verbal communication are
all used to coordinate activities among people.
It is important to take into account the social protocols people use in face to face collabo-
ration when designing collaborative technologies.
Keeping aware of what others are doing and letting others know what you are doing are
important aspects of collaborative working and socializing.
Ethnographic studies and conceptual frameworks play an important role in understand-
ing the social issues to be taken into account in designing collaborative systems.
Getting the right level of control between users and system is critical when designing col-
laborative systems.
Further reading
DIX, A., FINLAY, J., ABOWD, G., AND BEALE,R. (1998) BAECKER, R. M., GRUDIN, J., BUXTON, W. A. S., AND
Human-Computer Interaction. Upper Saddle River, NJ: GREENBERG, S. (eds.) (1995) Readings in Human-Computer
Prentice Hall. This textbook provides a comprehensive Interaction: Toward the Year 2000, (second edition) San
overview of groupware systems and the field of CSCW in Francisco, Ca.: Morgan Kaufmann, 1995.
Chapters 13 and 14. BAECKER, R. M. (ed.) (1993) Readings in Groupware and
ENGESTROM, Y A N D MIDDLETON, D. (1996) (eds.) Cog- Computer-Supported Cooperative Work: Assisting Human-
nition and Communication at Work. Cambridge: Cam- Human Collaboration, San Mateo, Ca.: Morgan Kaufmann.
bridge University Press. A good collection of classic These two collections of readings include a number of repre-
ethnographic studies that examine the relationship be- sentative papers from the field of CSCW, ranging from so-
tween different theoretical perspectives and field studies cial to system architecture issues.
of work practices. MUNRO, A.J.,HOOK, K. AND BENYON, D. (eds.) (1999) Social
PREECE, J. (2000) Online Communities: Designing Usability, Navigation of Information Space. New York: Springer Ver-
Supporting Sociability. New York: John Wiley and Sons. lag. Provides a number of illuminating papers that explore
This book combines usability and sociability issues to do how people navigate information spaces in real and virtual
with designing online communities. worlds and how people interact with one another in them.
138 Chapter 4 Design for collaboration and communication
Abigail Sellen is a senior re- value of a particular product for a user? Once we
searcher at Hewlett Packard know this, we can then ask, for a particular situation
Labs in Bristol, UK. Her or task, what features do we want to deliver and how
work involves carrying out best should we deliver those features? This includes,
user studies to inform the for example, what would the interface look like? Fi-
development of future prod-
nally, I think user studies are important to understand
ucts, including appliances
and web-based services.
how users' lives may change and how they will be af-
She has a background in fected by introducing a new technology. This has to
coanitive science and take into account the social, physical, and technologi-
"
human factors engineering, cal context into which it will be introduced.
having obtained her doctor-
ate at the University of Cali- YR: So it sounds like you have a set of general
fornia, Son Diego. Prior to
questions you have in mind when you do a user
this Abiaail worked at
Xerox Research Labs in Cambridge, UK, and Apple Computer
study. Could you now describe how you would do a
Inc. She has also worked as an academic researcher at the user study and what kinds of things you would be
Computer Systems Research Institute at the University of looking for?
Toronto, Canada and the Applied Psychology Unit in Cam- AS: Well, I think there are two different classes of
bridge, UK. She has written widely on the social and cognitive user studies and both are quite different in the ways
aspects of paper use, video conferencing, input devices, you go about them. There are evaluation studies,
human memory, and human error, ail with an eye to the de- where we take a concept, a prototype or even a devel-
sign of new technologies.
oped technology and look at how it is used and then
try to modify or improve it based on what we find.
YR: Could you tell me what you do at Hewlett The second class of user studies is more about discov-
Packard Research Labs? ering what people's unmet needs may be. This means
AS: Sure, I've been at HP Labs for a number of trying to develop new concepts and ideas for things
years now as a member of its User Studies and Design that people may never have thought of before. This is
Group. This is a smallish group consisting of five so- difficult because you can't necessarily just ask people
cial scientists and three designers. Our work can best what they would like or what they would use. Instead,
be described as doing three things: we do projeqts that you have to make inferences from studying people in
are group-led around particular themes, likt for ex- different situations and try to understand from this
ample, how people use digital music or how people what they might need or value.
capture documents using scanning technology. We do
consulting work for development teams at HP, and YR: In the book we mention the importance of tak-
thirdly, we do a little bit of our own individual work, ing into account social aspects, such as awareness of
like writing papers and books, and giving talks. others, how people communicate with each other and
so on. D o you think these issues are important when
YR: Right. Could you tell me about user studies, you are doing these two kinds of user studies?
what they are and why you consider them important? AS: Well, yes, and in particular I think social aspects
AS: OK. User studies essentially involve looking at really are playing to that second class of user study I
how people behave either in their natural habitats or mentioned where you are trying to discover what
in the laboratory, both with old technologies and with people's unmet needs or requirements may be. Here
new ones. I think there are many different questions you are trying to get rich descriptions about what
that these kinds of studies can help you answer. Let people do in the context of their everyday lives-
me name a few. One question is: who is going to be whether this is in their working lives, their home lives,
the potential user for a particular device or service or lives on the move. I'd say getting the social aspects
that you are thinking of developing? A second ques- understood is often very important in trying to under-
tion-which I think is key-is, what is the potential stand what value new products and services might
Interview 139
bring to people's day-to-day activities, and also how very different depending on the kind of reading the
they would fit into those existing activities. users are doing. So, for example, if they're reading by
themselves, the screen size and viewing angle may not
YR: And what about cognitive aspects, such as how be as important as if they're reading with others. If
people carry out their tasks, what they remember, they're skim reading, the ability to quickly flick
what they are bad at remembering? Is that also im- through pages is important. And if they're reading
portant to look into when you are doing these kinds and writing, then this points to the need for a pen-
of studies? based interface. All of these issues become important
design considerations.
AS: Yes, if you think about evaluation studies, then This study then led to the development of some
cognitive aspects are extremely important. Looking at design concepts and ideas for new kinds of reading
cognitive aspects can help you understand the nature devices. At this stage we involved designers to de-
of the user interaction, in particular what processes velop different "props" to get feedback and reactions
are going on in their heads. This includes issues like from potential users. A prop could be anything from
learning how users perceive a device and how they a quick sketch to an animation to a styrofoam 3D
form a mental model of how something works. Cogni- mockup. Once you have this initial design work, you
tive issues are especially important to consider when can then begin to develop working prototypes and
we want to contrast one device with another or think test them with realistic tasks in both laboratory and
about new and better ways in which we might design natural settings. Some of this work we have already
an interface. completed, but the project has had an impact on sev-
eral different research and development efforts.
YR: I wonder if you could describe to me briefly one
of your recent studies where you have looked at cog- YR: Would you say that user studies are going to be-
nitive and social aspects. come an increasingly important part of the interaction
AS: How about a recent study we did to do with design process, especially as new technologies like
building devices for reading digital documents? When ubiquitous computing and handheld devices come
we first set out on this study, before we could begin to into being-and where no one really knows what ap-
think about how to build such devices, we had to plications to develop?
begin by asking, "What do we mean by reading?" It AS: Yes. I think the main contribution of user stud-
turned out there was not a lot written about the dif- ies, say, 15 years ago was in the area of evaluation and
ferent ways people read in their day-to-day lives. So usability testing. I think that role is changing now in
the first thing we did was a very broad study looking that user studies researchers are not only those who
at how people read in work situations. The technique evaluate devices and interfaces but also those who de-
we used here was a combination of asking people to velop new concepts. Also, another important devel-
fill out a diary about their reading activities during the opment is a change in the way the research is carried
course of a day and interviewing them at the end of out. More and more I am finding that teams are draw-
each day. The interviews were based around what was ing together people from other disciplines, such as so-
written in the diaries, which turned out to be a good ciologists, marketing people, designers, and people
way of unpacking more details about what people had from business and technology development.
been doing.
That initial study allowed us to categorize all the
different ways people were reading. What we found YR: So they are essentially working as a multidisci-
out is that actually you can't talk about reading in a plinary team. Finally, what is it like to work in a
generic sense but that it falls into at least 10 different large organization like HP, with so many different
categories. For example, sometimes people skim departments?
read, sometimes they read for the purpose of writing AS: One thing about working for a large organiza-
something, and sometimes they read very reflectively tion is that you get a lot of variety in what you can
and deeply, marking up their documents as they go. do. You can pick and choose to some extent and, de-
What quickly emerged from this first study was that if pending on the organization, don't have to be tied to
you're designing a device for reading it might look a particular product. If, on the other hand, you work
140 Chapter 4 Design for collaboration and communication
for a smaller organization such as a start-up com- teams. They put huge pressures on you because they
pany, inevitably there is lots of pressure to get things have huge pressures on them. You really have to
out the door quickly. Things are often very focused. work at effectively incorporating user studies find-
Whether large or small, however, I think one of the ings into the development process. This can be in-
hardest things I have found in working for corporate credibly challenging, but it's also satisfying to have
research is learning to work with the development an impact on real products.
Understanding how interfaces
affect users
5.1 Introduction
5.2 What are affective aspects?
5.3 Expressive interfaces
5.4 User frustration
5.5 A debate: the application of anthropomorphism to interaction design
5.6 Virtual characters: agents
5.6.1 Kinds of agents
5.6.2 General design concerns: believability of virtual characters
5.1 Introduction
An overarching goal of interaction design is to develop interactive systems that
elicit positive responses from users, such as feeling at ease, being comfortable, and
enjoying the experience of using them. More recently, designers have become in-
terested in how to design interactive products that elicit specific kinds of emotional
responses in users, motivating them to learn, play, be creative, and be social. There
is also a growing concern with how to design websites that people can trust, that
make them feel comfortable about divulging personal information or making a
purchase.
We refer to this newly emerging area of interaction design as affective aspects.
In this chapter we look at how and why the design of computer systems cause cer-
tain kinds of emotional responses in users. We begin by looking in general at ex-
pressive interfaces, examining the role of an interface's appearance on users and
how it affects usability. We then examine how computer systems elicit negative re-
sponses, e.g., user frustration. Following this, we present a debate on the controver-
sial topic of anthropomorphism and its implications for designing applications to
have human-like qualities. Finally, we examine the range of virtual characters de-
signed to motivate people to learn, buy, listen, etc., and consider how useful and
appropriate they are.
142 Chapter 5 Understanding how interfaces affect users
Figure 5.1 Kismet the robot expressing surprise, anger, and happiness.
5.3 Expressive interfaces 143
A question of style or stereotype? Figure 5.4 shows two differently designed dialog boxes.
Describe how they differ in terms of style. Of the two, which one do you prefer? Why?
Which one do you think (i) Europeans would like the most and (ii) Americans would like
the most?
Comment Aaron Marcus, a graphic designer, created the two designs in an attempt to provide appealing
interfaces. Dialog box A was designed for white American females while dialog box B was
designed for European adult male intellectuals. The rationale behind Marcus's ideas was that
European adult male intellectuals like "suave prose, a restrained treatment of information
density, and a classical approach to font selection (e.g., the use of serif type in axial symmetric
layouts similar to those found in elegant bronze European building identification signs)." In
contrast, white American females "prefer a more detailed presentation, curvilinear shapes
and the absence of some of the more-brutal terms . . . favored by male software engineers."
When the different interfaces were empirically tested by Teasley et al. (1994), their re-
sults did not concur with Marcus's assumptions. In particular, they found that the European
dialog box was liked the best by all people and was considered most appropriate for all
users. Moreover, the round dialog box designed for women was strongly disliked by every-
one. The assumption that women like curvilinear features clearly was not true in this con-
text. At the very least, displaying the font labels in a circular plane makes them more
difficult to read than when presented in the conventionally accepted horizontal plane.
Family
[V
Linespace
1-
Width
pzEqq
Weight Slant
ml
,,,
\
Alignment
Efects
Reverse Outline
Shadow 1a Underline
> f
Figure 5.4 Square and round dialog boxes designed by Aaron Marcus (1993): (a) dialog box designed for white American women,
and (b) dialog box designed for European adult male intellectuals.
146 Chapter 5 Understanding how interfaces affect users
of their Windows '98 operating environment.' The agents typically appear at the
bottom of the screen whenever the system "thinks" the user needs help carrying
out a particular task. They, too, are depicted as cartoon characters, with friendly
warm personalities. As mentioned in Chapter 2, one of the problems of using
agents in this more general context is that some users do not like them. More expe-
rienced users who have developed a reasonably good mental model of the system
often find such agent helpers very trying and quickly find them annoying intrusions,
especially when they distract them from their work. (We return to anthropomor-
phism and the design of interface agents later in Section 5.5).
Users themselves have also been inventive in expressing their emotions at the
computer interface. One well-known method is the use of emoticons. These are
keyboard symbols that are combined in various ways to convey feelings and emo-
tions by siqulating facial expressions like smiling, winking, and frowning on the
screen. The meaning of an emoticon depends on the content of the message and
where it is placed in the message. For example, a smiley face placed at the end of a
message can mean that the sender is happy about a piece of news she has just writ-
ten about. Alternatively, if it is placed at the end of a comment in the body of the
message, it usually indicates that this comment is not intended to be taken seri-
ously. Most emoticons are designed to be interpreted with the viewer's head tilted
over to the left (a result of the way the symbols are represented on the screen).
Some of the best known ones are presented in Table 5.1. A recently created short-
hand language, used primarily by teenagers when online chatting or texting is the
use of abbreviated words. These are formed by keying in various numbers and let-
' o n the Mac version of Microsoft's Office 2001, Clippy was replaced by an anthropomorphized Mac
computer with big feet and a hand that conveys various gestures and moods.
5.4 User frustration 147
7
ters in place of words, e.g., "I 1 2 CU 2nite '. As well as being creative, the short-
hand can convey emotional connotations.
Expressive forms like emoticons, sounds, icons, and interface agents have been
primarily used to (i) convey emotional states andlor (ii) elicit certain kinds of emo-
tional responses in users, such as feeling at ease, comfort, and happiness. However, in
many situations computer interfaces inadvertently elicit negative emotional responses.
By far the most common is user frustration, to which we now turn our attention.
Provide specific examples for each of the above categories from your own experience, when
you have become frustrated with an interactive device (e.g., telephone, VCR, vending ma-
chine, PDA, computer). In doing this, write down any further types of frustration that come
to mind. Then prioritize them in terms of how annoying they are. What are the worst types?
Comment In the text below we provide examples of common frustrations experienced when using
computer systems. The worst include unhelpful error messages and excessive housekeeping
tasks. You no doubt came up with many more.
1. Gimmicks
Cause: When a users' expectations are not met and they are instead presented with
a gimmicky display.
Level of frustration: Mild
This can happen when clicking on a link to a website only to discover that it is still
"under construction." It can be still more annoying when the website displays a
road-sign icon of "men at work" (see Figure 5.6). Although the website owner may
think such signs amusing, it serves to underscore the viewer's frustration at having
made the effort to go to the website only to be told that it is incomplete (or not
even started in some cases). Clicking on links that don't work is also frustrating.
How to avoid or help reduce the frustration:
By far the best strategy is to avoid using gimmicks to cover up the real crime. In
this example it is much better to put material live on the web only when it is com-
plete and working properly. People very rarely return to sites when they see icons
like the one in Figure 5.6.
2. Error Messages
Cause: When a system or application crashes and provides an "unexpected" error
message.
Level of frustration: High
Error messages have a long history in computer interface design, and are notorious
for their incomprehensibility. For example, Nielsen (1993) describes an early system
that was developed that allowed only for one line of error messages. Whenever the
Figure 5.6 Men at work icon sign indicating "website under construction." Ac-
cording to AltaVista, there were over 12 million websites containing the phrase
"under construction" in January 2001.
5.4 User frustration 149
error message was too long, the system truncated it to fit on the line, which the users
would spend ages trying to decipher. The full message was available only by pressing
the PF1 (help key) function key. While this may have seemed like a natural design
solution to the developers, it was not at all obvious to the users. A much better design
solution would have been to use the one line of the screen to indicate how to find
more information about the current error ("press the PF1 key for explanation").
The use of cryptic language and developer's jargon in error messages is a major
contributing factor in user frustration. It is one thing to have to cope when some-
thing goes wrong but it is another to have to try to understand an obscure message
that pops up by way of explanation. One of my favorites, which sometimes appears
on the screen when I'm trying to do something perfectly reasonable like paste some I
text into a document, using a word processor, is: "The application Word Wonder
has unexpectedly quit due to a Type 2 error."
It is very clear from what the system has just done (closed the application very
rapidly) that it has just crashed, so such feedback is not very helpful. Letting the
user know that the error is of a Type 2 kind is also not very useful. How is the aver-
age user meant to understand this? Is there a list of error types ready at hand to tell
the user how to solve the problem for each error? Moreover, such a reference in-
vites the user to worry about how many more error types there might be. The tone
of the message is also annoying. The adjective "unexpectedly" seems condescend-
ing, implying almost that it is the fault of the user rather than the computer. Why
include such a word at all? After all, how else could the application have quit? One
could never imagine the opposite situation: an error message pops up saying, "The
application has expectedly quit, due to poor coding in the operating system."
How to avoid or help reduce the frustration:
Ideally, error messages should be treated as how-to-fix-it messages. Instead of
explicating what has happened, they should state the cause of the problem and
what the user needs to do to fix it. Shneiderman (1998) has developed a detailed set
of guidelines on how to develop helpful messages that are easy to read and under-
stand. Box 5.1 summarizes the main recommendations.
150 Chapter 5 Understanding how interfaces affect users
Below are some common error messages expressed in harsh computer jargon that can be
quite threatening and offensive.Rewrite them in more usable, useful, and friendly language
that would help users to understand the cause of the problem and how to fix it. For each
message, imagine a specific context where such a problem might occur.
SYNTAX ERROR
INVALID FILENAME
INVALID DATA
APPLICATION ZETA HAS UNEXPECTEDLY QUIT DUE TO A TYPE 4 ERROR
DRIVE ERROR: ABORT, RETRY OR FAIL? 1
Comment How specific the given advice can be will depend on the kind of system it is. Here are sugges- I
"You do not have the plug-in needed to view the audiolx-pn-real-audio plug-
in-type information on this page. To get plug-in now, view plug-in directory"
Figure 5.7a Typical message in dialog box that appears when trying t o run an applet on a
website that needs a plug-in the user does not have.
click on, can be a very arduous task. To add to the frustration, users may also dis-
cover that several of their well-learned procedures for carrying out tasks have been
substantially changed in the upgrade.
A pet frustration of mine over the years has been trying to run various websites
that require me to install a new plug-in. Achieving this is never straightforward. I
have spent huge amounts of time trying to install what I assume to be the correct
plug-in-only to discover that it is not yet available or incompatible with the oper-
ating system or machine I am using.
What typically happens is I'll visit a tempting new website, only to discover
that my browser is not suitably equipped to view it. When my browser fails to run
the applet, a helpful dialog box will pop up saying that a plug-in of X type is re-
quired. It also usually directs me to another website from where the plug-in can be
downloaded (see Figure 5.7a). Websites that offer such plug-ins, however, are not
organized around my specific needs but are designed more like hardware stores
(a bad conceptual model), offering hundreds (maybe even thousands) of plug-ins
covering all manner of applications and systems. Getting the right kind of plug-in
from the vast array available requires knowing a number of things about your ma-
chine and the kind of network you are using. In going through the various options
Plug-ins by Category
The Full List This is the whole list, but I gotta warn ya its getting big
MultiMedia Multi-Media Plug-Ins, AVI, QuickTime, ShockWave...
Graphics Graphic Plug-Ins, PNG, CMX, DWG...
Sound Sound & MIDI Plug-Ins, MIDI, ReadAudio, Truespeech...
Document Document Viewer Plug-Ins, Acrobat, Envoy, MS Word...
Productivity Productivity Plug-Ins, Map Viewers, Spell Checkers...
VRMU3-D VRML & QD3D Plug-Ins
Plug-ins by platform
Figure 5.7b Directory of plug-ins available on a plug-in site directed to from Netscape.
152 Chapter 5 Understanding how interfaces affect users
to narrow down which plug-in is required, it is easy to overlook something and end
up with an inappropriate plug-in. Even when the right plug-in has been down-
loaded and placed in the appropriate system folder, it may not work. A number of
other things usually need to be done, like specifying mime-type and suffix. The
whole process can end up taking huge amounts of time, rather than the couple of
minutes most users would assume.
How to avoid or help reduce the frustration:
Users should not have to spend large amounts of time on housekeeping tasks.
Upgrading should be an effortless and largely automatic process. Designers need to
think carefully about the trade-offs incurred when introducing upgrades, especially
the amount of relearning required. Plug-ins that users have to search for, down-
load, and set up themselves should be phased out and replaced with more powerful
browsers that automatically download the right plug-ins and place them in the ap-
propriate desktop folder reliably, or, better still, interpret the different file types
themselves.
4. Appearance
Cause: When the appearance of an interface is unpleasant
Level of frustration:Medium
As mentioned earlier, the appearance of an interface can affect its usability. Users
get annoyed by:
websites that are overloaded with text and graphics, making it difficult to
find the information desired and slow to access
* flashing animations, especially banner ads, which are very distracting
the copious use of sound effects and Muzak, especially when selecting op-
tions, carrying out actions, starting up CD-ROMs, running tutorials, or
watching website demos
featuritis-an excessive number of operations, represented at the interface
as banks of icons or cascading menus
childish designs that keep popping up on the screen, such as certain kinds of
helper agents
poorly laid out keyboards, pads, control panels, and other input devices that
cause the user to press the wrong keys or buttons when trying to do some-
thing else
How to avoid or help reduce the frustration:
Interfaces should be designed to be simple, perceptually salient, and elegant
and to adhere to usability design principles, well-thought-out graphic design princi-
ples, and ergonomic guidelines (e.g. Mullet and Sano, 1996).
I The motion
The use of anthropomorphism in interaction design is an effective technique and
should be exploited further.
Background
A controversial debate in interaction design is whether to exploit the phenomenon
of anthropomorphism (the propensity people have to attribute human qualities to
objects). It is something that people do naturally in their everyday lives and is com-
monly exploited in the design of technologies (e.g., the creation of humanlike ani-
mals and plants in cartoon films, the design of toys that have human qualities). The
approach is also becoming more widespread in interaction design, through the in-
troduction of agents in a range of domains.
What is anthropomorphism? It is well known that people readily attribute
human qualities to their pets and their cars, and, conversely, are willing to accept
human attributes that have been assigned by others to cartoon characters, robots,
toys, and other inanimate objects. Advertisers are well aware of this phenomenon
and often create humanlike characters out of inanimate objects to promote their
products. For example, breakfast cereals, butter, and fruit drinks have all been
transmogrified into characters with human qualities (they move, talk, have person-
alities, and show emotions), enticing the viewer to buy them. Children are espe-
cially susceptible to this kind of "magic," as witnessed in their love of cartoons,
where all manner of inanimate objects are brought to life with humanlike qualities.
vate people to carry out the tasks suggested (e.g., learning material, purchasing
goods) more strongly than if they are presented in cold, abstract computer lan-
guage. Being addressed in first person (e.g., "Hello Chris! Nice to see you again.
Welcome back. Now what were we doing last time? Oh yes, exercise 5. Let's start
again.") is much more endearing than being addressed in the impersonal third per-
son ("User 24, commence exercise 5'7, especially for children. It can make them
feel more at ease and reduce their anxiety. Similarly, interacting with screen char-
acters like tutors and wizards can be much pleasanter than interacting with a cold
dialog box or blinking cursor on a blank screen. Typing a question in plain English,
using a search engine like Ask Jeeves (which impersonates the well-known ficti-
tious butler), is more natural and personable than thinking up a set of keywords, as
required by other search engines. At the very least, anthropomorphic interfaces are
a harmless bit of fun.
a new question to it. Students enjoyed the experience and were more willing to con-
tinue working with the computer than were other students who were not praised by
the computer for doing the same things. In another study, Walker et al. (1994) com-
pared people's responses to a talking-face display and an equivalent text-only one
and found that people spent more time with the talking-face display than the text-
only one. When given a questionnaire to fill in, the face-display group made fewer
mistakes and wrote down more comments. In a follow-up study, Sproull et al.
(1996) again found that users reacted quite differently to the two interfaces, with
users presenting themselves in a more positive light to the talking-face display and
generally interacting with it more.
BEGIN SESSION), the former was rated by college students as less honest and it
157
I
made them feel less responsible for their actions (Quintanar et al., 1982).
Casting your vote: On the basis of this debate and any other articles on the topic
(see Section 5.6 and the recommended readings at the end of this chapter) together
with your experiences with anthropomorphic interfaces, make up your mind
whether you are for or against the motion.
the web, as e-commerce assistants that give us information about products, as char-
acters in video games, as learning companions or instructors in educational pro-
grams, and many more. The best known are videogame stars like Lara Croft and
Super Mario. Other kinds include virtual pop stars (See Figure 5.9 on Color Plate
6), virtual talk-show hosts, virtual bartenders, virtual shop assistants, and virtual
newscasters. Interactive pets (e.g., Aibo) and other artificial anthropomorphized
characters (e.g., Pokemon, Creatures) that are intended to be cared for and played
with by their owners have also proved highly popular.
1. Synthetic characters
These are commonly designed as 3D characters in video games or other forms of
entertainment, and can appear as a first-person avatar or a third-person agent.
Much effort goes into designing them to be lifelike, exhibiting realistic human
movements, like walking and running, and having distinct personalities and traits.
The design of the characters' appearance, their facial expressions, and how their
lips move when talking are also considered important interface design concerns.
Bruce Blumberg and his group at MIT are developing autonomous animated
creatures that live in virtual 3D environments. The creatures are autonomous in
that they decide what to do, based on what they can sense of the 3D world, and
how they feel, based on their internal states. One of the earliest creatures to be de-
veloped was Silas T. Dog (Blumberg, 1996). The 3D dog looks like a cartoon crea-
ture (colored bright yellow) but is designed to behave like a real dog (see Figure
5.10). For example, he can walk, run, sit, wag his tail, bark, cock his leg, chase
sticks, and rub his head on people when he is happy. He navigates through his
world by using his "nose" and synthetic vision. He also has been programmed with
various internal goals and needs that he tries to satisfy, including wanting to play
158 Chapter 5 Understanding how interfaces affect users
Figure 5.1 0 User interacting with Silas the dog in (a) physical world (b) virtual world, and 1
(c) close-up of Silas.
and have company. He responds to events in the environment; for example, he be-
comes aggressive if a hamster enters his patch.
A person can interact with Silas by making various gestures that are detected by a
computer-vision system. For example, the person can pretend to throw a stick, which
is recognized as an action that Silas responds to. An image of the person is also pro-
jected onto a large screen so that he can be seen in relation to Silas (see Figure 5.10).
Depending on his mood, Silas will run after the stick and return it (e.g., when he is
happy and playful) or cower and refuse to fetch it (e.g., when he is hungry or sad).
2. Animated agents
These are similar to synthetic characters except they tend to be designed to play a
collaborating role at the interface. Typically, they appear at the side of the screen
as tutors, wizards and helpers intended to help users perform a task. This might be
designing a presentation, writing an essay or learning about a topic. Most of the
characters are designed to be cartoon-like rather than resemble human beings.
An example of an animated agent is Herman the Bug, who was developed by In-
tellimedia at North Carolina State University to teach children from kindergarten to
high school about biology (Lester et al., 1997). Herman is a talkative, quirky insect
that flies around the screen and dives into plant structures as it provides problem-
solving advice to students (See Figure 5.11 on Color Plate 7). When providing its ex-
planations it performs a range of activities including walking, flying, shrinking,
expanding, swimming, bungee jumping, acrobatics, and teleporting. Its behavior in-
cludes 30 animated segments,160 canned audio clips, and a number of songs. Herman
offers advice on how to perform tasks and also tries to motivate students to do them.
3. Emotional agents
These are designed with a predefined personality and set of emotions that are ma-
nipulated by users. The aim is to allow people to change the moods or emotions of
agents and see what effect it has on their behavior. Various mood changers are pro-
5.6 Virtual characters: agents 159
vided at the interface in the form of sliders and icons. The effect of requesting an
animated agent to become very happy, sad, or grumpy is seen through changes to
their behavior, For example, if a user moves a slider to a "scared" position on an
emotional scale, the agent starts behaving scared, hiding behind objects and mak-
ing frightened facial expressions.
The Woggles are one of the earliest forms of emotional agents (Bates, 1994). A
group of agents was designed to appear on the screen that played games with one
another, such as hide and seek. They were designed as different colored bouncy
balls with cute facial expressions. Users could change their moods (e.g., from happy
to sad) by moving various sliders, which in turn changed their movement (e.g., they
bounced less), facial expression (e.g., they no longer smiled), and how willing they
were to play with the other Woggles (See Figure 5.12 on Color Plate 7).
Mike brings his hands up as if to speak, so Rea does not continue, waiting for
him to speak.
Mike: "Tell me more about it."
Rea: "Sure thing. It has a nice garden . . ."
Which of the various kinds of agents described above do you think are the most convincing?
Is it those that try to be as humanlike as possible or those that are designed to be simple, car-
toon-based animated characters?
Comment We argue that the agents that are the most successful are ironically those that are least 1
like humans. The reasons for this include that they appear less phony and are not trying
to pretend they are more intelligent or human than they really are. However, others 1
would argue that the more humanlike they are, the more believable they are and hence
the more convincing. I
Appearance
The appearance of an agent is very important in making it believable. Parsimony and
simplicity are key. Research findings suggest that people tend to prefer simple car-
toon-based screen characters to detailed images that try to resemble the human form
as much as possible (Scaife and Rogers, 2001). Other research has also found that
simple cartoon-like figures are preferable to real people pretending to be artificial
agents. A project carried out by researchers at Apple Computer Inc. in the 80s found
that people reacted quite differently to different representations of the same inter-
face agent. The agent in question, called Phil, was created as part of a promotional
5.6 Virtual characters: agents 1 61
video called "The Knowledge Navigator." He was designed to respond and behave
just like a well-trained human assistant. In one version, he was played by a real actor
that appeared on a university professor's computer screen. Thus, he was portrayed as
an artificial agent but was played by a real human. The actor was a smartly dressed
assistant wearing a white shirt and bow tie. He was also extremely polite. He per-
formed a number of simple tasks at the computer interface, such as reminding the
professor of his appointments for that day and alerting him to phone calls waiting.
Many people found this version of Phil unrealistic. After viewing the promotional
video, people complained about him, saying that he seemed too stupid. In another
version, Phil was designed as a simple line-drawn cartoon with limited animation (see
Figure 5.14) and was found to be much more likeable (see Laurel, 1993).
Behavior
Another important consideration in making virtual characters believable is how
convincing their behavior is when performing actions. In particular, how good are
they at pointing out relevant objects on the screen to the user, so that the user
knows what they are referring to? One way of achieving this is for the virtual char-
acter to "lead" with its eyes. For example, Silas the dog turns to look at an object or
a person before he actually walks over to it (e.g., to pick the object up or to invite
the person to play). A character that does not lead with its eyes looks very mechan-
ical and as such not very life-like (Maes, 1995).
As mentioned previously, an agent's actions need also to match their underly-
ing emotional state. If the agent is meant to be angry, then its body posture, move-
ments, and facial expression all need to be integrated to show this. How this can be
achieved effectively can be learned from animators, who have a long tradition in
this field. For example, one of their techniques is to greatly exaggerate expressions
162 Chapter 5 Understanding how interfaces affect users
Mode of interaction
The way the character communicates with the user is also important. One approach
has been towards emulating human conversations as much as possible to make the
character's way of talking more convincing. However, as mentioned in the debate
above, a drawback of this kind of masquerading is that people can get annoyed eas-
ily and feel cheated. Paradoxically, a more believable and acceptable dialog with a
virtual character may prove to be one that is based on a simple art@cial mode of in-
teraction, in which prerecorded speech is played at certain choice points in the in-
teraction and the user's responses are limited to selecting menu options. The
reason why this mode of interaction may ultimately prove more effective is because
the user is in a better position to understand what the agent is capable of doing.
There is no pretence of a stupid agent pretending to be a smart human.
Assignment
This assignment requires you to write a critique of the persuasive impact of virtual sales agents
on customers. Consider what it would take for a virtual sales agent to be believable, trustwor-
thy, and convincing, so that customers would be reassured and happy to buy something based
on its recommendations.
(a) Look at some e-commerce sites that use virtual sales agents (use a search engine to
find sites or start with Miss Boo at boo.com, which was working at time of printing)
and answer the following:
What do the virtual agents do?
What type of agent are they?
Do they elicit an emotional response from you? If so, what is it?
What kind of personality do they have?
How is this expressed?
What kinds of behavior do they exhibit?
What are their facial expressions like?
What is their appearance like? Is it realistic or cartoon-like?
Where do they appear on the screen?
How do they communicate with the user (text or speech)?
Is the level of discourse patronizing or at the right level?
Are the agents helpful in guiding the customer towards making a purchase?
Are they too pushy?
What gender are they? Do you think this makes a difference?
Would you trust the agents to the extent that you would be happy to buy a prod-
uct from them? If not, why not?
What else would it take to make the agents persuasive?
Further reading 163
(b) Next, look at an e-commerce website that does not include virtual sales agents but
is based on a conceptual model of browsing (e.g., Amazon.com). How does it com-
pare with the agent-based sites you have just looked at?
Is it easy to find information about products?
What kind of mechanism does the site use to make recommendations and guide
the user in making a purchase?
Is any kind of personalization used at the interface to make the user feel welcome
or special?
Would the site be improved by having an agent? Explain your reasons either
way.
(c) Finally, discuss which site you would trust most and give your reasons for this.
Summary
This chapter has described the different ways interactive products can be designed (both de-
liberately and inadvertently) to make people respond in certain ways. The extent to which
users will learn, buy a product online, chat with others, and so on depends on how comfort-
able they feel when using a product and how well they can trust it. If the interactive product
is frustrating to use, annoying, or patronizing, users easily get angry and despondent, and
often stop using it. If, on the other hand, the system is a pleasure, enjoyable to use, and
makes the users feel comfortable and at ease, then they are likely to continue to use it, make
a purchase, return to the website, continue to learn, etc. This chapter has described various
interface mechanisms that can be used to elicit positive emotional responses in users and
ways of avoiding negative ones.
Key points
Affective aspects of interaction design are concerned with the way interactive systems
make people respond in emotional ways.
Well-designed interfaces can elicit good feelings in people.
Aesthetically pleasing interfaces can be a pleasure to use.
Expressive interfaces can provide reassuring feedback to users as well as be informative
and fun.
Badly designed interfaces often make people frustrated and angry.
Anthropomorphism is the attribution of human qualities to objects.
An increasingly popular form of anthropomorphism is to create agents and other vixtual
characters as part of an interface.
People are more accepting of believable interface agents.
People often prefer simple cartoon-like agents to those that attempt to be humanlike.
Further reading
TURKLE, S. (1995) Life on the Screen. New York: Simon and puter-based applications. Sherry Turkle discusses at length
Schuster. This classic covers a range of social impact and af- how computers, the Internet, software, and the design of in-
fective aspects of how users interact with a variety of corn- terfaces affect our identities.
164 Chapter 5 Understanding how interfaces affect users
Two very good papers on interface agents can be found in MAES, P. (1995) Artificial life meets entertainment: lifelike
Brenda Laurel's (ed.) The Art of Human-Computer Interface autonomous agents. Communications of the ACM, 38. (ll),
Design (1990) Reading, MA.: Addison Wesley: 108-114. Pattie Maes has written extensively about the role
and design of intelligent agents at the interface. This paper
LAUREL,B. (1990) Interface agents: metaphor with charac- provides a good review of some of her work in this field.
ter, 355-366
Excerpts from a lively debate between Pattie Maes and Ben
OREN.T., SALOMON, G., KREITMAN,K., AND DON. A. (1990) Shneiderman on "Direct manipulation vs. interface agents"
Guides: characterizing the interface, 367-381 can be found ACM Interactions Magazine, 4 (6) (1997), 4241.
Chapter 6
6.1. Introduction
Design is a practical and creative activity, the ultimate intent of which is to develop
a product that helps its users achieve their goals. In previous chapters, we looked
at different kinds of interactive products, issues you need to take into account
when doing interaction design and some of the theoretical basis for the field. This
chapter is the first of four that will explore how we can design and build interactive
products.
Chapter 1 defined interaction design as being concerned with "designing inter-
active products to support people in their everyday and working lives." But how do
you go about doing this?
Developing a product must begin with gaining some understanding of what is
required of it, but where do these requirements come from? Whom do you ask
about them? Underlying good interaction design is the philosophy of user-centered
design, i.e., involving users throughout development, but who are the users? Will
they know what they want or need even if we can find them to ask? For an innova-
tive product, users are unlikely to be able to envision what is possible, so where do
these ideas come from?
In this chapter, we raise and answer these kinds of questions and discuss the
four basic activities and key characteristics of the interaction design process that
166 Chapter 6 The process of interaction design
design. For example, Danis and Boies (2000) found that using techniques from
167
I
graphic design that encouraged the generation of alternative designs stimulated in-
novative interactive systems design. See also the interview with Gillian Crampton
Smith at the end of this chapter for her views on how other aspects of traditional
design can help produce good interaction design.
Although possible, it is unlikely that just one person will be involved in devel-
oping and using a system and therefore the plan must be communicated. This re-
quires it to be captured and expressed in some suitable form that allows review,
revision, and improvement. There are many ways of doing this, one of the simplest
being to produce a series of sketches. Other common approaches are to write a de-
~
scription in natural language, to draw a series of diagrams, and to build prototypes.
A combination of these techniques is likely to be the most effective. When users
are involved, capturing and expressing a design in a suitable format is especially
important since they are unlikely to understand jargon or specialist notations. In
fact, a form that users can interact with is most effective, and building prototypes of
one form or another (see Chapter 8) is an extremely powerful approach.
So interaction design involves developing a plan which is informed by the
product's intended use, target domain, and relevant practical considerations. Alter-
native designs need to be generated, captured, and evaluated by users. For the
evaluation to be successful, the design must be expressed in a form suitable for
users to interact with.
Imagine that you want to design an electronic calendar or diary for yourself. You might use
this system to plan your time, record meetings and appointments, mark down people's birth-
days, and so on, basically the kinds of things you might do with a paper-based calendar.
Draw a sketch of the system outlining its functionality and its general look and feel. Spend
about five minutes on this.
Having produced an outline, now spend five minutes reflecting on how you went about
tackling this activity. What did you do first? Did you have any particular artifacts or experi-
ence to base your design upon? What process did you go through?
Comment The sketch I produced is shown in Figure 6.1. A S you can see, I was quite heavily influenced
by the paper-based books I currently use! I had in mind that this calendar should allow me
to record meetings and appointments, so I need a section representing the days and months.
But I also need a section to take notes. I am a prolific note-taker, and so for me this was a
key requirement. Then I began to wonder about how I could best use hyperlinks. I certainly
want to keep addresses and telephone numbers in my calendar, so maybe there could be a
link between, say, someone's name in the calendar and their entry in my address book that
will give me their contact details when I need them? But I still want the ability to be able to
turn page by page, for when I'm scanning or thinking about how to organize my time. A
search facility would be useful too.
The first thing that came into my head when I started doing this was my own paper-based
book where I keep appointments, maps, telephone numbers, and other small notes. I also
thought about my notebook and how convenient it would be to have the two combined.
Then I sat and sketched different ideas about how it might look (although I'm not very good
at sketching). The sketch in Figure 6.1 is the version I'm happiest with. Note that my sketch
168 Chapter 6 The process of interaction design
link t o
address book
i links always
available
link t o turn t o
notes section next page
has a strong resemblance to a paper-based book, yet I've also tried to incorporate electronic
capabilities. Maybe once I have evaluated this design and ensured that the tasks I want to
perform are supported, then I will be more receptive to changing the look away from a
paper-based "look and feel."
The exact steps taken to produce a product will vary from designer to designer, from
product to product, and from organization to organization. In this activity, you may have
started by thinking about what you'd like such a system to do for you, or you may have been
thinking about an existing paper calendar. You may have mixed together features of differ-
ent systems or other record-keeping support. Having got or arrived at an idea of what you
wanted, maybe you then imagined what it might look like, either through sketching with
paper and pencil or in your mind.
sign. During this time, prototypes may be built or perspectives may be drawn to
give clients a better indication of the design being developed. Detail design speci-
fies all components, and working drawings are produced. Finally, the job arrives on
site and building commences.
We will be expanding on each of the basic activities of interaction design in the
next two chapters. Here we give only a brief introduction to each.
Evaluating designs
Evaluation is the process of determining the usability and acceptability of the prod-
uct or design that is measured in terms of a variety of criteria including the number of
errors users make using it, how appealing it is, how well it matches the requirements,
and so on. Interaction design requires a high level of user involvement throughout
development, and this enhances the chances of an acceptable product being deliv-
ered. In most design situations you will find a number of activities concerned with
170 Chapter 6 The process of interaction design
quality assurance and testing to make sure that the final product is "fit-for-purpose."
I
Evaluation does not replace these activities, but complements and enhances them.
We devote Chapters 10 through 14 to the important subject of evaluation.
The activities of developing alternative designs, building interactive versions of
the design, and evaluation are intertwined: alternatives are evaluated through the
interactive versions of the designs and the results are fed back into further design.
This iteration is one of the key characteristics of the interaction design process,
which we introduced in Chapter 1.
This last point may seem a little exaggerated for just one system, but if you think
of others also migrating to an electronic version, and abandoning their paper cal-
endars, then you can see how the companies may be affected by the introduction
of the system.
The net of stakeholders is really quite wide! We do not suggest that you need
to involve all of the stakeholders in your user-centered approach, but it is impor-
tant to be aware of the wider impact of any product you are developing. Identifying
the stakeholders for your project means that you can make an informed decision
about who should be involved and to what degree.
Who do you think are the stakeholders for the check-out system of a large supermarket?
Comment First, there are the check-out operators. These are the people who sit in front of the machine
and pass the customers' purchases over the bar code reader, receive payment, hand over re-
ceipts, etc. Their stake in the success and usability of the system is fairly clear and direct.
Then you have the customers, who want the system to work properly so that they are
charged the right amount for the goods, receive the correct receipt, are served quickly and
efficiently. Also, the customers want the check-out operators to be satisfied and happy in
their work so that they don't have to deal with a grumpy assistant. Outside of this group, you
then have supermarket managers and supermarket owners, who also want the assistants to
be happy and efficient and the customers to be satisfied and not complaining. They also
don't want to lose money because the system can't handle the payments correctly. Other
people who will be affected by the success of the system include other supermarket employ-
ees such as warehouse staff, supermarket suppliers, supermarket owners' families, and local
shop owners whose business would be affected by the success or failure of the system. We
wouldn't suggest that you should ask the local shop owner about requirements for the super-
market check-out system. However, you might want to talk to warehouse staff, especially if
the system links in with stock control or other functions.
some of these in Chapter 3. For example, a person's physical characteristics may af-
fect the design: size of hands may affect the size and positioning of input buttons,
and motor abilities may affect the suitability of certain input and output devices;
height is relevant in designing a physical kiosk, for example; and strength in design-
ing a child's toy-a toy should not require too much strength to operate, but may
require strength greater than expected for the target age group to change batteries
or perform other operations suitable only for an adult. Cultural diversity and expe-
rience may affect the terminology the intended user group is used to, or how ner-
vous about technology a set of users may be.
If a product is a new invention, then it can be difficult to identify the users and
representative tasks for them; e.g., before microwave ovens were invented, there
were no users to consult about requirements and there were no representative
tasks to identify. Those developing the oven had to imagine who might want to use
such an oven and what they might want to do with it.
It may be tempting for designers simply to design what they would like, but
their ideas would not necessarily coincide with those of the target user group. It is
imperative that representative users from the real target group be consulted. For
example, a company called Netpliance was developing a new "Internet appli-
ance," i.e., a product that would seamlessly integrate all the services necessary for
the user to achieve a specific task on the Internet (Isensee et al., 2000). They took
a user-centered approach and employed focus group studies and surveys to under-
stand their customers' needs. The marketing department led these efforts, but de-
velopers observed the focus groups to learn more about their intended user group.
Isensee et al. (p. 60) observe that "It is always tempting for developers to create
products they would want to use or similar to what they have done before. How-
ever, in the Internet appliance space, it was essential to develop for a new audi-
ence that desires a simpler product than the computer industry has previously
provided."
In these circumstances, a good indication of future behavior is current or
past behavior. So it is always useful to start by understanding similar behavior
that is already established. Apart from anything else, introducing something new
into people's lives, especially a new "everyday" item such as a microwave oven,
requires a culture change in the target user population, and it takes a long time
to effect a culture change. For example, before cell phones were so widely avail-
able there were no users and no representative tasks available for study, per se.
But there were standard telephones and so understanding the tasks people per-
form with, and in connection with, standard telephones was a useful place to
start. Apart from making a telephone call, users also look up people's numbers,
take messages for others not currently available, and find out the number of the
last person to ring them. These kinds of behavior have been translated into
memories for the telephone, answering machines, and messaging services for
mobiles. In order to maximize the benefit of e-commerce sites, traders have
found that referring back to customers' non-electronic habits and behaviors can
be a good basis for enhancing e-commerce activity (CHI panel, 2000; Lee et al.,
2000).
I 174 Chapter 6 The process of interaction design
nsider again the calendar system introduced at the beginning of the chapter. Reflecting
the process again, what do you think inspired your outline design? See if you can identify
any elements within it that you believe are truly innovative.
Comment For my design, I haven't seen an electronic calendar, although I have seen plenty of other
software-based systems. My main sources of inspiration were my current paper-based books.
Some of the things you might have been thinking of include your existing paper-based
calendar, and other pieces of software you commonly use and find helpful or easy to use in
some way. Maybe you already have access to an electronic calendar, which will have given
you some ideas, too. However, there are probably other aspects that make the design some-
how unique to you and may be innovative to a greater or lesser degree.
All this having been said, under some circumstances the scope to consider alterna-
tive designs may be limited. Design is a process of balancing constraints and con-
stantly trading off one set of requirements with another, and the constraints may be
such that there are very few viable alternatives available. As another example, if
you are designing a software system to run under the Windows operating system,
then elements of the design will be prescribed because you must conform to the
Windows "look and feel," and to other constraints intended to make Windows pro-
grams consistent for the user. We shall return to style guides and standards in
Chapter 8.
If you are producing an upgrade to an existing system, then you may face other
constraints, such as wanting to keep the familiar elements of it and retain the same
"look and feel." However, this is not necessarily a rigid rule. Kent Sullivan reports
that when designing the Windows 95 operating system to replace the Windows 3.1
and Windows for Workgroups 3.11 operating systems, they initially focused too
much on consistency with the earlier versions (Sullivan, 1996).
176 Chapter 6 The process of interaction design
1 6.3 Some ~racticalissues 1 77
- - --- - - - - - - -
power outlets will be dependent on how the wiring within the building is designed
and the capacity of the main power supply; the choice of materials used in a pho-
tocopier may depend on its friction rating and how much it deforms under certain
conditions.
In an interactive product there are similar factors that are externally visible
and measurable and those that are hidden from the users' view. For example, ex-
actly why the response time for a query to a database (or a web page) is, say, 4 sec-
onds will almost certainly depend on technical decisions made when the database
was constructed, but from the users' viewpoint the important observation is the fact
that it does take 4 seconds to respond.
In interaction design, the way in which the users interact with the product is
considered the driving force behind the design and so we concentrate on the exter-
nally visible and measurable behavior. Detailed internal workings are important
only to the extent that they affect the external behavior. This does,not mean that
design decisions concerning a system's internal behavior are any less important:
however, the tasks that the user will perform should influence design decisions no
less than technical issues.
So, one answer to the question posed above is that we choose between alterna-
tive designs by letting users and stakeholders interact with them and by discussing
their experiences, preferences and suggestions for improvement. This is fundamen-
tal to a user-centered approach to development. This in turn means that the de-
signs must be available in a form that can be reasonably evaluated with users, not
in technical jargon or notation that seems impenetrable to them.
One form traditionally used for communicating a design is documentation, e.g.,
a description of how something will work or a diagram showing its components.
The trouble is that a static description cannot capture the dynamics of behavior,
and for an interaction device we need to communicate to the users what it will be
like to actually operate it.
In many design disciplines, prototyping is used to overcome potential client
misunderstandings and to test the technical feasibility of a suggested design and its
production. Prototyping involves producing a limited version of the product with
the purpose of answering specific questions about the design's feasibility or appro-
priateness. Prototypes give a better impression of the user experience than simple
descriptions can ever do, and there are different kinds of prototyping that are suit-
able for different stages of development and for eliciting different kinds of infor-
mation. One experience illustrating the benefits of prototyping is described in Box
6.2. So one important aspect of choosing among alternatives is that prototypes
should be built and evaluated by users. We'll revisit the issue of prototyping in
Chapter 8.
Another basis on which to choose between alternatives is "quality," but this
requires a clear understanding of what "quality" means. People's views of what is
a quality product vary, and we don't always write it down. Whenever we use any-
thing we have some notion of the level of quality we are expecting, wanting, or
needing. Whether this level of quality is expressed formally or informally does not
matter. The point is that it exists and we use it consciously or subconsciously to
evaluate alternative items. For example, if you have to wait too long to download
6.3 Some practical issues 181
a web page, then you are likely to give up and try a different site-you are apply-
ing a certain measure of quality associated with the time taken to download the
web page. If one cell phone makes it easy to perform a critical function while an-
other involves several complicated key sequences, then you are likely to buy the
former rather than the latter. You are applying a quality criterion concerned with
efficiency.
Now, if you are the only user of a product, then you don't necessarily have
to express your definition of "quality" since you don't have to communicate it to
anyone else. However, as we have seen, most projects involve many different
stakeholder groups, and you will find that each of them has a different definition
of quality and different acceptable limits for it. For example, although all stake-
holders may agree on targets such as "response time will be fast" or "the menu
structure will be easy to use," exactly what each of them means by this is likely
to vary. Disputes are inevitable when, later in development, it transpires that
"fast" to one set of stakeholders meant "under a second," while to another it
meant "between 2 and 3 seconds." Capturing these different views in clear un-
ambiguous language early in development takes you halfway to producing a
product that will be regarded as "good" by all your stakeholders. It helps to clar-
ify expectations, provides a benchmark against which products of the develop-
ment process can be measured, and gives you a basis on which to choose among
alternatives.
The process of writing down formal, verifiable-and hence measurable-usability
criteria is a key characteristic of an approach to interaction design called usability en-
gineering that has emerged over many years and with various proponents (Whiteside
182 Chapter 6 The process of interaction design
Consider the calendar system that you designed in Activity 6.1. Suggest some usability crite-
ria that you could use to determine the calendar's quality. You will find it helpful to think in
terms of the usability goals introduced in Chapter 1: effectiveness, efficiency, safety, utility,
learnability, and memorability. Be as specific as possible. Check your criteria by considering
exactly what you would measure and how you would measure its performance.
Having done that, try to do the same thing for the user experience goals introduced in
Chapter 1; these relate to whether a system is satisfying, enjoyable, motivating, rewarding,
and so on.
Comment Finding measurable characteristics for some of these is not easy. Here are some suggestions,
but you may have found others. Note that the criteria must be measurable and very specific.
Effectiveness: Identifying measurable criteria for this goal is particularly difficult since
it is a combination of the other goals. For example, does the system support you in
keeping appointments, taking notes, and so on. In other words, is the calendar used?
EBciency: Assuming that there is a search facility in the calendar, what is the response
time for finding a specific day or a specific appointment?
Safety: How often does data get lost or does the user press the wrong button? This may
be measured, for example, as the number of times this happens per hour of use.
Utility: How many functions offered by the calendar are used every day, how many
every week, how many every month? How many tasks are difficult to complete in a
reasonable time because functionality is missing or the calendar doesn't support the
right subtasks?
Learnability: How long does it take for a novice user to be able to do a series of set
tasks, e.g., make an entry into the calendar for the current date, delete an entry from
the current date, edit an entry in the following day?
Memorability: If the calendar isn't used for a week, how many functions can you re-
member how to perform? How long does it take you to remember how to perform
your most frequent task?
Finding measurable characteristics for the user experience criteria is even harder, though.
How do you measure satisfaction, fun, motivation or aesthetics? What is entertaining to one
person may be boring to another; these kinds of criteria are subjective, and s o cannot be
measured objectively.
to one another so that the full development process can be seen. The term lifecycle
model 1 is used to represent a model that captures a set of activities and how they
are related. Sophisticated models also incorporate a description of when and how
to move from one activity to the next and a description of the deliverables for each
activity. The reason such models are popular is that they allow developers, and par-
ticularly managers, to get an overall view of the development effort so that
progress can be tracked, deliverables specified, resources allocated, targets set, and
SO on.
Existing models have varying levels of sophistication and complexity. For pro-
jects involving only a few experienced developers, a simple process would probably
be adequate. However, for larger systems involving tens or hundreds of developers
with hundreds or thousands of users, a simple process just isn't enough to provide
the management structure and discipline necessary to engineer a usable product.
So something is needed that will provide more formality and more discipline. Note I
that this does not mean that innovation is lost or that creativity is stifled. It just
means that a structured process is used to provide a more stable framework for
creativity.
However simple or complex it appears, any lifecycle model is a simplified
version of reality. It is intended as an abstraction and, as with any good ab-
straction, only the amount of detail required for the task at hand should be in-
cluded. Any organization wishing to put a lifecycle model into practice will
need to add detail specific to its particular circumstances and culture. For ex-
ample, Microsoft wanted to maintain a small-team culture while also making
possible the development of very large pieces of software. To this end, they
have evolved a process that has been called "synch and stabilize," as described
in Box 6.3.
In the next subsection, we introduce our view of what a lifecycle model for in-
teraction design might look like that incorporates the four activities and the three
key characteristics of the interaction design process discussed above. This will form
the basis of our discussion in Chapters 7 and 8. Depending on the kind of system
being developed, it may not be possible or appropriate to follow this model for
every element of the system, and it is certainly true that more detail would be re-
quired to put the lifecycle into practice in a real project.
Many other lifecycle models have been developed in fields related to interac-
tion design, such as software engineering and HCI, and our model is evolved from
these ideas. To put our interaction design model into context we include here a de-
scription of five lifecycle models, three from software engineering and two from
HCI, and consider how they relate to it.
'Somme~ille(2001) uses the term process model to mean what we call a lifecycle model, and refers to
the waterfall model as the software lifecycle. Pressman (1992) talks about paradigms. In HCI the term
"lifecyclemodel" is used more widely. For this reason, and because others use "process model" to
represent something that is more detailed than a lifecycle model (e.g.,Comer, 1997) we have chosen to
use lifecycle model.
184 Chapter 6 The process of interaction design
6.4 Lifecycle models: showing how the activities relate 185
I 186 Chapter 6 The process of interaction design
Final product
design can begin. The names given to these steps varies, as does the precise defi-
nition of each one, but basically, the lifecycle starts with some requirements
analysis, moves into design, then coding, then implementation, testing, and fi-
nally maintenance. One of the main flaws with this approach is that require-
ments change over time, as businesses and the environment in which they
operate change rapidly. This means that it does not make sense to freeze re-
quirements for months, or maybe years, while the design and implementation
are completed.
Some feedback to earlier stages was acknowledged as desirable and indeed
practical soon after this lifecycle became widely used (Figure 6.8 does show some
limited feedback between phases). But the idea of iteration was not embedded in
the waterfall's philosophy. Some level of iteration is now incorporated in most ver-
sions of the waterfall, and review sessions among developers are commonplace.
However, the opportunity to review and evaluate with users was not built into this
model.
Cumulative
through
steps
Review
----___
Develop, verify
next-level product
Figure 6.9 The spiral lifecycle model of software development.
hind RAD began to emerge in the early 1990s, also in response to the inappropri-
ate nature of the linear lifecycle models based on the waterfall. Two key features of
a RAD project are:
Time-limited cycles of approximately six months, at the end of which a sys-
tem or partial system must be delivered. This is called time-boxing. In effect,
this breaks down a large project into many smaller projects that can deliver
products incrementally, and enhances flexibility in terms of the development
techniques used and the maintainability of the final system.
190 Chapter 6 The process of interaction design
Comment RAD and DSDM explicitly incorporate user involvement, evaluation and iteration. User in-
volvement, however, appears to be limited to the JAD workshop, and iteration appears to
be limited to the design and build phase. The philosophy underlying the interaction design
model is present, but the flexibility appears not to be. Our interaction design process would
be appropriately used within the design and build stage.
model was proposed by Hartson and Hix (1989) (see Figure 6.13). This emerged
from some empirical work they did looking at how interface designers went about
their work. They identified two different modes of activity: analytic mode and syn-
thetic mode. The former is characterized by such notions as top-down, organizing,
judicial, and formal, working from the systems view towards the user's view; the
latter is characterized by such notions as bottom-up, free-thinking, creative and ad
hoc, working from the user's view towards the systems view. Interface designers
move from one mode to another when designing. A similar behavior has been ob-
served in software designers (Guindon, 1990).
Unlike the lifecycle models introduced above, the Star lifecycle does not specify
any ordering of activities. In fact, the activities are highly interconnected: you can
move from any activity to any other, provided you first go through the evaluation
activity. This reflects the findings of the empirical studies. Evaluation is central to
this model, and whenever an activity is completed, its result(s) must be evaluated.
So a project may start with requirements gathering, or it may start with evaluating
an existing situation, or by analyzing existing tasks, and so on.
The Star lifecycle model has not been used widely and successfully for large projects in indus-
try. Consider the benefits of lifecycle models introduced above and suggest why this may be.
Comment One reason may be that the Star lifecycle model is extremely flexible. This may be how de-
signers work in practice, but as we commented above, lifecycle models are popular because
"they allow developers, and particularly managers, to get an overall view of the develop-
ment effort so that progress can be tracked, deliverables specified, resources allocated, tar-
gets set, and so on." With a model as flexible as the Star lifecycle, it is difficult to control
these issues without substantially changing the model itself.
0UETask
T Development Task
()Decision Point
Documentation
+ Complex Applications
- -t Simple Applications
(e.g. websites)
I
Figure 6.14 (continued).
Mayhew herself says, "I did not invent the concept of a Usability Engineering Life-
cycle. Nor did I invent any of the Usability Engineering tasks included in the lifecy-
cle . . . .". However, what her lifecycle does provide is a holistic view of usability
engineering and a detailed description of how to perform usability tasks, and it
specifies how usability tasks can be integrated into traditional software develop-
ment lifecycles. It is therefore particularly helpful for those with little or no exper-
tise in usability to see how the tasks may be performed alongside more traditional
software engineering activities. For example, Mayhew has linked the stages with a
general development approach (rapid prototyping) and a specific method (object-
oriented software engineering (OOSE, Jacobson et al, 1992)) that have arisen from
software engineering.
The lifecycle itself has essentially three tasks: requirements analysis, design1
testingldevelopment, and installation, with the middle stage being the largest and
involving many subtasks (see Figure 6.14). Note the production of a set of usability
goals in the first task. Mayhew suggests that these goals be captured in a style guide
that is then used throughout the project to help ensure that the usability goals are
adhered to.
This lifecycle follows a similar thread to our interaction design model but in-
cludes considerably more detail. It includes stages of identifying requirements, de-
signing, evaluating, and building prototypes. It also explicitly includes the style
guide as a mechanism for capturing and disseminating the usability goals of the
project. Recognizing that some projects will not require the level of structure pre-
sented in the full lifecycle, Mayhew suggests that some substeps can be skipped if
they are unnecessarily complex for the system being developed.
Study the usability engineering lifecycle and identify how this model differs from our inter-
action design model described in Section 6.4.1, in terms of the iterations it supports.
Comment One of the main differences between Mayhew's model and ours is that in the former the it-
eration between design and evaluation is contained within the second phase. Iteration be-
tween the design/testldevelopment phase and the requirements analysis phase occurs only
after the conceptual model and the detailed designs have been developed, prototyped, and
196 Chapter 6 The process of interaction design
evaluated one at a time. Our version models a return to the activity of identifying needs and
establishing requirements after evaluating any element of the design.
Assignment
Nowadays, timepieces (such as clocks, wristwatches etc) have a variety of functions. They not
only tell the time and date but they can speak to you, remind you when it's time to do some-
thing, and provide a light in the dark, among other things. Mostly, the interface for these de-
vices, however, shows the time in one of two basic ways: as a digital number such as 23:40 or
through an analog display with two or three hands-one to represent the hour, one for the
minutes, and one for the seconds.
In thb assignment, we want you to design an innovative timepiece for your own use. This
could be in the form of a wristwatch, a mantelpiece clock, an electronic clock, or any other
kind of clock you fancy. Your goal is to be inventive and exploratory. We have broken this as- I
signment down into the following steps to make it clearer: I
(a) Think about the interactive product you are designing: what do you want it to do I
for you? Find 3-5 potential users and ask them what they would want. Write a list
of requirements for the clock, together with some usability criteria based on the de- 1
finition of usability used in Chapter 1.
(b) Look around for similar devices and seek out other sources of inspiration that you
might find helpful. Make a note of any findings that are interesting, useful or in-
sightful.
(c) Sketch out some initial designs for the clock. Try to develop at least two distinct al-
ternatives that both meet your set of requirements.
(d) Evaluate the two designs, using your usability criteria and by role playing an interac-
tion with your sketches. Involve potential users in the evaluation, if possible. Does it
do what you want? Is the time or other information being displayed always clear?
Design is iterative, so you may want to return to earlier elements of the process be-
fore you choose one of your alternatives.
Once you have a design with which you are satisfied, you can send it to us and we shall
post a representative sample of those we receive to our website. Details of how to format
your submission are available from our website.
Summary
In this chapter, we have looked at the process of interaction design, i.e., what activities are
required in order to design an interactive product, and how lifecycle models show the rela-
tionships between these activities. A simple interaction design model consisting of four ac-
tivities was introduced and issues surrounding the identification of users, generating
alternative designs, and evaluating designs were discussed. Some lifecycle models from soft-
ware engineering and HCI were introduced.
Key points
The interaction design process consists of four basic activities: identifying needs and es-
tablishing requirements, developing alternative designs that meet those requirements,
building interactive versions of the designs so that they can be communicated and as-
sessed, and evaluating them.
Further reading 197
Key characteristics of the interaction design process are explicit incorporation of user in-
volvement, iteration, and specific usability criteria.
Before you can begin to establish requirements, you must understand who the users are
and what their goals are in using the device.
Looking at others' designs provides useful inspiration and encourages designers to con-
sider alternative design solutions, which is key to effectivedesign.
Usability criteria, technical feasibility, and users' feedback on prototypes can all be used
to choose among alternatives.
Prototyping is a useful technique for facilitating user feedback on designs at all stages.
Lifecycle models show how development activities relate to one another.
The interaction design process is complementary to lifecycle models from other fields.
Further reading
RUDISILL, M., LEWIS, C., POLSON, P. B., AND MCKAY,T. D. practical book about product user interface design. It ex-
(1995) (eds.) Human-Computer Interface Design: Success plains how to perform usability tasks throughout develop-
Stories, Emerging Methods, Real-World Context. San Fran- ment and provides useful examples along the way to
cisco: Morgan Kaufmann. This collection of papers describes illustrate the techniques. It links in with two software devel-
the application of different approaches to interface design. opment based methods: rapid prototyping and object-ori-
Included here is an account of the Xerox Star development, ented software engineering.
some advice on how to choose among methods, and some SOMMERVILLE, I AN (2001) SofnYare Engineering (6th edi-
practical examples of real-world developments. tion). Harlow, UK: Addison-Wesley. If you are interested in
BERGMAN, ERIC (2000) (ed.) Information Appliances and Be- pursuing the software engineering aspects of the lifecycle
yond. San Francisco: Morgan Kaufmann. This book is an models section, then this book provides a useful overview of
edited collection of papers which report on the experience of the main models and their purpose.
designing and building a variety of 'information appliances', NIELSEN, JAKOB (1993) Usability Engineering. San Fran-
i.e., purpose-built computer-based products which perform a cisco: Morgan Kaufmann. This is a seminal book on usability
specific task. For example, the Palm Pilot, mobile telephones, engineering. If you want to find out more about the philoso-
a vehicle navigation system, and interactive toys for children. phy, intent, history, or pragmatics of usability engineering,
MAYHEW,DEBORAH J. (1999) The Usability Engineering then this is a good place to start.
Lifecycle. San Francisco: Morgan Kaufmann. This is a very
198 Chapter 6 The process of interaction design
we choose what we use because they have a meaning works, or an underlying theory people can use to rea-
beyond their practical use. Good design is partly son about why it is not working in the way they expect.
about working really well, but it's also about what
something looks like, what it reminds us of, what it HS: So in trying to put more effort into the design as-
refers to in our broader cultural environment. It's this pect of things, do you think we need different people
side that interactive systems haven't really addressed in the team?
yet. They're only just beginning to become part of GC: Yes. People in the software field tend to think that
culture. They are not just a tool for professionals any designers are people who know how to give the product
more, but an environment in which we live. form, which of course is one of the things they do. But a
graphic designer, for instance, is somebody who also
HS: How do you think we can improve things? thinks at a more strategic level, "What is the message
GC: The parallel with architecture is quite an inter- that these people want to get over and to whom?" and
esting one. In architecture, a great deal of time and then, "What is the best way to give form to a message
expense is put into the initial design; I don't think like that?" The part you see is the beautiful design, the
very much money or time is put into the initial design lovely poster or record sleeve, or elegant book, but be-
of software. If you think of the big software engineer- hind that is a lot of thinking about how to communicate
ing companies, how many people work in the design ideas via a particular medium.
side rather than on the implementation side?
HS: If you've got people from different disciplines,
HS: When you say design do you mean conceptual have you experienced difficulties in communication?
design, or task design, or something else? GC: Absolutely. I think that people from different
GC: I mean all phases of design. Firstly there's re- disciplines have different values, so different results
search-finding out about people. This is not neces- and different approaches are valued. People have dif-
sarily limited to finding out about what they want ferent temperaments, too, that have led them to the
necessarily, because if we're designing new things, different fields in the first place, and they've been
they are probably things people don't even know they trained in different ways. In my view the big differ-
Interview 199
ence between the way engineers are trained and the there's also the aesthetic of how it works as well. You
way designers are trained is that engineers are trained can talk about an elegant way of doing something as
to focus in on a solution from the beginning whereas well as an elegant look.
designers are trained to focus out to begin with and
then focus in. They focus out and try lots of different HS: Another trait I've seen in designers is being pro-
alternatives, and they pick some and try them out to tective of their design. hi
see how they go. Then they refine down. This is very GC: I think that is both a vice and a virtue. In order
hard for both the engineers and the designers because to keep a design coherent you need to keep a grip on
the designers are thinking the engineers are trying to the whole and to push it through as a whole. Other-
hone in much too quickly and the engineers can't wise it can happen that people try to make this a bit
bear the designers faffing about. They are trained to smaller and cut bits out of that, and so on, and before
get their results in a completely different way. you know where you are the coherence of the design
is lost. It is quite difficult for a team to hold a coher-
HS: Is your idea to make each more tolerant of the ent vision of a design. If you think of other design
other? fields, like film-making, for instance, there is one di-
GC: Yes, my idea is not to try to make renaissance rector and everybody accepts that it's the director's
people, as I don't think it's feasible. Very few people vision. One of the things that's wrong with products
can do everything weU. I think the ideal team is made like Microsoft Word, for instance, is that there's no
up of people who are really confident and good at what coherent idea in it that makes you t nk, "Oh yes, I
they do and open-mined enough to realize there are understand how this fits with that."
very different approaches. There's the scientific ap- Design is always a balance between things that
proach, the engineering approach, the design approach. work well and things that look good, and the ideal de-
All three are different and that's their value-you sign satisfies everything, but in most designs you have
don't want everybody to be the same. The best combi- to make trade-offs. If you're making a game it's more
nation is where you have engineers who understand important that people enjoy it and that it looks good
design and designers who understand engineering. than to worry if some of it's a bit difficult. If you're
It's important that people know their limitations making a fighter cockpit then the most important
too. If you realize that you need an ergonomist, then thing is that pilots don't fall out of the sky, and so this
you go and find one and you hire them to consult for informs the trade-offs you make. The question is, who
you. So you need to know what you don't know as decides how to decide the criteria for the tradeoffs
well as what you do. that inevitably need to be made. This is not a matter
of engineering: it's a matter of values--cultural, emo-
HS: What other aspects of traditional design do you tional, aesthetic.
think help with interaction design?
G C I think the ability to visualize things. It allows HS: 1 know this is a controversial issue for some de-
people to make quick prototypes or models or sketches signers. D o you think users should be part of the de-
so that a group of people can talk about something sign team?
concrete. I think that's invaluable in the process. I GC: No, I don't. I think it's an abdication of re-
think also making things that people like is just one of sponsibility. Users should definitely be involved as a
the things that good designers have a feel for. source of inspiration, suggesting ideas, evaluating
proposals-saying, "Yes, we think this would be
HS: D o you mean aesthetically like or like in its great" or "No, we think this is an appalling idea."
whole sense? But in the end, if designers aren't better than the
GC: In its whole sense. Obviously there's the aes- general public at designing things, what are they
thetic of what something looks like or feels like but doing as designers?
Identifying needs and establishing
requirements
7.1 Introduction
7.2 What, how, and why?
7.2.1 What are we trying to achieve in this design activity?
7.2.2 How can we achieve this?
7.2.3 Why bother? The importance of getting it right
7.2.4 Why establish requirements?
7.3 What are requirements?
7.3.1 Different kinds of requirements
7.4 Data gathering
7.4.1 Data-gathering techniques
7.4.2 Choosing between techniques
7.4.3 Some basic data-gathering guidelines
7.5 Data interpretation and analysis
7.6 Task description
7.6.1 Scenarios
7.6.2 Use cases
7.6.3 Essential use cases
7.7 Task analysis
7.7.1 Hierarchical Task Analysis (HTA)
7.1 Introduction
An interaction design project may aim to replace or update an established system,
or it may aim to develop a totally innovative product with no obvious precedent.
There may be an initial set of requirements, or the project may have to begin by
producing a set of requirements from scratch. Whatever the initial situation and
whatever the aim of the project, the users' needs, requirements, aspirations, and
expectations have to be discussed, refined, clarified, and probably re-scoped. This
requires an understanding of, among other things, the users and their capabilities,
their current tasks and goals, the conditions under which the product will be used,
and constraints on the product's performance.
202 Chapter 7 Identifying needs and establishing requirements
'We use interpretation to mean the initial investigation of the data, while analysis is a more detailed
study, using a particular frame of reference and notation.
7.2 What, how, and why? 203
Description: The product &all i s u ean alert ifa matherstation fails to Wnsmit
readings
chapter. This template requires quite a bit of information about the requirement it-
self, including something called a "fit criterion," which is a way of measuring when
the solution meets the requirement. In Chapter 6 we emphasized the need to estab-
lish specific usability criteria for a product early on in development, and this part of
the template encourages this.
feasibility. For example, when the PalmPilot was developed (Bergman and Haitani,
2000), an overriding requirement was that it should be physically as small as possible,
allowing for the fact that it needed to incorporate batteries and an LCD display. In
addition, there were extremely tight constraints on the size of the screen, and that
had implications for the number of pixels available to display information. For exam-
ple, formatting lines or certain typefaces may become infeasible to use if they take up
even one extra pixel. Figure 7.2 shows two screen shots from the PalmPilot develop-
ment. As you can see, removing the line at the left-hand side of the display in the top
window released sufficient pixels to display the missing "s" in the bottom window.
Interaction design requires us to understand the functionality required and the
constraints under which the product must operate or be developed. However, instead
of referring to all requirements that are not functional as simply "non-functional" re-
quirements, we prefer to refine this into further categories. The following is not an
exhaustive list of the different requirements we need to be looking out for (see the
figure in Suzanne Robertson's interview at the end of this chapter for a more detailed
list), nor is it a tight categorization, however, it does illustrate the variety of require-
ments that need to be captured.
Functional requirements capture what the product should do. For example, a
functional requirement for a smart fridge might be that it should be able to tell
~
when the butter tray is empty. Understanding the functional requirements for an
interactive product is very important.
Data requirements capture the type, volatility, sizelamount, persistence, accu-
racy, and value of the amounts of the required data. All interactive devices have to
handle greater or lesser amounts of data. For example, if the system under consid-
/ ~ctivedisplay area
Inactive display border
eration is to operate in the share-dealing application domain, then the data must be
up-to-date and accurate, and is likely to change many times a day. In the personal
banking domain, data must be accurate, must persist over many months and proba-
bly years, is very valuable, and there is likely to be a lot of it.
Environmental requirements or context of use refer to the circumstances in
which the interactive product will be expected to operate. Four aspects of the envi-
ronment must be considered when establishing requirements. First is the physical
environment such as how much lighting, noise, and dust is expected in the opera-
tional environment. Will users need to wear protective clothing, such as large
gloves or headgear, that might affect the choice of interaction paradigm? How
crowded is the environment? For example, an ATM operates in a very public phys-
ical environment. Using speech to interact with the customer is therefore likely to
be problematic.
The second aspect of the environment is the social environment. The issues
raised in Chapter 4 regarding the social aspects of interaction design, such as col-
laboration and coordination, need to be explored in the context of the current de-
velopment. For example, will data need to be shared? If so, does the sharing have
to be synchronous, e.g., does everyone need to be viewing the data at once, or asyn-
chronous, e.g., two people authoring a report take turns in editing and adding to it?
Other factors include the physical location of fellow team members, e.g., do collab-
orators have to communicate across great distances?
The third aspect is the organizational environment, e.g., how good is user sup-
port likely to be, how easily can it be obtained, and are there facilities or resources
for training? How efficient or stable is the communications infrastructure? How hi-
erarchical is the management? and so on.
Finally, the technical environment will need to be established: for example,
what technologies will the product run on or need to be compatible with, and what
technological limitations might be relevant?
User requirements capture the characteristics of the intended user group. In
Chapter 6 we mentioned the relevance of a user's abilities and skills, and these are
an important aspect of user requirements. But in addition to these, a user may be a
novice, an expert, a casual, or a frequent user. This affects the ways in which inter-
action is designed. For example, a novice user will require step-by-step instructions,
probably with prompting, and a constrained interaction backed up with clear infor-
mation. An expert, on the other hand, will require a flexible interaction with more
wide-ranging powers of control. If the user is a frequent user, then it would be im-
portant to provide short cuts such as function keys rather than expecting them to
type long commands or to have to navigate through a menu structure. A casual or
infrequent user, rather like a novice, will require clear instructions and easily un-
derstood prompts and commands, such as a series of menus. The collection of at-
tributes for a "typical user" is called a user profile. Any one device may have a
number of different user profiles.
Note that user requirements are not the same as usability requirements. We
discuss the latter below.
Usability requirements capture the usability goals and associated measures for
a particular product. In Chapter 6 we introduced the idea of usability engineering,
208 Chapter 7 Identifying needs and establishing requirements
an approach in which specific measures for the usability goals of the product are es-
tablished and agreed upon early in the development process and are then revisited,
and used to track progress as development proceeds. This both ensures that usabil-
ity is given due priority and facilitates progress tracking. In Chapter 1 we described
a number of usability goals: effectiveness, efficiency, safety, utility, learnability, and
memorability. If we are to follow the philosophy of usability engineering and meet
these usability goals, then we must identify the appropriate requirements. Chapter
1 also described some user experience goals, such as making products that are fun,
enjoyable, pleasurable, aesthetically pleasing, and motivating. As we observed in
Chapter 6, it is harder to identify quantifiable measures that allow us to track these
qualities, but an understanding of how important each of these is to the current de-
velopment should emerge as we learn more about the intended product.
Usability requirements are related to other kinds of requirement we must es-
tablish, such as the kinds of users expected to interact with the product.
7.3 What are requirements? 209
uggest one key functional, data, environmental, user and usability requirement for each of
the following scenarios:
(a) A system for use in a university's self-service cafeteria that allows users to pay for
their food using a credit system.
(b) A system to control the functioning of a nuclear power plant.
(c) A system to support distributed design teams, e.g., for car design.
Comment You may have come up with alternative suggestions; these are indicative of the kinds of an-
swer we might expect.
(a) Functional: The system will calculate the total cost of purchases.
Data: The system must have access to the price of products in the cafeteria.
Environmental: Cafeteria users will be carrying a tray and will most likely be in a rea-
sonable rush. The physical environment will be noisy and busy, and users may be
talking with friends and colleagues while using the system.
User: The majority of users are likely to be under 25 and comfortable dealing with
technology.
Usability: The system needs to be simple so that new users can use the system imme-
diately, and memorable for more frequent users. Users won't want to wait around for
the system to finish processing, so it needs to be efficient and to be able to deal easily
with user errors.
(b) Functional:The system will be able to monitor the temperature of the reactors.
Data: The system will need access to temperature readings.
Environmental: The physical environment is likely to be uncluttered and to impose
few restrictions on the console itself unless there is a need to wear protective clothing
(depending on where the console is to be located).
User: The user is likely to be a well-trained engineer or scientist who is competent to
handle technology.
Usability: Outputs from the system, especially warning signals and gauges, must be
clear and unambiguous.
(c) Functional: The system will be able to communicate information between remote
sites.
Data: The system must have access to design information that will be captured in a
common file format (such as AutoCAD).
Environmental: Physically distributed over a wide area. Files and other electronic
media need to be shared. The system must comply with available communication
protocols and be compatible with network technologies.
User: Professional designers, who may be worried about technology but who are
likely to be prepared to spend time learning a system that will help them perform
their jobs better. The design team is likely to be multi-lingual.
Usability: Keeping transmission error rate low is likely to be of high priority.
21 0 Chapter 7 Identifying needs and establishing requirements
example of how different methods and props can be combined to gain maximum ad-
vantage, while Box 7.3 describes a very different approach aimed at prompting inspi-
ration rather than simple data gathering.
of questions designed to elicit specific information from us. The questions may re-
quire different kinds of answers: some require a simple YESINO, others ask us to
choose from a set of pre-supplied answers, and others ask for a longer response or
comment. Sometimes questionnaires are sent in electronic form and arrive via
email or are posted on a website, and sometimes they are given to us on paper. In
most cases the questionnaire is administered at a distance, i.e., no one is there to
help you answer the questions or to explain what they mean.
Well-designed questionnaires are good at getting answers to specific questions
from a large group of people, and especially if that group of people is spread across
a wide geographical area, making it infeasible to visit them all. Questionnaires are
often used in conjunction with other techniques. For example, information ob-
tained through interviews might be corroborated by sending a questionnaire to a
wider group of stakeholders to confirm the conclusions.
Interviews. Interviews involve asking someone a set of questions. Often inter-
views are face-to-face, but they don't have to be. Companies spend large amounts of
money conducting telephone interviews with their customers finding out what they
like or don't like about their service. If interviewed in their own work or home set-
ting, people may find it easier to talk about their activities by showing the interviewer
what they do and what systems and other artifacts they use. The context can also trig-
ger them to remember certain things, for example a problem they have downloading
email, which they would not have recalled had the interview taken place elsewhere.
Interviews can be broadly classified as structured, unstructured or semi-
structured, depending on how rigorously the interviewer sticks to a prepared set of
questions.
In the requirements activity, interviews are good at getting people to explore
issues and unstructured interviews are often used early on to elicit scenarios (see
Section 7.6 below). Interacting with a human rather than a sterile, impersonal piece
of paper or electronic questionnaire encourages people to respond, and can make the
exercise more pleasurable. In the context of establishing requirements, it is equally
important for development team members to meet stakeholders and for users to feel
involved. This on its own may be sufficient motivation to arrange interviews.
21 2 Chapter 7 Identifying needs and establishing requirements
7.4 Data gathering 213
However, interviews are time consuming and it may not be feasible to visit all
the people you'd like to see.
Focus groups and workshops. Interviews tend to be one on one, and elicit only
one person's perspective. As an alternative or as corroboration, it can be very re-
vealing to get a group of stakeholders together to discuss issues and requirements.
These sessions can be very structured with set topics for discussion, or can be un-
structured. In this latter case, a facilitator is required who can keep the discussion
on track and can provide the necessary focus or redirection when appropriate. In
some development methods, workshops have become very formalized. For exam-
ple, the workshops used in Joint Application Development (Wood and Silver,
1995) are very structured, and their contents and participants are all prescribed.
In the requirements activity, focus groups and workshops are good at gaining a
consensus view and/or highlighting areas of conflict and disagreement. On a social
level it also helps for stakeholders to meet designers and each other, and to express
their views in public. It is not uncommon for one set of stakeholders to be unaware
that their views are different from another's even though they are in the same orga-
nization. On the other hand, these sessions need to be structured carefully and the
participants need to be chosen carefully. It is easy for one or a few people to domi-
nate discussions, especially if they have control, higher status, or influence over the
other participants.
Naturalistic observation. It can be very difficult for humans to explain what
they do or to even describe accurately how they achieve a task. So it is very un-
likely that a designer will get a full and true story from stakeholders by using any of
the techniques listed above. The scenarios and other props used in interviews and
workshops will help prompt people to be more accurate in their descriptions, but
observation provides a richer view. Observation involves spending some time with
the stakeholders as they go about their day-to-day tasks, observing work as it hap-
pens, in its natural setting. A member of the design team shadows a stakeholder,
making notes, asking questions (but not too many), and observing what is being
done in the natural context of the activity. This is an invaluable way to gain insights
into the tasks of the stakeholders that can complement other investigations. The
level of involvement of the observer in the work being observed is variable along a
spectrum with no involvement (outside observation) at one end and full involve-
ment (participant observation) at the other.
214 Chapter 7 Identifying needs and establishing requirements
Detail for
Technique Good for Kind of data Advantages Disadvantages designing in
Questionnaires Answering Quantitative Can reach many The design is Chapter 13
specific and qualitative people with low crucial. Response
questions data resource rate may be low.
Responses may
not be what
you want
Interviews Exploring Some Interviewer can Time consuming. Chapter 13
issues quantitative guide interviewee Artificial
but mostly if necessary. environment
qualitative Encourages may intimidate
data contact between interviewee
developers and
users
I
Focus groups Collecting Some Highlights areas Possibility of Chapter 13
and multiple quantitative of consensus dominant
workshops viewpoints but mostly and conflict. characters
qualitative Encourages contact
data between developers
and users
Na tutalistic Understanding Qualitative Observing actual Very time Chapter 12
observation context of user work gives consuming.
activity insights that other Huge amounts
techniques of data
can't give
Studying Learning about Quantitative No time Day-to-day N/A
documentation procedures, commitment working will
regulations from users differ from
and standards required documented
procedures
Not only can naturalistic observation help fill in details and nuances that simply
did not come out of the other investigations, it also provides context for tasks. Con-
textualizing the work or behavior that a device is to support provides data that
other techniques cannot, and from which we can evolve requirements.
In the requirements activity, observation is good for understanding the nature
of the tasks and the context in which they are performed. However, it requires
more time and commitment from a member of the design team, and it can result in
a huge amount of data.
Studying documentation. Procedures and rules are often written down in manu-
als and these are a good source of data about the steps involved in an activity and
7.4 Data gathering 215
any regulations governing a task. Such documentation should not be used as the
only source, however, as everyday practices may augment them and may have been
devised by those concerned to make the procedures work in a practical setting.
Taking a user-centered view of development means that we are interested in the
everyday practices rather than an idealized account.
Other documentation that might be studied includes diaries or job logs that are
written by the stakeholders during the course of their work.
In the requirements activity, studying documentation is good for understanding
legislation and getting some background information on the work. It also doesn't in-
volve stakeholder time, which is a limiting factor on the other techniques.
I
7.4.2 Choosing between techniques
Table 7.1 provides some information to help you choose a set of techniques for a
specific project. It tells you the kind of information you can get, e.g., answers to
specific questions, and the kind of data it yields, e.g., qualitative or quantitative.
It also includes some advantages and disadvantages for each technique. The kind
of information you want will probably be determined by where you are in the
cycle of iterations. For example, at the beginning of the project you may not
have any specific questions that need answering, so it's better to spend time ex-
ploring issues through interviews rather than sending out questionnaires.
Whether you want qualitative or quantitative data may also be affected by the
point in development you have reached, but is also influenced by the kind of
analysis you need to do.
The resources available will influence your choice, too. For example, sending
out questionnaires nationwide requires sufficient time, money, and people to do a
good design, try it out (i.e., pilot it), issue it, collate the results and analyze them. If
you only have three weeks and no one on the team has designed a survey before,
then this is unlikely to be a success.
Finally, the location and accessibility of the stakeholders need to be consid-
ered. It may be attractive to run a workshop for a large group of stakeholders, but
if they are spread across a wide geographical area, it is unlikely to be practical.
Olson and Moran (1996) suggest that choosing between data-gathering tech-
niques rests on two issues: the nature of the data gathering technique itself and the
task to be studied.
Data-gathering techniques differ in two main respects:
1. The amount of time they take and the level of detail and risk associated
with the findings. For example, they claim that a naturalistic observation
will take two days of effort and three months of training, while interviews
take one day of effort and one month of training (p. 276).
2. The knowledge the analyst must hqye about basic cognitive processes.
Tasks can be classified along three scales:
1. Is the task a set of sequential steps or is it a rapidly overlapping series of
subtasks?
1 21 6 Chapter 7 Identifying needs and establishing requirements I
2. Does the task involve high information content with complex visual displays
to be interpreted, or low information content where simple signals are suffi-
cient to alert the user?
3. Is the task intended to be performed by a layman without much training or
by a practitioner skilled in the task domain?
Box 7.4 summarizes two examples to show how techniques can be chosen using
these dimensions.
So, when choosing between techniques for data gathering in the requirements
activity, you need to consider the nature of the technique, the knowledge required
of the analyst, the nature of the task to be studied, the availability of stakeholders
and other resources, and the kind of information you need.
sessions well, and know what your objectives are then this will increase your confi-
dence and make the whole exercise a lot more comfortable. Below we list some ~
data-gathering guidelines to support the requirements activity.
Focus on identifying the stakeholders' needs. This may be achieved by study-
ing their existing behavior and support tools, or by looking at other products,
7.4 Data gathering 217
situation, but before you can make sensible compromises, you need to know
what you'd really like.
How you record the data during a face-to-face data-gathering session is just
as important as the technique(s) you use. Video recording, audio recording,
and note taking are the main options. Video and audio recording provide
the most accurate record of the session, but they can generate huge amounts
of data. You also need to decide on practical issues that can have profound
effects on the data collected, such as where to position the camera. Note tak-
ing can be harder unless this is the person's only role in the session, but note
taking always involves an element of interpretation. Taking impartial, accu-
rate notes is difficult but can be improved with practice.
For each of the situations below, consider what kinds of data gathering would be appropri-
ate and how you might use the different techniques introduced above. You should assume
that you are at the beginning of the development and that you have sufficient time and re-
sources to use any of the techniques.
(a) You are developing a new software system to support a small accountant's office.
There is a system running already with which the users are reasonably happy, but it is
looking dated and needs upgrading.
(b) You are looking to develop an innovative device for diabetes sufferers to help them
record and monitor their blood sugar levels. There are some products already on the
market, but they tend to be large and unwieldy. Many diabetes sufferers rely on man-
ual recording and monitoring methods involving a ritual with a needle, some chemi-
cals, and a written scale.
(c) You are developing a website for a young person's fashion e-commerce site.
Comment (a) As this is a small office, there are likely to be few stakeholders. Some period of obser-
vation is always important to understand the context of the new and the old system.
Interviewing the staff rather than giving them questionnaires is likely to be appropri-
ate because there aren't very many of them, and this will yield richer data and give
the developers a chance to meet the users. Accountancy is regulated by a variety of
laws and it would also pay to look at documentation to understand some of the con-
straints from this direction. So we would suggest a series of interviews with the main
users to understand the positive and negative features of the existing system, a short
observation session to understand the context of the system, and a study of documen-
tation surrounding the regulations.
(b) In this case, your user group is spread about, so talking to all of them is infeasible.
However, it is important to interview some, possibly at a local diabetic clinic, making
sure that you have a representative sample. And you would need to observe the ex-
isting manual operation to understand what is required. A further group of stake-
holders would be those who use or have used the other products on the market.
These stakeholders can be questioned to find out the problems with the existing de-
vices so that the new device can improve on them. A questionnaire sent to a wider
group in order to back up the findings from the interviews would be appropriate, as
might a focus group where possible.
7.5 Data interpretation and analysis
(c) Again, you are not going to be able to interview all your users. In fact, the user group
219
I
may not be very well defined. Interviews backed up by questionnaires and focus
groups would be appropriate. Also, in this case, identlfy~ngsimilar or competing sites
and evaluating them will help provide information for producing an improved product.
ability. For example, who raised the requirement and where can more information
about it be found. This information may be captured in documents or in diagrams
drawn during analysis. Providing links with raw data as captured on video or audio
recordings can be harder, although just as important. Haumer et al. (2000) have de-
veloped a tool that records concrete scenarios using video, speech, and graphic
media, and relates these recorded observations to elements of a corresponding de-
sign. This helps designers to keep track of context and usage information while an-
alyzing and designing for the system.
More focused analysis of the data will follow initial interpretation. Different
techniques and notations exist for investigating different aspects of the system that
will in turn give rise to the different requirements. For example, functional require-
ments have traditionally been analyzed and documented using data-flow diagrams,
Book Flinht
~~
Flight details entered
Fare option displayed
Fare chosen
If new customer
Enter details
End If I customer details
i
Display customer details
Passenger details entered
Adcl 1 to NumberOfBookings
Booking confirmed by email
Figure 7.6 (a) Class diagram and (b) sequence diagram that might be used to analyze and
capture static structure and dynamic behavior (respectively) if the system is being developed
using an object-oriented approach.
7.5 Data interpretation and analysis 221
state charts, work-flow charts, etc. (see e.g., Sommerville, 2001). Data requirements
can be expressed using entity-relationship diagrams, for example. If the develop-
ment is to take an object-oriented approach, then functional and data requirements
are combined in class diagrams, with behavior being expressed in state charts and
sequence diagrams, among others. Examples of two such diagrams representing a
portion of a holiday booking system are given in Figure 7.6. These diagrams can be
linked to the requirements through the "Eventluse case" field in the template in
Figure 7.5.
We don't go into the detail of how diagrams such as these might be developed,
as whole books are dedicated to them. Instead, we describe four techniques that
have a user-centered focus and are used to understand users' goals and tasks: sce-
narios, use cases, essential use cases, and task analysis. All of them may be pro-
duced during data-gathering sessions, and their output used as props in subsequent
data-gathering sessions.
The requirements activity iterates a number of times before a set of stable re-
quirements evolves. As more interpretation and analysis techniques are applied, a
deeper understanding of requirements will emerge and the requirements descrip- I
tions will expand and clarify. I
-
"oltag,well, I think we all get the g i d of
where sev?vnj was going with the site map.'1
222 Chapter 7 Identifying needs and establishing requirements
university library, and allows you to access the details of books held in the library:
for example, to search for books by a particular author, or by subject, to identify
the location of a book you want to borrow, and to check on a member's current
loans and status.
The shared calendar application is to support a university department. Mem-
bers of the department currently keep their own calendars and communicate their
whereabouts to the department's administrator, who keeps the information in a
central paper calendar. Unfortunately, the central calendar and the individuals' cal-
endars easily become out of step as members of the department arrange their own
engagements. It is hoped that having a shared calendar in which individuals can
enter their own engagements will help overcome the confusion that often ensues
due to this mismatch. Shared calendars raise some interesting aspects of collabora-
tion and coordination, as discussed in Chapter 4, Box 4.2. In particular, people
don't usually like to have their time filled with appointments without their consent,
and so a mechanism is needed for people to protect some time from being booked
by others.
7.6.1 Scenarios
A scenario is an "informal narrative description" (Carroll, 2000). It describes
human activities or tasks in a story that allows exploration and discussion of con-
texts, needs, and requirements. It does not explicitly describe the use of software or
other technological support to achieve a task. Using the vocabulary and phrasing of
users means that the scenarios can be understood by the stakeholders, and they are
able to participate fully in the development process. In fact, the construction of sce-
narios by stakeholders is often the first step in establishing requirements.
Imagine that you have just been invited along to talk to a group of users who
perform data entry for a university admissions office. You walk in, and are greeted
by Sandy, the supervisor, who starts by saying something like:
Well, this is where the admissions forms arrive. We receive about 50 a day during the
peak application period. Brian here opens the forms and checks that they are complete,
that is, that all the documentation has been included. You see, we require copies of
relevant school exam results or evidence of work experience before we can process the
application. Depending on the result of this initial inspection, the forms getpassed t o . . . .
Telling stories is a natural way for people to explain what they are doing or
how to achieve something. It is therefore something that stakeholders can easily re-
late to. The focus of such stories is also naturally likely to be about what the users
are trying to achieve, i.e., their goals. Understanding why people do things as they
do and what they are trying to achieve in the process allows us to concentrate on
the human activity rather than interaction with technology.
This is not to say that the human activity should be preserved and reflected in
any new device we are trying to develop, but understanding what people do now is
a good starting point for exploring the constraints, contexts, irritations, facilitators
and so on under which the humans operate. It also allows us to identify the stake-
holders and the products involved in the activity. Repeated reference to a particular
224 Chapter 7 Identifying needs and establishing requirements
form, book, behavior, or location indicates that this is somehow central to the activ-
ity being performed and that we should take care to understand what it is and the
role it plays.
A scenario that might be generated by potential users of a library catalog ser-
vice is given below:
Say I want to find a book by George Jeffries. I don't remember the title but I know it was
published before 1995. I go to the catalog and enter m y user password. I don't
understand why I have to d o this, since I can't get into the library to use the catalog
without passing through security gates. However, once m y password has been confirmed,
I a m given a choice of searching b y author or b y date, but not the combination of author
and date. I tend to choose the author option because the date search usually identifies too
many entries. After about 30 seconds the catalog returns saying that there are n o entries
for George Jeffries and showing me the list of entries closest to the one I've sought. When
I see the list, I realize that in fact I got the author's first name wrong and it's Gregory, not
George. I choose the entry I want and the system displays the location to tell me where to
find the book.
In this limited scenario of existing system use, there are some things of note:
the importance of getting the author's name right, the annoyance concerning the
need to enter a password, the lack of flexible search possibilities, and the usefulness
of showing a list of similar entries when an exact match isn't clear. These are all in-
dicators of potential design choices for the new catalog system. The scenario also
tells us one (possibly common) use of the catalog system: to search for a book by an
author when we don't know the title.
The level of detail present in a scenario varies, and there is no particular guid-
ance about how much or how little should be included. Often scenarios are gener-
ated during workshop or interview sessions to help explain or discuss some aspect
of the user's goals. They can be used to imagine potential uses of a device as well as
to capture existing behavior. They are not intended to capture a full set of require-
ments, but are a very personalized account, offering only one perspective.
A simple scenario for the shared-calendar system that was elicited in an infor-
mal interview describes how one function of the calendar might work: to arrange a
meeting between several people.
The user types in all the names of the meeting participants together with some constraints
such as the length of the meeting, roughly when the meeting needs to take place, and
possibly where it needs to take place. The system then checks against the individuals'
calendars and the central departmental calendar and presents the user with a series of
dates o n which everyone is free all at the same time. Then the meeting could be confirmed
and written into peoples' calendars. Some people, though, will want to be asked before
the calendar entry is made. Perhaps the system could email them automatically and ask
that it be conjirmed before it is written in."
An example of a futuristic scenario, devised by Symbian, showing one vision of
how wireless devices might be used in the future is shown in Figure 7.7.
In this chapter, we refer to scenarios only in their role of helping to establish
requirements. They have a continuing role in the design process that we shall re-
turn to in Chapter 8.
7.6 Task description 225
I
Write a scenario of how you would currently go about choosing a new car. This should be a
I brand new car, not a second-hand car. Having written it, think about the important aspects
1 of the task, your priorities and preferences. Then imagine a new interactive product that
1 supports you in your goal and takes account of these issues. Write a futuristic scenario show-
1 ing how this product would support you.
I Comment The following example is a fairly generic view of this process. Yours will be different, but
I you may have identified similar concerns and priorities.
The first thing I would d o is to observe cars on the road and identify ones that I like the
look o j This may take some weeks. I would also try to identify any consumer reports that
will include an assessment of car performance. Hopefully, these initial activities will result
in m e identifying a likely car to buy. The next stage will be to visit a car showroom and
see at first hand what the car looks like, and how comfortable it is to sit in. If I still feel
positive about the car, then I'll ask for a test drive. Even a short test drive helps m e to
226 Chapter 7 Identifying needs and establishing requirements
understand how well the car handles, how noisy is the engine, how smooth are the gear
changes, and so on. Once I've driven the car myself, I can usually tell whether I would
like to own it or not.
From this scenario, it seems that there are broadly two stages involved in the task: re-
searching the different cars available, and gaining first-hand experience of potential pur-
chases. In the former, observing cars on the road and getting actual and maybe critical
information about them has been highlighted. In the latter, the test drive seems to be quite
significant.
For many people buying a new car, the smell and touch of the car's exterior and interior,
and the driving experience itself are often the most influential factors in choosing a particu-
lar model. Other more factual attributes such as fuel consumption, amount of room inside,
colors available, and price may rule out certain makes and models, but at the end of the day,
cars are often chosen according to how easy they are to handle and how comfortable they
are inside. This makes the test drive a vital part of the process of choosing a new car.
Taking these comments into account, we've come up with the following scenario describ-
ing how a new "one-stop ' shop for new cars might operate. This product makes use of im-
7
mersive virtual reality technology that is already used for other applications such as
designing buildings and training bomb disposal experts.
I want to buy a new car, so I go down the street to the local "one-stop car shop. " The
shop has a number of booths in it, and when I g o in I'm directed to an empty booth.
Inside there's a large seat that reminds m e of a racing car seat, and in front of that a large
display screen, keyboard and printer. A s Isit down, the display jumps into life. It offers
m e the options of browsing through video clips of new cars which have been released in
the last two years, or of searching through video clips of cars by make, by model, or by
year. I can choose as many of these as I like. I also have the option of searching through
and reading or printing consumer reports that have been produced about the cars I'm
interested in. I spend about an hour looking through materials and deciding that I'd like
to experience a couple that look promising. I can of course go away and come back later,
but I'd like to have a go with some of those I've found. B y flicking a switch in m y
armrest, Z can call u p the options for virtual reality simulations for any of the cars I'm
interested in. These are really great as they allow me to take the car for a test drive,
simulating everything about the driving experience in this car, from road holding, to
windscreen display, and front pedal pressure to dash board layout. It even re-creates the
atmosphere of being inside the car.
Note that the product includes support for the two research activities mentioned in the
original scenario, as well as the important test drive facility. This would be only a first cut
scenario which would then be refined through discussion and further investigation.
case, i.e,, one particular set of conditions. This meaning is consistent with the defin-
I
ition given above in that they both represent one specific example of behavior.
A use case is associated with an actor, and it is the actor's goal in using the
system that the use case wants to capture. In this technique, the main use case
describes what is called the "normal course" through the use case, i.e., the set of
actions that the analyst believes to be most commonly performed. So, for exam-
ple, if through data gathering we have found that most users of the library go to
the catalog to check the location of a book before going to the shelves, then the
normal course for the use case would include this sequence of events. Other pos-
sible sequences, called alternative courses, are then listed at the bottom of the
use case.
A use case for arranging a meeting using the shared calendar application, with
the normal course being that the meeting is written into the calendar automatically,
might be:
1. The user chooses the option to arrange a meeting.
2. The system prompts user for the names of attendees.
3. The user types in a list of names.
4. The system checks that the list is valid.
5. The system prompts the user for meeting constraints.
6. The user types in meeting constraints.
7. The system searches the calendars for a date that satisfies the constraints.
8. The system displays a list of potential dates.
9. The user chooses one of the dates.
10. The system writes the meeting into the calendar.
11. The system emails all the meeting participants informing them of the ap-
pointment.
Alternative courses:
5. If the list of people is invalid,
5.1 The system displays an error message.
5.2 The system returns to step 2.
8. If no potential dates are found,
8.1 The system displays a suitable message.
8.2 The system returns to step 5.
Note that the number associated with the alternative course indicates the step in
the normal course that is replaced by this action or set of actions. Also note how
specific the use case is about how the user and the system will interact.
Use cases may be described graphically. Figure 7.8 shows the use case diagram
for the above calendar example. The actor "Administrator" is associated with the
use case "Arrange a meeting." Another actor we might identify for the calendar
system is the "Departmental member" who updates his own calendar entries, also
shown in Figure 7.8. Actors may be associated with more than one use case, so for
228 Chapter 7 Identifying needs and establishing requirements
Administrator Departmental
member
I I
Figure 7.8 Use case diagram for the shared calendar system showing three use cases and
two actors.
example the actor "Departmental member" can be associated with a use case
"Retrieve contact details" as well as the "Update calendar entry" use case. Each
use case may also be associated with more than one actor.
This kind of description has a different style and a different focus from the sce-
narios described above. The layout is more formal, and the structure of "good" use
cases has been discussed by many (e.g., Cockburn, 1995; Gough et al., 1995; Ben
Achour, 1999). The description also focuses on the user-system interaction rather
than on the user's activities; thus a use case presupposes that technology is being used.
This kind of detail is more useful at conceptual design stage than during requirements
or data gathering, but use cases have been found to help some stakeholders express
their views on how existing systems are used and how a new system might work.
To develop a use case, first identify the actors, i.e., the people or other systems
that will be interacting with the system under development. Then examine these
actors and identify their goal or goals in using the system. Each of these will be a
use case.
Library
member
c
Figure 7.9 Use case diagram for the library catalog service.
7.6 Task description 229
Consider the example of the library catalog service again. One use case is "Locate book,"
and this would be associated with the "Library member" actor. Identify one other main
actor and an associated use case, and draw a use case diagram.
Write out the use case for "Locate book" including the normal and some alterna-
tive courses. You may assume that the normal course is for users to go to the catalog
to find the location, and that the most common path to find this is through a search by
author.
Comment One other main actor is the "Librarian." A use case for the "Librarian" would be "Update
catalog." Figure 7.9 is the associated use case diagram. There are other use cases you may
have identified.
The use case for "Locate book" might be something like this:
1. The system prompts for user name and password.
2. The user enters his or her user name and password into the catalog system.
3. The system verifies the user's password.
4. The system displays a menu of choices.
5. The user chooses the search option.
6. The system displays the search menu.
7. The user chooses to search by author.
8. The system displays the search author screen.
9. The user enters the author's name.
10. The system displays search results.
11. The user chooses the required book.
12. The system displays details of chosen book.
13. The user notes location.
14. The user quits catalog system.
Alternative courses:
4. If user password is not valid
4.1 The system displays error message.
4.2 The system returns to step 1.
5. If user knows the book details
5.1 The user chooses to enter book details.
5.2 The system displays book details screen.
5.3 The user enters book details.
5.4 The system goes to step 12.
above. Scenarios are concrete stories that concentrate on realistic and specific
activities. They therefore can obscure broader issues concerned with the wider
organizational view. On the other hand, traditional use cases contain certain as-
sumptions, including the fact that there is a piece of technology to interact with,
and also assumptions about the user interface and the kind of interaction to be
designed.
Essential use cases represent abstractions from scenarios, i.e., they represent a
more general case than a scenario embodies, and try to avoid the assumptions of a
traditional use case. An essential use case is a structured narrative consisting of
three parts: a name that expresses the overall user intention, a stepped description
of user actions, and a stepped description of system responsibility. This division be-
tween user and system responsibilities can be very helpful during conceptual design
when considering task allocation and system scope, i.e., what the user is responsible
for and what the system is to do.
An example essential use case based on the library example given above is
shown in Figure 7.10. Note that the steps are more generalized than those in the
use case in Section 7.6.2, while they are more structured than the scenario in Sec-
tion 7.6.1. For example, the first user intention does not say anything about typ-
ing in a list of names, it simply states that the user identifies meeting attendees.
This could be done by identifying roles, rather than people's names, from an or-
ganizational or project chart, or by choosing names from a list of people whose
calendars the system keeps, or by typing in the names. The point is that at the
time of creating this essential use case, there is no commitment to a particular in-
teraction design.
Instead of actors, essential use cases are associated with user roles. One of the
differences is that an actor could be another system, whereas a user role is just that:
not a particular person, and not another system, but a role that a number of differ-
ent people may play when using the system. Just as with actors, though, producing
an essential use case begins with identifying user roles.
Construct an essential use case "1ocateBook" for the user role "Library member" of the li-
brary catalog service discussed in Activity 7.4.
7.7 Task analysis 231
Comment locateBook I
USER INTENTION SYSTEM RESPONSIBILITY
identify self
verify identity
request appropriate details I
offer known details 1
offer search results 1
note search results I
quit system
close
Note that here we don't talk about passwords, but merely state that the users need to
identify themselves. This could be done using fingerprinting, or retinal scanning, or any
other suitable technology. The essential use case does not commit us to technology at this
point. Neither does it specify search options or details of how to initiate the search.
I
I
7.7 Task analysis
Task analysis is used mainly to investigate an existing situation, not to envision new
systems or devices. It is used to analyze the underlying rationale and purpose of
what people are doing: what are they trying to achieve, why are they trying to
achieve it, and how are they going about it? The information gleaned from task
analysis establishes a foundation of existing practices on which to build new re-
quirements or to design new tasks.
Task analysis is an umbrella term that covers techniques for investigating cog-
nitive processes and physical actions, at a high level of abstraction and in minute
detail. In practice, task analysis techniques have had a mixed reception. The most
widely used version is Hierarchical Task Analysis (HTA) and this is the technique
we introduce in this chapter. Another well-known task analysis technique called
GOMS (goals, operations, methods, and selection rules) that models procedural
knowledge (Card et al., 1983) is described in Chapter 14.
I 7.7.1 Hierarchical task analysis
Hierarchical Task Analysis (HTA) was originally designed to identify training needs
(Annett and Duncan, 1967). It involves breaking a task down into subtasks and then
into sub-subtasks and so on. These are then grouped together as plans that specify
how the tasks might be performed in an actual situation. HTA focuses on the physi-
cal and observable actions that are performed, and includes looking at actions that
are not related to software or an interaction device at all. The starting point is a user
goal. This is then examined and the main tasks associated with achieving that goal
are identified. Where appropriate, these tasks are subdivided into subtasks.
Consider the library catalog service, and the task of borrowing a book. This task
can be decomposed into other tasks such as accessing the library catalog, searching
by name, title, subject, or whatever, making a note of the location of the book, going
to the correct shelf, taking it down off the shelf (provided it is there) and finally tak-
232 Chapter 7 Identifying needs and establishing requirements
it to the check-out counter. This set of tasks and subtasks might be performed in a
different order depending on how much is known about the book, and how familiar
the user might be with the library and the book's likely location. Figure 7.11 shows
these subtasks and some plans for different paths through those subtasks. Indenta-
tion shows the hierarchical relationship between tasks and subtasks.
Note how the numbering works for the task analysis: the number of the plan
corresponds to the number of the step to which the plan relates. For example, plan
2 shows how the subtasks in step 2 can be ordered; there is no plan 1 because step 1
has no subtasks associated with it.
An alternative expression of an HTA is a graphical box-and-line notation. Fig-
ure 7.12 shows the graphical version of the HTA in Figure 7.11. Here the subtasks
are represented by named boxes with identifying numbers. The hierarchical rela-
tionship between tasks is shown using a vertical line. If a task is not decomposed
any further then a thick horizontal line is drawn underneath the corresponding box.
plan 0:
do 1-3-4.
If book isn't on the shelf expected, do 2-3-4.
I I I 1
plan 2:
do 2.1-2.4-2.5.
If book not identifiedfrom information available, do 2.2-2.3-2.4-2.5.
I I I I I
Figure 7.12 A graphical representation of the task analysis for borrowing a book.
7.7 Task analysis
Plans are also shown in this graphical form. They are written alongside the vertical
233
I
line emitting from the task being decomposed. For example, in Figure 7.12 plan 2 is
specified next to the vertical line from box 2 "find required book."
ook back at the scenario for arranging a meeting in the shared calendar application. Per-
rm hierarchical task analysis for the goal of arranging a meeting. Include all plans in your
answer. Express the task analysis textually and graphically.
Comment The main tasks involved in this are to find out who needs to be at the meeting, find out the
constraints on the meeting such as length of meeting, range of dates, and location, find a suit-
able date, enter details into the calendar, and inform attendees. Finding a suitable date can
be decomposed into other tasks such as looking in the departmental calendar, looking in in-
dividuals' calendars, and checking potential dates against constraints. The textual version of
the HTA is shown below. Figure 7.13 shows the corresponding graphical representation.
0. In order to arrange a meeting
1. compile a list of meeting attendees
2. compile a list of meeting constraints
3. find a suitable date
3.1 identify dates from departmental calendar
3.2 identify dates from each individual's calendar
3.3 compare ptential dates
3.4 choose one preferred date
4. enter meeting into calendars
5. inform meeting participants of calendar entry
plan 0: do 1-2-3. If potential dates are identified, do 4-5. If no potential dates can be identi-
fied, repeat 2-3.
plan 3: do 3.1-3.2-3.3-3.4 or do 3.2-3.1 -3.3-3.4
plan 0:
do 1-2-3.
If potential dates are identified, do 4-5. If not repeat 2-3
I I I I I
plan 3:
do 3.1-3.2-3.3-3.4
- - - -
What do you think are the main problems with using task analysis on real problems? Think
of more complex tasks such as scheduling delivery trucks, or organizing a large conference.
Comment Real tasks are very complex. One of the main problems with task analysis is that it does not
scale very well. The notation soon becomes unwieldy, making it difficult to follow. Imagine
what it would be like to produce a task analysis in which there were hundreds or even thou-
sands of subtasks.
A second problem is thkt task analysis is limited in the kind of tasks it can model. For ex-
ample, it cannot model tasks that are overlapping or parallel, nor can it model interruptions.
Most people work through interruptions of various kinds, and many significant tasks happen
in parallel.
Assignment
This assignment is the first of four assignments that together take you through the complete de-
velopment lifecycle for an interactive product. This assignment requires you to use techniques
described in this chapter for identifying needs and establishing requirements. The further three
assignments are at the end bf Chapters 8, 13, and 14.
The overall assignment is for you to design and evaluate an interactive website for booking
tickets online for events like concerts, the theatre and the cinema. This is currently an activity that
in many instances, can be difficult or inconvenient to achieve using traditional means (e.g., wait-
ing for ages on the phone to get hold of an agent, queuing for hours in the rain at a ticket office).
For this assignment, you should:
(a) Identify users' needs for this website. You could do this in a number of ways. For
example, you could observe people using ticket agents, think about your own expe-
rience of purchasing tickets, look at existing websites for booking tickets, talk to
friends and family about their experiences, and so on. Record your data carefully.
(b) Based on your user requirements, choose two different user profiles and produce
one main scenario for each one, capturing how the user is expected to interact with
the system.
(c) Using the scenarios generated from your data gathering, perform a task analysis on
the main task associated with the ticket booking system, i.e., booking a ticket.
(d) Based on the data gathered in part (a) and your subsequent interpretation and
analysis, identify different kinds of requirements for the website, according to the
headings introduced in Section 7.3 above. Write up the requirements in the style of
the Volere template.
Summary
In this chapter, we have looked in more detail at how to identify users' needs and establish
requirements for interaction design. Various data-gathering techniques can be used to collect
data for interpretation and analysis. The most common of these are questionnaires, inter-
views, focus groups, workshops, naturalistic observation, and studying documentation. Each
of these has advantages and disadvantages that must be balanced against your constraints
when choosing which techniques to use for a particular project. They can be combined in
many different ways, and can be supported by props such as scenarios and prototypes. How
Further reading 235
to carry out these techniques is covered in Chapters 12 through 14, Scenarios, use cases, and
essential use cases are helpful techniques for beginning to document the findings from the
data-gathering sessions. Task analysis is a little more structured, but does not scale well.
Key points
Getting the requirements right is crucial to the success of the interactive product.
There are different kinds of requirements: functional, data, environmental, user, and us-
ability. Every system will have requirements under each of these headings.
The most commonly used data-gathering techniques for this activity are: questionnaires, in-
terviews, workshops or focus groups, naturalistic observation, and studying documentation.
Descriptions of user tasks such as scenarios, use cases, and essential use cases help users to
articulate existing work practices. They also help to express envisioned use for new devices.
Task analysis techniques help to investigate existing systems and current practices.
Further reading
ROBERTSON, SUZANNE, AND ROBERTSON, JAMES (1999) Mas- tive guide for developing object-oriented systems using use
tering the Requirements Process. Boston: Addison-Wesley. cases and the modeling language Unified Modeling Lan-
In this book, Robertson and Robertson explain a useful guage (UML).
framework for software requirements work (see also the in- BRUEGGE, BERND, AND DUTOIT, ALLEN H. (2000) Object-
terview with Suzanne Robertson after this chapter). oriented Software Engineering. Upper Saddle River, NJ:
CONSTANTINE, LARRY L., AND LOCKWOOD, LUCY A. D. Prentice-Hall. This book is a comprehensive treatment of
(1999) Software for Use. Boston: Addison-Wesley. This very the whole development process using object-oriented tech-
readable book provides a concrete approach for modeling niques such as use cases. The book is organized to help those
and analyzing software systems. The approach has a user- involved in project work.
centered focus and contains some useful detail. It also in- SOMMERVILLE, IAN (2001) Software Engineering (6th ed.).
cludes more information about essential use cases. Boston: Addison-Wesley. If you are interested in pursuing
JACOBSON, I., BOOCH, G., AND RUMBAUGH, J. (1992) The notations for functional and data requirements, then this
Unified Software Development Process. Boston: Addison- book introduces a variety of notations and techniques used
Wesley. This is not an easy book to read, but it is the defini- in software engineering.
236 Chapter 7 Identifying needs and establishing r
Suzanne Roberston is a to pay for the development, and the customer who's
principal of The Atlantic making the decision about buying it. Then you've got
Systems Guild, an interna- stakeholders like the project leader, the developers,
tional think tank producing the requirements engineers, the designers, the quality
numerous books and semi- people, and the testers. Then you've got the less obvi-
nars whose aim is to make
ous stakeholders like surrounding organizations, pro-
good ideas to do with sys-
tems engineering more ac-
fessional bodies, and other people in the organization
cessible. Suzanne is
whose work might be affected by the project you're
particularly well known for doing, even if they're never going to use the product.
her work in systems analysis
and requirements gathering HS: So do you find the stakeholders by just asking
activities. questions?
SR: Yes, partly that and partly by using the domain
HS: What are requirements? model of the subject matter, which is in drawer 9, as the
SR: Well the problem is that "requirements" has driver to ask more questions about the stakeholders.
turned into an elastic term. Requirements is an enor- For example, for each one of the subject matter areas,
mously wide field and there are so many different ask who have we got to represent this subject matter?
types of requirements. One person may be talking For each one of the people that we come across, ask
about budget, somebody else may be talking about in- what subject matter are we expecting from them?
terfacing to an existing piece of software, somebody Drawer 3 contains the end users. I've put them in a
else may be talking about a performance require- separate drawer because an error that a lot of people
ment, somebody else may be talking about the calcu- make when they're looking for requirements is that the
lation of an algorithm, somebody else may be talking only stakeholder they talk about is the end user. They
about a data definition, and I could go on for hours as decide on the end user too quickly and they miss oppor-
to what requirement means. What we advise people tunities. So you end up building a product that is possi-
to do to start with is to look for something we call bly less competitive. I keep them a bit fuzzy to start
"linguistic integrity" within their own project. When with, and as you start to fix on them then you can go
all people who are connected with the project are into really deep analysis about them: What is their psy-
talking about requirements, what do they mean? This chology? What are their characteristics? What's their
gets very emotional, and that's why we came up with subject-matter knowledge? How do they feel about
our framework. We gathered together all this experi- their work? How do they feel about technology? All of
ence of different types of requirements, tried to pick these things help you to come up with the most compet-
the most common organization, and then wrote them itive non-functional requirements for the product.
down in a framework.
HS: How do you resolve conflict between stake-
HS: Please would you explain your framework? (The holders?
version discussed in this interview is shown in the fig- SR: Well, part of it is to get the conflicts out in the
ure on page 238. The most recent version may be open up front, so people stop blaming each other, but
downloaded from www.systemsguild.com.) that certainly doesn't resolve it. One of the ways is to
SR: Imagine a huge filing cabinet with 27 drawers, and make things very visible all the way through and to
in each drawer you've got a category of knowledge that keep reminding people that conflict is respectable,
is related to requirements. In the very first drawer for that it's a sign of creativity, of people having ideas.
example you've got the goals, i.e., the reason for doing The other thing that we do is that in our individual re-
the project. In the second drawer you've got the stake- quirements (that is atomic requirements), which end
holders. These are roles because they could be played up living in drawers 9 to 17 of this filing cabinet, we've
by more than one person, and one person may play got a place to say "Conflict: Which other requirement
more than one role. You've got the client who's going is this in conflict with?" and we encourage people to
Interview 237
identify them. Sometimes these conflicts resolve lution ideas, and when you get a solution idea, pop it
themselves because they're on people's back burners, in this drawer. This helps requirements engineers, I
and some of the conflicts are resolved by people just think, because we are trained to think of solutions,
talking to one another. We have a point at which we not to dig behind and find the real problem.
cross-check recluirements and look for conflicts and if
we find some that are just not sorting themselves out, H S : How do you go about identifying requirements?
then we stop and have a serious negotiation.
S R . For too long we've been saying the stakeholders
In essence, it's bubbling the conflicts up to the sur-
should give us their requirements: we'll ask them and
face. Keep on talking about them and keep them visi-
they'll give them to us. We've realized that this is not
ble. De-personalize it as much as you can. That helps.
practical-partly because there are many require-
ments people don't know they've got. Some require-
HS: What other things are associated with these ments are conscious and they're usually because things
atomic requirements? have gone wrong or they'd like something extra. Some
S R . Each one has a unique number and a description requirements are unconscious because maybe people
that is as close as you can get to what you think the are used to it, or maybe they haven't a clue because
thing means. It also has a rationale that helps you to they don't see the overall picture. And then there are
figure out what it really is. Then the next component is undreamed-of requirements that people just don't
the fit criterion, which is, "If somebody came up with a dream they could ever have, because we've all got
solution to this requirement, how would you know boundaries based on what we think technology is ca-
whether or not it satisfies the requirement?" So this pable of doing or what we know about technology or
means making the requirement quantifiable, measur- what our experience is. So it's not just asking people
able. And it's very powerful because it makes you for things, it's also inventing requirements. I think
think about the requirement. One requirement quite that's where prototyping comes in and scenario model-
often turns into several when you really try and quan- ing and storyboarding and all of those sorts of tech-
tify it. It also provides a wonderful opportunity for in- niques to help people to imagine what they could have.
volving testers, because at that point if you write the fit If you're building a product for the market and
criterion you can get a tester and ask whether this can you want to be more competitive you should be in-
be used as input to writing a cost-effective test. Now venting requirements. Instead of constricting yourself
this is different from the way we usually use the testers, within the product boundary, say, "Can I push myself
which is to build tests that test our solutions. Here I out a bit further? Is there something else I could do
want to get them in much earlier, I want them to test that isn't being done?"
whether this requirement really is a requirement.
HS: S o what kinds of techniques can people use to
HS: S o what's in drawers 18 through 27? push out further?
SR: Well here you can get into serious quarrels. The SR: One of the things is to learn how to imagine what
overall category is "project issues," and people often it's like to be somebody else, and this is why going into
say they're not really requirements, and they aren't. other fields, for example family therapy, is helpful.
But if the project is not being managed according to They've learned an awful lot about how to imagine
the real work that's being done, in other words the you might be somebody else. And that's not some-
contents of the drawers, then the project goes off the thing that software engineers are taught in college
rails. In project issues we create links so that a project normally and this is why it's very healthy for us to be
manager can manage the project according to what's bringing together the ideas of psychology and sociol-
happening to the requirements. ogy and so on with software and systems engineering.
In the last drawer we have design ideas. People Bringing in these human aspects-the performance,
say when you're gathering requirements you should the usability features, the "look and feel" features-
not be concerned with how you're going to solve the that's going to make our products more competitive. I
problem. But mostly people tell you requirements in always tell people to read a lot of novels. If you're
the form of a solution anyway. The key thing is to having trouble relating to some stakeholders, for ex-
learn how to separate the real requirements from so- ample, go and read some Jane Austen and then try to
238 Chapter 7 Identifying needs and establishing requirements
imagine what it would have been like to have been the was invented because of a very enthusiastic high-level
heroine in Pride and Prejudice. What would it have stakeholder in a project we were doing. She was very
been like to have to change your clothes three times a enthusiastic and keen and very involved. Wonderful!
day? I find this helps me a lot, it frees your mind and She really gave us tremendous ideas and support. The
then you can say, "OK, what's it really like to be that problem was she kept having ideas, and we didn't
other person?" There's a lot to learn in that area. know what to do. We didn't want to stop her having
ideas, on the other hand we couldn't always include
HS: So what you're saying really is that it's not easy. them because then we would never get anything built.
SR. It's not easy. I don't think there's any particular So we invented the waiting room. All the good ideas
technique. But what we have done is we have come we have we put in there and every so often we go into
up with a lot of different "trawling" techniques, along the waiting room and review the ideas. Some of them
with recommendations, that can help you. get added to the product, some are discarded, and
some are left waiting. The psychology of it is very
HS: Do you have any other tips for gathering re- good because the idea's in the waiting room, everyone
quirements? knows it's in there, but it's not being ignored. When
SR: It's important for people to feel that they've people feel heard, they feel better and consequently
been heard. The waiting room (drawer number 26) they're more likely to cooperate and give you time.
The Template
8.1 Introduction
8.2 Prototyping and construction
8.2.1 What is a prototype?
8.2.2 Why prototype?
8.2.3 Low-fidelity prototyping
8.2.4 High-fidelity prototyping
.8.2.5 Compromises in prototyping
8.2.6 Construction: from design to implementation
8.3 Conceptual design: moving from requirements to first design
8.3.1 Three perspectives For developing a conceptual model
8.3.2 Expanding the conceptual model
8.3.3 Using scenarios in conceptual design
8.3.4 Using prototypes in conceptual design
8.4 Physical design: getting concrete
8.4.1 Guidelines for physical design
8.4.2 Different kinds of widget
8.5 Tool support
8.1 Introduction
Design activities begin once a set of requirements has been established. Broadly
speaking, there are two types of design: conceptual and physical. The former is
concerned with developing a conceptual model that captures what the product will
do and how it will behave, while the latter is concerned with details of the design
such as screen and menu structures, icons, and graphics. The design emerges itera-
tively, through repeated design-evaluation-redesign cycles involving users.
For users to effectively evaluate the design of an interactive product, design-
ers must produce an interactive version of their ideas. fn the early stages of de-
velopment, these interactive versions may be made of paper and cardboard,
while as design progresses and ideas become more detailed, they may be polished
pieces of software, metal, or plastic that resemble the final product. We have
240 Chapter 8 Design, prototyping and construction
called the activity concerned with building this interactive version prototyping
and construction.
There are two distinct circumstances for design: one where you're starting from
scratch and one where you're modifying an existing product. A lot of design comes
from the latter, and it may be tempting to think that additional features can be
added, or existing ones tweaked, without extensive investigation, prototyping or
evaluation. It is true that if changes are not significant then the prototyping and
evaluation activities can be scaled down, but they are still invaluable activities that
should not be skipped.
In Chapter 7, we discussed some ways to identify user needs and establish re-
quirements. In this chapter, we look at the activities involved in progressing a set of
requirements through the cycles of prototyping to construction. We begin by ex-
plaining the role and techniques of prototyping and then explain how prototypes
may be used in the design process. Tool support plays an important part in devel-
opment, but tool support changes so rapidly in this area that we do not attempt to
provide a catalog of current support. Instead, we discuss the kinds of tools that may
be of help and categories of tools that have been suggested. I
4 inches
4
Durable c a s e t h e
tough plastic
exterior enables
complete protection
of the device if
dropped, and the Communication
rubberized outer keys-these are
casing lessens the 1 sensitive touch-
impacts of shocks. panel buttons. On
In addition, the being triggered, a
exterior is recorded message
lightweight and related to that key
makes the design is output from
ideal for use in the speaker
virtually any
environment In addition, symbols
and photos familiar
to the user can be
used on the keypads
to enable usability
of device to be
immediate in the
case of some
individuals
Battery indicator
shows amount of
battery left before
recharging is
required
J Amplified speaker
provides excellent output
Heather Martin and Bill Gaver (2000) describe a different kind of prototyping
with a different purpose. When prototyping audiophotography products, they used
a variety of different techniques including video scenarios similar to the scenarios
we introduced in Chapter 7, but filmed rather than written. At each stage, the pro-
totypes were minimally specified, deliberately leaving some aspects vague so as to
stimulate further ideas and discussion.
8.2 Prototyping and construction 243
1996) depicts a person using a new system for digitizing images. This example doesn't
show detailed drawings of the screens involved, but it describes the steps a user
might go through in order to use the system.
Produce a storyboard that depicts how to fill a car with gas (petrol).
Protofyping with Index Cards Using index cards (small pieces of cardboard about
3 X 5 inches) is a successful and simple way to prototype an interaction, and is used
quite commonly when developing websites. Each card represents one screen or one
element of a task. In user evaluations, the user can step through the cards, pretend-
ing to perform the task while interacting with the cards. A more detailed example
of this kind of prototyping is given in Section 8.3.4.
8.2 Prototyping and construction 245
I
Drive car t o gas pump Take nozzle from pump ... and put it ~ n t othe
car's gas tank
Table 8.1 Relative effectiveness of low- vs. high-fidelity prototypes (Rudd et al., 1996)
Marc Rettig (1994) argues that more projects should use low-fidelity prototyp-
ing because of the inherent problems with high-fidelity prototyping. He identifies
these problems as:
They take too long to build.
Reviewers and testers tend to comment on superficial aspects rather than
content.
Developers are reluctant to change something they have crafted for hours.
A software prototype can set expectations too high.
Just one bug in a high-fidelity prototype can bring the testing to a halt.
High-fidelity prototyping is useful for selling ideas to people and for testing out
technical issues. However, the use of paper prototyping and other ideas should be
actively encouraged for exploring issues of content and structure. Further advan-
tages and disadvantages of the two types of prototyping are listed in Table 8.1.
that any one prototype allows the designer to answer is therefore limited, and the
prototype must be designed and built with the key issues in mind. In low-fidelity
prototyping, it is fairly clear that compromises have been made. For example, with
a paper-based prototype an obvious compromise is that the device doesn't actually
work! For software-based prototyping, some of the compromises will still be fairly
clear; for example, the response speed may be slow, or the exact icons may be
sketchy, or only a limited amount of functionality may be available.
Two common compromises that often must be traded against each other are
breadth of functionality provided versus depth. These two kinds of prototyping
248 Chapter 8 Design, prototyping and construction
I
are called horizontal prototyping (providing a wide range of functions but with
little detail) and vertical prototyping (providing a lot of detail for only a few
functions).
Other compromises won't be obvious to a user of the system. For example, the
internal structure of the system may not have been carefully designed, and the pro-
totype may contain "spaghetti code" or may be badly partitioned. One of the dan-
gers of producing running prototypes, i.e., ones that users can interact with
automatically, is that they may believe that the prototype is the system. The danger
for developers is that it may lead them to consider fewer alternatives because they
have found one that works and that the users like. However, the compromises
made in order to produce the prototype must not be ignored, particularly the ones
that are less obvious from the outside. We still must produce a good-quality system
and good engineering principles must be adhered to.
prototypes are thrown away and the final product is built from scratch. If an evo-
lutionary prototyping approach is to be taken, the prototypes should be subjected
to rigorous testing along the way; for throw-away prototyping such testing is not
necessary.
Which interaction mode? Which interaction mode is most suitable for the product
depends on the activities the user will engage in while using it. This information is
identified through the requirements activity. The interaction mode refers to how
the user invokes actions when interacting with the device. In Chapter 2 we intro-
duced two different types of interaction mode: those based on activities and those
based on objects. For those based on activities, we introduced four general styles:
instructing, conversing, manipulating and navigating, and exploring and browsing.
Which is best suited to your current design depends on the application domain and
the kind of system being developed. For example, a computer game is most likely
to suit a manipulating and navigating style, while a drawing package has aspects of
instructing and conversing.
8.3 Conceptual design: moving from requirements to first design 251
252 Chapter 8 Design, prototyping and construction
Consider the library catalog system introduced in Chapter 7. Identify tasks associated with
this product that would be best supported by each of the interaction modes instructing, con-
versing, manipulating and navigating, and exploring and browsing.
Comment Here are some suggestions. You may have identified others:
(a) Instructing: the user wants to see details of a particular book, such as publisher and
location.
(b) Conversing: the user wants to identify a book on a particular topic but doesn't know
exactly what is required.
8.3 Conceptual design: moving from requirements to first design 253
(c) Manipulating and navigating: the library books could be represented as icons that
could be interrogated for information or manipulated to represent the book being re-
served or borrowed.
(d) Exploring and browsing: the user is looking for interesting books, with no particular
topic or author in mind.
Models based on objects provide a different perspective since they are struc-
tured around real-world objects. For example, the shared calendar system can be
thought of as an electronic version of a paper calendar, which is a book kept by
each person on their desk or in their bag. Alternatively, it could be thought of as a
planner, a large flat piece of paper that is often pinned up on the wall in offices and I
is far more public. The choice of which objects to choose as a basis for the concep-
tual model is related to the choice of interface metaphor, which we consider below.
Mayhew (1999) identifies a similar distinction between conceptual models:
process-oriented or product-oriented. The former kind of model best fits "an appli-
cation in which there are no clearly identifiable primary work products. In these
applications the main point is to support some work process." Examples of this
might be software to control a chemical processing plant, a financial management
package, or a customer care call-center. On the other hand, a product-oriented
model "will best fit an application in which there are clear, identifiable work prod-
ucts that users individually create, modify and maintain." Examples of this are Mi-
crosoft products such as Excel, Powerpoint, Word, etc. More information about
these kinds of conceptual model is given in Box 8.3.
metaphors used in the application domain with which the users may be familiar
may be suitable.
When suitable metaphors have been generated, they need to be evaluated.
Again, Erickson (1990) suggests five questions to ask.
1. How much structure does the metaphor provide? A good metaphor will re-
quire structure, and preferrably familiar structure.
8.3 Conceptual design: moving From requirements to first design 255
2. How much of the metaphor is relevant to the problem? One of the difficul-
ties of using metaphors is that users may think they understand more than
they do and start applying inappropriate elements of the metaphor to the
system, leading to confusion or false expectations.
3. Is the interface metaphor easy to represent? A good metaphor will be asso-
ciated with particular visual and audio elements, as well as words.
256 Chapter 8 Design, protoiyping and construction
Another possible interface metaphor for the shared calendar system is the wall planner. Ask
the five questions above of this metaphor.
Comment (a) Does it supply structure? Yes, it supplies structure based on the wall-planner. This
metaphor embodies the notion of public access more than the paper-based calendar.
In particular, the wall planner is never "closed" to those who are near it.
(b) How much of the metaphor is relevant? Most of this metaphor is relevant. Individu-
als don't walk around with the wall planner, though, so the answer depends on how
the calendar is to be used.
(c) Is the metaphor easy to represent? Yes, it could be represented as a spreadsheet.
(d) Will your audience understand the metaphor? Yes.
(e) How extensible is the metaphor? The functionality of a wall planner is also fairly
limited. There are no obvious ways in which to extend the metaphor to help with this
application.
8.3 Conceptual design: moving from requirements to first design 257
I
Which interadion paradigm? Interaction paradigms are design philosophies that
help you think about the product being developed. Interaction paradigms include
the now traditional desktop paradigm, with WIMP interface (windows, icons,
menus and pointers), ubiquitous computing, pervasive computing, wearable com-
puting, tangible bits, attentive environments, and the Workaday World. Thinking
about the user tasks with these different paradigms in mind can help provide in-
sight both to choose the interaction paradigm and to inspire a different perspective
on the problem.
Thinking about environmental requirements is particularly relevant when con-
sidering interaction paradigms. For example, consider the shared calendar in the
context of the following paradigms:
Ubiquitous computing. Combining some of our earlier discussions, we could
perhaps imagine the shared calendar as being like a planner on the wall, but
in an electronic form with which people could interact.
Pervasive computing. Carrying around our own copy of the shared calendar
builds directly upon current expectations and experience of personal calen-
dars. We can imagine a system that allows individuals to keep a copy of the
system on their own palmtop computers or PDAs, while also being linked to
a central server somewhere that allows access to other information that is
shared.
Wearable computing. Imagine having an earring or a tie pin telling you that
you have an appointment in an hour's time at a client's office and that you
need to book a taxi? Or maybe asking you whether it is all right to book a
meeting with your colleague on a particular date. What other possibilities
can this model conjure up?
Consider the library catalog system and think about each of the paradigms listed above.
Choose two of them and suggest different kinds of interaction that these paradigms imply.
Comment We had the following thoughts, but you may have others. The library catalog is likely to be
used only in certain places, such as the library or perhaps in an office. The idea of wearable
computers is not as attractive in this situation as pervasive computing would be, since people
would have to put on the wearable when they arrived at the library. Alternatively, the li-
brary system might be designed to "cut in" on an existing wearable. Both of these solutions
seem a little intrusive. Pervasive computing, on the other hand, would allow users to interact
with the catalog wherever in the library they were, rather than having to go to a place where
the PC or card catalog sits. You could possibly have digital books at the end of each library
shelf that gave access to the catalog.
or tested with users. One aspect that will need to be decided is what technologies to
use, e.g., mutimedia, virtual reality, or web-based materials, and what input and
output devices best suit the situation, e.g., pen-based, touch screen, speech, key-
board, and so on. These decisions will depend on the constraints on the system,
arising from the requirements you have established. For example, input and output
devices will be influenced particularly by user and environmental requirements.
You also have to decide what concepts need to be communicated between the
user and the product and how they are to be structured, related, and presented.
This means deciding which functions the product will support, how those functions
are related, and what information is required to support them. Although these de-
cisions must be made, remember that they are made only tentatively to begin with
and may change after prototyping and evaluation.
What functions will the product perform? Understanding the tasks the product will
support is a fundamental aspect of developing the conceptual model, but it is also
important to consider more specifically what functions the product will perform,
i.e., how the task will be divided up between the human and the machine. For ex-
ample, in the shared calendar example, the system may suggest dates when a set of
people are able to meet, but is that as far as it should go? Should it automatically
book the dates, or should it email the people concerned informing them of the
meeting or asking if this is acceptable? Or is the human user or the meeting at-
tendee responsible for checking this out? Developing scenarios, essential use cases,
and use cases for the system will help clarify the answers to these questions. Decid-
ing what the system will do and what must be left for the user is sometimes called
task allocation. The trade-off between what to hand over to the device and what to
keep in the control of the user has cognitive implications (see Chapter 3), and is
linked to social aspects of collaboration (see Chapter 4). An example relating to
our shared calendar system was discussed in Box 4.2 of Chapter 4: should the sys-
tem allow users to book meetings in others' calendars without asking their consent
first? In addition, if the cognitive load is too high for the user, then the device may
be too stressful to use. On the other hand, if the device takes on too much and is
too inflexible, then it may not be used at all.
Another aspect concerns the functions the hardware will perform, i.e., what
functions will be hard-wired into the device and what will be left under software
control, and thereby possibly indirectly in the control of the human dser? This
leads to considerations of the architecture of the device, although you Would riot
expect necessarily to have a clear architectural design at this stage of development.
How are the functions related to each other? Functions may be related temporally,
e.g., one must be performed before another, or two can be performed in parallel.
They may also be related through any number of possible categorizations, e.g., all
functions relating to telephone memory storage in a cell phone, or all options for
accessing files in a word processor. The relationships between tasks may constrain
use or may indicate suitable task structures within the device. For example, if a task
is dependent on completion of another task, then you may want to restrict the user
to performing the tasks in strict order. An instance in which this has been put into
8.3 Conceptual design: moving from requirements to first design 259
through scenarios for a product. B@dkeridentifies four roles that have been sug-
gested for scenarios (B@dker,2000, p. 63):
as a basis for the overall design
for technical implementation
as a means of cooperation within design teams I
as a means of cooperation across professional boundaries, i.e., as a basis of
communication in a multidisciplinary team
In any one project, scenarios may be used for any or all of these. Box 8.4 de-
tails how different scenarios were used throughout the development of a speech-
Scenario 3: Hyper-wonderland
This scenario addresses the positive aspects of how a hypermedia solution will
work.
The setting is the Lindholm consuuction site sometime in the future.
Kurt has access to a portable PC. The portables are hooked up to the computer at the
site office via a wireless modem connection, through which the supervisors run the hy-
permedia application.
Action: During inspection of one of the caissons1 Kurt takes his portable PC,
switches it on and places the cursor on the required information. He clicks the mouse
button and gets the master file index together with an overview of links. He chooses the
links of relevance for the caisson he is inspecting.
Kurt is pleased that he no longer needs to plan his inspections in advance. This is a
great help because due to the 'event-driven' nature of inspection, constructors never
know where and when an inspection is tajung place. Moreover, it has become much
easier to keep nack of personal notes, reports etc. because they can be entered directly
on the spot.
The access via the construction site interface does not force him to deal with compli-
cated keywords either. Instead, he can access the relevant information right away, liter-
ally from where he is standing.
A positive side effect concerns his reachability. As long as he has logged in on the
computer, he is within reach of the secretaries and can be contacted when guests arrive
or when he is needed somewhere else on the site. Moreover, he can see at a glance
where his colleagues are working and get in touch with them when he needs theii help
or advice.
All in all, Kurt feels that the new computer application has put him more in control of
things.
Scenario 4: Panopticon
This scenario addresses the negative aspects of how a hypermedia solution will
work.
The setting is the Lindholm construction site sometime in the future.
Kurt has access to a portable PC. The portables are hooked up to the computer at the
site ofice via a wireless modem connection, through which the supwisors run the hy-
permedia application.
Action: During inspecting one of the caissons Kurt starts talking to one of the build-
e n about some reinforcement problem. They argue about the recent lab tests. and he
takes out h s portable PC in order to provide some data which justify his arguments. It
takes quite a while before he finds a spot where he can place the PC. either there is too
much light, or there is no level surface at a suitable height. Finally, he puts the laptop
on a big box and switches it on. He positions the cursor on the caisson he is currently
inspecting and clicks the mouse to get into the master file. The table of contents pops up
and from the overview of links he chooses those of relevance - but no lab test appears
on the screen. Obviously, the file has not been updated as planned.
Kurt is rather upset. This loss of prestige in front of a contractor engineer would not
have happened if he had planned his inspection as he had in the old days.
Sometimes, he feels l i e a hunted fox especially in Situatlon~where he is drifting
around thinking about what kind of action to take in a particular case. If he has forgot-
ten ro log out he suddenly has a secretary on the phone: "I see you are right at caisson
39. so could you not just drop by and take a message?"
All in all Kurt feels that the new computer application has put him under control.
recognition system. More specifically, scenarios have been used as scripts for user
evaluation of prototypes, providing a concrete example of a task the user will per-
form with the product. Scenarios can also be used to build a shared understanding
among team members of the kind of system being developed. Scenarios are good at
selling ideas to users, managers, and potential customers. For example the scenario
presented in Figure 7.7 was designed to sell ideas to potential customers on how a
product might enhance their lifestyles.
An interesting idea also proposed by Bgdker is the notion of plus and m i n u s
scenarios. These attempt to capture the most positive and the most negative conse-
quences of a particular proposed design solution (see Figure 8.8) thereby helping
designers to gain a more comprehensive view of the proposal.
Consider an in-car navigation device for planning routes, and suggest one plus and one
minus scenario. For the plus scenario, try to think of all the possible benefits of the device.
For the minus scenario, try to imagine everything that could go wrong.
Comment Scenario 1 This plus scenario shows some potential positive aspects of an in-car navigation
system.
"Beth is in a hurry to get to her friend's house. She jumps into the car and switches on her
in-car navigation system. The display appears quickly, showing her local area and
indicating the current location of her car with a bright white dot. She calls up the memory
function of the device and chooses her friend's address. A number of her frequent
destinations are stored like this in the device, ready for her to pick the one she wants. She
chooses the "shortest route" option and the device thinks for a few seconds before
showing her a bird's-eye view of her route. This feature is very useful because she can get
an overall view of where she is going.
Once the engine is started, the display reverts to a close-up view to show the details of
her journey. A s she pulls away from the pavement, a calm voice tells her to "drive straight
o n for half a mile, then turn left." After half a mile, the voice says again "turn left at the
next junction." A s Beth has traveled this route many times before, she doesn't need to be
told when to turn left or right, so she turns o f f the voice output and relies only on the
display, which shows sujjicient detail for her to see the location of her car, her destination
and the roads she needs to use."
Scenario 2 This minus scenario shows some potential negative aspects of an in-car naviga-
tion system.
"Beth is in a hurry to get to her friend's house. She gets in her car and turns on the in-car
navigation system. The car's battery is faulty so all the information she had entered into
the device has been lost. She has to tell the device her destination by choosing from a
long list of towns and roads. Eventually, she finds the right address and asks for the
quickest route. The device takes ages to respond, but after a couple of minutes displays
an overall view of the route it has found. To Beth's dismay, the route chosen includes
one of the main roads that is being dug up over this weekend, so she cannot use the
route. She needs to find another route, so she presses the cancel button and tries again to
search for her friend's address through the long list oftowns and roads. By this time, she
is very late."
262 Chapter 8 Design, protoIyping and construction
Figure 8.9 A card-based prototype for booking a meeting in the shared calendar system.
264 Chapter 8 Design, prototyping and construction
after a user has chosen one of the dates and is asked to provisionally book the cho-
sen option, to confirm that this should be booked, or to cancel.
Note that at this point we have not decided how the navigation will work, i.e.,
whether there will be a tool bar, menus, etc. But we have included some detailed
aspects of the design, in order to provide enough detail for users to interact with
the prototype.
To illustrate how these cards can be used and the kind of information they can
yield, we held a prototyping session with a potential user of the calendar. The ses-
sion was informal (a kind of "quick and dirty" evaluation that you'll learn more
about in Chapter 11) and lasted about 20 minutes. The user was walked through
the task to see if the work flow was appropriate for the task of booking a meeting.
Generally, the work flow agreed with the user's model of the task, but the session
also highlighted some further considerations that did not arise in the original data
gathering. Some of these had to do with work flow, but others were concerned with I
more detailed design. For example, the user suggested that it should be possible to
state a range of dates rather than just a "before" date; he also thought that the peo-
ple attending the meeting should have a chance to confirm the date through the
system, and then when everyone had confirmed, the booking could be confirmed
and placed in the calendar. On the detailed design, he thought that date entry
through a matrix rather than a drop-down list would be more comfortable, and he
asked how the possible meeting dates would be ordered. There were many more
comments, all of which would be food for thought in the design. We considered
only the one task, and yet it yielded a lot of very useful information.
oduce a card-based prototype for the library catalog system and the task of borrowing a
ok as described by the scenario, use case, and HTA in Chapter 7. You may also like to ask
one of your peers to act as a user and step through the task using the prototype.
- B y AaG-------.--.. -'y--- - - , -- - -
Name
--- - - - A ~ ~ - , . L - -- -.1 .
-em--. - -
I - "
.. -
By Title
- -1
-Title -l~~~+---..---.-
i -iI
..-- .
SEARCH BOCW(--------
RESULTS -
Tine - -- -%lf_Mar_k
I
-1 Figure 8.10 A card-based
; prototype for borrowing a
II book in the library catalog
system.
requirements. These are often in conflict. For example, a cell phone must pro-
vide a lot of functionality but is constrained by having only a small screen and a
small keyboard. This means that the display of information is limited and the
number of unique function keys is also limited, resulting in restricted views of in-
formation and the need to associate multiple functions with function keys. Figure
8.11 shows the number of words it can display.
There are many aspects to the physical design of interactive products, and
we can't cover them all in this book. Instead, we introduce some principles of
266 Chapter 8 Design, protoiyping and construction
Figure 8.1 1 An average cell phone screen can display only a short mes-
sage legibly.
good design in the context of some common interface elements. On our website
(www.ID-book.com), you will find more activities and concrete examples of
physical design.
I
\ .
these focus on making the communication between user and product as clear as
possible.
Extensive experience in the art of communication (through posters, text,
books, images, advertising, etc.) is relevant to interaction design. In her interview
at the end of Chapter 6, Gillian Crampton Smith identifies the roles that traditional
designers can play in interaction design; one of them she highlights is the fact that
designers are trained to produce a coherent design that delivers the desired mes-
sage to the intended audience. Including such designers on the team can bring this
experience to bear. Mullet and Sano (1995) identify a number of useful design prin-
ciples arising from the visual arts.
To see how these can be translated into the context of interaction design, we
consider their application to different widgets, i.e., screen elements, in the next
section.
Menu design Menus provide users with a choice that can be a choice of com-
mands or a choice of options related to a command. They provide the means by
which the user can perform actions related to the task in hand and therefore are
based on task structure and the information required to perform a task.
Menus may be designed as drop-down, pop-up or single-dialog menus. It may
seem obvious how to design a menu, but if you want to make the application easy
to use and provide user satisfaction, some important points must be taken into ac-
count. For example, for pull-down and pop-up menus, the most commonly used
functions should be at the top, to avoid frequent long scans and scrolls. The princi-
ple of grouping can be used to good effect in menu design. For example, the menu
can be divided into collections of items that are related, with each collection being
8.4 Physical design: getting concrete 269
Figure 8.12 An excerpt from I S 0 9241 concerning how to group items in a menu.
separated from others. Opposite operations such as "quit" and "save" should be
clearly separated to avoid accidentally losing work instead of saving it (See Figure
1.6 in Chapter 1).
An excerpt from I S 0 9241, a major international standard for interaction de-
sign, considers grouping in menu design, as shown in Figure 8.12.
To show how the design of menus may proceed, we return to the shared calen-
dar. In our initial data gathering, we identified a number of possible tasks that the
user might want to perform using the calendar. These included making an entry, ar-
ranging a meeting among a number of people, entering contact details, and finding
out other people's engagements. Tied to these would also be a number of adminis-
trative and housekeeping actions such as deleting entries, moving entries, editing
entries, and so on. Suppose we stick with just this list. The first question is what to
call the menu entries. Menu names need to be short, clear, and unambiguous. The
space for listing them will be restricted, so they must be short, and you want them
to be distinguishable, i.e., not easily confused with one another so that the user
won't choose the wrong one by mistake. Our current descriptions are really too
long. For example, instead of "find out other people's engagements" we could have
Query entry as a menu option, following through to a dialog box that asks for rele-
vant details.
We need to consider logical groupings. In this case, we could group according
to user goal, i.e., have Query entry, Add entry, Edit entry, Move entry, and Delete
entry grouped together (see Figure 8.13). Similarly, we could group Add contact,
270 Chapter 8 Design, prototyping and construction
Edit contact and Delete contact together. Finding other people's engagements could
be generalized to a simple Search option that led to a dialog box in which the
search parameters are specified. Arranging a meeting is also an option that doesn't
clearly group with other commands. This and the Search option may be better rep-
resented as options on a toolbar than as menu items on their own.
Icon design Designing a good icon takes more than a few minutes. You may be
able to think up good icons in a matter of seconds, but such examples are unlikely
to be widely acceptable to your user group. When symbols for representing ladies'
and gents' toilets first appeared in the UK, a number of confused tourists did not
understand the culturally specific icons of a woman wearing a skirt and a man wear-
ing trousers. For example, some people protested that they thought the male icon
was a woman wearing a trouser suit. We are now all used to these symbols, and in-
deed internationally recognized symbols for how to wash clothes, fire exits, road
signs, etc. now exist. However, icons are cultural and context-specific. Designing a
good icon takes time.
At a simple level, designers should always draw on existing traditions or
standards, and certainly should not contradict them. Concrete objects or things
are easier to represent as an icon since they can be just a picture of the item. Ac-
tions are harder but can sometimes be captured. For example, using a picture of
7
a pair of scissors to represent "cut ' in a word-processing application provides
sufficient clues as long as the user understands the convention of "cut" for delet-
ing text.
In our shared calendar, if we are going to have the Search and Arrange a Meet-
ing commands on a tool bar, we need to identify a suitable icon for each of them. A
number of possible icons spring to mind for the Search option, mainly because
searching is a fairly common action in many interactive products: a magnifying
glass or a pair of binoculars are commonly used for such options. Arranging a
meeting is a little difficult, though. It's probably easier to focus on the meeting itself
than the act of arranging the meeting, but how do you capture a meeting? You
want the icon to be immediately recognizable, yet it must be small and simple.
What characteristic(s) of a meeting might you capture? One of the things that
comes to mind is a group of people, so maybe we could consider a collection of
stick people? Another element of a meeting is usually a table, but a table on its
own isn't enough, so maybe having a table with a number of people around it
would work?
8.4 Physical design: getting concrete 271
Figure 8.14 A variety of possible icons to represent the "arrange a meeting" function.
Sketch a simple, small icon to represent a set of people around the table, or suggest an icon
of your own. Show it to your peers or friends, tell them that it's an icon for a shared calendar
application, and see if they can understand what it represents.
Comment A variety of attempts are shown in Figure 8.14. The last icon is the icon that paim.net uses
for arranging meetings. This is a different possibility that tries to capture the fact that you're
entering data into the planner.
Screen design. There are two aspects to screen design: how the task is split across
a number of screens, and how the individual screens are designed.
The first aspect can be supported by reference to the task analysis, which broke
down the user's task into subtasks and plans of action. One starting point for screen
design is to translate the task analysis into screens, so that each task or subtask has
its own screen. This will require redesign and adjustment, but it is a starting point.
The interaction could be divided into simple steps, each involving a decision or
simple data entry. However, this can become idiotic, and having too many simple
screens can become just as frustrating as having information all crammed into one
screen. THIS is one of the balances to be drawn in screen design. Tasks that are
more complicated than this (and are usually unsuited to simple task analysis) may
require a different model of interaction in which a number of screens are open at
the same time and the user is allowed to switch among them.
272 Chapter 8 Design, prototyping and construction
Another issue affecting the division of a task across screens is that all pertinent
information must be easily available at relevant times.
Guidelines for the second aspect, individual screen design, draw more clearly
from some of the visual communication principles we mentioned above: for exam-
ple, designing the screen so that users' attention is drawn immediately to the salient
points, and using color, motion, boxing and grouping to aid understanding and clar-
ity. Each screen should be designed so that when users first see it, their attention is
focused on something that is appropriate and useful to the task at hand. Anima-
tions can be very distracting if they are not relevant to the task, but are effective if
used judiciously.
Good organization helps users to make sense of an interaction and to inter-
pret it within their own context (as discussed in Chapter 3). This is another ex-
ample where principles of good grouping can be applied, for example, grouping
similar things together or providing separation between dissimilar or unrelated
items. Grouping can be achieved in different ways: by placing things close to-
gether, using colors, boxes, or frames to segregate items, or using shapes to in-
dicate relationships among elements. There is a trade-off between sparsely
populated screens with a lot of open space and overcrowded screens with too
many and too complicated sets of icons. If the screen is overcrowded, then users
8.4 Physical design: getting concrete 273
274 Chapter 8 Design, prototyping and construction
will become confused and distracted. But too much open space and conse-
quently many screens can lead to frequent screen changes, and a disjointed se-
ries of interactions.
information display. Making sure that the relevant information is available for the
task is one aspect of information display, but another concerns the format. Differ-
8.5 Tool support 275
ent types of information lend themselves to different kinds of display. For example,
data that is discrete in nature, such as sales figures for the last month, could be dis-
played graphically using a digital technique, while data that is continuous in nature,
such as the percentage increase in sales over the last month, is better displayed
using an analog device.
If data is to be transferred to the device from a paper-based medium or vice
versa, it makes sense to have the two consistent. This reduces user confusion and
search time in reconciling data displayed with data on the paper.
In the shared calendar application, there is potentially a lot of information to
display. If you have five members of the department, each with their own calen-
dars, and the departmental calendar too, then you need to display six sets of en-
gagement information. When we showed the prototype system to our user, he
suggested that dates should be chosen through a matrix of some kind rather than a
drop-down list. Displaying information appropriately can make communication a
lot easier.
help design the interface given a specification of the end users' tasks
help implement the interface given a specification of the design
create easy-to-use interfaces
allow the designer to rapidly investigate different designs
allow nonprogrammers to design and implement user interfaces
automatically evaluate the interface and propose improvements
allow the end user to customize the interface
provide portability
be easy to use
In a later paper Myers et al. (2000), look at the past, present, and future of user in-
terface tools. Box 8.8 describes some types of tool that have been successful and
some that have been unsuccessful.
- - -
Assignment
This Assignment continues work on the web-based ticket reservation system at the end of
Chapter 7.
(a) Based on the information gleaned from the assignment in Chapter 7, suggest three
different conceptual models for this system. YOU should consider each of the as-
pects of a conceptual model discussed in this chapter: interaction paradigm, interac-
tion mode, metaphors, activities it will support, functions, relationships between
functions, and information requirements. Of these, decide which one seems most
appropriate and articulate the reasons why.
(b) Produce the following prototypes for your chosen conceptual model.
(i) Using the scenarios generated for the ticket reservation system, produce a
storyboard for the task of buying a ticket for one of your conceptual models.
Show it to two or three potential users and get some informal feedback.
(ii) Now develop a prototype based on cards and post-it notes to represent the
structure of the ticket reservation task, incorporating the feedback from the
first evaluation. Show this new prototype t o a different set of potential users
and get some more informal feedback.
(iii) Using a software-based prototyping tool (e.g., Visual Basic or Director) or web
authoring tool (e.g., Dreamweaver), develop a software-based prototype that
incorporates all the feedback you've had so far. If you do not have experience
in using any of these, create a few HTML web pages to represent the basic
structure of your website.
(c) Consider the web page's detailed design. Sketch out the application's main screen
(home page or data entry). Consider the screen layout, use of colors, navigation
audio, animation, etc. While doing this, use the three main questions introduced in
Box 8.7 as guidance: Where am I? What's here? Where can I go? Write one or two
sentences explaining your choices, and consider whether the choice is a usability
consideration or a user experience consideration.
Summary
This chapter has explored the activities of design prototyping and construction. Prototyping
and scenarios are used throughout the design process to test out ideas for feasibility and user
acceptance. We have looked at the different forms of prototyping, and the activities have en-
couraged you to think about and apply prototyping techniques in the design process.
Key points
Prototyping may be low fidelity (such as paper-based) or high fidelity (such as software-
based).
High-fidelity prototypes may be vertical or horizontal.
Low-fidelity prototypes are quick and easy to produce and modify and are used in the
early stages of design.
There are two aspects to the design activity: conceptual design and physical design.
Conceptual design develops a model of what the product will do and how it will behave,
while physical design specifies the details of the design such as screen layout and menu
structure.
278 Chapter 8 Design, prototyping and construction
We have explored three perspectives to help you develop conceptual models: an interac-
tion paradigm point of view, an interaction mode point of view, and a metaphor point of
view.
Scenarios and prototypes can be used effectively in conceptual design to explore ideas.
We have discussed four areas of physical design: menu design, icon design, screen design,
and information display.
There is a wide variety of support tools available to interaction designers.
Further reading
WINOGRAD, TERRY (1996) Bringing Design to Software. Ad- guidance for designing interactions that focus on communi-
dison-Wesley and ACM Press. This book is a collection of cation. The ideas here come from communication-oriented
articles all based on the theme of applying ideas from other visual designers. Mullet and Sano show how to apply these
design disciplines in software design. It has a good mixture techniques to interaction design, and they also show some
of interviews, articles, and profiles of exemplary systems, common errors made by interaction designers that contra-
projects or techniques. Anyone interested in software design vene the principles.
will find it inspiring. VEEN, JEFFREY (2001) The Art and Science of Web Design.
CARROLL, JOHN M. (ed.) (1995) Scenario-based Design. John New Riders. A very bright book, providing a lot of practical
Wiley & Sons, Inc. This volume is an edited collection of pa- information taken from the visual arts about how to design
pers arising from a three-day workshop on use-oriented de- websites. It also includes sections on common mistakes to
sign. The book contains a variety of papers including case help you avoid these pitfalls.
studies of scenario use within design, and techniques for MYERS, BRAD, HUDSON, S. E., AND PAUSCH, R. (2000)
using them with object-oriented development, task models Past, present and future of user interface software tools.
and usability engineering. This is a good place to get a broad ACM Transactions on Computer-Human Interaction, 7(1),
understanding of this form of development. 3-28. This paper presents an interesting description of
MULLET, KEVIN, AND SANO, DARELL (1995) Designing Vi- user interface tools, expanding on the information given in
sual Interfaces. SunSoft Press. This book is full of practical Box 8.8.
Chapter 9
User-centered approaches
to interaction
9.1 Introduction
9.2 Why is it important to involve users at all?
9.2.1 Degrees of involvement
9.3 What is a user-centered approach?
9.4 Understanding users' work: applying ethnography in design
9.4.1 Coherence
9.4.2 Contextual Design
9.5 Involving users in design: participatory design
9.5.1 PlCTlVE
9.5.2 CARD
1 9.1 Introduction
As you would expect, user-centered development involves finding out a lot about
the users and their tasks, and using this information to inform design. In Chapter 7
we introduced some data-gathering techniques which can be used to collect this in-
formation, including naturalistic observation. Studying people in their "natural"
surroundings as they go about their work can provide insights that other data-gath-
ering techniques cannot, and so interaction designers are keen to use this approach
where appropriate. One particular method that has been used successfully for natu-
ralistic observation in the social sciences is ethnography. It has also been used with
some success in product development but there have been some difficulties know-
ing how to interpret and present the data gathered this way so that it can be trans-
lated into practical design.
Another aspect of user-centered development is user involvement in the devel-
opment process. There are different degrees of involvement, one of which is
through evaluation studies, as discussed in Chapters 10 through 14. Another is for
users to contribute actively to the design itself-to become co-designers. As Gillian
Crampton Smith said in the interview at the end of Chapter 6, users are not design-
ers, but the payoffs for allowing users to contribute to the design themselves are
quite high in terms of user acceptance of the product. So techniques have been de-
veloped that engage users actively and productively in design.
280 Chapter 9 User-centered approaches to interaction design
In this chapter, we discuss some issues surrounding user involvement, and ex-
pand on the principles underlying a user-centered approach. Then we describe two
approaches to using ethnographic data to inform design and two approaches to in-
volving users actively in design.
The main aims of this chapter are to:
Explain some advantages of involving users in development.
Explain the main principles of a user-centered approach.
Describe some ethnographic-based methods aimed at understanding users'
work.
Describe some participative design techniques that help users take an active
part in design decisions.
f
ing to do with functionality are equal y as important if the product is to be usable
and used: expectation management a d ownership.
Expectation management is the process of making sure that the users views7
and expectations of the new product are realistic. The purpose of expectation man-
agement is to ensure that there are no surprises for users when the product arrives.
If users feel they have been "cheated" by promises that have not been fulfilled,
then this will cause resistance and ma be rejection. Expectation management is rel-
~i'
evant whether you are dealing with a organization introducing a new software sys-
tern or a company developing a new ifiteractive toy. In both cases, the marketing of
the new arrival must be careful not to misrepresent the product. How many times
i
have you seen an advert for somethi g you thought would be really good to have,
but when you see one, discover that t e marketing "hype" was a little exaggerated?
I expect you felt quite disappointed rjnd let down. Well, this is the kind of feeling
that expectation management tries to lavoid.
It is better to exceed users' expedtations than to fall below them. This does not
7
mean just adding more features, how*, but that the product supports the users
work more effectively than they expect. Inuolving users throughout development
helps with expectation management because they can see from an early stage what
the product's capabilities are and what they are not. They will also understand bet-
ter how it will affect their jobs and what 'they can expect to do with the product;
they are less likely to be disappointed. Users can also see the capabilities develop
and understand, at least to some extent, why the features are the way they are.
Adequate and timely training is another technique for managing expectations.
If you give people the chance to work with the product before it is released, either
9.2 Why is it important to involve users at all? 281 I
by training them on the real system or by offering hands-on demonstrations of a
prerelease version, then they will understand better what to expect when the final
product is released.
A second reason for user involvement is ownership. Users who are involved
and feel that they have contributed to a product's development, are more likely to
feel a sense of "ownership" towards it and to be receptive to it when it finally
emerges. Remember Suzanne Robertson's comment in her interview at the end of
Chapter 7 about how important it is for people to feel heard? Well, this is true
throughout development, not just at the requirements stage.
pectations and to create a feeling of ownership. At one end of the spectrum, users
may be co-opted to the design team so that they are major contributors. For any
one user, this may be on a full-time basis or a part-time basis, and it may be for the
duration of the project or for a limited time only. There are advantages and disad-
vantages to each situation. If a user is co-opted full-time for the whole project, their
input will be consistent and they will become very familiar with the system and its
rationale. However, if the project takes many years they may lose touch with the
rest of the user group, making their input less valuable. If a user is co-opted part-
time for the whole project, she will offer consistent input to development while re-
maining in touch with other users. Depending on the situation, this will need
careful management as the user will be trying to learn new jargon and handle unfa-
miliar material as a member of the design team, yet concurrently trying to fulfill the
demands of their original job. This can become very stressful for the individuals. If
a number of users from each user group are co-opted part-time for a limited pe-
riod, input is not necessarily consistent across the whole project, but careful coordi-
nation between users can alleviate this problem. In this case, one user may be part
of the design team for six months, then another takes over for the next six months,
and so on.
At the other end of the spectrum, users may be kept informed through regular
newsletters or other channels of communication. Provided they are given a chance
to feed into the development process through workshops or similar events, this can
be an effective approach to expectation management and ownership. In a situation
with hundreds or even thousands of users it would not be feasible to involve them
all as members of the team, and so this might be the only viable option.
If you have a large number of users, then a compromise situation is probably
the best. Representatives from each user group may be co-opted onto the team on
a full-time basis, while other users are involved through design workshops, evalua-
tion sessions, and other data-gathering activities.
The individual circumstances of the particular project affect what is realistic
and appropriate. If your end user groups are identifiable, e.g., you are developing a
product for a particular company, then it is easier to involve them. If, however, you
are developing a product for the open market, it is unlikely that you will be able to
co-opt a user to your design team. Box 9.1 explains how Microsoft involves users in
its developments.
282 Chapter 9 User-centered approaches to interaction design
One of the reasons often cited for not involving users in development is the
amount of time it takes to organize, manage, and control such involvement. This
issue may appear particularly acute in developing systems to run on the Internet
where ever-shorter timescales are being forced on teams-in this fast-moving area,
projects lasting three months or less are common. You might think, therefore, that
it would be particularly difficult to involve users in such projects. However, Braiter-
man et al. (2000) report two case studies showing how to involve users successfully
in large-scale but very short multidisciplinary projects, belying the claim that in-
volving users can waste valuable development time.
The first case study was a three-week project to develop the interaction for a
new web shopping application. The team included a usability designer, an informa-
tion architect, a project manager, content strategists, and two graphic designers. In
such a short timeframe, long research and prototyping sessions were impossible, so
the team produced a hand-drawn paper prototype of the application that was
9.2 Why is it important to involve users at all? 283
revised daily in response to customer testing. The customers were asked to perform
tasks with the prototype, which was manipulated by one of the team in order to
simulate interaction, e.g., changing screens. After half the sessions were conducted,
the team produced a more formal version of the prototype in Adobe Illustrator.
They found that customers were enthusiastic about using the paper prototype and
were keen to offer improvements.
The second case study involved the development of a website for a video
game publisher over three months. In order to understand what attracts people
to such gaming sites, the multidisciplinary team felt they needed to understand
the essence of gaming. To do this, they met 32 teenage gamers over a ten-day
period, during which they observed and interviewed them in groups and individ-
ually. This allowed the team to understand something of the social nature of
gaming and gave insights into the gamers themselves. During design, the team
also conducted research and testing sessions in their office lab. This led them to
develop new strategies and web designs based on the gamers' habits, likes, and
dislikes.
Box 9.2 describes a situation in which users were asked to manage a software
development project. There were hundreds of potential users, and so in addition,
9.3 What is a user-centered approach? 285
users became design team members on a full- and part-time basis; regular design
workshops, debriefing, and training sessions were also held.
How actively users should be involved is a matter for debate. Some studies
have shown that too much user involvement can lead to problems. This issue is dis-
cussed in the Dilemma box below.
would lead to a "useful and easy to use computer system." These are very similar to
the three key characteristics of interaction design introduced in Chapter 6.
1. Early focus on users and tasks. This means first understanding who the users
will be by directly studying their cognitive, behavioral, anthropomorphic,
and attitudinal characteristics. This required observing users doing their
normal tasks, studying the nature of those tasks, and then involving users in
the design process.
2. Empirical measurement. Early in development, the reactions and perfor-
mance of intended users to printed scenarios, manuals, etc. is observed and
measured. Later on, users interact with simulations and prototypes and
their performance and reactions are observed, recorded, and analyzed.
3. Iterative design. When problems are found in user testing, they are fixed and
then more tests and observations are carried out to see the effects of the
fixes. This means that design and development is iterative, with cycles of
"design, test, measure, and redesign" being repeated as often as necessary.
Iteration is something we have emphasized throughout these chapters on de-
sign, and it is now widely accepted that iteration is required. When Gould and
Lewis wrote their paper, however, the iterative nature of design was not accepted
by most developers. In fact, they comment in their paper how "obvious" these
principles are, and remark that when they started recommending these to design-
ers, the designers' reactions implied that these principles were indeed obvious.
However, when they asked designers at a human factors symposium for the major
steps in software design, most of them did not cite most of the principles-in fact,
only 2% mentioned all of them. So maybe they had "obvious" merit, but were not
so easy to put into practice. The Olympic Messaging System (OMS) (Gould et al.,
1987) was the first reported large computer-based system to be developed using
these three principles. Here a combination of techniques was used to elicit users'
reactions to designs, from the earliest prototypes through to the final product. In
this case, users were mainly involved in evaluating designs. The OMS is discussed
further in Chapter 10.
286 Chapter 9 User-centered approaches to interaction design
The iterative nature of design and the need to develop usability goals have
been discussed in Chapter 6. Here, we focus on the first principle, early focus on
users and tasks, and suggest five further principles that expand and clarify what this
means:
1. User's tasks and goals are the driving force behind the development. In a
user-centered approach to design, while technology will inform design op-
tions and choices, it should not be the driving force. Instead of saying,
"Where can we deploy this new technology?," say, "What technologies are
available to provide better support for users' goals?"
2. Users' behavior and context of use are studied and the system is designed
to support them. This is about more than just capturing the tasks and the
users' goals. How people perform their tasks is also significant. Under-
standing behavior highlights priorities, preferences, and implicit inten-
tions. One argument against studying current behavior is that we are
looking to improve work, not to capture bad habits in automation. The
implication is that exposing designers to users is likely to stifle innovation
and creativity, but experience tells us that the opposite is true (Beyer and
HoItzblatt, 1998). In addition, if something is designed to support an ac-
tivity with little understanding of the real work involved, it is likely to be
incompatible with current practice, and users don't like to deviate from
their learned habits if operating a new device with similar properties
(Norman, 1988).
3. Users' characteristics are captured and designed for. When things go
wrong with technology, we often say that it is our fault. But as humans,
we are prone to making errors and we have certain limitations, both cog-
nitive and physical. Products designed to support humans should take
these limitations into account and should limit the mistakes we make.
Cognitive aspects such as attention, memory, and perception issues were
introduced in Chapter 3. Physical aspects include height, mobility, and
strength. Some characteristics are general, such as that about one man in
12 has some form of color blindness, but some characteristics may be as-
sociated more with the job or particular task at hand. So as well as gen-
eral characteristics, we need to capture those specific to the intended user
group.
4 . Users are consulted throughout development from earliest phases to the latest
and their input is seriously taken into account. As discussed above, there are
different levels of user involvement and there are different ways in which to
consult users. However involvement is organized, it is important that users
are respected by designers.
5 . All design decisions are taken within the context of the users, their work, and
their environment. This does not necessarily mean that users are actively in-
volved in design decisions. As you read in Gillian Crampton Smith's inter-
view at the end of Chapter 6, not everyone believes that it is a good idea for
users to be designers. As long as designers remain aware of the users while
9.3 What is a user-centered approach? 287
making their decisions, then this principle will be upheld. Keeping this con-
text in mind can be difficult, but an easily accessible collection of gathered
data is one way t o achieve this. Some design teams set up a specific design
room for the project where data and informal records of brainstorming ses-
sions are pinned on the walls o r left on the table. (This is discussed again in
Section 9.4.2 on Contextual Design.)
Assume that you are involved in developing a new e-commerce site for selling garden plants.
Suggest ways of applying the above principles in this task.
Comment To address the first three principles, we would need to find out about potential users of the
site. As this is a new site, there is no immediate set of users to consult. However, the tasks
and goals, behavior, and characteristics of potential users of this site can be identified by in-
vestigating how people shop in existing online and physical shopping situations-for exam-
ple, shopping through interactive television, through other online sites, in a garden center, in
the local corner shop, and so on. For each of these, you will find advantages and disadvan-
tages to the shopping environment and you will observe different behaviors. By investigating
behavior and patterns in a physical garden center, you can find out a lot about who might be
interested in buying plants, how these people choose plants, what criteria are important, and
what their buying habits are. From existing online shopping behavior, you could determine
likely contexts of use for the new site.
For the fourth principle, because we don't have an easily tapped set of users available, we
could follow a similar route to the Internet company described in Section 9.2, and try to re-
cruit people we believe to be representative of the group. These people may be involved in
workshops or in evaluation sessions, possibly in a physical shopping environment. Valuable
input can be gained in targeted workshops, focus groups, and evaluation sessions. The last
principle could be supported through the creation of a design room to house all the data
collected.
the nature and purposes of collaboration, awareness of other's work, and implicit
goals that may not even be recognized by the workers themselves. For example, I
Heath et al. (1993) have been exploring the implications of ethnographic studies of
real-world settings for the design of cooperative systems. We described their un-
1
derground control room study in Chapter 4, but they have also studied medical
centers, architects' practices, and TV and radio studios. I
In one of their studies Heath et al. (1993) looked at how dealers in a stock ex- I
change work together. A main motivation was to see whether proposed technologi-
cal support for market trading was indeed suitable for that particular setting. One I
of the tasks examined in detail was the process of writing tickets to record deals. It
had been commented upon earlier by others that this process of deal capture, using
"old-fashioned" paper and pencil technology, was currently time-consuming and
prone to error. Based on this finding, it had been further suggested that the existing
way of making deals could be improved by introducing new technologies, including
touch screens to input the details of transactions, and headphones to eliminate dis-
tracting external noise.
However, when Heath et al. began observing the deal capture in practice, they
quickly discovered that these proposals were misguided. In particular, they warned
that these new technologies would destroy the very means by which the traders cur-
rently communicate and keep informed of what others are up to. Thi: touch screens
would reduce the availability of information to others on how deals were progress-
ing, while headphones would impede the dealers' ability to inadvertently monitor
one another's conversations. They pointed out how this kind of peripheral monitor-
ing of other dealers' actions was central to the way deals are done. Moreover, if any
dealers failed to keep up with what the other dealers were doing by continuously
monitoring them, it was likely to affect their position in the market, which ulti-
mately could prove very costly to the bank they were working for.
Hence, the ethnographic study proved to be very useful in warning against at-
tempts to integrate new technologies into a workplace without thinking through
the implications for the work practice. As an alternative, Heath et al. suggested
pen-based mobile systems with gestural recognition that could allow deals to be
made efficiently while also allowing the other dealers to continue to monitor one
another unobtrusively.
9.4 Understanding users' work: applying ethnography in design 291
Collecting ethnographic data is not hard although it may seem a little bewildering
to those accustomed to using a frame of reference to focus the data collection rather
than letting the frame of reference arise from the available data. You collect what is
available, what is "ordinary," what it is that people do, say, how they work. The data
collected therefore has many forms: documents, notes of your own, pictures, room
layouts. Notebook notes may include snippets of conversation and descriptions of
rooms, meetings, what someone did, or how people reacted to a situation. It is oppor-
tunistic in that you collect what you can collect and make the most of opportunities
presented to you. You don't go in with a firm plan, and so the data you collect is not
specifiable in advance. You have to do it rather than read about it. What you record
can become more focused after being in the field for a while.
Look up from reading this book and observe your surroundings. Wherever you are, the
chances are that you can see and hear lots of things, and probably other people too. Start
to make a list of what you observe, and when things change or people move, write down
what has happened and how it happened. For example, if someone spoke, what did his
voice sound like? Angry, calm, whispering, happy? Spend just a few minutes observing
what you can see.
Now think about the same observations but begin to interpret them: imagine that you
have to place the main items or people that you can see into categories. For example, on a
train you might consider who might be getting off at which station, in a bedroom you might
think about how to tidy up the items lying around.
How easy is it to go from the detailed description to the more abstracted one?
Comment As I am writing this, 1 am in a room on my own. I therefore don't have people to observe, but
my desk is covered with things: a pen, a boarding pass from a recent trip abroad, a rosette from
"
U p a w , disks etc. If I look around then 1 can see the wall-
paper and the curtains, clothes hanging and in piles on the bed. In the background I can hear
cars moving along the road, and the television downstairs. To spend any length of time really
describing any one of the things 1 observe would take up a lot of words, and that's a lot of data.
If I now consider how to file the things I can see, then I would start to think of categories
such as which are books, which are research papers, what can be thrown away, and so on. It
becomes easier to feel like I'm making progress. The other thing to notice is that some things
1 can observe are blocked out of my sphere of interest, such as the cars outside.
In some ways, the goals of design and the goals of ethnography are at opposite
ends of a spectrum. Design is concerned with abstraction and rationalization.
Ethnography, on the other hand, is about detail. An ethnographer's account will be
concerned with the minutiae of observation, while a designer is looking for useful
abstractions that can be used to inform design. One of the difficulties faced by
those wishing to use this very powerful technique is how to harness the data gath-
ered in a form that can be used in design.
Below, we introduce one framework that has been developed specifically to
help structure the presentation of ethnographies in a way that enables designers to
use them (other frameworks to help orient observers and how to organize this kind
r
I 9.4 Understanding users' work: applying ethnography in design 293
of study are described in Chapter 12). This framework has three main dimensions
(Hughes et al, 1997):
1. The distributed co-ordination dimension focuses on the distributed nature of
the tasks and activities, and the means and mechanisms by which they are co-
ordinated. This has implications for the kind of automated support required.
2. The plans and procedures dimension focuses on the organizational support
for the work, such as workflow models and organizational charts, and how
these are used to support the work. Understanding this aspect impacts on
how the system is designed to utilize this kind of support.
3. The awareness of work dimension focuses on how people keep themselves
aware of others' work. No-one works in isolation, and it has been shown
that being aware of others' actions and work activities can be a crucial ele-
ment of doing a good job. In the stock market example described above,
this was one aspect that ethnographers identified. Implications here relate
to the sharing of information.
Rather than taking data from ethnographers and interpreting this in design, an al-
ternative approach is to train developers to collect ethnographic data themselves.
This has the advantage of giving the designers first-hand experience of the situa-
tion. Telling someone how to perform a task, or explaining what an experience is
like, is very different from showing them or even gaining the experience them-
selves. Finding people with the skills of ethnographers and interaction designers
may be difficult, but it is possible to provide notational and procedural mechanisms
to allow designers to gain some of the insights first-hand. The two methods de-
scribed below provide such support.
9.4.1 Coherence
The Coherence method (Viller and Sommerville, 1999) combines experiences of
using ethnography to inform design with developments in requirements engineer-
ing. Specifically,it is intended to integrate social analysis with object-oriented analy-
sis from software engineering (which includes producing use cases as described in
Chapter 7). Coherence does not prescribe how to move from the social analysis to
use cases, but claims that presenting the data from an ethnographic study based
around a set of "viewpoints" and "concerns" facilitates the identification of the
product's most important use cases.
294 Chapter 9 User-centered approaches to interaction design
1. Paperwork and computer work. These are embodiments of plans and proce-
dures, and at the same time are a mechanism for developing and sharing an
awareness of work.
2. Skill and the use of local knowledge. This refers to the "workarounds" that
a r e developed in organizations and are at the heart of how the real work
gets done.
Distributed coordination
How is the division of labor manifest through the work of individuals and its coordina-
tion with others?
How clear are the boundaries between one person's responsibilities and another's?
What appreciation do people have of the work/tasks/roles of others?
How is the work of individuals oriented towards the others?
Awareness of work
How does the spatial organization of the workplace facilitate interaction between
workers and with the objects they use?
How do workers organize the space around them? Which artifacts that are kept to
hand are likely to be important to the achievement of everyday work?
What are the notes and lists that the workers regularly refer to?
What are the location(s) of objects, who uses them, how often?
Organizational memory
How do people learn and remember how to perform their work?
How well do formal records match the reality of how work is done?
3. Spatial and temporal organization. This concern looks at the physical layout
of the workplace and areas where time is important.
4. Organizational memory. Formal documents are not the only way in which
things are remembered within an organization. Individuals may keep their
own records, or there may be local gurus.
The elaboration questions associated with these concerns are listed in Figure 9.2
and a sample social concern from the air traffic control domain, together with re-
sultant requirements, is shown in Figure 9.3.
of feeding it into design. It has been used on a number of projects, e.g., see
Box 9.5.
Contextual Design has seven parts: Contextual Inquiry, Work Modeling, Con-
solidation, Work Redesign, User Environment Design, Mockup and Test with Cus-
tomers, and Putting It into Practice. In this chapter we are focusing on
understanding users' work, and so shall discuss only the first three steps. Step 4 in-
volves changing work practices, which is outside our scope here. Step 5 produces a
prototype that is used with customers, and the final step concerns the practicality of
the working system. The activities involved in these last two steps have been dis-
cussed in general terms in Section 8.2.
Contextual inquiry
Contextual inquiry is an approach to ethnographic study used for design that fol-
lows an apprenticeship model: the designer works as an apprentice to the user. The
9.4 Understanding users' work: applying ethnography in design 297
I 298 Chapter 9 User-centered approaches to interaction design
1.
most typical format for bontextual inquiry is a contextual interview, which is a com-
bination of observatfbn, discussion, and reconstruction of past events. Contextual
inquiry rests on four main principles: context, partnership, interpretation and focus.
The context principle emphasizes the importance of going to the workplace
and seeing what happens. The partnership principle states that the developer and
the user should collaborate in understanding the work; in a traditional interviewing
or workshop situation, !he interviewer or workshop leader is in control, but in con-
textual inquiry the spirit of partnership means that the understanding is developed
through cooperation.
9.4 Understanding users' work: applying ethnography in design 299
How does the contextual inquiry interview compare with the interviews introduced in
Chapter 7?
Normally, each team member conducts at least one contextual inquiry session.
Data is collected in the form of notes and perhaps audio and video recording, but a
lot of information is in the observer's head. It is important to review the experience
300 Chapter 9 User-centered approaches to interaction design
and to start documenting the findings as soon as possible after the session. Contextual
Design includes an interpretation session in which a number of models are generated
(see below). Figures 9.5 to 9.8 show flow, sequence, cultural, and physical models fo-
cused around the system manager of an organization (Holtzblatt and Beyer, 1996).
Work Modeling
For customer-centered design, the$rsf task of a design team is to shift focus from the
system that the team is chartered to build and redirect it to the work of potential
customers. Work, and understanding work becomes the primary consideration. But
"work" is a slippery concept. What is work? (Beyer and Holtzblatt, 1998, p. 81)
Contextual design identifies five aspects to modeling "work," each of which
guides the team to take a different perspective on what they have observed:
The workflow model (Figure 9.5) represents the people involved in the work
and the communication and coordination that takes place among them in
order to achieve the work.
The sequence model (Figure 9.6) shows the detailed work steps necessary to
achieve a goal. Sequences are collected during the contextual interview, as
the user works. However, understanding the steps alone is not sufficient,
since although you may be able to streamline the steps themselves, if you do
not understand the goals you may create a nonsensical work sequence. The
sequence model also states the trigger for the set of steps.
The artifact model represents the physical things created to do the work,
such as the sticky notes at my desk, described above. The model consists of
an annotated picture (or drawing) of each significant physical artifact used in
achieving the work.
The cultural model (Figure 9.7) represents constraints on the system caused
by organizational culture. Organizations have cultures, teams build up their
302 Chapter 9 User-centered approaches to interaction design
I
Raise problems through
escalation chain.
- Multiple inconsisten
tracking databases
Certain roles need to be adopted by the participants of this session. The inter-
viewer is the person who has conducted the interviews and whose models are being
examined. He must describe to the team what happened and in what order. During
this recounting, the other members of the team can question the interviewer for clar-
ification and extra information. Work modelers draw the work models as they
emerge from the description given by the interviewer. The recorder keeps notes of
the interpretation session that provide a sequential record of the meeting. The rest
of the team (participants) listen to the description, ask questions, suggest design
ideas (which are noted and not discussed at this time), observe, and contribute to the
building of the models. The moderator stage-manages the meeting, keeps discussions
I 304 Chapter 9 User-centered approaches to interaction design
focused on the main issue, keeps the pace of the meeting brisk, encourages everyone
to take part, and notes where in the story the interviewer was in case of interrup-
tions. The rat-hole watcher steers the conversation away from any distractions.
The output from this session is a set of models associated with the particular
contextual inquiry interview. Each contextual inquiry interview generates its own
set of models that is inevitably focused on the interviewee. These sets of models
must be consolidated to gain a more general view of the work as described below.
The thick lightning marks in the flow models represent points at which breakdowns in com-
munication or coordination occur. Alongside each lightning bolt is a description of the cause
for this breakdown. Study the flow model in Figure 9.5 and identify all the breakdowns and
their causes.
lndividual point
captured during
interpretation
lndividual point
captured during
interoretation II lndividual point
captured during
inter~retation
white
lndividual point
captured during
interpretation Figure 9.9 The structure
of an affinity diagram.
All together, the consolidated models help designers to understand the users'
intent, strategy to achieve that intent, structures to support the strategy, concepts
to help manage and think about work, and the users' mind set.
sort ma chi^ rno~k-rrp.The headline reads: "We didnotwrders& cutting showing a parcel-
the blurprinrs, so we mat& our own mock-ups." sorting machine mockup.
structure. He didn't think that it was a big error (he was a polite person), but he just
wanted to point out that the computer scientists who had prepared the proposal had
forgotten to specify how the codes were to be presented on the screen. Would it read
"<bf/"or perhaps just 'Zb" when the text that followed was to be printed in boldface?
In fact, the system being described by the designers was a WYSIWYG (what you
see is what you get) system, and so text that needed to be in bold typeface would
appear as bold (although most typographic systems at that time did require such
codes). The typographer was unable to link his knowledge and experience with
what he was being told. In response to this kind of problem, the project started
using mockups (introduced in Chapter 8). Simulating the working situation helped
workers to draw on their experience and tacit knowledge, and designers to get a
better understanding of the actual work typographers needed to do. An example
mockup for a computer-controlled parcel-sorting system, from another project, is
shown in Figure 9.10 (Ehn and Kyng, 1991). The headline of this newspaper clip-
ping reads, "We did not understand the blueprints, so we made our own mockups".
Mockups are one way to make effective use of the users' experience and
knowledge. Other paper-based prototyping techniques that have been developed
for participatory design are PICTIVE (Muller, 1991) and CARD (Tudor, 1993).
Shared Design
Surface
Colored Pens
Figure 9.1 1 PICTIVE design objects and PICTIVE setting.
9.5 Involving users in design: Participatory Design 309
Describe a set of design components you would develop for a PICTIVE session for the
shared calendar application discussed in Chapter 8.
Comment From our earlier design activities, we know that having dialog boxes and icons for arranging
a meeting would be appropriate. Also, different mechanisms for specifying the people to at-
tend the meeting and for choosing dates, e.g., drop-down lists, free text entry, or planner-
style date display. These components could be based on our preliminary designs. We will
also need a menu bar and associated menu lists, calendar page display, and function button
components. It would also be important to have some blank components that could be com-
pleted during the brainstorming session.
9.5.2 CARD
CARD (Collaborative Analysis of Requirements and Design) is similar to PIC-
TIVE, but uses playing cards with pictures of computers and screen dumps on
them to explore workflow options (see Figure 9.12 for an example set of cards
playing cards. Note that the cards can be used to represent users' goals or inten-
tions as well as specific computer screens or task elements. Participants can easily
create new cards during the session as deemed appropriate.
CARD can be used to complement PICTIVE as it provides a different granu-
larity of focus. Muller et al. (1995) characterized this as a bifocal view, CARD giv-
ing a macroscopic view, and PICTIVE the microscopic.
At the beginning of this chapter, we explained that there are different levels of
user involvement, from newsletters and workshops through to full-time member-
ship of the design team. Each project will need to decide on the level of user in-
volvement required. T o support this involvement, a project may also choose to use
one or a combination of the techniques introduced in Sections 9.4 and 9.5. For ex-
ample, Contextual Design could be used even if one of the users is a member of the
design team; an ethnographic study might be running alongside a series of user
workshops. These techniques expand the level of user involvement. However, each
approach has advantages and disadvantages, and Table 9.1 provides a brief com-
parison between the main techniques introduced in this chapter.
Assignment
This assignment asks you to apply some elements of Coherence and Contextual Design to
your own work or home circumstances.
(a) Using the questions for elaborating the viewpoints and concerns in Coherence, study
the environment of your workplace, university library or somewhere similar that you
know. Begin by deciding which concerns are relevant to each viewpoint, e.g., ask, "Are
there paper artifacts used in the workplace?" or "Is local knowledge used?" Then an-
swer the questions of elaboration for the three viewpoints and the four concerns.
Study your answers to the questions and see if you can identify priorities or con-
straints within the organization that you were not aware of before.
(b) Again using your workplace or similar location, attempt to draw the five Contextual
Design work models introduced in Section 9.4.3.
First of all, identify a key player in the workplace. This may be one of the librari-
ans, a clerk or secretary, or a manager. If possible, run a contextual inquiry interview
by sitting with her while working and asking her to tell you about one major aspect
of work. If this is not possible, then identify one of the main tasks that is visible to
you, such as the librarian issuing books, and sit and watch how the task is performed.
Draw the models from the information you have collected. If you find that you
need more data, go back and collect more. Once you feel that the models are
complete, take them back to the person you interviewed (if possible) and ask for
comments.
Summary
This chapter has elaborated on some issues surrounding the involvement of users in the de-
sign process. We have also introduced the method of ethnography as a useful source of in-
formation for a user-centered design process. One of the main disadvantages to using
ethnography is finding a way to represent the output of the study so that it can be fed into
312 Chapter 9 User-centered approaches to interaction design
the design process. We have described two approaches to design (Coherence and Contextual
Design) that were derived from ethnography and other approaches, to address this problem.
Users may be involved passively or they may be more actively involved in making de-
sign decisions. Participatory design is an approach in which users are co-designers. We have
described two techniques (PICTIVE and CARD) that have helped users' input to be more
effective.
Key Points
Involving users in the design process helps with expectation management and feelings of
ownership, but how and when to involve users is a matter of dispute.
Putting a user-centered approach into practice requires much information about the
users to be gathered and interpreted.
Ethnography is a good method for studying users in their natural surroundings.
Representing the information gleaned from an ethnographic study so that it can be used
in design has been problematic.
The goals of ethnography are to study the details, while the goals of system design are to
produce abstractions; hence they are not immediately compatible.
Coherence is a method that provides focus questions to help guide the ethnographer to-
wards issues that have proved to be important in systems development.
Contextual Design is a method that provides models and techniques for gathering con-
textual data and representing it in a form suitable for practical design.
PICTIVE and CARD are both participatory design techniques that empower users to
take an active part in design decisions.
Further reading
GREENBAUM, JOAN, AND KYNG, MORTEN (eds.) (1991) De- in a rapidly changing world, to develop and ship products
sign at Work: Co-operative Design of Computer Systems. that appeal to mass markets, and to continually build on and
- col-
Hillsdale, NJ: Lawrence Erlbaum. This book is a good improve market position.
lection of papers about the co-design of software systems:
both why it is worthwhile and experience of how to do it. WIXON, DENNIS, A N D RAMEY, JUDITH (eds.) (1996) Field
Methods Casebook for Software Design. New York: John
BEYER, HUGH AND HOLTZBJ-ATT, KAREN (1998) Contextual Wiley & Sons, Inc. This book is a collection of papers about
Design-' D&% Cmtomer-Centered Systems. Sari Francisco: practical use of field research methods in software design,
Morgan Kaufmann.This book will tell You more about contex- some of which are directly mentioned in the present chapter.
tual design and the rationale behind the Steps and the models. three main approaches that these papers cover are
--
CUSUMANO, M.A., AND SELBY, R. W. (1995) Microsoft Se- ethnography, participative design, and contextual design.
crets. London: Harper-Collins Business. This is a fascinating There are 14 chapters describing case studies and three
book based on a two-and-a-half-year study of Microsoft and chapters giving an overview of the main methods. For any-
how they build software. The book details findings about one interested in the practical use of these methods in soft-
strategies to manage an innovative organization competing ware development, it's a fascinating read!
Interview 31 3
HS: How did the idea of contextual design emerge? day and they'll say, "We have all this qualitative
KH. Contextual Design started with the invention stuff and nobody's using it . . . maybe we should
of Contextual Inquiry in a post-doctoral internship have a debriefing session." So then they have de-
with John Whiteside at Digital. At the time, usabil- briefing sessions. Then they wake up later on and
ity testing and usability issues had been around they say, "We don't have any way of structuring this
maybe eight years or so and he was asking the ques- information . . . models are a good idea." And basi-
tion, "Usability identifies about 10 to 20% of the cally they reconstruct the whole process as they hit
fixes at the tail end of the process to make the frost- the next problem.
ing on the cake look a little better to the user. What Now it's not quite that clean, but my point is that
would it take to really infuse usability?" Contextual organizational adoption is about people making it
Inquiry was my answer to that question. After that, their own and taking on the parts, changing them,
I took a job with Lou Cohen's Quality group at doing what they can. You have to get somebody to do
DEC, where I picked up the affinity diagram idea. something and then once they do something it snow-
Also at that time, Pelle Ehn and Kim Madsen were balls.
talking about Morten Kyng's ideas on paper mock- What's nice about the Contextual Design way of
ups and I added paper prototyping with post-its to doing everything on paper is that it creates a design
check out the design. Hugh and I hooked up 13 room, the design room creates a talk event, and the
years ago. He's a software and object-oriented de- talk event pulls everyone in because they want to I
know what you're doing. Then if they like the data, ,
veloper. We started working with teams and we no-
ticed that they didn't know how to go from the data they feel left out, and because they feel left out they
to the design and they didn't know how to structure want to do a project and they want to have a room for I
the system to think about it. So then we invented themselves as well.
more of the work models and the user environment The biggest complaint about Contextual Design
design. is that it takes too long. Some of that is about time,
So the Contextual Design method came from some of it is about thought. You have people who are
looking at the practice; we evolved every single step used to coding and now have to think about field
of this process based on what people needed. The data. They're not used to that.
whole process was worked out with real people doing
real design in real companies. So, where did it come
from? It came from dialog with the problem.
HS: What's the future direction of Contextual Design?
M: Every process can always be tweaked. I think
the primary parts of Contextual Design are there.
HS: What are the main problems that organizations There are interesting directions in which it can go,
face when putting Contextual Design into practice? but there's only so much we can get our audience to
KH: The question is, "What does organizational buy.
change look like?" because that's what we're talking I think that for us there are two key things that
about. The problem is that people want to change we're doing. One is we're starting to talk about design
and they don't want to change. What we communi- and what design is, so we can talk about the role of
cate to people is that organizational change is piece- design in design thinking. And we are still helping
meal. In order to own a process you have to say train everyone who wants to learn. But the other
what's wrong with it, you have to change it a little thing we're finding is that sometimes the best way to
bit, you have to say how whoever invented the support the client is to do the design work for them.
process is wrong and how the people in the organiza- So we have the design wing of the business where we
tion want to fix it, you have to make it fit with your put together the contextual design teams.
organizational culture and issues. Most people will We're working with distributed teams, we're
adopt the field-data gathering first and that's all working with creativity and invention, we're working
they'll do and they'll tell me that they don't have with how it impacts with business processes and mar-
time for anything else and they don't need anything keting, we're working with the balance of all those
else, and that's fine. And then they'll wake up one things. But it's only going to be in the context of a
Interview 31 5
team that's actually very advanced in the standard tual Design is a scaffolding, they can plug other
process that new process inventions will occur. Out of processes into it. They take their usability testing and
that will come lessons that can then be put back into they can plug it here, if they have their special creativ-
the standard contextual design. For most organiza- ity thing they can plug it here; if they have a focus
tions looking to adopt a customer-centered design group they can plug it here. But most people haven't
process, the standard contextual design is enough for got a backbone for design, and Contextual Design is a
now, they have to get started. And because Contex- good backbone to start with.
Chapter IO
Introducing evaluation
10.1 Introduction
10.2 What, why, and when to evaluate
10.2.1 What to evaluate
10.2.2 Why you need to evaluate
10.2.3 When to evaluate
10.3 Hutchworld case study
10.3.1 How the team got started: Early design ideas
10.3.2 How was the testing done?
10.3.3 Was it tested again?
10.3.4 Looking to the future
10.4 Discussion
10.1 Introduction
Recently I met two web designers who, proud of their newest site, looked at me in
astonishment when I asked if they had tested it with users. "No," they said "but we
know it's OK." So, I probed further and discovered that they had asked the "web
whiz-kids" in their company to look at it. These guys, I was told, knew all the tricks
of web design.
The web's presence has heightened awareness about usability, but unfortu-
nately this reaction is all too common. Designers assume that if they and their col-
leagues can use the software and find it attractive, others will too. Furthermore,
they prefer to avoid doing evaluation because it adds development time and costs
money. So why is evaluation important? Because without evaluation, designers
cannot be sure that their software is usable and is what users want. But what do we
mean by evaluation? There are many definitions and many different evaluation
techniques, some of which involve users directly, while others call indirectly on an
understanding of users' needs and psychology. In this book we define evaluation as
the process of systematically collecting data that informs us about what it is like for
a particular user or group of users to use a product for a particular task in a certain
type of environment.
As you read in Chapter 9, the basic premise of user-centered design is that
users' needs are taken into account throughout design and development. This is
achieved by evaluating the design at various stages as it develops and by amending
I 31 8 Chapter I O Introducing evaluation
7
it to suit users needs (Gould and Lewis, 1985). The design, therefore, progresses in
iterative cycles of design-evaluate redesign. Being an effective interaction designer
requires knowing how to evaluate different kinds of systems at different stages of
development. Furthermore, developing systems in this way usually turns out to be
less expensive than fixing problems that are discovered after the systems have been
shipped to customers (Karat, 1993). Studies also suggest that the business case for
using systems with good usability is compelling (Dumas and Redish, 1999; May-
hew, 1999): thousands of dollars can be saved.
Many techniques are available for supporting design and evaluation. Chapter 9
discussed techniques for involving users in design and part of this involvement
comes through evaluation. In this and the next four chapters you will learn how dif-
ferent techniques are used at different stages of design to examine different aspects
of the design. You will also meet some of the same techniques that are used for
gathering user requirements, but this time used to collect data to evaluate the de-
sign. Another aim is to show you how to do evaluation.
This chapter begins by discussing what evaluation is, why evaluation is impor-
tant, and when to use different evaluation techniques and approaches. Then a case
study is presented about the evaluation techniques used by Microsoft researchers
and the Fred Hutchinson Cancer Research Center in developing HutchWorld
(Cheng et al., 2000), a virtual world to support cancer patients, their families, and
friends. This case study is chosen because it illustrates how a range of techniques is
used during the development of a new product. It introduces some of the practical
problems that evaluators encounter and shows how iterative product development
is informed by a series of evaluation studies. The HutchWorld study also lays the
foundation for the evaluation framework that is discussed in Chapter 11.
The main aims of this chapter are to:
Explain the key concepts and terms used to discuss evaluation.
Discuss and critique the HutchWorld case study.
Examine how different techniques are used at different stages in the devel-
opment of HutchWorld.
Show how developers cope with real-world constraints in the development
of HutchWorld.
setting allows the evaluators to control what they want to investigate. Other as-
pects, such as whether a collaborative toy is robust and whether children enjoy in-
teracting with it, are better evaluated in natural settings, so that evaluators can see
what children do when left to their own devices.
You may remember from Chapters 2, 6 and 9 that John Gould and his col-
leagues (Gould et al., 1990; Gould and Lewis, 1985) recommended three similar
principles for developing the 1984 Olympic Message System:
focus on users and their tasks
observe, measure, and analyze their performance with the system
design iteratively
Box 10.1 takes up the evaluation part of the 1984 Olympic Messaging System
story and lists the many evaluation techniques used to examine different parts of
the OMS during its development. Each technique supported Gould et al.'s three
principles.
Since the OMS study, a number of new evaluation techniques have been devel-
oped. There has also been a growing trend towards observing how people interact
with the system in their work, home, and other settings, the goal being to obtain a
better understanding of how the product is (or will be) used in its intended setting.
For example, at work people are frequently being interrupted by phone calls, oth-
ers knocking at their door, email arriving, and so on-to the extent that many tasks
are interrupt-driven. Only rarely does someone carry a task out from beginning to
end without stopping to do something else. Hence the way people carry out an ac-
tivity (e.g., preparing a report) in the real world is very different from how it may
be observed in a laboratory. Furthermore, this observation has implications for the
way products should be designed.
Tognazzini points out that there are five good reasons for investing in user
testing:
1. Problems are fixed before the product is shipped, not after.
2. The team can concentrate on real problems, not imaginary ones.
3. Engineers code instead of debating.
4. Time to market is sharply reduced.
5. Finally, upon first release, your sales department has a rock-solid design it
can sell without having to pepper their pitches with how it will all actually
work in release 1.1 or 2.0.
Now that there is a diversity of interactive products, it is not surprising that the
range of features to be evaluated is very broad. For example, developers of a new
web browser may want to know if users find items faster with their product. Gov-
ernment authorities may ask if a computerized system for controlling traffic lights
322 Chapter 1O Introducing evaluation
results in fewer accidents. Makers of a toy may ask if six-year-olds can manipulate
the controls and whether they are engaged by its furry case and pixie face. A com-
pany that develops the casing for cell phones may ask if the shape, size, and color
of the case is appealing t o teenagers. A new dotcom company may want to assess
market reaction t o its new home page design.
This diversity of interactive products, coupled with new user expectations,
poses interesting challenges for evaluators, who, armed with many well tried and
tested techniques, must now adapt them and develop new ones. As well as usabil-
ity, user experience goals can be extremely important for a product's success, as
discussed in Chapter 1.
Think of examples of the following systems and write down the usability and user experience
features that are important for the success of each:
(a) a word processor
(b) a cell phone
(c) a website that sells clothes
(d) an online patient support community
Comment (a) It must be as easy as possible for the intended users to learn and to use and it must be
satisfying. Note, that wrapped into this are characteristics such as consistency, relia-
bility, predictability,etc., that are necessary for ease of use.
(b) A cell phone must also have all the above characteristics; in addition, the physical de-
sign (e.g., color, shape, size, position of keys, etc.) must be usable and attractive (e.g.,
pleasing feel, shape, and color).
(c) A website that sells clothes needs to have the basic usability features too. In particu-
lar, navigation through the system needs to be straightforward and well supported.
You may have noticed, for example, that some sites always show a site map to indi-
cate where you are. This is an important part of being easy to use. So at a deeper
level you can see that the meaning of "easy to use and to learn" is different for differ-
ent systems. In addition, the website must be attractive, with good graphics of the
clothes-who would want to buy clothes they can't see or that look unattractive?
Trust is also a big issue in online shopping, so a well-designed procedure for taking
customer credit card details is essential: it must not only be clear but must take into
account the need to provide feedback that engenders trust.
(d) An online patient support group must support the exchange of factual and emotional
information. So as well as the standard usability features, it needs to enable patients
to express emotions either publicly or privately, using emoticons. Some 3D environ-
ments enable users to show themselves on the screen as avatars that can jump, wave,
look happy or sad, move close to another person, or move away. Designers have to
identify the types of social interactions that users want to express (i.e., sociability)
and then find ways to support them (Preece, 2000).
From this selection of examples, you can see that success of some interactive products de-
pends on much more than just usability. Aesthetic, emotional, engaging, and motivating
qualities are important too.
10.2 What, why, and when to evaluate 323
Re-read the discussion of the 1984 Olympic Messaging System (OMS) in Box 10.1 and
briefly describe some of the things that were evaluated, why it was necessary to do the evalu-
ations, and when the evaluations were done.
Comment Because the Olympic Games is such a high-profile event and IBM's reputation was at stake,
the OMS was intensively evaluated throughout its development. We're told that early evalua-
tions included obtaining feedback from Olympic officials with scenarios that used printed
screens and tests of the user guides with Olympians, their friends, and family. Early evaluations
of simulations were done to test the usability of the human-computer dialog. These were done
first in the US and then with people outside of the US. Later on, more formal tests investigated
how well 100 participants could interact with the system. The system's robustness was also
324 Chapter 10 Introducing evaluation
tested when used by many users simultaneously. Finally, tests were done with users from mi-
nority cultural groups to check that they could understand how to use the OMS.
10.3.1 How the design team got started: early design ideas
Before developing this product, the team needed to learn about the patient experi-
ence at the Fred Hutchinson Center. For instance, what is the typical treatment
process, what resources are available to the patient community, and what are the
needs of the different user groups within this community? They had to be particu-
larly careful about doing this because many patients were very sick. Cancer pa-
tients also typically go through bouts of low emotional and physical energy.
Caregivers also may have difficult emotional times, including depression, exhaus-
tion, and stress. Furthermore, users vary along other dimensions, such as education
and experience with computers, age and gender and they come from different cul-
tural backgrounds with different expectations.
It was clear from the onset that developing a virtual community for this popu-
lation would be challenging, and there were many questions that needed to be an-
10.3 HutchWorld case study 325
swered. For example, what kind of world should it be and what should it provide?
What exactly do users want to do there? How will people interact? What should it
look like? To get answers, the team interviewed potential users from all the stake-
holder groups-patients, caregivers, family, friends, clinicians, and social support
staff-and observed their daily activity in the clinic and hospital. They also read the
latest research literature, talked to experts and former patients, toured the Fred
Hutchinson (Hutch) research facilities, read the Hutch web pages, and visited the
Hutch school for pediatric patients and juvenile patient family members. No stone
was left unturned.
The development team decided that HutchWorld should be available for pa-
tients any time of day or night, regardless of their geographical location. The team
knew from reading the research literature that participants in virtual communities
are often more open and uninhibited about themselves and will talk about problems
and feelings in a way that would be difficultin face-to-face situations. On the down-
side, the team also knew that the potential for misunderstanding is higher in virtual
communities when there is inadequate non-verbal feedback (e.g., facial expressions
and other body language, tone of voice, etc.). On balance, however, research indi-
cates that social support helps cancer patients both in the psychological adjustments
needed to cope and in their physical wellbeing. For example, research showed that
women with breast cancer who received group therapy lived on average twice as
long as those who did not (Spiegel, et al., 1989). The team's motivation to create
HutchWorld was therefore high. The combination of information from research lit-
erature and from observations and interviews with users convinced them that this
was a worthwhile project. But what did they do then?
The team's informal visits to the Fred Hutchinson Center led to the develop-
ment of an early prototype. They followed a user-centered development methodol-
ogy. Having got a good feel for the users' needs, the team brainstormed different
ideas for an organizing theme to shape the conceptual design-a conceptual model
possibly based on a metaphor. After much discussion, they decided to make the de-
sign resemble the outpatient clinic lobby of the Fred Hutchinson Cancer Research
Center. By using this real-world metaphor, they hoped that the users would easily
infer what functionality was available in HutchWorld from their knowledge of the
real clinic. The next step was to decide upon the kind of communication environ-
ment to use. Should it be synchronous or asynchronous? Which would support so-
cial and affective communications best? A synchronous chat environment was
selected because the team thought that this would be more realistic and personal
than an asynchronous environment. They also decided to include 3D photographic
avatars so that users could enjoy having an identifiable online presence and could
easily recognize each other.
Figure 10.3 shows the preliminary stages of this design with examples of the
avatars. You can also see the outpatient clinic lobby, the auditorium, the virtual
garden, and the school. Outside the world, at the top right-hand side of the screen,
is a list of commands in a palette and a list of participants. On the right-hand side at
the bottom is a picture of participants' avatars, and underneath the window is the
textual chat window. Participants can move their avatars and make them gesture to
tour the virtual environment. They can also click on objects such as pictures and in-
teract with them.
326 Chapter 1O Introducing evaluation
I
The prototype was reviewed with users throughout early development and was
later tested more rigorously in the real environment of the Hutch Center using a
variety of techniques. A Microsoft product called V-Chat was used to develop a
second interactive prototype with the subset of the features in the preliminary de-
sign shown in Figure 10.3; however, only the lobby was fully developed, not the au-
ditorium or school, as you can see in the new prototype in Figure 10.4.
Before testing could begin, the team had to solve some logistical issues. There
were two key questions. Who would provide training for the testers and help for
the patients? And how many systems were needed for testing and where should
they be placed? As in many high-tech companies, the Microsoft team was used to
short, market-driven production schedules, but this time they were in for a shock.
Organizing the testing took much longer than they anticipated, but they soon
won says'nowdyr
lSlWeilvs'Har( Lmz wur pun(ect avatar Sarahr
ah ewe Whymankpul'
learned to set realistic expectations that were in synch with hospital activity and the
unexpected delays that occur when working with people who are unwell.
A. Imagine you have never been to Seattle before. Your task is to find something to do.
B. Find out how to get to the Fred Hutchinson Cancer Research Center.
C. Go to your favorite website. [Or go to Yahoo: www.yahoo.com]
I D. Once you have found a website, resize the screen so you can see the whole web page.
Figure 10.6 A sample of the structured tasks used in the HutchWorld evaluation.
330 Chapter 10 Introducing evaluation
During the study, a member of the development team role-played being a par-
ticipant so that the real participants would be sure to have someone with whom to
interact. The evaluator also asked the participants to fill out a short questionnaire
after completing the tasks, with the aim of collecting their opinions about their ex-
periences with HutchWorld. The questionnaire asked:
What did you like about HutchWorld?
What did you not like about HutchWorld?
What did you find confusing or difficult to use in HutchWorld?
How would you suggest improving HutchWorld?
The following descriptions provide examples of some of the problems participants experience.
Get map view. People generally did not immediately know how to find the map view. However, they knew to
look in the chat buttons, and by going through the buttons they found the map view.
Walk in 3 0 view. People found the use of the mouse to move the avatar awkward, especially when they were
trying to turn around. However, once they were used to using the mouse they had no difficulty. For a couple of
people, it was not clear to them that they should click on the avatar and drag it in the desired direction. A cou-
ple of people tried to move by clicking the place they wanted to move to.
Figure 10.7 Participant information and ratings of difficulty in completing the structured tasks.
1 = easy, 2 = okay, 3 = difficult and bold = needed help.
Issue
Issue# Priority Issue Recommendation
1 high Back button sometimes not working. Fix back button.
2 high People are not paying attention to Make navigation buttons more
navigation buttons. prominent.
3 low Fonts too small, hard to read for some Make it possibl&to change fonts.
people. Make the font colors more distinct
from the background color.
4 low When navigating, people were not aware Change the overview button to a
overview button would take them back to home button, change the wording
the main page. of the overview page accordingly.
7 low People do not readily find map view button. Make the icon on the map view
button more map-like.
8 medium Moving avatar with mouse took some Encourage the use of the
getting used to. keyboard. Mention clicking and
dragging the avatar in the
welcome.
9 low People wanted to turn around in 3D view, Make one of the chat buttons a
but it was awkward to do so. button that lets you turn around.
12 high People not seeinglfinding the chat window. Make chat window more
Trying to chat to people from the people list prominent. Somehow link chat-
where other chat-like features are (whisper, like features of navigation list to
etc.) chat window. Change wording of
13 low Who is here list and who has been here list Spread them apart more in the
confused. people list.
14 medium Difficulty in finding who is here. Change People button to "Who is
On" button.
15 low Went to own profile to make someone a Let people add friends at My
friend. profile
16 low Not clear how to appendlreply to a Make an append button pop up
discussion in the bulletin board. when double clicking on a topic.
Change wording from "post a
message" to "write a message" or
"add a message".
17 low Bulletin board language is inconsistent. Change so it is either a bulletin
board, or a discussion area.
Figure 10.8 shows part of this table. Notice that issues were ranked in priority:
low, medium, and high. There were just five high-ranking problems that ab-
solutely had to be fixed:
The back button did not always work.
People were not paying attention to navigation buttons, so they needed to be
more prominent.
People frequently clicked on objects in the 3D view and expected something
to happen. A suggestion for fixing this was to provide links to a web page.
People did not realize that there could be other real people in the 3D world
with whom they could chat, so the wording in the overview description had
to be changed.
People were not noticing the chat window and instead were trying to chat to
people in the participant list. The team needed to clarify the instructions
about where to chat.
In general, most users found the redesigned software easy to use with little instruc-
tion. By running a variety of tests, the informal onsite test, and the formal usability
test, key problems were identified at an early stage and various usability issues
could be fixed before the actual deployment of the software.
of course there were still usability problems to be fixed. Then the question arose:
what to do next? In particular, had they done enough testing (see Dilemma)?
After making a few more fixes, the team stopped usability testing with specific
tasks. But the story didn't end here. The next step was to show HutchWorld to can-
cer patients and caregivers in a focus-group setting at the Fred Hutchinson Cancer
Research Center to get their feedback on the final version. Once the team made
adjustments to HutchWorld in response to the focus-group feedback, the final step
was to see how well HutchWorld worked in a real clinical environment. It was
therefore taken to a residential building used for long-term patient and family stays
that was fully wired for Internet access. Here, the team observed what happened
when it was used in this natural setting. In particular, they wanted to find out how
HutchWorld would integrate with other aspects of patients' lives, particularly with
their medical care routines and their access to social support. This informal obser-
vation allowed them to examine patterns of use and to see who used which parts of
the system, when, and why.
How might any medical facility use computers and software like Hutch-
World to provide social support for its patients and caregivers?
There is always more t o learn about the efficacy of a design and how much
users enjoy using a product, especially when designing innovative products like
HutchWorld for new environments. This study will provide a longer-term view of
how HutchWorld is used in its natural environment that is not provided by the
other evaluations. It's an ambitious plan because it involves a comparison between
two different environmental settings, one that has computers and HutchWorld and
one that doesn't (see Chapter 13 for more on experimental design).
(a) The case study does not say much about early evaluation to test the conceptual de-
sign shown in Figure 10.5. What do you think happened?
(b) The evaluators recorded the gender of participants and noted their previous experi-
ence with similar systems. Why is this important?
(c) Why do you think it was important to give participants a five-minute exploration pe-
riod?
(d) Triangulation is a term that describes how different perspectives are used to under-
stand a problem or situation. Often different techniques are used in triangulation.
Which techniques were triangulated in the evaluations of the HutchWorld proto-
type?
(e) The evaluators collected participants' opinions. What kinds of concerns do you think
participants might have about using HutchWorld? Hints: personal information, med-
ical information, communicating feelings, etc.
Comment (a) There was probably much informal discussion with representative users: patients,
medical staff, relatives, friends, and caregivers. The team also visited the clinic and
hospital and observed what happened there. They may also have discussed this with
the physicians and administrators.
(b) It is possible that our culture causes men and women to react differently in certain
circumstances. Experience is an even more important influence than gender, so
knowing how much previous experience users have had with various types of com-
puter systems enables evaluators to make informed judgments about their perfor-
mance. Experts and novices, for example, tend to behave very differently.
(c) The evaluators wanted to see how participants reacted to the system and whether or
not they could log on and get started. The exploration period also gave the partici-
pants time to get used to the system before doing the set tasks.
(d) Data was collected from the five-minute exploration, from performance on the struc-
tured tasks, and from the user satisfaction questionnaire.
(e) Comments and medical details are personal and people want privacy. Patients might
be concerned about whether the medical information they get via the computer and
from one another is accurate. Participants might be concerned about how clearly and
accurately they are communicating because non-verbal communication is reduced
online.
336 Chapter I O Introducing evaluation
I 10.4 Discussion
In both HutchWorld and the 1984 Olympic Messaging System, a variety of
evaluation techniques were used at different stages of design to answer different
questions. "Quick and dirty" observation, in which the evaluators informally exam-
ine how a prototype is used in the natural environment, was very useful in early de-
sign. Following this with rounds of usability testing and redesign revealed
important usability problems. However, usability testing alone is not sufficient.
Field studies were needed to see how users used the system in their natural envi-
ronments, and sometimes the results were surprising. For example, in the OMS sys-
tem users from different cultures behaved differently. A key issue in the
HutchWorld study was how use of the system would fit with patients' medical rou-
tines and changes in their physical and emotional states. Users' opinions also of-
fered valuable insights. After all, if users don't like a system, it doesn't matter how
successful the usability testing is: they probably won't use it. Questionnaires and in-
terviews were used to collect user's opinions.
An interesting point concerns not only how the different techniques can be
used to address different issues at different stages of design, but also how these
techniques complement each other. Together they provide a broad picture of the
system's usability and reveal different perspectives. In addition, some techniques
are better than others for getting around practical problems. This is a large part of
being a successful evaluator. In the HutchWorld study, for example, there were not
many users, so the evaluators needed to involve them sparingly. For example, a
technique requiring 20 users to be available at the same time was not feasible in the
HutchWorld study, whereas there was no problem with such an approach in the
OMS study. Furthermore, the OMS study illustrated how many different tech-
niques, some of which were highly opportunistic, can be brought into play depend-
ing on circumstances. Some practical issues that evaluators routinely have to
address include:
There are many evaluation techniques from which to choose and these practi-
cal issues play a large role in determining which are selected. Furthermore, selec-
tion depends strongly on the stage in the design and the particular questions to be
answered. In addition, each of the disciplines that contributes to interaction design
has preferred bodies of theory and techniques that can influence this choice. These
issues are discussed further in the next chapter.
Further reading 337
Assignment
1. Reconsider the HutchWorld design and evaluation case study and note what was
evaluated, why and when, and what was learned at each stage?
2. How was the design advanced after each round of evaluation?
3. What were the main constraints that influenced the evaluation?
4. How did the stages and choice of techniques build on and complement each other
(i.e., triangulate)?
5. Which parts of the evaluation were directed at usability goals and which at user ex-
perience goals? Which additional goals not mentioned in the study could the evalu-
ations have focused upon?
Summary
The aim of this chapter was to introduce basic evaluation concepts that will be revisited and
built on in the next four chapters. We selected the HutchWorld case study because it illus-
trates how a team of designers evaluated a novel system and coped with a variety of practical
constraints. It also shows how different techniques are needed for different purposes and
how techniques are used together to gain different perspectives on a product's usability. This
study highlights how the development team paid careful attention to usability and user expe-
rience goals a s they designed and evaluated their system.
Key points
Evaluation and design are very closely integrated in user-centered design.
Some of the same techniques are used in evaluation as in the activity of establishing re-
quirements and identifying users' needs, but they are used differently (e.g., interviews
and questionnaires, etc.).
Triangulation involves using combinations of techniques in concert to get different per-
spectives or to examine data in different ways.
Dealing with constraints, such as gaining access to users or accommodating users' rou-
tines, is an important skill for evaluators to develop.
Further reading
CHENG, L., STONE, L., FARNHAM, S., CLARK, A. M., AND A test of behavioral principles of system design. In J. Preece
ZANER-GODSEY, M. (2000) Hutchworld: Lessons Learned. A and L. Keller (eds.), Human-Computer Interaction (Read-
Collaborative Project: Fred Hutchinson Cancer Research ings). Prentice Hall International Ltd., Hemel Hempstead,
Center & Microsofi Research. In the Proceedings of the Vir- UK: 260-283. This edited paper tells the story of the design
tual Worlds Conference 2000, Paris, France. This paper de- and evaluation of the OMS.
scribes the HutchWorld study and, as the title suggests, it GOULD,J. D., BOIES,S. J., LEVY, S., RICHARDS, J. T., AND
discusses the design lessons that were learned. It also de- SCHOONARD, J. (1987). The 1984 Olympic Message System:
scribes the evaluation studies in more detail. a test of behavioral principles of systems design. Communi-
GOULD, J. D., BOIES,S. J., LEVY, S., RICHARDS, J. T.,AND cations of the ACM, 30(9), 758-769. This is the original, full
SCHOONARD, J. (1990). The 1984 Olympic Message System: version of the OMS paper.
Chapter II
An evaluation framework
1 I . 1 Introduction
1 1.2 Evaluation pradigms and techniques
1 1.2.1 Evaluation paradigms
1 1 2 . 2 Techniques
1 1.3 D E C I D E: A framework to guide evaluation
11.3.1 Determine the
1 1.3.2 Explore the questions
1 1.3.3 Choose the evaluation pradigm and techniques
1 1.3.4 Identify the practical issues
1 1.3.5 Decide how to deal with the ethical issues
1 1.3.6 Evaluate, interpret and present the data
1 1.4 Pilot studies
1 1.1 Introduction
Designing useful and attractive products requires skill and creativity. As products
evolve from initial ideas through conceptual design and prototypes, iterative cycles
of design and evaluation help to ensure that they meet users' needs. But how do
evaluators decide what and when to evaluate? The Hutchworld case study in the
previous chapter described how one team did this, but the circumstances surround-
ing every product's development are different. Certain techniques work better for
some than for others.
Identifying usability and user experience goals is essential for making every
product successful, and this requires understanding users' needs. The role of eval-
uation is to make sure that this understanding occurs during all the stages of the
product's development. The skillful and sometimes tricky part of doing this is
knowing what to focus on at different stages. Initial requirements get the design
process started, but, as you have seen, understanding requirements tends to hap-
pen by a process of negotiation between designers and users. As designers under-
stand users' needs better, their designs reflect .this understanding. Similarly, as
users see and experience design ideas, they are able to give better feedback that
enables the designers to improve their designs further. The process is cyclical,
with evaluation playing a key role in facilitating understanding between designers
and users.
340 Chapter 11 An evaluation framework
Evaluation is driven by questions about how well the design or particular as-
pects of it satisfy users' needs. Some of these questions provide high-level goals to
guide the evaluation. Others are much more specific. For example, can users find a
particular menu item? Is a graphic useful and attractive? Is the product engaging?
Practical constraints also play a big role in shaping evaluation plans: tight sched-
ules, low budgets, or little access to users constrain what evaluators can do. You
read in chapter 10 how the Hutchworld team had to plan its evaluation around
hospital routines and patients' health.
Experienced designers get to know what works and what doesn't, but those
with little experience can find doing their first evaluation daunting. However, with
careful advance planning, problems can be spotted and ways of dealing with them
can be found. Planning evaluation studies involves thinking about key issues and
asking questions about the process. In this chapter we propose the DECIDE
framework to help you do this.
The main aims of this chapter are to:
Continue to explain the key concepts and terms used to discuss evaluation.
Describe the evaluation paradigms and techniques used in interaction design.
Discuss the conceptual, practical, and ethical issues to be considered when
planning evaluation.
Introduce the DECIDE framework to help you plan your own evaluation
studies.
Usability testing
Usability testing was the dominant approach in the 1980s (Whiteside et al., 1998),
and remains important, although, as you will see, field studies and heuristic evalua-
tions have grown in prominence. Usability testing involves measuring typical users'
performance on carefully prepared tasks that are typical of those for which the sys-
tem was designed. Users' performance is generally measured in terms of number of
errors and time to complete the task. As the users perform these tasks, they are
watched and recorded on video and by logging their interactions with software.
This observational data is used to calculate performance times, identify errors, and
help explain why the users did what they did. User satisfaction questionnaires and
interviews are also used to elicit users' opinions.
The defining characteristic of usability testing is that it is strongly controlled
by the evaluator (Mayhew, 1999). There is no mistaking that the evaluator is in
charge! Typically tests take place in laboratory-like conditions that are controlled.
Casual visitors are not allowed and telephone calls are stopped, and there is no
possibility of talking to colleagues, checking email, or doing any of the other
tasks that most of us rapidly switch among in our normal lives. Everything that
342 Chapter 1 1 An evaluation framework
Field studies
The distinguishing feature of field studies is that they are done in natural settings
with the aim of increasing understanding about what users do naturally and how
technology impacts them. In product design, field studies can be used to (1) help
identify opportunities for new technology; (2) determine requirements for design;
(3) facilitate the introduction of technology; and (4) evaluate technology (Bly,
1997).
Chapter 9 introduced qualitative techniques such as interviews, observation,
participant observation, and ethnography that are used in field studies. The exact
choice of techniques is often influenced by the theory used to analyze the data. The
data takes the form of events and conversations that are recorded as notes, or by
audio or video recording, and later analyzed using a variety of analysis techniques
such as content, discourse, and conversational analysis. These techniques vary con-
siderably. In content analysis, for example, the data is analyzed into content cate-
gories, whereas in discourse analysis the use of words and phrases is examined.
Artifacts are also collected. In fact, anything that helps to show what people do in
their natural contexts can be regarded as data.
In this text we distinguish between two overall approaches to field studies. The
first involves observing explicitly and recording what is happening, as an outsider
looking on. Qualitative techniques are used to collect the data, which may then be
analyzed qualitatively or quantitatively. For example, the number of times a partic-
ular event is observed may be presented in a bar graph with means and standard
deviations.
In some field studies the evaluator may be an insider or even a participant.
Ethnography is a particular type of insider evaluation in which the aim is to explore
the details of what happens in a particular social setting. "In the context of human-
computer interaction, ethnography is a means of studying work (or other activities)
in order to inform the design of information systems and understand aspects of
their use" (Shapiro, 1995, p. 8).
1 1.2 Evaluation paradigms and techniques 343
Predictive evaluation
In predictive evaluations experts apply their knowledge of typical users, often guided
I
by heuristics, to predict usability problems. Another approach involves theoretically-
based models. The key feature of predictive evaluation is that users need not be pres-
ent, which makes the process quick, relatively inexpensive, and thus attractive to
companies; but it has limitations.
In recent years heuristic evaluation in which experts review the software prod-
uct guided by tried and tested heuristics has become popular (Nielsen and Mack,
1994). As mentioned in Chapter 1, usability guidelines (e.g., always provide clearly
marked exits) were designed primarily for evaluating screen-based products (e.g.
form fill-ins, library catalogs, etc.). With the advent of a range of new interactive
products (e.g., the web, mobiles, collaborative technologies), this original set of I
heuristics has been found insufficient. While some are still applicable (e.g., speak
the users' language), others are inappropriate. New sets of heuristics are also
needed that are aimed at evaluating different classes of interactive products. In
particular, specific heuristics are needed that are tailored to evaluating web-based
products, mobile devices, collaborative technologies, computerized toys, etc. These
should be based on a combination of usability and user experience goals, new re-
search findings and market research. Care is needed in using sets of heuristics. As
you will see in Chapter 13, designers are sometimes led astray by findings from
heuristic evaluations that turn out not to be as accurate as they at first seemed.
Table 11.1summarizes the key aspects of each evaluation paradigm for the fol-
lowing issues:
the role of users
who controls the process and the relationship between evaluators and users
during the evaluation
the location of the evaluation
when the evaluation is most useful
the type of data collected and how it is analyzed
how the evaluation findings are fed back into the design process
the philosophy and theory that underlies the evaluation paradigms
Some other terms that you may encounter in your reading are shown in Box 11.1.
Comment (a) The team did some "quick and dirty" evaluation during early development but this is
not stressed in their report. Usability testing played a strong role, with some tests
being carried out at the Fred Hutchinson Center and later tests in Microsoft's usabil-
ity laboratories. Field studies are not strongly featured, but the team does mention
344 Chapter 11 An evaluation framework
Evaluation Usability
paradigms "Quick and dirty" testing Field studies Predictive
Role of users Natural behavior. To carry out Natural behavior. Users generally not
set tasks. involved.
When used Any time you want With a prototype Most often used Expert reviews
to get feedback or product. early in design to (often done by
about a design check that users' consultants) with a
quickly. Techniques needs are being prototype, but can
from other met or to assess occur at any time.
evaluation problems or design Models are used to
paradigms can be opportunities. assess specific
used-e.g., experts aspects of a
review software. potential design.
observing how patients used HutchWorld in the Center. Field studies were planned
in which patients, who have access to HutchWorld and the web, could be systemati-
cally compared with another group who does not have these facilities. However, dis-
tinguishing between evaluation paradigms isn't always clear-cut. In practice elements
typically found in one may be transferred to another (e.g., the controlled approach
the HutchWorld team planned to use in the field). The only evaluation paradigm that
is not mentioned in the study is predictive evaluation.
(b) Expert reviews could have been done any time during its development but the team
may have thought they were not needed, or there wasn't time, or perhaps they were
performed but not reported.
1 1.2.2 Techniques
There are many evaluation techniques and they can be categorized in various ways,
but in this text we will examine techniques for:
observing users
asking users their opinions
asking experts their opinions
testing users' performance
modeling users' task performance to predict the efficacy of a user interface
The brief descriptions below offer an overview of each category, which we discuss
in detail in the next three chapters. Be aware that some techniques are used in dif-
ferent ways in different evaluation paradigms.
Observing users
Observation techniques help to identify needs leading to new types of products and
help to evaluate prototypes. Notes, audio, video, and interaction logs are well-
known ways of recording observations and each has benefits and drawbacks. Obvi-
ous challenges for evaluators are how to observe without disturbing the people
being observed and how to analyze the data, particularly when large quantities of
346 Chapter 1 1 An evaluation framework
video data are collected or when several different types must be integrated to tell
the story (e.g., notes, pictures, sketches from observers). You met several observa-
tion techniques in Chapter 7 in the context of the requirements activity; in Chapter
12 we will focus on how they are used in evaluation.
Asking users
Asking users what they think of a product-whether it does what they want; whether
I
they like it; whether the aesthetic design appeals; whether they had problems using
it; whether they want to use it again-is an obvious way of getting feedback. Inter-
views and questionnaires are the main techniques for doing this. The questions
asked can be unstructured or tightly structured. They can be asked of a few people
or of hundreds. Interview and questionnaire techniques are also being developed for
use with email and the web. We discuss these techniques in Chapter 13.
Asking experts
Software inspections and reviews are long established techniques for evaluating
software code and structure. During the 1980s versions of similar techniques were
developed for evaluating usability. Guided by heuristics, experts step through tasks
role-playing typical users and identify problems. Developers like this approach be-
cause it is usually relatively inexpensive and quick to perform compared with labo-
ratory and field evaluations that involve users. In addition, experts frequently
suggest solutions to problems. In Chapter 13 you will learn a few inspection tech-
niques for evaluating usability.
User testing
Measuring user performance to compare two or more designs has been the bedrock
of usability testing. As we said earlier when discussing usability testing, these tests are
usually conducted in controlled settings and involve typical users performing typical,
well-defined tasks. Data is collected so that performance can be analyzed. Generally
the time taken to complete a task, the number of errors made, and the navigation
path through the product are recorded. Descriptive statistical measures such as means
and standard deviations are commonly used to report the results. In Chapter 14 you
will learn the basics of user testing and how it differs from scientific experiments.
Asking users Discussions with User satisfaction The evaluator may N/A
users and questionnaires interview or
potential users are administered discuss what she
individually, in to collect users' sees with
groups or focus opinions. participants.
groups. Interviews may Ethnographic
also be used to interviews are used
get more details. in ethnographicstudies.
C 1969 R m d y G l . s h g e n .
C
-
These goals influence the evaluation approach, that is, which evaluation paradigm
guides the study. For example, engineering a user interface involves a quantitative
engineering style of working in which measurements are used to judge the quality
of the interface. Hence usability testing would be appropriate. Exploring how chil-
dren talk together in order to see if an innovative new groupware product would
help them to be more engaged would probably be better informed by a field
study.
I
11.3.2 Explore the questions I
Users
It goes without saying that a key aspect of an evaluation is involving appropriate
users. For laboratory studies, users must be found and screened to ensure that they
represent the user population to which the product is targeted. For example, us-
ability tests often need to involve users with a particular level of experience e.g.,
novices or experts, or users with a range of expertise. The number of men and
women within a particular age range, cultural diversity, educational experience,
and personality differences may also need to be taken into account, depending on
the kind of product being evaluated. In usability tests participants are typically
screened to ensure that they meet some predetermined characteristic. For example,
they might be tested to ensure that they have attained a certain skill level or fall
within a particular demographic range. Questionnaire surveys require large num-
bers of participants so ways of identifying and reaching a representative sample of
participants are needed. For field studies to be successful, an appropriate and ac-
cessible site must be found where the evaluator can work with the users in their
natural setting.
Another issue to consider is how the users will be involved. The tasks used in a
laboratory study should be representative of those for which the product is de-
signed. However, there are no written rules about the length of time that a user
should be expected to spend on an evaluation task. Ten minutes is too short for
most tasks and two hours is a long time, but what is reasonable? Task times will
vary according to the type of evaluation, but when tasks go on for more than 20
minutes, consider offering breaks. It is accepted that people using computers
should stop, move around and change their position regularly after every 20 min-
utes spent at the keyboard to avoid repetitive strain injury. Evaluators also need to
put users at ease so they are not anxious and will perform normally. Even when
users are paid to participate, it is important to treat them courteously. At no time
should users be treated condescendingly or made to feel uncomfortable when they
make mistakes. Greeting users, explaining that it is the system that is being tested
and not them, and planning an activity to familiarize them with the system before
starting the task all help to put users at ease.
turbed by having a camera pointed at them and will not perform normally, so how
can you avoid making them feel uncomfortable? Spare film and batteries may also
be needed.
Expertise
Does the evaluation team have the expertise needed to do the evaluation? For ex-
ample, if no one has used models to evaluate systems before, then basing an eval-
uation on this approach is not sensible. It is no use planning to use experts to
review an interface if none are available. Similarly, running usability tests requires
expertise. Analyzing video can take many hours, so someone with appropriate ex-
pertise and equipment must be available to do it. If statistics are to be used, then a
statistician should be consulted before starting the evaluation and then again later
for analysis, if appropriate.
Informal observation, user performance testing, and questionnaires were used in the Hutch-
World case study. What practical issues are mentioned in the case study? What other issues
do you think the developers had to take into account?
Comment No particular practical issues are mentioned for the informal observation, but there proba-
bly were restrictions on where and what the team could observe. For example, it is likely
that access would be denied to very sick patients and during treatment times. Not surpris-
ingly, user testing posed more problems, such as finding participants, putting equipment in
place, managing the tests, and underestimation of the time needed to work in a hospital set-
ting compared with the fast production times at Microsoft.
agreement between the evaluator and the evaluation participants that helps to con-
firm the professional relationship that exists between them. If your university or orga-
nization does not provide such a form it is advisable to develop one, partly to protect
yourself in the unhappy event of litigation and partly because the act of constructing it
will remind you what you should consider.
The following guidelines will help ensure that evaluations are done ethically
and that adequate steps to protect users' rights have been taken.
Tell participants the goals of the study and exactly what they should expect if
they participate. The information given to them should include outlining the
process, the approximate amount of time the study will take, the kind of data
that will be collected, and how that data will be analyzed. The form of the
final report should be described and, if possible, a copy offered to them. Any
payment offered should also be clearly stated.
Be sure to explain that demographic, financial, health, or other sensitive in-
formation that users disclose or is discovered from the tests is confidential. A
coding system should be used to record each user and, if a user must be iden- I
I
tified for a follow-up interview, the code and the person's demographic de-
tails should be stored separately from the data. Anonymity should also be
promised if audio and video are used.
Make sure users know that they are free to stop the evaluation at any time if
they feel uncomfortable with the procedure.
Pay users when possible because this creates a formal relationship in which
mutual commitment and responsibility are expected.
Avoid including quotes or descriptions that inadvertently reveal a person's
identity, as in the example mentioned above, of avoiding use of the pronoun
"she" in the focus group. If quotes need to be reported, e.g., to justify con-
clusions, then it is convention to replace words that would reveal the source
with representative words, in square brackets. We used this convention in
Boxes 9.2 and 9.3.
Ask users' permission in advance to quote them, promise them anonymity,
and offer to show them a copy of the report before it is distributed.
The general rule to remember when doing evaluations is do unto others only what
you would not mind being done to you.
*
I Think back to the HutchWorld case study. What ethical issues did the developers have to
" consider?
Comment The developers of Hutchworld considered all the issues listed above. In addition, because
the study involved patients, they had to be particularly careful that medical and other per-
sonal information was kept confidential. They were also sensitive to the fact that cancer pa-
tients may become too tired or sick to participate so they reassured them that they could
stop at any time if the task became onerous.
354 Chapter 11 An evaluation framework
Usability laboratories often have a one-way mirror that allows evaluators to watch users
doing their tasks in the laboratory without the users seeing the evaluators. Should users be
told that they are being watched?
Comment Yes, users should be told that they will be observed through a one-way mirror. It is unethical
not to. This honest approach will not compromise the study because users forget about the mir-
ror as they get more absorbed in their tasks. Telling users what is happening helps to build trust.
The recent explosion in Internet and web usage has resulted in more research
on how people use these technologies and their effects on everyday life. Conse-
quently, there are many projects in which developers and researchers are logging
users' interactions, analyzing web traffic, or examining conversations in chatrooms,
bulletin boards, or on email. Unlike most previous evaluations in human-computer
interaction, these studies can be done without users knowing that they are being
studied. This raises ethical concerns, chief among which are issues of privacy, confi-
dentiality, informed consent, and appropriation of others' personal stories (Sharf,
1999). People often say things online that they would not say face to face. Further-
more, many people are unaware that personal information they share online can be
read by someone with technical know-how years later, even after they have deleted
l
it from their personal mailbox (Erickson et al., 1999).
Studies of user behavior on the Internet may involve logging users' interactions and keeping
a copy of their conversations with others. Should users be told that this is happening?
1 1.3 DECIDE:A framework to guide evaluation 355
I
Comment Yes, it is better to tell users in advance that they are being logged. As in the previous exam-
ple, the users' knowledge that they are being logged often ceases to be an issue as they be-
come involved in what they are doing.
Reliability
The reliability or consistency of a technique is how well it produces the same results
on separate occasions under the same circumstances. Different evaluation
processes have different degrees of reliability. For example, a carefully controlled
experiment will have high reliability. Another evaluator or researcher who follows
exactly the same procedure should get similar results. In contrast, an informal, un-
structured interview will have low reliability: it would be difficult if not impossible
to repeat exactly the same discussion.
Validity
Validity is concerned with whether the evaluation technique measures what it is
supposed to measure. This encompasses both the technique itself and the way it is
performed. If for example, the goal of an evaluation is to find out how users use a
new product in their homes, then it is not appropriate to plan a laboratory experi-
ment. An ethnographic study in users' homes would be more appropriate. If the
goal is to find average performance times for completing a task, then counting only
the number of user errors would be invalid.
Biases
Bias occurs when the results are distorted. For example, expert evaluators per-
forming a heuristic evaluation may be much more sensitive to certain kinds of de-
sign flaws than others. Evaluators collecting observational data may consistently
fail to notice certain types of behavior because they do not deem them important.
356 Chapter 11 An evaluation framework . .
Put another way, they may selectively gather data that they think is important. In-
terviewers may unconsciously influence responses from interviewees by their tone
of voice, their facial expressions, or the way questions are phrased, so it is impor-
tant to be sensitive to the possibility of biases.
Scope
The scope of an evaluation study refers to how much its findings can be general-
ized. For example, some modeling techniques, like the keystroke model, have a
narrow, precise scope. The model predicts expert, error-free behavior so, for exam-
ple, the results cannot be used to describe novices learning to use the system.
Ecological validity
Ecological validity concerns how the environment in which an evaluation is con-
ducted influences or even distorts the results. For example, laboratory experiments
are strongly controlled and are quite different from workplace, home, or leisure en-
vironments. Laboratory experiments therefore have low ecological validity because
the results are unlikely to represent what happens in the real world. In contrast,
ethnographic studies do not impact the environment, so they have high ecological
validity.
Ecological validity is also affected when participants are aware of being stud-
ied. This is sometimes called the Hawthorne effect after a series of experiments at
the Western Electric Company's Hawthorne factory in the US in the 1920s and
1930s. The studies investigated changes in length of working day, heating, lighting,
etc., but eventually it was discovered that the workers were reacting positively to
being given special treatment rather than just to the experimental conditions.
Assignment
Find a journal or conference publication that describes an interesting evaluation study or se-
I
lect one using www.hcibib.org. Then use the DECIDE framework to determine which para-
digms and techniques were used. Also consider how well it fared on ethical and practical issues.
(a) Which evaluation paradigms and techniques are used?
(b) Is triangulation used? How? '
(c) Comment on the reliability, validity, ecological validity, biases and scope of the
techniques described.
(d) Is there evidence of one or more pilot studies?
(e) What are the strengths and weakness of the study report? Write a 50-100 word cri-
tique that would help the author(s) improve their report.
Summary
This chapter has introduced four core evaluation paradigms and five categories of tech-
niques and has shown how they relate to each other. The DECIDE framework identifies the
main issues that need to be considered when planning an evaluation. It also introduces many
of the basic concepts that will be revisited and built upon in the next three chapters: Chapter
12, which discusses observation techniques; Chapter 13, which examines techniques for gath-
ering users' and experts' opinions; and Chapter 14, which discusses user testing and tech-
niques for modeling users' task performance.
Key points
A n evaluation paradigm is an approach in which the methods used are influenced by par-
ticular theories and philosophies. Four evaluation paradigms were identified:
1. "quick and dirty"
2. usability testing
3. field studies
4. predictive evaluation
Methods are combinations of techniques used to answer a question but in this book we
often use the terms "methods" and "techniques" interchangeably. Five categories
were identified:
I. observing users
2. asking users
3. asking experts
4. user testing
5. modeling users' task performance
The DECIDE framework has six parts:
1. Determine the overall goals of the evaluation.
2. Explore the questions that need to be answered to satisfy the goals.
3. choose the evaluation paradigm and techniques to answer the questions.
4. Identify the practical issues that need to be considered.
5. Decide on the ethical issues and how to ensure high ethical standards.
6. Evaluate, interpret, and present the data.
Drawing up a schedule for your evaluation study and doing one or several pilot studies
will help to ensure that the study is well designed and likely to be successful.
358 Chapter 11 An evaluation framework
Further reading
DENZIN, N. K. AND LINCOLN, Y. S. (1994) Handbook of ROBSON,C. (1993) Real World Research. Oxford, UK:
Qualitative Research. London: Sage. This book is a collec- Blackwell. This book offers a practical introduction to ap-
tion of chapters by experts in qualitative research. It is an plied research and evaluation. It is very readable.
excellent reference source. WHITESIDE, J., BENNETT, J., AND HOLTZBLA~, K.(1998) US-
DIX, A., FINLAY,J., ABOWD,G. AND BEALE,R. (1998) ability engineering: our experience and evolution. In M. He-
Human-Computer Interaction (2d ed.). London: Prentice lander (ed.), Handbook of Human-Computer Interaction.
Hall Europe. This book provides a useful introduction to Amsterdam: North Holland. This chapter reviews the
evaluation. strengths and weakness of usability engineering and explains
SHNEIDERMAN, B. (1998) Designing the User Interface: why ethnographic techniques can provide a useful alterna-
Strategies for Effective Human-Computer Interaction (3rd tive in some circumstances,791-817.
ed.). Reading, MA: Addison-Wesley. This text provides an
alternative way of categorizing evaluation techniques and
offers a good overview.
Observing users
12.1 Introduction
12.2 Goals, questions, and paradigms
1 2.2.1 What and when to observe
1 2.2.2 Approaches to observation
12.3 How to observe
12.3.1 In controlled environments
12.3.2 In the field
12.3.3 Participant observation and ethnography
12.4 Data collection
12.4.1 Notes plus still camera
12.4.2 Audio recording plus still camera
12.4.3 Video
1 2.5 Indirect Observation: tracking user's activities
12.5.1 Diaries
12.5.2 Interaction logging
1 2.6 Analyzing, interpreting, and presenting data
12.6.1 Qualitative analysis to tell a story
1 2.6.2 Qualitative analysis for categorization
12.6.3 Quantitative data analysis
12.6.4 Feeding the findings back into design
Introduction
Observation involves watching and listening to users. Observing users interacting
with software, even casual observing, can tell you an enormous amount about what
they do, the context in which they do it, how well technology supports them, and
what other support is needed. In Chapter 9 we discussed the role of observation and
ethnography in informing design, particularly early in the process. In this chapter
we describe how to observe and do ethnography and discuss their role in evaluation.
Users can be observed in controlled laboratory-like conditions, as in usability
testing, or in the natural environments in which the products are used-i.e., the
field. How the observation is done depends on why it is being done and the ap-
proach adopted. There is a variety of structured, less structured, and descriptive
360 Chapter 12 Observing users
observation techniques for evaluators to choose from. Which they select and how
their findings are interpreted will depend upon the evaluation goals, the specific
questions being addressed, and practical constraints. This chapter focuses on how
to select appropriate observation techniques, how to do observation, and how to
analyze the data and present findings from it. We also discuss the benefits and prac-
ticalities associated with each technique. An interview with interaction design con-
sultant Sara Bly at the end of the chapter discusses how she uses observation in her
work.
The main aims of this chapter are to:
Discuss the benefits and challenges of different types of observation.
Describe how to observe as an on-looker, a participant, and an ethnographer.
I
Discuss how to collect, analyze and present data from observational evaluation. I
I
Examine key issues for doing think-aloud evaluation, diary studies and inter-
action logging.
Give you experience in selecting and doing observational evaluation.
In general, observing and talking to users usually go together, but we leave the de-
tails of interview techniques until Chapter 13.
(a) Find a small group of people who are using any kind of technology (e.g., computers,
household or entertainment appliances, etc.) and try to answer the question, "What
are these people doing?" Watch for three to five minutes and write down what you
observe. When you have finished, note how you felt doing this.
(b) If you were to repeat the exercise what would you look for when you next observe
the group? How would you refine your goals?
Comment (a) What was the group doing? Were they talking, working, playing or something else?
How were you able to decide? Did you feel awkward or embarrassed watching? Did
you wonder whether you should tell them that you were observing them? What prob-
lems did you encounter doing this exercise? Was it hard to watch everything and re-
12.2 Goals, questions, and paradigms 361
member what happened? What were the most important things? Did you wonder if
you should be trying to identify and remember just those things? Was remembering
the order of events tricky? Perhaps you naturally picked up a pen and paper and took
notes. If so, was it difficult to record fast enough? How do you think the people being
watched felt? Did they know they were being watched? Did knowing affect the way
they behaved? Perhaps some of them objected and walked away. If you didn't tell
them, do you think you should have?
(b) Your questions should be more focused. For example, you might ask, what are the
people specifically trying to do and how is the technology being used? Is everyone in
the group using the technology? Is it supporting or hindering the users' goals?
Having a goal, even a very general goal, helps to guide the observation because
there is always so much going on.
To understand this notion of an outsider-insider spectrum better, read the scenarios below
and answer the questions that follow.
Scenario 1. A usability consultant joins a group who have been given WAP phones to test
on a visit to Washington, DC. Not knowing the restaurants in the area, they use the WAP
phone to find a list of restaurants within a five-mile radius of their hotel. Several are listed
and while the group waits for a taxi, they find the telephone numbers of a couple, call them
to ask about their menus, select one, make a booking, and head off to the restaurant. The us-
ability consultant observes some problems keying instructions because the buttons seem
small. She also notices that the screen seems rather small, but the person using it is able to
get the information needed and call the restaurant, etc. Discussion with the group supports
the evaluator's impression that there are problems with the interface, but on balance the de-
vice is useful and the group is pleased to get a table at a good restaurant nearby.
Scenario 2. A usability consultant observes how participants perform a pre-planned task
using the WAP phone in a usability laboratory. The task requires the participants to find the
telephone number of a restaurant called Matisse. It takes them several minutes to do this
362 Chapter 12 Observing users
and they appear to.have problems. The video recording and interaction log suggest that the
screen is too small for the amount of information they need to access and this is supported
by participants' answers on a user satisfaction questionnaire.
(a) In which situation does the observer take the most control?
(b) What are the advantages and disadvantages of these two types of observation?
(c) When might each type of observation be useful?
Comment (a) The observer takes most control in the second study. The task is predetermined,
the participant is instructed what to do, and she is located in a controlled laboratory
environment.
(b) The advantages of the field study are that the observer got to see how the device
could be used in a real situation to solve a real problem. She experienced the delight
expressed with the overall concept and the frustration with the interface. By watching
how the group used the device "on the move," she gained an understanding of what
they liked and needed. The disadvantage is that the observer was an "insider" in the
group, so how objective could she be? The data is qualitative and while anecdotes
can be very persuasive, how useful are they in evaluation? Maybe she was having
such a good time that her judgment was clouded and she missed hearing negative
comments and didn't notice some people's annoyance. Another study could be done
to find out more, but it is not possible to replicate the exact situation, whereas the
laboratory study is easier to replicate.
The advantages of the laboratory are that several users performed the same task,
so different users' performance could be compared and averages calculated. The ob-
server could also be more objective because she was more of an outsider. The disad-
vantage is that the study is artificial and says nothing about how the device would be
used in the real environment.
(c) Both types of studies have merits. Which is better depends on the goals of the
study. The laboratory study is useful for examining details of the interaction style
to make sure that usability problems with the interface and button design are diag-
nosed and corrected. The field study reveals how the phone is used in a real world
context and how it integrates with or changes users' behavior. Without this study,
it is possible that developers might not have discovered the enthusiasm for the
phone because the reward for doing laboratory tasks is not as compelling as a
good meal!
of the time spent by boys and girls using technology in the classroom, an observer
may go into the classroom to note when technology is used by boys and when by
girls. She could do this by standing at the back of the room with a data sheet on
which she notes the gender of the children who use the computer and how long
they spend using it. In contrast, if the goal is to understand how the computer inte-
grates with other artifacts and social interactions in the classroom, a more holistic
approach would be better. In this situation the evaluator might take more of an in-
sider perspective in which she talks to participants as well as observes. The ob-
server mixes and integrates with participants more, but there is no illusion that she
is anything other than an observer.
Inside observers may be participant observers or ethnographers. In participant
observation evaluators participate with users in order to learn what they do and
how and why they do it. A fully participant observer observes from the inside as a
member of the group, which means she must not only be present to share experi-
ences, but also learn the social conventions of the group, including beliefs and pro-
tocols, dress codes, communication conventions, use of language, and non-verbal
communication. "Participant observation combines participation in the lives of the
people under study with maintenance of a professional distance that allows ade-
quate observation and recording of data" (Fetterman, 1998, p. 34-35).
Ethnographers can be thought of as participant observers or not, depending on
your point of view. Ethnographers themselves debate this issue. Some see partici-
pant observation as virtually synonymous with ethnography (Atkinson and Ham-
mersley, 1994). Others view participant observation as a technique that is used in
ethnography along with informants from the community, interviews with commu-
nity members, and the study of community artifacts (Fetterman, 1998). Ethno-
graphic evaluation is derived from ethnography. Ethnographic studies typically
take weeks, months, or even longer to gain an "inside" understanding of what is
going on in a community. Much shorter studies are usual in interaction design be-
cause of the time constraints imposed by development schedules.
As in any evaluation study, goals and questions determine whether the obser-
vation will be "quick and dirty," in a controlled environment or in the field, and the
extent to which the observers are outsiders or insiders. Determining goals, explor-
ing questions, and choosing techniques are necessary steps in the DECIDE frame-
work. Practical and ethical issues also have to be identified and decisions made
about how to handle them.
In controlled environments
The role of the observer is to first collect and then make sense of the stream of
data on video, audiotapes, or notes made while watching users in a controlled envi-
ronment. Many practical issues have to be thought about in advance, including the
following.
It is necessary to decide where users will be located so that the equipment
can be set up. Many usability laboratories, for example, have two or three
wall-mounted, adjustable cameras to record users' activities while they work
on test tasks. One camera might record facial expressions, another might
focus on mouse and keyboard activity, and another might record a broad
view of the participant and capture body language. The stream of data from
the cameras is fed into a video editing and analysis suite where it is anno-
tated and partially edited. Another form of data that can be collected is an
interaction log. This records all the user's key presses. Mobile usability labo-
ratories, as the name suggests, are intended to be moved around, but the
equipment can be bulky. Usually it is taken to a customer's site where a tem-
porary laboratory environment is created.
The equipment needs testing to make sure that it is set up and works as ex-
pected, e.g., it is advisable that the audio is set at the right level to record the
user's voice.
An informed consent form should be available for users to read and sign at
the beginning of the study. A script is also needed to guide how users are
greeted, and to tell them the goals of the study, how long it will last, and to
explain their rights. It is also important to make users feel comfortable and
at ease.
Whether in a real or make-do laboratory one of the problems with this type of ob-
servation is that the observer doesn't know what users are thinking, and can only
guess from what she sees.
Think-aloud technique Imagine observing someone who has been asked to evalu-
ate the interface of the web search engine Northernlight. The user, who has used the
web only once before, is told to find a list of the books written by the well-known bi-
ologist Stephen Jay Gould. He is told to type http://www.northernlight.com and then
proceed however he thinks best. He types the URL and gets a screen similar to the
one in Figure 12.1.
Next he goes to the search box but types Stephen Jay Gouild without realizing
that he has made a typing error and added an 'i'. He presses return and gets a
screen similar to the one in Figure 12.2.
He is silent. What is going on, you wonder? What is he thinking? One way
around this problem is to collect a think-aloud protocol, using a technique developed
by Erikson and Simon for examining people's problem-solving strategies (Erikson
and Simon, 1985). The technique requires people to say out loud everything that they
are thinking and trying to do, so that their thought processes are externalized.
366 Chapter 12 Observing users
So, let's imagine an action replay of the situation just described, but this time
the user has been instructed to think aloud:
I'm typing in http://www.northernlight.com as you told me. (types)
Now Ipress the enter key, right? (presses enter key)
(pause and silence)
It's taking a few moments to respond.
Oh! Here it is. (Figure 12.1 appears)
Gosh, there's a lot of stuff on this screen, hmmm, I wonder what I do next. (pauses and
looks at the screen) Probably a simple search. What's apower search and there's all
these others too?
I just want to$nd Stephen Jay Gould, right, and then it's bound to have a list of his
books? (pause) Well, it looks like I should type his name in this box here. (moves cursor
towards the search box. Positions cursor. Types 'Stephen Jay Gouild'. Pauses, but does
not notice that he has incorrectly included an "i" in Gould, then clicks the search
button.) Well, something seems to be happening. . . (Watches) something is happening.
Ah! What's this. . . (Looks at screen and Figure 12.2 appears)
Silence. . .
Now you know more about what the user is trying to achieve but he is silent again.
You can see that he has spelled Gould incorrectly and that he doesn't realize that
he has typed Gouild. What you don't know is what he is thinking now or what is he
12.3 How to observe 367
lsephen iqm
a Etccumentsthatbest match your search
1
.
71% Directories C L k Mamage Book 4 Marnage Book F w r of ltawamba
County, Mississippi was abstracted by Eioyie Grissom from the original records
and typesel for web publication by. . llZEi12M
P a m n a l pege: http:/ / vwwv.nmrk-one.com/ -ithissod marr4.html
2.
Union Database. WAME
FNAME OLOSEC SEC GRAVE GRAVRA STATE W K ARM COMPANY
REGIMEM DDATE DATE OPB WAR UNKNOWNCOMMENT REF JOSEPH...
1213111969
Educational mite: http:/ / wcwc.lsu.edu/ c d projectd dbasast
chalm.la union.htm
Figure 12.2 The screen that appears in response to searching for Stephen Jay Gouild.
looking at. Has he noticed his typing error or the Barnes and Noble box at the top
left that says "Stephen Jay"?
Comment You probably felt self-conscious and awkward doing this. Some people say they feel really
embarrassed. At times you may also have started to forget to speak out loud because it feels
like talking to yourself, which most of us don't do. YOUmay also have found it difficult to
think aloud when the task got difficult. In fact, you probably stopped speaking when the task
became demanding, and that is exactly the time when an evaluator is most eager to hear
your comments.
The occurrence of these silences is one of the biggest problems with the think-
aloud technique.
If a user is silent during a think-aloud protocol, the evaluator could interrupt
.and remind him to think out loud, but that would be intrusive. Another solution is
368 Chapter 12 Observing users
to have two people work together so that they talk to each other. Working with an-
other person is often more natural and revealing because they talk in order to help
each other along. This technique has been found particularly successful with chil-
dren. It is also very effective when evaluating systems intended to be used synchro-
nously by groups of users, e.g., shared whiteboards.
(a) Look at Goetz's and LeCompte's framework. Apart from there being more items
than in the first framework, what is the other main difference?
(b) Now compare this framework with Robson's. What does Robson's attend to that is
not obvious in Goetz's and LeCompte's framework?
(c) Which of the three frameworks do you think would be easiest to remember and why?
I
Comment (a) The Goetz and LeCompte framework pays much more attention to the context of
the observation.
(b) There is considerable overlap between the two frameworks despite differences in
wording. The main difference is that Robson's framework pays attention to the mood
of the group.
(c) The three-item framework is likely to be easy, but so is the Goetz and LeCompte
framework because it adopts the much used organizing principle "who, what, when,
where, why, how." Robson's framework has two extra items and no obvious way of
remembering them. However, having said that, to me it is more explicit. Which is
used for a particular study depends on the study goals and how much detail is I
needed, and to a degree, it is also a matter of personal preference.
These frameworks are useful not only for providing focus but also for organiz-
ing the observation and data-collection activity. Below is a checklist of things to
plan before going into the field:
State the initial study goal and questions clearly.
Select a framework to guide your activity in the field.
Decide how to record events-i.e., as notes, on audio, or on video, or using a
combination of all three. Make sure you have the appropriate equipment
and that it works. You need a suitable notebook and pens. A laptop com-
puter might be useful but could be cumbersome. Although this is called ob-
servation, photographs, video, interview transcripts and the like will help to
explain what you see and are useful for reporting the story to others.
Be prepared to go through your notes and other records as soon as possible
after each evaluation session to flesh out detail and check ambiguities with
other observers or with the people being observed. This should be done rou-
tinely because human memory is unreliable. A basic rule is to do it within 24
hours, but sooner is better!
As you make and review your notes, try to highlight and separate personal
opinion from what happens. Also clearly note anything you want to go back
to. Data collection and analysis go hand in hand to a large extent in field-
work.
Be prepared to refocus your study as you analyze and reflect upon what
you see. Having observed for a while, you will start to identify interesting
370 Chapter 12 Observing users
phenomena that seem relevant. Gradually you will sharpen your ideas
into questions that guide further observation, either with the same group
or with a new but similar group.
Think about how you will gain the acceptance and trust of those you observe.
Adopting a similar style of dress and finding out what interests the group and
showing enthusiasm for what they do will help. Allow time to develop rela-
tionships. Fixing regular times and venues to meet is also helpful, so every-
one knows what to expect. Also, be aware that it will be easier to relate to
some people than others, and it will be tempting to pay attention to those
who receive you well, so make sure you attend to everyone in the group.
Think about how to handle sensitive issues, such as negotiating where you
can go. For example, imagine you are observing the usability of a portable
home communication device. Observing in the living room, study, and
kitchen is likely to be acceptable, but bedrooms and bathrooms are probably
out of bounds. Take time to check what participants are comfortable with
and be accommodating and flexible. Your choice of equipment for data col-
lection will also influence how intrusive you are in people's lives.
Consider working as a team. This can have several benefits; for instance, you
can ~gmpareyour observations. Alternatively, you can agree to focus on dif-
ferent people or different parts of the context. Working as a team is also
likely to generate more reliable data because you can compare notes among
different evaluators.
Consider checking your notes with an informant or members of the group to
ensure that you are understanding what is happening and that you are mak-
ing good interpretations.
plan to look at the situation from different perspectives. For example, you
may focus on particular activities or people. If the situation has a hierarchi-
cal structure, as in many companies, you will get different perspectives from
different layers of management-e.g., end-users, marketing, product devel-
opers, product managers, etc.
Drawing on your experience of using email, bulletin boards, UseNet News, or chat rooms,
how might participant observation online differ from face-to-face participant observation?
Comment In online participant observation you don't have to look people in the eye, deal with their
skepticism, or wonder what they think of you, as you do in face-to-face situations. What you
wear, how you look, or the tone of your voice don't matter. However, what you say or don't
say and how you say it are central to the way others will respond to you. Online you only see
part of people's context. You usually can't see how they behave off line, how they present
themselves, their body language, how they spend their day, their personalities, who is pre-
sent but not participating, etc.
The most important part of fieldwork is just being there to observe, ask
questions, and record what is seen and heard. You need to be aware of peo-
ple's feelings and sensitive to where you should not go.
Collect a variety of data, if possible, such as notes, still pictures, audio and
video, and artifacts as appropriate. Interviews are one of the most important
data-gathering techniques and can be structured, semi-structured, or open.
So-called retrospective interviews are used after the fact to check that inter-
pretations are correct.
As you work in the field, be prepared to move backwards and forwards be-
tween the broad picture and specific questions. Look at the situation holisti-
cally and then from the perspectives of different stakeholder groups and
participants. Early questions are likely to be broad, but as you get to know
the situation ask more specific questions.
Analyze the data using a holistic approach in which observations are under-
stood within the broad context-i.e., they are contextualized.To do this, first
synthesize your notes, which is best done at the end of each day, and then
check with someone from the community that you have described the situa-
tion accurately. Analysis is usually iterative, building on ideas with each
pass.
I
Look at the steps listed for doing ethnography and compare them with the earlier generic set
for field observation (see Section 12.3.2). What is the main difference?
Comment Both sets of steps involve structuring observations and refining goals and questions through
knowledge gained during the study. Both use similar data collection techniques and rely on
the trust and cooperation of those being observed. Ethnographers tend to be deeply irn-
mersed in the group, whereas not everyone doing field studies takes this approach. Some
ethnographers, such as David Fetterman, are guided by theory; others are strongly against
this and believe that ethnography should be approached open-mindedly.
During the last ten years ethnography has gained credibility in interaction de-
sign because if products are to be used in a wide variety of environments designers
must know the context and ecology of those environments (Nardi and O'Day,
1999). However, for those unfamiliar with ethnography and general field observa-
tion there are two dilemmas. The first dilemma is, "When have I observed
12.4 Data collection 373
enough?" The second dilemma is, "How can I adapt ethnography so that it better
fits the short development cycles and the mindset of the developers?"
What are the main differences between the stages that Rose et al. (1995) describe and the
steps suggested by Fetterman (1998)?
Comment The list in the "How Can I Adapt Ethnography" dilemma suggests that the evaluators are
not as immersed in the study as Fetterman's process suggests. One aim of the Rose proce-
dure is radically to reduce the time needed to do a study so that it is compatible with system
development. Another aim is to reduce the data to a quantifiable form so that it is familiar
and acceptable to the developers.
photos from a still camera. When different kinds of data are collected, evalua-
tors have to coordinate them; this requires additional effort but has the advan-
tage of providing more information and different perspectives. Interaction
logging and participant diary studies are also used, as we discuss later in Section
12.5. Which techniques are used will depend on the context, time available, and
the sensitivity of what is being observed. In most settings, audio, photos, and
notes will be sufficient. In others it is essential to collect video data so as to ob-
serve in detail the intricacies of what is going on.
12.4.3 Video
Video has the advantage of capturing both visual and audio data but can be intru-
sive. However, the small, handheld, battery-driven digicams are fairly mobile, inex-
pensive and are commonly used.
A problem with using video is that attention becomes focused on what is seen
through the lens. It is easy to miss other things going on outside of the camera view.
When recording in noisy conditions, e.g., in rooms with many computers running or
outside when it is windy, the sound may get muffled.
Analysis of video data can be very time-consuming as there is so much to take
note of. Over 100 hours of analysis time for one hour of video recording is common
for detailed analyses in which every gesture and utterance is analyzed. However, this
12.4 Data co:o(lection 375
level of detail is usually not needed because evaluators often focus on particular
episodes and use the whole recording only for contextual information and reference.
In Table 12.2 we summarize the key features, advantages and drawbacks of
these three combinations of data collection techniques.
Imagine you are a consultant who is employed to help develop a new computerized garden-
planning tool to be used by amateur and professional garden designers. Your goal is to find
out how garden designers use an early prototype as they walk around their clients' gardens
sketching design ideas, taking notes, and asking the clients about what they like and how
they and their families use the garden. What are the advantages and disadvantages of the
three types of data-collection techniques in this environment?
I
Comment Handwritten notes do not require specialist equipment. They are unobtrusive and very flexi-
ble but difficult to do while walking around a garden. If it starts to rain there is no equipment
to get wet, but taking notes is tiring, people lose concentration, biases creep in, and hand-
writing can be difficult to decipher. Video captures more information (e.g., the landscape,
where the designers are looking, sketches, comments, etc.) but it is more intrusive, you must
also carry equipment and film and what happens if it starts to rain? You also need access to
376 Chapter 12 Observing users
Table 12.2 Comparison of the three main data-collection techniques used in observation
-- -- -
Completenessof data Only get what note-taker Can obtain complete Most complete method
thinks is important and audio recording but of data collecting, especially
can record in the time visual data is missing. if more than one camera
available. Problem with Notes, photographs, used, but coordination of
inexperienced evaluators. sketches can video material is needed.
augment recording but
need coordinating with
the recording.
Disturbance to users Very low. Low but cassette must Can be very obtrusive. Care
be changed and needed to avoid Hawthorne
microphone positioned. effect.
Reliability of data May be low. Relies on High but external noise, Can be high but
humans making a good e.g. fans in computers depends on what camera
record and knowing can muffle what is said. is focused on.
what to record.
playback and editing facilities. Audio could be a good compromise, but integrating sketches
and other artifacts later can be a burden and garden planning is a highly visual, aesthetic ac-
tivity. You could also supplement notes and audio with a still camera.
I
I I
12.5.1 Diaries
I I
Diaries provide a record of what users did, when they did it, and what they thought
about their interactions with the technology. They are useful when users are scat-
tered and unreachable in person, as in many Internet and web evaluations. Diaries
are inexpensive, require no special equipment or expertise, and are suitable. for
long-term studies. Templates can also be created online to standardize entry for-
mat and enable the data to go straight into a database for analysis. These templates
are like those used in open-ended online questionnaires. However, diary studies
rely on participants being reliable and remembering to complete them, so incen-
tives are needed and the process has to be straightforward and quick. Another
problem is that participants often remember events as being better or worse than
they really were, or taking more or less time than they actually did.
Robinson and Godbey (1997) asked participants in their study to record how
much time Americans spent on various activities. These diaries were completed at
the end of each day and the data was later analyzed to investigate the impact of
television on people's lives. In another diary study, Barry Brown and his colleagues
from Hewlett Packard collected diaries form 22 people to examine when, how, and
why they capture different types of information, such as notes, marks on paper,
scenes, sounds, moving images, etc. (Brown, et al., 2000). The participants were
each given a small handheld camera and told to take a picture every time they cap-
tured information in any form. The study lasted for seven days and the pictures
were used as memory joggers in a subsequent semi-structured interview used to get
participants to elaborate on their activities. Three hundred and eighty-one activi-
ties were recorded. The pictures provided useful contextual information. From this
data the evaluators constructed a framework to inform the design of new digital
cameras and handheld scanners.
usually synchronized with video and audio logs to help evaluators analyze users'
I
behavior and understand how users worked on the tasks they set. Specialist soft-
ware tools are used to collect and analyze the data. The log is also time-stamped so
it can be used to calculate how long a user spends on a particular task or lingered in
a certain part of a website or software application.
Explicit counters that record visits to a website were once a familiar sight.
Recording the number of visitors to a site can be used to justify maintenance and
upgrades to it. For example, if you want to find out whether adding a bulletin
board to an e-commerce website increases the number of visits, being able to com-
pare traffic before and after the addition of the bulletin board is useful. You can
also track how long people stayed at the site, which areas they visited, where they
came from, and where they went next by tracking their Internet Service Provider
(I.S.P.) address. For example, in a study of an interactive art museum by re-
searchers at the University of Southern California, server logs were analyzed by
tracking visitors in this way (McLaughIin et al., 1999). Records of when people
came to the site, what they requested, how long they looked at each page, what
browser they were using, and what country they were from, etc., were collected I
over a seven-month period. The data was analyzed using Webtrends, a commer-
cial analysis tool, and the evaluators discovered that the site was busiest on week-
day evenings. In another study that investigated lurking behavior in listserver I
discussion groups, the number of messages posted was compared with list mem-
I
bership over a three-month period to see how lurking behavior differed among
groups (Nonnecke and Preece, 2000).
An advantage of logging user activity is that it is unobtrusive, but this also
raises ethical concerns that need careful consideration (see the dilemma about ob-
serving without being seen). Another advantage is that large volumes of data can
be logged automatically. However, powerful tools are needed to explore and ana-
lyze this data quantitatively and qualitatively. An increasing number of visualiza-
tion tools are being developed for this purpose; one example is WebLog, which
dynamically shows visits to websites, as illustrated in Figure 12.3 (Hochheiser and
Shneiderman, 2000).
12.6 Analyzing, interpreting, and presenting the data 379
Figure 12.3 A display from WebLog, time vs. URL (Hochheiser and Shneiderman, 2001).
The requested URL is on the y-axis, with the date and time on the x-axis. The dark lines on
the x-axis correspond to weekends. Each circle represents a request for a single page, and
the size of the circle indicates the number of bytes delivered for a given request. (Color,
which is not shown here, indicates the Http status response.)
Review the data after each observation session to synthesize and identify
key themes and make collections.
Record the themes in a coherent yet flexible form, with examples. While
post-its enable you to move ideas around and group similar ones, they can
fall off and get lost and are not easily transported, so capture the main points
in another form, either on paper or on a laptop, or make an audio recording.
Record the date and time of each data analysis session. (The raw data should
already be systematically logged with dates.)
As themes emerge, you may want to check your understanding with the peo-
ple you observe or your informants.
Iterate this process until you are sure that your story faithfully represents
what you observed and that you have illustrated it with appropriate exam-
ples from the data.
Report your findings to the development team, preferably in an oral presen-
tation as well as in a written report. Reports vary in form, but it is always
helpful to have a clear, concise overview of the main findings presented at
the beginning.
graphic data are similar to those just mentioned but notice the emphasis on detail
(Fetterman, 1998):
Look for key events within a group that speak about what drives the group's
activity.
Look for patterns of behavior in various situations and among different play-
ers. With experience, ethnographers build up sets of knowledge from various
sources, asking questions, listening, probing, comparing and contrasting, syn-
thesizing, and evaluating information.
Compare sources of data against each other to provide consistent explana-
tions.
Finally, report your findings in a convincing and honest way. Writing is part
of the analysis since it helps to crystallize ideas.
Software tools, such as NUDIST and Ethnograph, allow ethnographers to code
their notes and artifact descriptions so that they can be sorted, searched, and re-
trieved. For example, using NUDIST, field notes can be searched for key words or
phrases and a report printed listing every occasion the word or phrase is used. The
information can also be printed out as a tree showing the relationship of occur-
rences. Similarly, NUDIST can be used to search a body of text to identify specific
predetermined categories or words for content analysis. The more copious the
notes, the more useful tools like NUDIST are. Furthermore, many exploratory
searches can be done to test hypotheses among different categories of data.
Other computerized tools support basic statistical analysis. For example, some
data can be analyzed using statistical tests (such as chi-square contingency table
analysis or rank correlation) to determine whether particular trends are significant.
Comment Depending on how the logs have been annotated, using the Observer Video-Pro product,
you can search the data for various things including the following:
Video time-A specific time, e.g., 02:24:36.04 (hh:mm: ss.dd).
Marker-A previously entered free-format annotation.
Event-A combination of actor, behavior, and modifiers, with optional wildcards (e.g.,
the first occurrence of "glazed look" or "Sarah approaches Janice").
Text-Any word or alphanumeric text string occurring in the coded event records or free-
format notes.
Analyzing discourse
Another approach to video, and audio analysis is to focus on the dialog, i.e., the
meaning of what is said, rather than the content. Discourse analysis is strongly in-
terpretive, pays great attention to context, and views language not only as reflect-
ing psychological and social aspects but also as constructing it (Coyle, 1995). An
384 Chapter 12 Observing users
Assignment
The aim of this assignment is for you to learn to do field obsewation. To do the assignment
you will need to find a group of people or a single individual engaged in using one of the fol-
lowing: a mobile phone, a VCR, a photocopying machine, computer software, or some other
type of technology that interests you. Assume that you have been employed to improve the
product, either by doing a redesign or by creating a completely new product. You can observe
people in your family, your friends, or people in your class or local community group.
For this assignment you should:
(a) Consider what the basic goal of "improving the product" means. What initial ques-
tions might you ask?
(b) Watch the group (or person) casually to get an understanding of issues that might
create challenges for you doing this assignment and information that might enable
you to refine your questions.
(c) Then plan your study:
(i) Think again about what questions will help direct your observation. What are
you evaluating?
(ii) Decide where on the outsider-insider spectrum of observers you wish to be.
(iii) Prepare an informed consent form and any scripts that you need to introduce
yourself and your study.
(iv) Decide how you will collect data and prepare any data-collection sheets
needed; acquire and test any equipment needed.
(v) Decide how you will analyze the data that you collect.
(vi) Think through the DECIDE framework. Is everything covered?
(vii) If so, do a pilot study to check your preparation.
(d) Carry out your study but limit its scope. For example, plan two half-hour observa-
tion periods.
(e) Now analyze your data using the method chosen above.
(f) Write a report about what you did and why; describe your data, how you analyzed
it, and your findings.
(g) Suggest some ways in which the product might be improved.
Summary
Observing users in the field enables designers to see how technology is used in context. It is
valuable for confirming designers' understanding of users' needs and for exploring new de-
sign ideas. Various amounts of control, intervention, and involvement with users are possible.
386 Chapter 12 Observing users
At one end of the spectrum, laboratory studies offer a strongly controlled environment with
little evaluator involvement; at the other, participant observation and ethnography require
deeper involvement with users and understanding of context. Diaries and data-logging tech-
niques provide a way of tracking user activity without intruding.
Key points
Observation in usability testing tends to be objective, from the outside. The observer
watches and analyzes what happens.
In contrast, in participant observation the evaluator works with users to understand their
activities, beliefs and feelings within the context in which the technology is used.
Ethnography uses a set of techniques that include participant observation and interviews.
Ethnographers immerse themselves in the culture that they study.
The way that observational data is collected and analyzed depends on the paradigm in
which it is used: quick and dirty, user testing, or field studies.
Combinations of video, audio and paper records, data logging, and diaries can be used to
collect observation data.
In participant observation, collections of comments, incidents, and artifacts are made
during the observation period. Evaluators are advised to discuss and summarize their
findings as soon after the observation session as possible.
Analyzing video and data logs can be difficult because of the sheer volume of data. It is
important to have clearly specified questions to guide the process and also access to ap-
propriate tools.
Evaluators often flag events in real time and return to examine them in more detail
later. Identifying key events is an effective approach. Fine-grained analyses can be very
time-consuming.
Fuither reading
BLY, S. (1997) Field work: Is it product work? Interactions, lowed by semi-structured interviews, to inform the design of
January and February, 25-30. This article provides addi- handheld storage devices.
tional information to supplement the interview with Sara FETTERMAN, D. M. (1998). Ethnography: Step by Step (2nd
Bly. It gives a broad perspective on the role of participant ed.). (Vol. 17). Thousand Oaks, CA: SAGE. This book pro-
observation in product development. vides an introduction to the theory and practice of ethnogra-
BOGDEWIC,
S. P. (1992) Participant observation. In B. F. phy and is an excellent guide for beginners. In addition, it
Crabtree and W. L. Miller (eds.), Doing Qualitative Re- has a useful section on computerized tools for ethnography.
search. Newbury Park, CA: Sage, 45-69. This chapter pro- ROBSON, C. (1993). Real World Research. Oxford, U K :
vides an introduction to participant observation. Blackwell. Chapter 8 discusses a range of observation
BROWN, B. A., SELLEN,
A. J., AND O'HARA,K. P. (2000). A methods. There is a section on doing participant observa-
diary study of information capture in working life. In the Pro- tion and also on observing from the outside using coding
ceedings of CHI2000, The Hague, Holland, 438-445. This schemes.
paper discusses how cameras were used in a diary study, fol-
Interview 387
ment of the domain and/or technology and the deter- JP: Is it difficult to get development teams and man-
mination of the questions to address in the evalua- agers to listen to you? How do you feed your findings
tion. Second is the data collection, analysis, and back?
representation, and third, the communication of the SB: As often as possible, development teams are in-
findings with the development team. I try to start with volved in the process along the way. They participate
a clear understanding of what I need to focus on in in setting the initial goals of the evaluation, occasion-
the field. However, I also try hard not to start with as- ally in observation sessions, and as recipients of a
sumptions about what will be true. So, 1 start with a final report. My goal with any project is to ensure that
well-defined focus but not a hypothesis. In the field the final report is not a handoff but rather an interac-
(or even in the lab), I primarily use interviews and ob- tion that offers a chance to work together on what
servations with some self-reporting that often takes we've found.
the form of diaries, etc. The data typically consists of
my notes, the audio and/or videotapes from inter-
JP: What are the main challenges you face?
views and observation time, still pictures, and as
many artifacts as I can appropriately gather (e.g., a SB: It's always difficult to conduct a field study with
work document covered with post-its, a page from an as much time and participation as would be ideal.
old calendar). I also prefer to work with at least one Most product cycles are short and the evaluation is
other colleague so that there is a minimum of two just one of many necessary steps. So it's always a chal-
perspectives on the events and data. lenge to do an evaluation that is timely, useful, and
yet based on solid methodology.
JP: It sounds like keeping track of all this data could A gnawing question for me is how to evaluate a
be a problem. How do you organize and analyze it? system in the context of the customer's own envi-
ronment and experience when the system is not
SB: Obviously it's critical not to end with the data
fully developed and ready to deploy? If we can't
collection. Whenever possible, I do immediate de-
bring a product to the field, can we bring the field
briefs after each session in the field with my col-
to the product? For example, a client recently had
league, noting individually and collectively whatever
a prototype interface for a system that was intended
jumped out at us. Subsequently, I use the interview
to provide a new approach to person-to-person
notes (from everyone involved) and the tapes and ar-
calls. But using the interface made sense only in
tifacts to construct as much of a picture of what hap-
the context of actual real-world interactions. So,
pened as possible, without putting any judgment on it.
while we certainly could do a standard usability
For example, in a recent study six of us were involved
study of the interface, this approach wouldn't get at
in interviews and observations. We worked in pairs
the questions of how well the product would fit into
and tried to vary the pairings as often as possible.
an actual work situation.
Thus. we had lots of conversations about the data and
the situations before we ever came together. First, we
wrote up the notes from each session (something I try JP: Finally, what about the future? Any comments?
to do as soon as possible). Next we got together and SB: I think the explosion of computing technology is
began looking across the data. That is, we created both exciting and overwhelming. We now have so
representations of important events (tables, maps, much new information constantly available and so
charts) together. Because we collectively had ob- many new devices to master that it's hard to keep up.
served all the events and because we could draw upon Evaluation is going to become ever more critical and
our notes, we could feed the data from each observa- complex and we should use all the techniques at our
tion into each finding. Oftentimes, we create collec- disposal as appropriate. I think an increasingly impor-
tions, looking for common behaviors or events across tant aspect of new interfaces will be not only how well
multiple sessions. A collection will highlight activities they support performance, satisfaction, and experi-
that are crucial to the design of the system being eval- ence, but the way in which a user is able to grasp a
uated. Whatever techniques we use, we always come conceptual model that is compatible with, but does
back to the data as a reality and validity check. not overwhelm their ongoing practice.
Chapter 13
13.1 Introduction
In the last chapter we looked at observing users. Another way of finding out what
users do, what they want to do, like, or don't like is to ask them. Interviews and
questionnaires are well-established techniques in social science research, market
research, and human-computer interaction. They are used in "quick and dirty"
evaluation, in usability testing, and in field studies to ask about facts, behavior, be-
liefs, and attitudes. Interviews and questionnaires can be structured (as in the
Hutchworld case study in Chapter lo), or flexible and more like a discussion, as in
field studies. Often interviews and observation go together in field studies, but in
this chapter we focus specifically on interviewing techniques.
390 Chapter 13 Asking users and experts
The first part of this chapter discusses interviews and questionnaires. As with
observation, these techniques can be used in the requirements activity (as we de-
scribed in Chapter 7), but in this chapter we focus on their use in evaluation. An-
other way of finding out how well a system is designed is by asking experts for their
opinions. In the second part of the chapter, we look at the techniques of heuristic
evaluation and cognitive walkthrough. These methods involve predicting how usable
interfaces are (or are not). As in the previous chapter, we draw on the DECIDE
framework from Chapter 11 to help structure studies that use these techniques.
The main aims of this chapter are to:
Discuss when it is appropriate to use different types of interviews and
questionnaires.
Teach you the basics of questionnaire design.
Describe how to do interviews, heuristic evaluation, and walkthroughs.
Describe how to collect, analyze, and present data collected by the tech-
niques mentioned above.
Enable you to discuss the strengths and limitations of the techniques and se-
lect appropriate ones for your own use.
Asking colleagues to review the questions and running a pilot study will help to
identify problems in advance and gain practice in interviewing.
When planning an interview, think about interviewees who may be reticent
to answer questions or who are in a hurry. They are doing you a favor, so try to
make it as pleasant for them as possible and try to make the interviewee feel
comfortable. Including the following steps will help you to achieve this (Robson,
1993):
The golden rule is to be professional. Here is some further advice about conducting
interviews (Robson, 1993):
Ananova is a virtual news reporter created by the British Press Association on the website
www.ananova.com, which is similar to the picture in Figure 13.1. Viewers who wish to hear
Ananova report the news must select from the menu beneath her picture and must have
downloaded software that enables them to receive streaming video. Those who wish to read
text may do so.
The idea is that Ananova is a life-like, i.e., an 'anthropomorphic' news presenter. She is
designed to speak, move her lips, and blink, and she has some human facial expressions. She
reads news edited from news reports. Ananova's face, her voice tone, her hair, in fact every-
thing about her was tested with users before the site was launched so that she would appeal
to as many users as possible. She is fashionable and looks as though she is in her twenties or
13.2 Asking users: interviews 393
@
mo*
A
-
Home News Enteitainment Sport Budnaol: Weather VldeoRepor(r
Going Out TV Gulde Sits Directory Ale* Web Search About Ananon,
peopleHhouseus
About Ananova
What's happenmg
In the newsroom
Get tnvokd
Why we're here
How to
Ananow on WAP
Jobs at Ananova
About the company
Contan us
New0
Entetiainment
Sport
Businem
Feedback
Wanted: PA to I
If you enjoy organlsfr
rn~ghrbe just the pet
asststant to our Man
early thirties-presumably the age that market researchers determined fits the profile of the
majority of users-and she is also designed to appeal to older people too.
To see Ananova in action, go to the website (www.annanova.com) and follow the direc-
tions for downloading the software. Alternatively you can do the activity by just looking at
the figure and thinking about the questions.
(a) Suggest unstructured interview questions that seek opinions about whether Ananova
improves the quality of the news service.
(b) Suggest ways of collecting the interview data.
(c) Identify practical and ethical issues that need to be considered.
Comment (a) Possible questions include: D o you think Ananova reading the news is good? Is it
better than having to read it yourself from a news bulletin? In what ways does having
Ananova read the news influence your satisfaction with the service?
(b) Taking notes might be cumbersome and distracting to the interviewee, and it would
be easy to miss important points. An alternative is to audio record the session. Video
recording is not needed as it isn't necessary to see the interviewee. However, it would
be useful to have a camera at hand to take shots of the interface in case the intervie-
wee wanted to refer to aspects of Ananova.
(c) The obvious practical issues are obtaining a cassette recorder, finding participants,
scheduling times for the interviews and finding a quiet place to conduct them. Having
394 Chapter 13 Asking users and experts
a computer available for the interviewee to refer to is important. The ethical issues
include telling the interviewees why you are doing the interviews and what you will
do with the information, and guaranteeing them anonymity. An informed consent
form may be needed.
Semi-structured interviews
Semi-structured interviews combine features of structured and unstructured inter-
views and use both closed and open questions. For consistency the interviewer has
a basic script for guidance, so that the same topics are covered with each intervie-
wee. The interviewer starts with preplanned questions and then probes the inter-
viewee to say more until no new relevant information is forthcoming. For example:
Which websites do you visit most frequently? <Answer> Why? <Answer mentions
several but stresses that she prefers hottestmusic.com> And why do you like it?
<Answer> Tell me more about x? <silence, followed by an answer> Anything else?
<Answer> Thanks. Are there any other reasons that you haven't mentioned?
It is important not to preempt an answer by phrasing a question to suggest that a
particular answer is expected. For example, "You seemed to like this use of color . . ."
assumes that this is the case and will probably encourage the interviewee to answer
that this is true so as not to offend the interviewer. Children are particularly prone to
behave in this way. The body language of the interviewer, for example, whether she is
smiling, scowling, looking disapproving,etc., can have a strong influence.
Also the interviewer needs to accommodate silences and not to move on too
quickly. Give the person time to speak. Probes are a device for getting more infor-
mation, especially neutral probes such as, "Do you want to tell me anything else?"
You may also prompt the person to help her along. For example, if the interviewee
is talking about a computer interface but has forgotten the name of a key menu
item, you might want to remind her so that the interview can proceed productively.
However, semi-structured interviews are intended to be broadly replicable, so prob-
ing and prompting should aim to help the interview along without introducing bias.
rite a semi-structured interview script to evaluate whether receiving news from Ananova
appealing and whether Ananova's presentation is realistic. Show two of your peers the
13.2 Asking users: interviews 395
Ananova.com website or Figure 13.1. Then ask them to comment on your interview script.
Refine the questions based on their comments.
Comment You can use questions that have a predetermined set of answer choices. These work well for
fast interviews when the range of answers is known, as in the airport studies where people
tend to be in a rush. Alternatively, open-ended questions can also be used if you want to ex-
plore the range of opinions.
Some questions that you might ask include:
Have you seen Ananova before?
Would you like to receive news from Ananova?
Why?
In your opinion, does Ananova look like a real person?
As you can probably guess, there are problems deciding on the range of possible
answers. Maybe you thought of other ones. In order to get a good range of answers
for the second question, a large number of people would have to be interviewed
before the questionnaire is constructed to identify all the possible answers and then
those could be used to determine what should be offered.
Write three or four semi-structured interview questions to find out if Ananova is popular
with your friends. Make the questions general.
I
Prepare the full interview script to evaluate Ananova, including a description of why you are
doing the interview, and an informed consent form, and the exact questions. Use the DE-
CIDE framework for guidance. Practice the interview on your own, audiotape yourself, and
then listen to it and review your performance. Then interview two peers and be reflective.
What did you learn from the experience?
Comment You probably found it harder than you thought to interview smoothly and consistently. Did
you notice an improvement when you did the second interview? Were some of the questions
poorly worded. Piloting your interview often reveals poor or ambiguous questions that you
then have a chance to refine before holding the first proper interview.
Group interviews
One form of group interview is the focus group that is frequently used in marketing,
political campaigning, and social sciences research. Normally three to 10 people are
involved. Participants are selected to provide a representative sample of typical
users; they normally share certain characteristics. For example, in an evaluation of a
university website, a group of administrators, faculty, and students may be called to
form three separate focus groups because they use the web for different purposes.
The benefit of a focus group is that it allows diverse or sensitive issues to be
raised that would otherwise be missed. The method assumes that individuals de-
velop opinions within a social context by talking with others. Often questions posed
to focus groups seem deceptively simple but the idea is to enable people to put for-
ward their own opinions in a supportive environment. A preset agenda is devel-
oped to guide the discussion but there is sufficient flexibility for a facilitator to
13.2 Asking users: interviews 397
follow unanticipated issues as they are raised. The facilitator guides and prompts
discussion and skillfully encourages quiet people to participate and stops verbose
ones from dominating the discussion. The discussion is usually recorded for later
analysis in which participants my be invited to explain their comments more fully.
Focus groups appear to have high validity because the method is readily under-
stood and findings appear believable (Marshall and Rossman, 1999). Focus groups
are also attractive because they are low-cost, provide quick results, and can easily be
scaled to gather more data. Disadvantages are that the facilitator needs to be skillful
so that time is not wasted on irrelevant issues. It can also be difficult to get people to-
gether in a suitable location. Getting time with any interviewees can be difficult, but
the problem is compounded with focus groups because of the number of people in-
volved. For example, in a study to evaluate a university website the evaluators did not
expect that getting participants would be a problem. However, the study was sched-
uled near the end of a semester when students had to hand in their work, so strong in-
centives were needed to entice the students to participate in the study. It took an
increase in the participation fee and a good lunch to convince students to participate.
Designing questionnaires
Many questionnaires start by asking for basic demographic information (e.g., gen-
der, age) and details of user experience (e.g., the time or number of years spent
using computers, level of expertise, etc.). This background information is useful in
finding out the range within the sample group. For instance, a group of people who
are using the web for the first time are likely to express different opinions to an-
other group with five years of web experience. From knowing the sample range, a
designer might develop two different versions or veer towards the needs of one of
the groups more because it represents the target audience.
Following the general questions, specific questions that contribute to the evalu-
ation goal are asked. If the questionnaire is long, the questions may be subdivided
into related topics to make it easier and more logical to complete.
Box 13.1 contains an excerpt from a paper questionnaire designed to evaluate
users' satisfaction with some specific features of a prototype website for career
changers aged 34-59 years.
400 Chapter 1 3 Asking users and experts
details of age are needed. But since some people do not like to give their exact age,
many questionnaires ask respondents to specify their age as a range (Box 13.1). A
common design error arises when the ranges overlap. For example, specifying two
ranges as 15-20,20-25 will cause confusion: which box do people who are 20 years
old check? Making the ranges 14-19,20-24 avoids this problem.
A frequently asked question about ranges is whether the interval must be
equal in all cases. The answer is that it depends on what you want to know. For ex-
ample, if you want to collect information for the design of an e-commerce site to
sell life insurance, the target population is going to be mostly people with jobs in
the age range of, say, 21-65 years. You could, therefore, have just three ranges:
under 21,2145 and over 65. In contrast, if you are interested in looking at ten-year
cohort groups for people over 21 the following ranges would be best: under 21,
22-31,3241, etc.
There are a number of different types of rating scales that can be used, each
with its own purpose (see Oppenheim, 1992). Here we describe two commonly
used scales, Likert and semantic differential scales.
The purpose of these is to elicit a range of responses to a question that can be
compared across respondents. They are good for getting people to make judgments
about things, e.g. how easy, how usable etc., and therefore are important for usabil-
ity studies.
Likert scales rely on identifying a set of statements representing a range of pos-
sible opinions, while semantic differential scales rely on choosing pairs of words that
represent the range of possible opinions. Likert scales are the most commonly used
scales because identifying suitable statements that respondents will understand is
easier than identifying semantic pairs that respondents interpret as intended.
Likert Scales
Likert scales are used for measuring opinions, attitudes, and beliefs, and conse-
quently they are widely used for evaluating user satisfaction with products as in the
Hutchworld evaluation described in Chapter 10. For example, users' opinions
about the use of color in a website could be evaluated with a Likert scale using a
range of numbers (1) or with words (2):
(1) The use of color is excellent: (where 1 represents strongly agree and 5 repre-
sents strongly disagree)
1 2 3 4 5
0 17 17
(2) The use of color is excellent:
strongly strongly
agree agree OK disagree disagree
0 n o 0 0
Below are some steps for designing Likert scales:
Gather a pool of short statements about the features of the product that are
to be evaluated e.g., "This control panel is easy to use." A brainstorming
402 Chapter 13 Asking users and experts
I
session with peers in which you examine the product to be evaluated is a
good way of doing this.
Divide the items into groups with about the same number of positive and nega-
tive statements in each group. Some evaluators prefer to have all negative or
all positive questions, while others use a mix of positive and negative questions,
as we have suggested here. Deciding whether to phrase the questionnaire posi-
tively or negatively depends partly on the complexity of the questionnaire and
partly on the evaluator's preferences. The designers of QUIS (Box 13.2) (Chin
et al., 1988),for example, decided not to mix negative and positive statements
because the questionnaire was already complex enough without forcing partici-
pants to pay attention to the direction of the argument.
Decide on the scale. QUIS (Box 13.2) uses a 9-point scale, and because it is a
general questionnaire that will be used with a wide variety of products it also
includes NIA (not applicable,) as a category. Many questionnaires use 7- or
5-point scales and there are also 3-point scales. Arguments for the number of
points go both ways. Advocates of long scales argue that they help to show
discrimination, as advocated by the QUIS team (Chin et al., 1988). Rating I
features on an interface is more difficult for most people than, say, selecting
among different flavors of ice cream, and when the task is difficult there is I
evidence to show that people "hedge their bets." Rather than selecting the I
values nearer the center. The counter-argument is that people cannot be ex-
pected to discern accurately among points on a large scale, so any scale of
more than five points is unnecessarily difficult to use.
Another aspect to consider is whether the scale should have an even or
odd number of points. An odd number provides a clear central point. On the
13.3 Asking users: questionnaires 403
other hand, an even number forces participants to make a decision and pre-
vents them from sitting on the fence.
Select items for the final questionnaire and reword as necessary to make
them clear.
Instructions:for each pair of adjectives, place a cross at the point between them
that reflects the extent to which you believe the adjectives describe the home
page. You should place only one cross between the marks on each line.
Attractive 1 I I I I I I I ugly
Clear I I I I I I I I Confusing
Dull I I I I I I I I Colorful
Exciting I I I I I I I I Boring
Annoying 1 I I I I I I J Pleasing
Helpful I I I I I I I I Unhelpful
Poor I I I I I I I I Well designed
twice yearly since 1994. The policy that GVU employs to deal with this difficult
sampling issue is to make as many people aware of the GVU survey as possible so
that a wide variety of participants are encouraged to participate. However, even
these efforts do not avoid biased sampling, since participants are self-selecting. In-
deed, some survey experts are vehemently opposed to such methods and instead
propose using national census records to sample offline (Nie & Ebring, 2000). In
some countries, web-based questionnaires are used in conjunction with television
to elicit viewers' opinions of programs and political events, and many such ques-
tionnaires now say that their results are "not scientific" when they cite them, mean-
ing that unbiased sampling was not done. A term that is gaining popularity is
convenience sampling, which is another way of saying that the sample includes
those who were available rather than those selected using scientific sampling.
Turning the paper questionnaire into a web-based version requires four steps.
database. However, this action could infringe people's privacy and the legal
situation should be checked. Another way is to access the transfer and refer-
rer logs from the web server, which provide information about the domains
from which the web-based questionnaire was accessed. Unfortunately, peo-
ple can still send from different accounts with different IP addresses, so ad-
ditional identifying information may also be needed.
4. User-test the survey with pilot stddies before distributing.
Commercial questionnaires are becoming available via the Internet. Two ex-
amples are SUM1 and MUMMS, which are briefly discussed in Box 13.3.
1994a). However, skillful experts can capture many of the usability problems by
themselves, and many consultants now use this technique as the basis for critiquing
interactive devices-a process that has become know as an expert crit in some
countries. Because users and special facilities are not needed for heuristic evalua-
tion and it is comparatively inexpensive and quick, it is also known as discount
evaluation.
ments in the context of the whole product, and to identify potential usabil-
ity problems.
If the evaluation is for a functioning product, the evaluators need to
have some specific user tasks in mind so that exploration is focused. Suggest-
ing tasks may be helpful but many experts do this automatically. However,
this approach is less easy if the evaluation is done early in design when there
are only screen mockups or a specification; the approach needs to be
adapted to the evaluation circumstances. While working through the inter-
face, specification or mockups, a second person may record the problems
identified, or the evaluator may think aloud. Alternatively, she may take
notes herself. Experts should be encouraged to be as specific as possible and
to record each problem clearly.
3. The debriefing session in which the experts come together to discuss their
findings and to prioritize the problems they found and suggest solutions.
The heuristics focus the experts' attention on particular issues, so selecting ap-
propriate heuristics is therefore critically important. Even so, there is sometimes
less agreement among experts than is desirable, as discussed in the dilemma below.
There are fewer practical and ethical issues in heuristic evaluation than for
other techniques because users are not involved. A week is often cited as the time
needed to train experts to be evaluators (Nielsen and Mack, 1994), but this of
course depends on the person's expertise. The best experts will have expertise in
both interaction design and the product domain. Typical users can be taught to do
41 2 Chapter 13 Asking users and experts
heuristic evaluation, although there have been claims that it is not very successful
(Nielsen, 1994a). However, some closely related methods take a team approach
that involves users (Bias, 1994).
Figure 13.7 Clicking Health Topics on the home page produced this page.
Simple dialog.
The dialog with the user should not include information that is irrelevant,
unnecessary, or rarely needed. The dialog should be presented in terms fa-
miliar to the user and not be system-oriented.
Shortcuts.
The interface should accommodate both novice and experienced users.
Minimizing the user's memory load.
The interface should not require the user to remember information from one
part of the dialog to another.
Preventing errors.
The interface should prevent errors from occurring.
Feedback.
The system should keep the user informed about what is taking place.
Internal locus of control.
Users who choose system functions by mistake should have an "emergency
exit" that lets them leave the unwanted state without having to engage in an
extended dialog with the system,
These heuristics were given to three expert evaluators who independently eval-
uated MEDLINEplus. Their comments were then compiled and a meeting was
414 Chapter 13 Asking users and experts
Figure 13.8 Categories of links within Health Topics for knee injuries.
called to discuss their findings and suggest strategies for addressing problems. The
following points were among their findings:
Layout.
All pages within MEDLINEplus have a relatively uncomplicated vertical de-
sign. The home page is particularly compact, and all pages are well suited for
printing. The use of graphics is conservative, minimizing the time needed to
download pages.
Internal consistency.
The formatting of pages and presentation of the logo are consistent across
the website. Justification of text, fonts, font sizes, font colors, use of terms,
and links labels are also consistent.
surface, giving many short menus rather than a few deep ones (see the exper-
iment on breadth versus depth in Chapter 14 which provides evidence to jus-
tify this.)
Navigation One of the biggest problems for users of large websites is navigating
around the site. The phrase "lost in cyberspace" is understood by every web user.
The following six guidelines (from Nielsen (1998) and others) are intended to en-
courage good navigation design:
Avoid orphan pages i.e. pages that are not connected to the home page, be-
cause they lead users into dead ends.
Are there any orphan pages? Where do they go to?
Avoid long pages with excessive white space that force scrolling.
Are there any long pages? Do they have lots of white space or are they full
of texts or lists?
Provide navigation support, such as a strong site map that is always present
(Shneiderman, 1998b).
Is there any guidance, e.g. maps, navigation bar, menus, to help users find
their way around the site?
Avoid narrow, deep, hierarchical menus that force users to burrow deep into
the menu structure.
Empirical evidence indicates that broad shallow menus have better usabil-
ity than a few deep menus (Larson and Czerwinski, 1998; Shneiderman,
1998b).
Avoid non-standard link colors.
What color is used for links? Is it blue or another color? If it is another color,
then is it obvious to the user that it is a hyperlink?
Provide consistent look and feel for navigation and information design.
Are menus used, named, and positioned consistently? Are links used
consistently?
Access Accessing many websites can be a problem for people with slow Internet
connections and limited processing power. In addition, browsers are often not sen-
sitive to errors in URLs. Nielsen (1998) suggests the following guidelines:
Avoid complex URLs.
Are the URLs complex? Is it easy to make typing mistakes when entering
them?
416 Chapter 13 Asking users and experts
I
'
Consider the following design guidelines for information design and for each one suggest a
question that could be used in heuristic evaluation:
Outdated or incomplete information is to be avoided (Nielsen, 1998). It creates a poor
~
impression with users.
Good graphical design is important. Reading long sentences, paragraphs, and docu-
ments is difficult on screen, so break material into discrete, meaningful chunks to give
the website structure (Lynch and Horton, 1999).
Avoid excessive use of color. Color is useful for indicating different kinds of informa-
tion, i.e., cueing (Preece et al., 1994).
Avoid gratuitous use of graphics and animation. In addition to increasing download
time, graphics and animation soon become boring and annoying (Lynch and Horton,
1999).
Be consistent. Consistency both within pages (e.g., use of fonts, numbering, terminol-
ogy, etc.) and within the site (e.g., navigation, menu names, etc.) is important for us-
ability and for aesthetically pleasing designs.
Comment We suggest the following questions; you may have identified others:
Outdated or incomplete information.
Do the pages have dates on them? How many pages are old and provide outdated in-
formation?
Good graphical design is important.
Is the page layout structured meaningfully? Is there too much text on each page?
Avoid excessive use of color.
How is color used? Is it used as a form of coding? Is it used to make the site bright and
cheerful? Is it excessive and garish?
Avoid gratuitous use of graphics and animation.
Are there any flashing banners? Are there complex introduction sequences? Can they
be short-circuited? Do the graphics add to the site?
Be Consistent.
Are the same buttons, fonts, numbers, menu styles, etc. used across the site? Are they
used in the same way?
Look at the heuristics above and consider how you would use them to evaluate a website for
purchasing clothes (e.g., REI.com, which has a home page similar to that in Figure 13.9).
I
I
--
13.4 Asking experts: inspections 417
While you are doing this activity think about whether the grouping into three categories is
useful.
(a) Does it help you focus on what is being evaluated?
(b) Might fewer heuristics be better? Which might be combined and what are the trade-offs?
Comment (a) Informal evaluation in which the heuristics were categorized suggests that the three
categories help evaluators to focus. However, 13 heuristics is still a lot.
(b) Some heuristics can be combined and given a more general description. For example,
providing navigation support and avoiding narrow, deep, hierarchical menus could be re-
placed with "help users develop a good mental model," but this is a more abstract state-
ment and some evaluators might not know what is packed into it. Producing questions
suitable for heuristic evaluation often results in more of them, so there is a trade-off. An
argument for keeping the detail is that it reminds evaluators of the issues to consider. At
present, since the web is relatively new, we can argue that such reminders are
needed. Perhaps in five years they will not be.
Go to the communities in RELcom or to another site that has bulletin boards to which cus-
tomers can send comments. Social interaction was discussed in Chapter 4, and this exercise
involves picking up some of the concepts discussed there and developing heuristics to evalu-
ate online communities. Before starting you will find it useful to familiarize yourself by car-
rying out the following:
read some of the messages
send a message
reply to a message
search for information
notice how many messages have been sent and how recently
13.4 Asking experts: inspections 419
notice whether you can see the physical relationship between messages easily
notice whether you can post to people privately using email
notice whether you can gain a sense of what the other people are like and the emo-
tional content of their messages
notice whether there is a sense of community and of individuals being present, etc.
Then use the nine questions above as heuristics to evaluate the site: I
(a) How well do the questions work as heuristics for evaluating the online community for
both usability and sociability issues?
(b) Could these questions form the basis for heuristics for other online communities such
as Hutchworld discussed in Chapter lo?
I
I
Comment (a) You probably found that these questions helped focus your attention on the main is- i
sues of concern. You may also have noticed that some communities are more like
ghost towns than communities; they get very few visitors. Unlike the website evalua-
tion it is therefore important to pay attention to social interaction. A community with-
out people is not a community no matter how good the software is that supports it.
(b) HutchWorld is designed to support social interaction and offers many additional fea-
tures such as support for social presence by allowing participants to represent them-
selves as avatars, show pictures of themselves, tell stories, etc. The nine questions
above are useful but may need adapting.
Allison Druin works with children to develop web applications and computerized toys
(Druin, 1999). From doing this work Allison and her team know that children like to:
be in control and not to be controlled
create things
express themselves
be social
collaborate with other children
(a) What kind of tasks should be considered in evaluating a fluffy robot toy dog that can
be programmed to move and to tell personalized stories about itself and children?
The target age group for the toy is 7-9 years.
(b) Suggest heuristics to evaluate the toy.
420 Chapter 13 Asking users and experts
Comment (a) Tasks that you could consider: making the toy tell a story about the owner and two
friends, making the toy move across the room, turn, and speak. You probably
thought of others.
(b) The heuristics could be written to cover: being in control, being flexible, supporting
expression, being motivating, supporting collaboration and being engaging. These are
based on the issues raised by Druin, but the last one is aesthetic and tactile. Several of
the heuristics needed would be more concerned with user experience (e.g., motivating,
engaging, etc.) than with usability.
Will the user associate and interpret the response from the action cor-
42 1
I
rectly? (Will users know from the feedback that they have made a correct
or incorrect choice of action?)
In other words: will users know what to do, see how to do it, and understand
from feedback whether the action was correct or not?
4. As the walkthrough is being done, a record of critical information is com-
piled in which:
The assumptions about what would cause problems and why are
recorded. This involves explaining why users would face difficulties,
Notes about side issues and design changes are made.
A summary of the results is compiled.
5. The design is then revised to fix the problems presented.
I
It is important to document the cognitive walkthrough, keeping account of
what works and what doesn't. A standardized feedback form can be used in which
answers are recorded to the three bulleted questions in step (3) above. The form
can also record the details outlined in points 1-4 as well as the date of the evalua-
tion. Negative answers to any of the questions are carefully documented on a sepa-
rate form, along with details of the system, its version number, the date of the
evaluation, and the evaluators' names. It is also useful to document the severity of
the problems, for example, how likely a problem is to occur and how serious it will
be for users.
The strengths of this technique are that it focuses on users' problems in detail,
yet users do not need to be present, nor is a working prototype necessary. How-
ever, it is very time-consuming and laborious to do. Furthermore the technique has
a narrow focus that can be useful for certain types of system but not others.
Activity 13.7 was about doing a heuristic evaluation of REI.com or a similar e-commerce re-
tail site. Now go back to that site and do a cognitive walkthrough to buy something, say a
pair of skis. When you have completed the evaluation, compare your findings from the cog-
nitive walkthrough technique with those from heuristic evaluation.
Comment You probably found that the cognitive walkthrough took longer than the heuristic evalua-
tion for evaluating the same part of the site because it examines each step of a task. Conse-
quently, you probably did not see as much of the website. It's likely that you also got much
more detailed findings from the cognitive walkthrough. Cognitive walkthrough is a useful
technique for examining a small part of a system in detail, whereas heuristic evaluation is
useful for examining whole or parts of systems.
These adaptations made the technique more usable, despite losing some of the
detail from the analysis. Perhaps most important of all, he directed the social inter-
actions of the design team so that they achieved their goal.
Assignment
This assignment continues the work you did on the web-based ticketing system at the end of
Chapters 7 and 8. The aim of this assignment is to evaluate the prototypes produced in the as-
signment of Chapter 8. The assignment takes an iterative form in which we ask you to evaluate
and redesign your prototypes, following the iterative path in the interaction design process de-
scribed in Chapter 6.
(a) For each prototype, return to the feedback you collected in Chapter 8 but this time
perform open-ended interviews with a couple of potential users.
424 Chapter 13 Asking users and experts
(b) Based on the feedback from this first evaluation, redesign the softwareIHTML pro-
totype to take comments on all three prototypes into account.
(c) Decide on an appropriate set of heuristics and perform a heuristic evaluation of the
redesigned prototype.
(d) Based on this evaluation, redesign the prototype to overcome the problems you
encountered.
(e) Design a questionnaire to evaluate the system. The questionnaire may be paper-
1
based or electronic. If it is electronic, make your software prototype and the
questionnaire available to others and ask a selection of people to evaluate the
system.
Summary
Techniques for asking users for their opinions vary from being unstructured and open-ended
to tightly structured. The former enable exploration of concepts, while the latter provide
structured information and can be replicated with large numbers of users, as in surveys. Pre-
dictive evaluation is done by experts who inspect the designs and offer their opinions. The
value of these techniques is that they structure the evaluation process, which can in turn help
to prevent problems from being overlooked. In practice, interviews and observations often
go hand in hand, as part of a design process.
Key points
There are three styles of interviews: structured, semi-structured and unstructured.
Interview questions can be open or closed. Closed questions require the interviewee to
select from a limited range of options. Open questions accept a free-range response.
Many interviews are semi-structured. The evaluator has a predetermined agenda but
will probe and follow interesting, relevant directions suggested by the interviewee.
A few structured questions may also be included, for example to collect demographic
information.
Structured and semi-structured interviews are designed to be replicated.
Focus groups are a form of group interview.
Questionnaires are a comparatively low-cost, quick way of reaching large numbers of
people.
Various rating scales exist including selection boxes, Likert, and semantic scales.
Inspections can be used for evaluating requirements, mockups, functional prototypes, or
systems.
Five experts typically find around 75% of the usability problems.
Compared to user testing, heuristic evaluation is less expensive and more flexible.
User testing and heuristic evaluation often reveal different usability problems.
Other types of inspections include pluralistic and cognitive walkthroughs.
Walkthroughs are very focused and so are suitable for evaluating small parts of
systems.
Further reading 425
Further reading
NIELSEN,J., AND MACK, R. L. (eds.) (1994) Usability Inspec- PREECE,3. (2000) Online Communities: Designing Usability,
tion Methods. New York: John Wiley & Sons. This book con- Supporting Sociability. Chichester, UK: John Wiley & Sons.
tains an edited collection of chapters on a variety of usability This book is about the design of web-based online communi-
inspection methods. There is a detailed description of heuris- ties. It suggests guidelines for evaluating for sociability and
tic evaluation and walkthroughs and comparisons of these usability that can be used as a basis for heuristics.
techniques with other evaluation techniques, particularly ROBSON, C. (1993) Real World Research. Blackwell. Oxford,
user testing. Jakob Nielsen's website useit.com provides ad- UK. Chapter 9 provides basic practical guidance on how to
ditional information and advice on website design. interview and design questionnaires. It also contains many
OPPENHEIM, A. N. (1992) Questionnaire Design, Interview- examples.
ing and Attitude Measurement. London: Pinter Publishers. SHNEIDERMAN, B. (1998) Designing the User Interface:
This text is useful for reference. It provides a detailed ac- Strategies for Effective Human-Computer Interaction (3rd
count of all aspects of questionnaire design, illustrated with Edition) Reading, M A . : Addison-Wesley. Chapter 4 con-
many examples. tains a discussion of the QUIS questionnaire.
426 Chapter 13 Asking users and experts
14.1 Introduction
A central aspect of interaction design is user testing. User testing involves measuring
the performance of typical users doing typical tasks in controlled laboratory-like con-
ditions. Its goal is to obtain objective performance data to show how usable a system
or product is in terms of usability goals, such as ease of use or learnability. More gen-
erally, usability testing relies on a combination of techniques including observation,
questionnaires and interviews as well as user testing, but user testing is of central
concern, and in this chapter we focus upon it. We also examine key issues in experi-
mental design because user testing has developed from experimental practice, and
although there are important differences between them there is also commonality.
430 Chapter 14 Testing and modeling users
The last part of the chapter considers how user behavior can be modeled to
predict usability. Here we examine two modeling approaches (based on psycholog-
ical theory) that have been used to predict user performance. Both come from the
well-known GOMS family of approaches: the GOMS model and the Keystroke
level model. We also discuss Fitts' Law.
The main aims of this chapter are to:
Explain how to do user testing.
Discuss how and why a user test differs from an experiment.
Discuss the contribution of user testing to usability testing.
Discuss how to design simple experiments.
Describe the GOMS model, the Keystroke level model and Fitts' law and
discuss when these techniques are useful.
Explain how to do a simple keystroke level analysis.
be carefully planned and executed, but real-world constraints must be taken into
account and compromises made. It is rarely exactly replicable, though it should be
possible to repeat the tests and obtain similar findings. Experiments are usually val-
idated using statistical tests, whereas user testing rarely employs statistics other
than means and standard deviations.
Typically 5-12 users are involved in user testing (Dumas and Redish, 1999),
but often there are fewer and compromises are made to work within budget and
7
schedule constraints. "Quick and dirty ' tests involving just one or two users are
frequently done to get quick feedback about a design idea. Research experiments
generally involve more participants, more tightly controlled conditions, and more
extensive data analysis in which statistical analysis is essential.
432 Chapter 14 Testing and modeling users
Selection of participants
MEDLINEplus was tested with nine participants selected from primary health care
practices in the Washington, DC metropolitan area. This was accomplished by
Figure 14.2 The script used to greet participants in the MEDLINEplus study.
We'll start with a general overview of MEDLINEplus. It's a web-based product devel-
oped by the National Library of Medicine. Its purpose is to link users with sources of au-
thoritative health information on the web.
The purpose of our work today is to explore the MEDLINEplus interface to identify
features that could be improved. We're also interested in finding out about features that
are particularly helpful.
In a few minutes I'll give you five tasks. For each task you'll use MEDLINEplus to
find health-related information.
As you use MEDLINEplus to find the information for each task, please keep in mind
that it is MEDLINEplus that is the subject of this evaluation-not you.
You should feel free to work on each task at a pace that is normal and comfortable for
you. We will be keeping track of how long it takes you to complete each task, but you
should not feel rushed. Please work on each task at a pace that is normal and comfortable
for you. If any task takes you longer than twenty minutes, we will ask you to move on to
the next task. The Home button on the browser menu has been set to the MEDLINEplus
homepage. We'll ask you to return to this page before starting a new task.
As you work on each task, I'd like you to imagine that it's something you or someone
close to you needs to know.
All answers can be found on MEDLINEplus or on one of the sites it points to. But if
you feel you are unable to complete a task and would like to stop, please say so and we'll
move on to the next task.
Before we proceed, do you have any questions at this point?
Before starting the main tasks the participants were invited to explore the web-
site for up to 10 minutes and to think aloud as they moved through the site. Figure
14.4 contains the script used to describe how to do this exploration task.
Each participant was then asked to work through the five tasks and was allowed
up to 20 minutes for each task. If they did not finish a task they were asked to stop and
if they forgot to think out loud or appeared to be stuck they were prompted. The eval-
uator used the script in Figure 14.5 to direct participants' behavior (Cogdill, 1999).
14.2 User testing 435
Before we begin the tasks, I'd like you to explore MEDLINEplus independently for as
long as ten minutes.
As you explore, please "think aloud." That is, please tell us your thoughts as you en-
counter the different features of MEDLINEplus.
Feel free to explore any topics that are of interest to you.
If you complete your independent exploration before the ten minutes are up, please
let me know and we'll proceed with the tasks. Again, please remember to tell us what
you're thinking as you explore MEDLINEplus.
Figure 14.4 The script used to introduce and describe the initial exploration task.
Please read aloud this task before beginning your use of MEDLINEplus to find the infor-
mation.
After completing each task, please return to the MEDLINEplus home page by click-
ing on the "home" button.
Prompts: "What are you thinking?"
"Are you stuck?"
"Please tell me what you're thinking."
[Iftime exceeds 20 minutes:" I need to ask you to stop working on this task
and proceed to the next one."]
Figure 14.5 The script used to direct participants' behavior.
When all the tasks were completed, the participant was given a post-test ques-
tionnaire consisting of items derived from the QUIS user satisfaction questionnaire
(Chin et al., 1988) described in Chapter 13. Finally, when the questionnaire was
completed, there was a debriefing (Figure 14.6) in which participants were asked
for their opinions.
How did you feel about your performance on the tasks overall?
Tell me about what happened when [cite problem/error/excessive time].
What would you say was the best thing about the MEDLINEplus interface?
What would you say was the worst thing about the MEDLINEplus interface?
Data collection
Criteria for successfully completing each task were developed in advance. For ex-
ample, participants had to find and access between 3-9 web page URLs. Each
user's search moves were then recorded for each task. For example, the log re-
vealed that Participant A visited the online resources shown in Table 14.1 while
trying to complete the first task.
Completion times were automatically recorded and calculated from the video
and interaction log data. The data from the questionnaire and the debriefing session
436 Chapter 14 Testing and modeling users
Table 14.1 The resources visited by participant A for the first task.
Databases
Home
MEDLINEIPubMed: "dark bump"
MEDLINEIPubMed: "bump"
Home
Dictionaries
External: Online Medical Dictionary
Home
Health Topics
Melanoma (HT)
External: American Cancer Society
were also used to help understand each participant's performance. The data col-
lected contained the following:
start time and completion time
page count (i.e., pages accessed during the search task)
external site count (i.e., number of external sites accessed during the search
task)
medical publications accessed during the search task
the user's search path
any negative comments or mannerisms observed during the search
user satisfaction questionnaire data
What do you notice about how the user testing fits into the overall usability testing?
Comment The user testing is closely integrated with the other techniques used in usability testing-
questionnaires, interviews, thinkaloud, etc. In concert they provide a much broader picture
of the user's interaction than any single technique would show.
Data analysis
Analysis of the data focused on such things as:
website organization such as arrangement of topics, menu depth, organiza-
tion of links, etc.
browsing efficiency such as navigation menu location, text density, etc.
the search features such as search interface consistency, feedback, terms, etc.
For example, Table 14.2 contains the performance data for the nine subjects
for task 1. It shows the time to complete the task and the different kinds of searches
undertaken. Similar tables were produced for each task. The exploration and ques-
tionnaire data was also analyzed to help explain the results.
1 14.2 User testing 437
Table 14.2 Performance data for task 1 : Find information about whether a dark bump on your shoulder might
be skin cancer. Mean (M) and standard deviation (SD) for all subieck are also shown.
Comment (a) Participants' names should be kept confidentialin reports, so a coding scheme is used.
(b) Completion times are not closely associated with successful completion of this task.
For example, completion times range from 5-14 minutes for successful completion
and from 9-13 minutes for those who asked to terminate the task.
438 Chapter 14 Testing and modeling users
(c) From the data it appears that there may have been several ways to complete the task
successfully. For example, participants A and C both completed the task successfully
but their records of visiting the different resources differ considerably.
(a) Was the way in which participants were selected appropriate and were there enough
participants? Justify your comments.
(b) Why do you think participants were asked to read each new task aloud before start-
ing it and to return to the home page?
1 (c) Was the briefing material adequate? Justify your comment.
Comments (a) This way of selecting participants was appropriate for user testing. The evaluator was
careful to get a number of representative users across the user age range from both
genders. Participants were screened to ensure that they were experienced web users.
The evaluator decided to select from a local volunteer pool of participants, to ensure
that he got people who wanted to be involved and who lived locally. Since using the
web is voluntary, this is a reasonable approach. The number of participants was ade-
quate for user testing.
(b) This was to make it easy for the evaluator to detect the beginning of a new task on the
video log. Sending the participants back to the home page before starting each new
task ensured that logging always started from the same place. It also helped to orient
the participants.
(c) The briefing material was full and carefully prepared but not excessive. Partici-
pants were told what was expected of them and the prompts were preplanned to
ensure that each participant was treated in the same way. An informed consent
form was also included.
Comment It is important to have a representative sample to ensure that the findings of the user test
can be generalized to the rest of the user population. Selecting participants according to
clear objectives helps evaluators to avoid unwanted bias. For example, if 90% of the par-
ticipants testing a product for 9-12 year-olds were 12, it would not be representative of
the full age range. The results of the test would be distorted by the large group of users at
the top-end of the age range.
I 14.3 Doing user testing 4.41
in the recording room. While the test is going on, the evaluators observe and anno-
tate the video stream, indicating events for later more detailed analysis.
The viewing room is like a small auditorium with rows of seats at different lev-
els. It is designed so that managers and others can watch the tests. Video monitors
display video and the managers overlook the observation room and into the labo-
ratory through one-way mirrors. Generally only large companies can afford this
extra room and it is becoming less common.
The reception area also has bathroom facilities so that testers do not have to go
into the outside world during a session. Similarly, telephones in the laboratory do
not connect with the outside world, so there are no distractions. The only commu-
nication occurs between the tester and the evaluators. The laboratory can be modi-
fied to include other features of the environment in which the product will be used
if necessary, but it is always tightly controlled.
Many companies and researchers cannot afford to have a usability labora-
tory, or even to rent one. Instead, they buy mobile usability equipment (e.g.,
video, interaction logging system) and convert a nearby room into a makeshift
laboratory. The mobile laboratory can also be taken into companies and packed
away when not needed. This kind of makeshift laboratory is more amenable to
the needs of user testing. Modifications may have to be made to test different
types of applications. For example, Chris Nodder and his colleagues at Microsoft
had to partition the space when they were testing early versions of NetMeeting,
a videoconferencing product, in the mid-1990s, as Figure 14.8 shows (Nodder et
al., 1999).
Usability engineer uses another PC to Figure 14.8The testing arrangement used for Net-
become the third participant Meeting videoconferencing system.
performed to make sure that everything is working, the instructions are clear, and
there are no unforeseen glitches.
It's a good idea to start the session with a familiarization task, such as browsing
a website in a web usability study, so that participants can get used to the equip-
ment before testing starts. An easy first task encourages confidence; ending with a
fairly easy one makes participants go away feeling good. A contingency plan is
needed for dealing with people who spend too long on a task, as in MEDLINEplus.
A query from the evaluator asking if the participant is all right can help. If the
participant gets really stuck then the evaluator should tell him to move on to the
next part of the task.
Long tasks and a long testing procedure should be avoided. It is a good idea to
keep the session under one hour. Remember, all the data that is collected has to be
analyzed and if you have nine participants who together generate nine hours of
video, there is a lot to review and analyze.
14.4 Experiments
Although classically performed scientific experimentation is usually too expensive
or just not practical for most usability evaluations, there are a few occasions when
it is used. For example, in a case study about the testing of a voice response system
discussed later in Chapter 15 plenty of participants were available. The develop-
ment schedule was flexible, and the evaluators knew that quantitative results would
be well received by their clients, so they adopted a more experimental approach
than usual. For this reason, and because the roots of user testing are in scientific ex-
perimentation and many undergraduate projects involve experiments, we will dis-
cuss experimental design.
The aim of an experiment is to answer a question or to test a hypothesis that pre-
dicts a relationship between two or more events known as variables. For example,
444 Chapter 14 Testing and modeling users
"Will the time to read a screen of text be different if 12-point Helvetica font is used
instead of 12-point Times New Roman?" Such hypotheses are tested by manipulat-
ing one or some of the variables involved. The variable that the researcher manipu-
lates is known as the independent variable, because the conditions to test this
variable are set up independently before the experiment starts. In the example
above, type font is the independent variable. The other variable, time to read the
text, is called the dependent variable because the time to read the text depends on
the way the experimenter manipulates the other variable, in this case which type
font is used.
It is advisable to consult someone who is knowledgeable about relevant statis-
tical tests before doing most experiments, rather than wondering afterwards what
to do with the data that is collected.
Different participants
In different participant design a single group of participants is allocated randomly
to each of the experimental conditions, so that different participants perform in dif-
ferent conditions. There are two major drawbacks with this arrangement. The first
is making sure that you have enough participants. The second is that if small groups
are used for each condition, then the effect of any individual differences among
participants, such as differences in experience and expertise, becomes a problem.
Randomly allocating the participants and pre-testing to identify any participants
that differ strongly from the others helps. An advantage is that there are no order-
ing effects, caused by the influence of participants' experience of one set of tasks on
performance on the next, as each participant only ever performs in one condition.
Same participants
In same-participant design, all participants perform in all conditions so only halfthe
number of participants is needed; the main reason for this design is to lessen the im-
pact of individual differences and to see how performance varies across conditions
for each participant. However, it is important to ensure that the order in which par-
ticipants perform tasks does not bias the results. For example, if there are two
tasks, A and B, half the participants should do task A followed by task B and the
other half should do task B followed by task A. This is known as counterbalancing.
446 Chapter 14 Testing and modeling users
Counterbalancing neutralizes possible unfair effects of learning from the first task,
i.e., the order effect.
Matched participants
In matched-participants design, participants are matched in pairs based on certain
user characteristics such as expertise and gender. Each pair is then randomly allo-
cated to each experimental condition. This design is used when participants cannot
perform in both conditions. The problem with this arrangement is that other im-
portant variables that haven't been taken into account may influence the results.
For example, experience in using the web could influence the results of tests to
evaluate the navigability of a website. So web expertise would be a good criterion
for matching participants.
The advantages and disadvantages of using different experimental designs are
summarized in Table 14.3.
(a) What were the independent and dependent variables in this study?
(b) Write two possible hypothesis statements.
(c) How would you categorize the experimental design?
(d) The participants are all described as "experts." Is this adequate? What else do you
want to know about them?
(e) Comment on the description of the tasks. What else do you want to know?
(f) If you know some statistics, suggest what further analysis of the results should be done.
(g) Three other analyses were done on issues that were not mentioned in this descrip-
tion, but that anyone doing this experiment might have looked at. From your knowl-
edge of interaction design, suggest what these analyses might be and say why.
(h) What are the implications of this study for web design?
I Comment (a) The independent variable is menu link structure. The dependent variable is reaction
time to complete a search successfully.
(b) Web search performance is better with broad shallow link structures. There is no dif-
ference in search performance with different link structures.
(c) All the participants did all the tasks, so this is a same-participant design.
(d) "Expert" could refer to a broad range of expertise. The evaluators could have used a
screening questionnaire to make sure that all the participants had reached a basic
level of expertise and there were no super-experts in the group. However, given that
all the participants did all the conditions, differences in expertise had less impact than
in other experimental designs.
(e) Our excerpt contains very little description of the tasks. It would be good to see ex-
amples of typical tasks in each task category. How was the similarity and complexity
of the tasks tested?
(f) A one-way analysis of variance was used to validate the significance of the main find-
ing. Other tests are also discussed in the full paper.
(g) Participants could be asked to rate their preferences using a subjective rating ques-
tionnaire, which is similar to a user satisfaction questionnaire. The researchers also
analyzed the paths the participants took to see if any of the conditions caused less op-
timal searching. They found that the condition with 32 items on the top-level caused a
feeling of "lost in hyperspace," though this was not statistically significant. A less ob-
vious analysis examined memory and scanning ability and found that better memory
and scanning ability was associated with faster reaction time in the 16 X 32 hierarchy.
(h) Implications for web design are to avoid deep narrow link hierarchies and very broad
shallow ones. However, as the authors emphasize, this is only one study and more re-
search is needed before any generalizations can be made.
Goals refer to a particular state the user wants to achieve (e.g., find a website
on interaction design).
Operators refer to the cognitive processes and physical actions that need to
be performed in order to attain those goals (e.g., decide on which search en-
gine to use, think up and then enter keywords in search engine). The differ-
ence between a goal and an operator is that a goal is obtained and an
operator is executed.
Methods are learned procedures for accomplishing the goals. They consist of
the exact sequence of steps required (e.g., drag mouse over entry field, type
in keywords, press the "go" button).
Selection rules are used to determine which method to select when there is
more than one available for a given stage of a task. For example, once key-
words have been entered into a search engine entry field, many search en-
gines allow users to press the return key on the keyboard or click the "go"
button using the mouse to progress the search. A selection rule would deter-
mine which of these two methods to use in the particular instance. Below is a
detailed example of a GOMS model for deleting a word in a sentence using
Microsoft Word.
450 Chapter 14 Testing and modeling users
these (note how much variability there is in the time it takes to press a key for users
with different typing skills).
The predicted time it takes to execute a given task is then calculated by describing
the sequence of actions involved and then summing together the approximate
times that each one will take:
For example, consider how long it would take to insert the word not into the fol-
lowing sentence, using a word processor like Microsoft Word:
Running through the streets naked is normal.
So that it becomes:
Running through the streets naked is not normal.
First we need to decide what the user will do. We are assuming that he will have
read the sentences beforehand and so start our calculation at the point where he
is about to carry out the requested task. To begin he will need to think what
method to select. So we first note a mental event (M operator). Next he will
need to move the cursor into the appropriate point of the sentence. So we note
an H operator (i.e., reach for the mouse). The remaining sequence of operators
are then: position the mouse before the word normal (P), click the mouse button
(P,), move hand from mouse over the keyboard ready to type (H), think about
which letters to type (M), type the letters n, o and t (3K) and finally press the
spacebar (K).
452 Chapter 14 Testing and modeling users
The times for each of these operators can then be worked out:
When there are many components to add up, it is often easier to put together all
the same kinds of operators. For example, the above can be rewritten as:
+
2(M) + 2(H) 1(P) + 1(P,) + 4 (K) = 2.70 + 0.88 + 1.10 + 0.2 + 0.80 = 5.68
seconds.
Over 5 seconds seems a long time to insert a word into a sentence, especially
for a good typist. Having made our calculation it is useful to look back at the var-
ious decisions made. For example, we may want to think why we included a men-
tal operator before typing the letters n, o and t but not one before any of the
other physical actions. Was this necessary? Perhaps we don't need to include it.
The decision when to include a time for mentally preparing for a physical action
is one of the main difficulties with using the keystroke level model. Sometimes it
is obvious when to include one (especially if the task requires making a decision)
but for other times it can seem quite arbitrary. Another problem is that, just like
typing skills vary between individuals, so too do the mental preparation times
people spend thinking about what to do. Mental preparation can vary from under
0.5 of a second to well over a minute. Practice at modeling similar kinds of tasks
together with comparing them with actual times taken can help overcome these
problems. Ensuring that decisions are applied consistently also helps. For exam-
ple, if comparisons between two prototypes are made, apply the same decisions
to each.
As described in the GOMS model above there are two main ways words can be deleted in a
sentence when using a word processor like Word. These are:
(a) deleting each letter of the word individually by using the delete key
(b) highlighting the word using the mouse and then deleting the highlighted section in
one go
Which of the two methods do you think is quickest for deleting the word "not" from the fol-
lowing sentence:
this might be the case: certain keystrokes would need to be performed at critical
times during a task rather than during slack periods (as was the case with the exist-
ing system). Thus, rather than carrying out these keystrokes in parallel when talking
with a customer (as they did with the existing system) they would need to do them
sequentially-hence the predicted increase in time spent on the overall task. This
suggested to the researchers that, overall, the proposed system would actually slow
down the operators rather than improve their performance. On the basis of this
study, they were able to advise the phone company against purchasing the new
workstations,saving them from investing in a potentially inefficient technology.
While this study has shown that GOMS can be useful in helping make decisions
about the effectiveness of new products, it is not often used for evaluation purposes.
Part of the problem is its highly limited scope: it can only really model computer-
based tasks that involve a small set of highly routine data-entry type tasks. Further-
more, it is intended to be used only to predict expert performance, and does not
allow for errors to be modeled. This makes it much more difficult (and sometimes
impossible) to predict how an average user will carry out their tasks when using a
range of systems, especially those that have been designed to be very flexible in the
way they can be used. In most situations, it isn't possible to predict how users will
perform. Many unpredictable factors come into play including individual differences
among users, fatigue, mental workload, learning effects, and social and organiza-
tional factors. For example, most people do not carry out their tasks sequentially
but will be constantly multi-tasking, dealing with interruptions and talking to others.
A dilemma with predictive models, therefore, is that they can only really make
predictions about predictable behavior. Given that most people are unpredictable
in the way they behave, it makes it difficult to use them as a way of evaluating how
systems will be used in real-world contexts. They can, however, provide useful esti-
mates for comparing the efficiency of different methods of completing tasks, partic-
ularly if the tasks are short and clearly defined.
In a nutshell the bigger the target the easier and quicker it is to reach it. This is why
interfaces that have big buttons are easier to use than interfaces that present lots of
tiny buttons crammed together. Fitts' law also predicts that the most quickly ac-
cessed targets on any computer display are the four corners of the screen. This is
because of their "pinning" action, i.e., the sides of the display constrain the user
from over-stepping the target. However, as pointed out by Tog on his AskTog web-
site, corners seem strangely to be avoided at all costs by designers.
Fitts' Law, therefore, can be useful for evaluating systems where the time to
physically locate an object is critical to the task at hand. In particular it can help de-
signers think about where to locate objects on the screen in relation to each other.
This is especially useful for mobile devices, where there is limited space for placing
icons and buttons on the screen. For example, in a recent study carried out by Nokia,
Fitts' Law was used to predict expert text entry rates for several input methods on a
12-key mobile phone keypad. The study helped the designers make decisions about
the size of keys, their positioning and the sequences of presses to perform common
tasks for the mobile device. Trade-offs between the size of a device, and accuracy of
using it were made with the help of calculations from this model.
Microsoft toolbars provide the user with the option of displaying a label below each tool.
Give a reason why labeled tools may be accessed faster. (Assume that the user knows the
tool and does not need the label to identify it.)
Comment The label becomes part of the target and hence the target gets bigger. As we mentioned ear-
lier bigger targets can be accessed faster.
Furthermore, tool icons that don't have labels are likely to be placed closer together so
they are more crowded. Spreading the icons further apart creates buffer zones of space
around the icons so that if users accidentally go past the target they will be less likely to se-
lect the wrong icon. When the icons are crowded together the user is at greater risk of acci-
dentally overshooting and selecting the wrong icon. The same is true of menus, where the
items are closely bunched together.
~ Assignment
This assignment continues the work you did on the web-based ticketing system at the end of
Chapters 7,8, and 13. The aim of this assignment is again to evaluate the prototypes produced,
but this time using user testing. You will then be able to compare the kind of results you got
from the heuristic evaluation with those from the user testing. Even though you will be using
different prototypes for each evaluation, you should be able to compare the types of problems
that each technique reveals.
(a) Based on your knowledge of the requirements for this system, develop a standard
task, e.g., booking two seats for a particular performance.
(b) Prepare a short informed consent form, and write an introduction that explains why
you are testing this prototype.
(c) Select three typical users, who can be friends or colleagues, and ask them to do the
task using your prototype.
(d) 'Note the problems that each user encounters. If you can, time their performance.
(If you happen to have a video camera you could film each participant.)
456 Chapter 14 Testing and modeling users
(e) Did the kinds of problems that user testing revealed differ from those obtained
from a heuristic evaluation? If so, in what ways?
(f) What are the main advantages and disadvantages of each technique?
Summary
This chapter described user testing, which is the core of usability testing. The various aspects
of user testing were discussed, including setting up tests, collecting data, controlling condi-
tions and analyzing findings. Experimental design and how experiments differ from user
testing was also discussed.
Predicting user performance using the GOMS model, the keystroke level model, and
Fitts' Law was presented. These techniques can be useful for determining whether a pro-
posed interface, system or keypad layout will be optimal.
Key points
User testing is a central component of usability testing which typically also includes ob-
servation, user satisfaction questionnaires and interviews.
Testing is commonly done in controlled laboratory-like conditions, in contrast to field
studies that focus o n how the product is used in its natural context.
Experiments aim to answer a question or hypothesis by manipulating certain variables
while keeping others constant.
The experimenter controls independent variable(s) in order to measure dependent
variable(s).
There are three types of experimental design: different participants, same participants,
and matched pair participants.
The GOMS model, keystroke-level model and Fitts' law can be used to predict expert,
error-free performance for certain kinds of tasks.
Predictive models require neither users nor experts, but the evaluators must be skilled in
applying the models.
Predictive models are used to evaluate systems with limited, clearly defined functionality
such as data entry applications.
Futfher reading
DUMAS, J. S., AND REDISH, J. C. (1999) A Practical Guide to LARSON, K., AND CZERWINSKI, M. (1998) Web page design:
Usability Testing. Exeter, UK: Intellect. Many books have Zmplications of memory, structure and scent for information
been written about user testing and usability, but this one is retrieval. Paper presented at CHI 98, Los Angeles. This
particularly useful because it describes the process in detail paper describes the breadth-versus-depth web study out-
and provides many examples. lined in Box 14.2.
RUBIN,J. (1994) Handbook of Usability Testing: How to CARD, S . K., MORAN, T. P., AND NEWELL, A. (1963) The
Plan, Design and Conduct Effective Tests. New York: John Psychology of Human Computer Interaction. Hillsdale, NJ:
Wiley & Sons. This book also provides good practical advice Lawrence Erlbaum Associates. This seminal book describes
about preparing and conducting user tests, analyzing and re- GOMS and the keystroke level model.
porting the results. MACKENZIE, I. S. (1992) Fitts' law as a research and design
ROBSON, C. (1994) Experimental Design and Statistics in Psy- tool in human-computer interaction. Human-Computer In-
chology. Aylesbury, UK. Penguin Psychology. This book teraction, 7 , 91-139. This early paper by Scott Mackenzie
provides an introduction to experimental design and basic provides a detailed discussion ofhow Fitts' law can be used
statistics. in HCI.
Interview 457
and the procedure is carefully described so that oth- ing is about what computers can do, the new comput-
ers can replicate it. I tell my students that experiments ing is about what users can do."
have two parents and three children. The parents are
"a practical problem" and "a theoretical foundation" JP: But hasn't HCI always been about what users
and the three children are "help in resolving the prac- can do?
tical problem," "refinements to the theory," and "ad- BS: Yes, but HCI and usability engineering have
vice to future experimenters who work on the same been more evaluative than generative. To clarify, I
problem." believe that deeper theories about human needs will
By contrast, a usability test studies a small num- contribute to innovations in mobility, ubiquity, and
ber of users who carry out required tasks. Statistical community. Information and communication tools
results are less important. The goal is to refine a prod- will become pervasive and enable higher levels of so-
uct as quickly as possible. The outcome of a usability cial interaction. For example, museum visitors to the
test is a report to developers that identifies frequent Louvre, white-water rafters in Colorado, or family
problems and possibly suggests improvements, maybe travelers to Hawaii's Haleakala volcano will be able
ranked from high to low priority and from low to high to point at a sculpture, rock, or flower and find out
developer effort. about it. They'll be able to see photos at different sea-
sons taken by previous visitors and send their own
JP: What do you see as the important usability issues pictures back to friends and grandparents. One of our
for the next five years? projects allows people to accumulate, organize, and
BS: I see three directions for the next five years. The retrieve the many photos that they will take and re-
first is the shift from emphasizing the technology to ceive. Users of our PhotoFinder software tool can or-
focusing on user needs. I like to say "the old comput- ganize their photos and annotate them by dragging
Interview 459
and dropping name labels. Then they can find photos spect of their colleagues. Evidence is accumulating
of people and events to tell stories and reminisce (see that designs that facilitate multiple natural-language
figure). versions of a website also make it easy to accom-
HCI researchers who understand human needs modate end-user customization, convert to wireless
are likely to come up with innovations that help physi- applications, support disabled users and speed modifi-
cians to make better diagnoses, enable shoppers to cations. The good news is that satisfying these multi-
find what they want at fair prices, and allow educators ple requirements also produces interfaces that are
to create more compelling experiences for students. better for all users. Diversity promotes quality.
The third direction is the development of tools to
let more people be more creative more of the time.
JP: What are the other two directions? Word processors, painting tools and music-composi-
BS: The second opportunity is to support universal tion software are a good starting point, but creative
usability, thereby bringing the benefits of information people need more powerful tools so that they can ex-
and communications technology to the widest possible plore alternative solutions rapidly. Creativity-support
set of users. website designers will need to learn how tools will speed search of existing solutions, facilitate
to attract and retain a broad set of users with diver- consultations with peers and mentors, and record the
gent needs and differing skills. They will have to un- users' history of activity so that they can review or re-
derstand how to accommodate users efficiently with vise their work.
slow and fast network connections, new and old com- But remember that every positive development
puters, and various software platforms. System de- also has a potential dark side. One of the formidable
signers who invent strategies to accommodate young challenges for HCI students is to think carefully about
and old, novice and expert, and users with varying dis- how to cope with the unexpected and unintended.
abilities will earn the appreciation of users and the re- Powerful tools can have dangerous consequences.
Design and evaluation in the
-
15.1 Introduction
Textbooks about design and usability testing often make the processes sound
straightforward and able to be followed in a step-by-step manner. However, in
the real world bringing together all the different aspects of a design is far from
straightforward. It is only when you become involved in an actual design project
that the challenges and multitude of difficult decisions to be made become appar-
ent. Iterative design often involves carrying out different parts of a project in par-
allel and under tremendous pressure. The need to deal with different sets of
demands and trade-offs (e.g., the need for rigorous testing versus the very limited
availability of time and resources) is a major influence on the way a design project
is carried out.
The aim of this final chapter is to convey what interaction design is like in the
real world by describing how others have dealt with the challenges of an actual de-
sign project. As you will have noticed, we have written primarily about design in
Chapters 6-9 and evaluation in Chapters 10-14. This was to enable us to explain
the different techniques and processes involved during a design project. It is impor-
tant to realize that in the real world these two central aspects are closely integrated.
You do not do one without the other. In particular, the main reason for doing an
462 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
more practical problems and dilemmas that can arise when working on an actual
project.
We present the case studies through a set of questions that draw out a number
of key issues for each project. For example, mapping a large number of functions
onto a much smaller number of buttons is key for mobile devices; understanding a
child's world is key when designing for children; evaluating the current system is
key when redesigning any large system.
Comment All these are relevant in the design of mobile communicators, but one that needs particular
attention is environmental requirements. Because the device is aimed at users "on the
move" in all kinds of places, the environment in which it should work or its "context of use"
is verv variable.
Core environmental issues include how to make the device small and light
enough to be carried around in a pocket or small handbag. This means the device
must be made of light materials and should be physically small, and also the software
must be designed to work with a small screen and limited memory. The system must
464 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
allow for a whole range of situations: noisy or quiet, well lit or poorly lit, hot or cold,
wet or dry, vibrating or still, and so on. These constraints have implications for the
use of audio, for the levels of display lighting, and for the physical robustness of the
device, among other things.
Another consideration in the design of this kind of communication device is
what the users are doing when using it. A typical user is likely to be doing some-
thing else at the same time as using the communicator. This may be walking
around, avoiding obstacles, looking for traffic, etc., or it may be listening for a train
announcement or a call from children. So users are trying to combine at least three
things: communicating with the device (talking, typing, or whatever), performing
the "external" activity (walking, listening, etc.), and operating the device. This cre-
ates quite a high cognitive load, so operating the device should occupy as little at-
tention as possible.
Tasks are very likely to be interrupted by external events, so users need to
know where in an interaction sequence they are at any time, and be able to restart
~
the sequence after an interruption. For a mobile communicator designed to access
the Internet, this raises an interesting design trade-off: how long should a commu- I
nicator remain connected to the Internet after activity has apparently ceased? A
balance is needed between disconnecting so as to minimize connection costs, and
remaining connected in a stable state to allow the resumption of an interrupted
task. The best option may be to let users set their own time-out period, but this
adds to the complexity of operation.
Another implication of the fact that users are likely to be doing other things in
parallel with operating the device is that the communicator may need to be oper-
ated with one hand, or indeed in a hands-free mode. For example, someone who is
walking down the street carrying a bag when the phone rings needs to be able to re-
spond without stopping and putting the bag down, i.e., the operation needs to be
one-handed.
For mobile devices in particular, tasks tend to be time-critical, ad hoc, trig-
gered by other people or events, relatively brief, low in terms of attention to be ap-
plied to the task, and very personal. Because of these characteristics, the flow
among tasks must be smooth. It seems that easy transition between contact data-
base, telephone, and calendar is particularly important for mobile devices. The na-
ture of these tasks and the environmental requirements for mobile devices have
implications for evaluation, as we discuss in section 15.3.2.
Because this device will be mobile it must be simple to use and not involve
much training. It also needs to be robust and reliable, as the user is most likely to
be away from any significant technical support.
as email and high-speed WAP connections, it also runs a variety of office applica-
tions including word processing, spreadsheets, and presentations.'
This case study is based on material from Vaananen-Vainio-Mattila and Ruuska
(2000).
What kind of IiFecycle does Nokia use? Nokia follows a user-centered approach to
concept development that includes contextual design techniques. They point out
that "one clear strength of the methodology is that it makes ethnographic research
manageable in a business environment" (Vaananen-Vainio-Mattila and Ruuska,
2000, p. 197). As discussed in Chapter 9, the "rich" descriptions arising from an
ethnographic study are often not in a form that can be readily translated into a de-
sign specification. Nokia tries to get around this problem by carrying out ethno-
graphic studies in combination with other methods. This enables them to come up
with a set of detailed requirements.
Figure 15.2 shows a top-level model of Nokia's approach. It has four main
steps:
1. The cycle begins with data gathering. The data is collected through market
research studies, data from previous projects, and contextual techniques.
'Description summarized from information on the Nokia website www.nokia.com,as of February 2001.
466 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
Contextual
data gathering
Concept
creation evaluatlon
2. Scenarios and then task models are built by analyzing the data collected,
and initial designs are proposed.
3. Many iterations of design and evaluation are performed before the final de-
sign emerges. During this process, it may be found that more data is required,
so further data gathering is conducted. The evaluation involves contextual in-
terviews with paper-based prototypes to get feedback on first designs, and us-
ability testing once the design is sufficiently advanced. Evaluation sessions
emphasize the most important user tasks, as determined by the data gathering.
Once the design is advanced enough, high-fidelity simulations of the de-
sign are constructed.
Simulation tests are conducted with end users, and expert reviews are
performed. Functional prototypes are tested with end users for feedback
on long-term acceptability, efficiency, and utility of the concept.
4. During the last iteration phase, the final design is tested with end users and
expert usability specialists.
How does this cycle of activities differ from the interaction design model introduced in
Figure 6.7?
Comment This cycle also has a focus on iteration through prototyping and evaluation, which is the
basis of the model in Chapter 6. However, this cycle distinguishes between concept creation
and concept evaluation. scenarios and task modeling are used at the concept creation phase
but simulation tests are used in the concept evaluation phase.
What challenges does this approach raise? Nokia is very conscious of the need for
iterative design and evaluation in the development of mobile communicators. They
15.3 Designing mobile communicators 467
also use participatory design to a degree, but they point out that users will not nec-
essarily have the vision of future possibilities that would allow innovative design in
the same way as they might if asked to help design a familiar application like a web
browser. Nokia is also well aware of the challenges of evaluating an innovative
product like a communicator. These include:
The difficulty of testing in all possible scenarios.
The difficulty of testing human communication practices, especially when
developing innovative products that will encourage novel behavior.
The difficulty of testing services that cannot all be known beforehand.
What happens when the product is new and there are no users to test? At Nokia,
quick and effortless access to critical tasks is a key design driver, and usability tests
are used to evaluate the flow of tasks that have been found critical for mobile devices.
In a competitive and innovative market, other evaluation challenges may also
arise. For example, consider the original Nokia communicator (the N9000). This
was the first of its kind on the market. This had implications for how it could be
evaluated because the device could not be shown to people outside the develop-
ment team for fear of losing the "first-in-the-market" advantage. Thus the first ver-
sion on the market did not have the benefit of testing with real users. Although
extensive paper-based prototyping and simulations were produced, the evaluations
were limited to a small group of people.
What methods does Nokia use? Nokia uses a number of methods in its develop-
ment cycle, in particular "usage scenarios." Usage scenarios are high-level descrip-
tions of uses of the device, based on data collected from representative
stakeholders. They differ from the generic scenarios described in Chapter 7 in that
they focus specifically on concept creation and high-level design considerations. An
example of a usage scenario developed by Nokia is given in Figure 15.3.
What do design teams do next once they have created a set of scenarios? ~t
Nokia, the design teams use the usage scenarios they have developed to identify
critical user tasks and their structure. These task descriptions, which are more
detailed than the original descriptions provided in the usage scenarios, are then
used to consider lower-level design issues. A sample critical user task is shown in
Figure 15.4.
1 To create scenarios, appropriate tasks and stakeholders will need to be identified. Who
would the stakeholders be, and what techniques might be used to investigate their needs?
Comment First, the tasks to be performed and the stakeholders who might be asked about require-
ments would have to be identified. Stakeholders for a mobile device include users, develop-
! ers, telephone companies, computer hardware and software vendors, and their shareholders.
At least in theory, a user may be almost any member of the population, but in practice, only
I
certain sections of the population are likely to be users. Given the wide functionality of the
communicator, the most likely users are professionals.
I
7
If we assume that the user group is professional, then it is necessary to find out more
about the tasks they perform. This could be done using questionnaires, interviews and obser-
vation, or focus groups, but there would be some other issues to consider. A professional
who is constantly on the move will be difficult to track down. However, interviews and ques-
tionnaires can be administered in different settings such as at trade fairs where many profes-
sionals are all gathered in one place. This would potentially provide a ready audience,
reduce travel expenses, and supply immediate responses.
Performing standard observations in an office has its problems, but observing someone
on the move, in all the possible locations in which they might use the device, opens up a
whole new set of issues. Mobile devices are intended to be used anywhere, so where are ob-
servations performed, and how closely can the participants be followed?
What usabiliy and user experience goals are important in designing this kind of
device? A mobile communicator would be expected to meet the normal usability
goals that we have discussed before. But what about user experience goals? Person-
alization has been identified as significant in user satisfaction; however, a balance
15.3 Designing mobile communicators 469
Receiving
(2) Reading and replying to a message
(2) Reading and calling back the sender
(3) Reading and erasing a message
(4) Reading and storing a message with a new name, etc.
Figure 15.4 Sample user tasks.
470 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
must be struck between allowing flexibility and providing sensible default values so
that users don't have to customize settings unless they want to.
Mobile communicators are intended to support users wherever they are, so
they must be compatible with the users' lifestyles. Designers must therefore under-
stand the design characteristics that make the communicator attractive to different
user groups, and those characteristics that will vary from group to group. If we con-
sider the users as business people, then the important user experience goals are
likely to include being helpful, motivating, aesthetically pleasing, and rewarding. If
we consider children, then entertainment and fun are likely to be more important,
while for teenagers its physical appearance might be more significant.
How does Nokia design a communicator's physical aspects? Deciding how many
keys to have and how to map them onto a much larger set of functions is a difficult
design challenge in any mobile device (see Box 15.1). For example, in the Nokia 7110
mobile phone, the problem of limited keys and limited space was dealt with by pro-
viding softkeys with context-sensitive functions that change depending on where the
user is in the interaction sequence. This allows the keys to perform different functions
depending on the other contextual issues. The softkeys allow the user to do a variety
of things, such as make selections, enter, edit, or delete text. The current label for
each softkey is displayed at the bottom of the screen, near the relevant key. There is,
15.3 Designing mobile communicators 471
of course, a balance to be struck between having too many softkeys, each with limited
functionality, and having only a few keys that can be overloaded with too many func-
tions. In the end, the Nokia 7110 (Figure 15.5) was designed with just two softkeys
that performed multiple functions. (Vaananen-Vainio-Mattila and Ruuska, 2000).
Textual input becomes a major problem when the number of input keys is re-
stricted by the design. Having only a small number means the users must con-
stantly "peck" at a few keys, typically using their thumbs. Trying to place too many
keys in a heavily constrained space means that the user is likely to press the wrong
key or two keys at once. How was this pcoblem handled by Nokia? They opted for
a small number of keys but in combination with a way of speeding up the typing of
words, through having the communicator guess what the user is writing. In particu-
lar, the Nokia 7110 introduced the T9 predictive text method that allows speedy
input of words based on a dictionary. The phone proposes a likely word once the
user has typed a few characters. The user then either selects the proposed word
and moves on to the next word, or rejects it and continues to enter the current
word.
Communicators have also been designed to include a function button to let the
user customize the interface to a limited aegree, for example by allowing a favorite
application to be associated with one of the hard keys.
472 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
If you are sitting near a desktop computer, study the interface of the piece of software that is
running. If you are not near one, then think of the application you run most regularly on a
I 474 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
desktop machine. Imagine what this interface would look like if you were to reduce the
screen size to a mere 158 mm x 56 mm (the size of the Nokia 9210 communicator). What
difficulties can you see? What implications do you think this has for software design, and
also for the user who is swapping between desktop systems and mobile systems on a regular
basis?
Comment If the same screen design is carried over to the mobile device then either everything will
have to be miniaturized, so that the tool bars, icons and menus will become unreadable, or
left at the same size, so that they will take up too much space on the screen. The interface
therefore must be designed differently. This has implications for consistency for users who
might be using the same application in a desktop environment and on the mobile device.
What kind of user testing does Nokia use? As mentioned earlier, there were confi-
dentiality problems in testing the first generation of communicators on the in-
tended user population. Hence, user testing could be done only after the product
was released on the market. One kind of summative testing Nokia did was to find
out what questions people have when first using the communicator. Users were
given the device to use for some weeks and were then asked to report on positive
I
and negative features. The results from this study confirmed the developers' con-
cerns about the effects of consistency with other similar applications designed to
run on desktop machines. Another study involved sending questionnaires to more
critical communicator users whose experience ranged from 0 to 12 months, to find
out if their reactions were similar.
As can be seen from this case study, Nokia uses a number of methods to de-
velop their communicators for the general public. Furthermore, many design deci-
sions and problems have to be dealt with, ranging from the lack of real users for
testing, to how to let users send text messages with only a few keys and a very con-
fined space.
Which approach did Philips use? The Philips process of development for this
particular communicator made extensive use of prototyping techniques and par-
ticipatory design. Children were involved from the initial concepts stage right
through to final product testing. Each time a prototype was produced, it was
shown to children for comment and feedback. A central part of the design process
involved developing interface metaphors. Again, when ideas for metaphors were
15.3 Designing mobile communicators 475
Figure 15.6 (a) The communicator with pen. (b) Product display showing 'the world'.
What usability and user experience were considered important? In the Nokia
communicator example we saw the importance of usability goals focusing on effec-
tiveness and efficiency, especially the need to move smoothly among critical tasks. In
contrast, Philips focused more on the user experience goals of being enjoyable, en-
tertaining, and fun. Other goals were that it should encourage creativity and provide
personal and magical applications. The girls had expressed a specific desire for these.
What functionalify did the communicator provide? The communicator was de-
signed to have a touch-sensitive screen, pen input, infrared communications, and
audio output (see Figure 15.6(a)). The interface was built on the metaphor of a
world in which the users can move around freely, picking things up and starting ap-
plications (see Figure 15,6(b)). Available applications include a calendar, alarm
clock, photo album, fortune teller, and communicator. The user can also perform
tasks such as writing letters, composing tunes, drawing pictures, and sending them
to other similar devices (see Figure 15.7).
What methods were used? Development of the product was divided into four
phases: initiation, concept creation, specification, and finalization. Whereas Nokia
adopted techniques from contextual design, Philips used mainly low-fidelity proto-
typing techniques for this particular project. Different prototypes were used
throughout the development and for different purposes.
During the initiation phase, foam models were used to elicit feedback on the
color, shape, size, styles, and robustness of the device, among other things. Using
group discussions to encourage the youngsters to express their opinions a lot of
feedback was gained from the foam models, even though the models contained no
functionality. For example, children liked the idea of protecting the screen when
carrying it, so they wanted different bags and cases to be provided for it; privacy
was an important aspect, so they did not want it easily accessible by others; the pen
should be stored safely within the device rather than underneath it for fear of it
I 476 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
@~@w=typo
q U z i n g ycar l ika
$gm ecrn t ~ ; t p o
.*'""...................
being lost. One surprising result was that the children did not like the colors. The
initial colors were bright (See Figure 15.8 on Color Plate 8), but they wanted dark
colors more akin to their parents' hi-fi equipment at home.
The session with the models also provided input for the first user interface de-
sign, which was animated using a computer-based tool. This was used to explore
navigation, pen-based dialog, types of application, and visual style.
During the concept creation phase, dynamic visualizations, which are like the
storyboards described in Chapter 8 but are computer-based, were used to capture
the initial ideas about interface and functionality (see Figure 15.9).
During the specification phase, foam models were again used to decide the size
of the screen appropriate for writing on while standing up. As well as the size, dif-
ferent display formats were simulated (see Figure 15.10). These prototypes proved
to be effective, again eliciting a lot of useful feedback. For example, left-handed
users used the upper left part of the product to lean on while writing and the right-
handed children used the lower right portion, yielding the design implication that
the product should have hand resting places at these two points.
Also during specification, ideas for the interface design were evaluated by
youngsters at a fair. There were two main contenders for the interface design.
15.3 Designing mobile communicators 477
I
One provided direct access to each of the applications in the device, represented
as a static matrix of options. This meant that the visual presentation and size of
the applications was limited by the size of the screen. The other interface
worked by indirect access, through a navigation model based on the idea of a
window moving over a linked list of options.
Prototyping was also used in the finalization phase for market evaluations.
Figure 15.10 Foam models for investigating display size and screen format.
478 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
I
I
Prototypes are often used to answer specific questions. In this development, what questions
were answered by producing and evaluating the foam models?
Comment Foam models were used at two specific points in the development to answer clear ques-
tions. The first set was used to consider the physical design such as size and color. They
also elicited comments about storing the pen, covering the display, and having a carrying
bag. The second set was used to design the display size and format. This also had the side
effect of finding out useful information about where children would rest their hands on
the device.
How much did the children participate in the design? One of the problems with
participatory design is knowing how much to involve the users. Trying to involve
children too much can be counterproductive, boring them and sometimes making
them feel out of their depth. Asking children to participate too little can end up
making them feel as if their views and ideas are not being sufficiently taken into
account.
The Philips design team involved the children in design and evaluation from
the very beginning. The first participatory design session was held during the ini-
tiation phase at a local international primary school. The session investigated
the social and personal lives of 7 to 12 year-olds. Groups of 8 to 10 children were
engaged in discussions and were asked to draw sketches of their ideal prod-
uct. They were also asked to write stories about the use of the product, so that
designers could get some contextual information about how it might be used.
From this first session, it was clear that the concept was well received by the
children. They particularly liked the communication, the pen-based interface,
and its multifunctionality.
There were clear differences between boys, who wanted a broader range of func-
tionality, and girls, who focused on communication. The ability to personalize was
important to both groups. For example, one girl wanted the device to cough when a
message arrived so that the teacher wouldn't know she was using it during class.
The whole design team was present at participatory design sessions. Spending
time to get the children's opinions and to enter their world to understand how they
perceive things was important for the success of the product.
One lesson that the designers drew from this exercise echoes a comment by
Gillian Crampton Smith in the interview at the end of Chapter 6: users are not de-
signers. In this instance, the children were limited in what they could design by
what they knew and what they were used to. Another stakeholder group, parents,
expected keyboard input, as they believed this to be more sophisticated than pen
input, which was seen as old fashioned.
On the other hand, children are often more imaginative than adults, so involv-
ing the children was useful when discussing innovative ideas, or when only partial
ideas were available. Working with children like this rather than adults requires a
different approach, yet both adults and children need to appreciate each others'
strengths and weaknesses. Box 15.3 describes the intergenerational design teams
that Druin works with in projects at the University of Maryland.
15.3 Designing mobile communicators 479
15.3 Designing mobile communicators A81
Suggest ways of helping adults and children feel comfortable together and gain mutual ac-
ceptance.
Cornrnent Allison Druin asks everyone to dress casually in jeans, sneakers and T-shirts. The group
works together at shared tables or on the floor. Snacks are important in creating a relaxed
environment, and everyone uses first names. The goal is to create a group in which everyone
respects each other's contributions and accepts and welcomes different contributions. Chil-
dren are used to being controlled by adults and adults are used to being in control, and it
takes time to break down these ingrained stereotypes.
What conceptual models did they design? By the concept creation phase, the im-
portance of four goals for the product and its interface had emerged:
1. to support communication by stimulating social interaction among children I
2. to evoke creativity and fantasy
3. to be "aliven-unexpected fun things should happen, surprising and plea-
surable to the user, that give the product more character
1
4. to enhance intimacy-the product is a personal asset containing personal
information
Five metaphors were developed by designers based on these values. Each
metaphor was represented by a story. Figure 15.14 shows an illustration of one
metaphor: the wizard. Specific metaphor workshops were conducted to find out
how the girls reacted to the metaphors. They were asked to create a collage to visu-
alize the metaphors, showing what they understood by them. The collages were a
combination of drawings, essays, and existing pictures. The metaphor workshop
showed that the girls were interested in being able to create, communicate, and or-
ganize personal things.
How did they evaluate the concepfuaI model? During the finalization stage, usabil-
ity evaluations with children were performed to investigate the user interface itself
and also to answer specific questions concerned with ideas for games, and writing
performance. In most sessions, users were asked to play with the device for a cer-
tain period of time before giving feedback.
What lessons were learned from this case study? Many lessons were learned from
developing an innovative product using a combination of participatory design and
user testing. Some practical advice offered by Oosterholt and colleagues that can
be generalized to the design of other interactive products is:
Specify Your User Requirements And Define Milestones The rationale behind
specifying user requirements is not just to develop them, but to make sure that the team
agrees on the assumptions and realizes how and when they have been and can be
changed.
A Product Is Not Designed in a Vacuum Start thinking about additional and follow-
up products at an early stage, so one does not have to change suddenly or add extra
functionality in a later phase.
Users Are Not Designers Not all answers can be generated by user or market tests.
Users will generally relate any new product concept to existing products.
Act Quick And Dirty If Necessary Often, the purpose of user testing is not to decide
whether one interface concept is more usable than an alternative concept, but to
discover issues that are important to the children. Small qualitative sessions of user
involvement are therefore often appropriate.Furthermore, such sessions provide an
opportunity for designers to "enter" the children's world.
15.4.1 Background
Everyone over age 18 living in the US must submit a tax return each year either
individually or included in a household. The age varies from country to country
but the process is fairly similar in many countries. In the US this amounts to
over 100 million tax returns each year. Completing the actual tax return is com-
plex, so the IRS provides information in various forms to help people. One of
the most used information services is TRIS, which provides voice-recorded in-
formation through an automated system. TRIS also allows simple automated
transactions. Over 50 million calls are made to the IRS each year, but of these
only 14% are handled by TRIS. This suggested to the designers that something
was wrong.
is auditory. How can you possibly remember all the instructions and construct an
accurate mental model in your head to help you?
Once in TRIS, users can take various paths that:
Provide answers to questions about tax law (provided by one of the two
other computer systems accessible through TRIS).
Allow people to order all the forms and other materials they need to com-
plete their tax return (provided by the two other systems accessible through
TRIS).
Perform simple transactions, such as changing a mailing address, ordering a
copy of a tax return, or obtaining answers to specific questions about a per-
son's taxation.
Reach a live operator if none of the above options are applicable or the user
cannot figure out how to use the system.
Comment Much of TRIS is hidden to the users. Their interaction with it is indirect, through listening to
responses from the system and pressing various keys (whose meaning is always context de-
pendent). There is no visual interface and users have only speech output to support their
mental model development. Because speech is transient, unlike visual feedback, users must
work out the conceptual model without visual cues. The user interface to this system is a se-
ries of menus in a tree structure and, since human short-term memory is limited, the struc-
ture of the system must also be limited to only a few branches at each point in the tree.
Another problem is that TRIS accepts input only from the telephone number keypad, so it's
not possible to associate unique or meaningful options with user choices.
What are the main problems identified with the existing version o f TRIS? Because
one of the main problems users have when using TRIS is developing a mental
model of the system it is hard for users to find the information they need. In addi-
tion, TRIS was not designed to reveal the mapping of the underlying systems and
often did things that made sense from a processing point of view but not from the
user's. This is probably because the programmers took a data-oriented view of the
system rather than a user-oriented one. For example, TRIS used the same software
routine to gather both a social security number and an employee identification
number for certain interactions. This may be efficient from a code-development
standpoint, since only one code module needs to be designed and tested, but from
the user's perspective it presented several problems. The system always had to ask
the user which type of number was expected, even though only one of these num-
bers made sense for many questions being asked. Consequently, many users unfa-
miliar with employee identification numbers were not sure what to answer, those
who knew the difference wondered why the system was even asking, and all users
had yet another chance to make an entry error.
15.4 Redesigning part of a large interactive phone-based response system 485
What methods did the usabiliiy experts use to identi& the problems with the current
version of TRlS? To begin with the usability specialists did a general review of the
literature and industry standards and identified the latest design guidelines and cur-
rent industry best practices for interactive voice response (IVR) systems. These
guidelines formed the basis for a heuristic evaluation of the existing TRIS user in-
terface and helped identify specific areas that needed improvement. They also used
the GOMS keystroke-level modeling technique to predict how well the interface
supported users' tasks. Menu selection from a hierarchy of options is quite well
suited to a GOMS evaluation, although certain modifications were necessary to es-
timate values for average performance times.
What did they do with the findings of the evaluation? Once the analysis of the ex-
isting interface and user tasks was complete, the team then followed a set of design
guidelines and standards, to develop three alternative interfaces for the Auto At-
tendant part of TRIS. An expert peer panel then reviewed the three alternatives
and jointly selected the one that they considered to have the highest usability. The
usability specialists also performed a further GOMS analysis for comparison with
the existing system. The analysis predicted that it would only take 216.2 seconds to
make a call with the new system, compared with 278.7 seconds with the original
system. While this kind of prediction can highlight possible savings, it says little
about which aspects of the redesign are more effective and why. The usability spe-
cialists, therefore, needed to carry out other kinds of user testing.
Why is it that the results from a GOMS analysis do not necessarily predict the best design?
Comment The keystroke-level analysis predicts performance time for experts doing a task from begin-
ning to end. Not all of the users of TRIS will be experts, so performance time is not the only
predictor of good usability.
The usability specialists did three iterations of user testing in which they simulated
how the new system would work. When they were confident the new Auto Atten-
dant interface had sufficient usability, they redesigned a subset of the underlying
functionality. A new simulation of the entire Auto Attendant portion of TRIS was
then developed. It was designed to support two typical tasks that had been identi-
fied earlier as problematic, to:
find out the status of a tax refund
order a transcript of a tax return for a particular year
These tasks also provide examples of nearly all of the user-system interactions with
TRIS (e.g., caller identification, numeric data entry, database lookup, data play-
back, verbal instructions, etc.). A separate simulation of the existing system was also
developed so that the new and existing designs could be compared. The user inter-
action was automatically logged to make data collection easier and unobtrusive.
486 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
What conflicts can arise when suggesting changes for improvement? When carry-
ing out an evaluation of an existing product, often "jewels in the mud" stick out-
glaring usability problems with a system that, if changed, could result in significant
improvements. However, conflicts can arise when suggesting such changes, espe-
cially if they may decrease the efficient running of the system. The usability special-
ists quickly became aware that the TRIS system was making too many cognitive
demands on users. In particular, the system expected users to select from too many
menu choices too quickly. They also realized that immediate usability improve-
ments could be gained by just a few minor changes: breaking menu choices into
groups of 3-5 items; making the choices easier to understand; and separating gen-
eral navigation commands (e.g., repeat the menu or return to the top menu) from
other choices with pauses. However, to make these changes would require adding
additional menus and building in pauses in the software. This conflicts with the way
engineers write their code: they are extremely reluctant to purposely add addi-
tional levels to a menu structure and resist purposely slowing down a system with
pauses.
I
The gap between programmers' goals and usability goals is often seen in large systems like
I TRIS that have existed for some time. How might such problems be avoided when designing
new systems?
I
Comment It can be hard to get changes made when a system has been in operation for some time,
but it is important for interaction designers to be persistent and convince the programmers
of the benefits of doing so. Involving users early in design and frequent cycles of 'design-
test-redesign' helps to avoid such problems in the design of new systems.
How were the usabilij/ tests devised and carried out? In order to do usability tests,
the usability specialists had to identify goals for testing, plan tasks that would sat-
isfy those goals, recruit participants, schedule the tests, collect and analyze data,
and report their findings. Their main goals were to:
evaluate the navigation system of the redesigned TRIS Auto Attendant
compare the usability of the redesign with the original TRIS for sample tasks
Twenty-eight participants were recruited from a database of individuals who
had expressed interest in participating in a usability test. There was an attempt to
recruit an equal number of males and females and people from a mixture of educa-
tion and income levels. The participants were screened by a telephone interview
and were paid for their participation. The tests were conducted in a usability lab
that provided access to the two simulated TRIS systems (the original design and
the redesign). The lab had all the usual features (e.g., video cameras) and a tele-
phone. Timestamps were included in the videotape and the participants' comments
were recorded.
The order of the tasks and the order in which the systems were used was
7
counter-balanced. This was done so that participants experience on one system or
15.4 Redesigning part of a large interactive phone-based response system 487
task would not distort the results. So, half the participants first experienced the
original TRIS design and the other half first experienced the redesigned TRIS sys-
tem. That way, if a user learned something from one or other system the effects
would be balanced. Similarly, the usability specialists wanted to avoid ordering ef-
fects from all the participants doing the same task first. Half the participants were
therefore randomly allocated to do task A first and the other half to do task B.
Taking both these ordering effects into account produced a 4 X 4 experimental de-
sign with eight participants for each condition.
Compare the description of this testing procedure with that for HutchWorld in Chapter 10.
What differences do you notice and how can they be explained?
Comment The testing for Hutchworld is more typical. There were fewer participants and only one ver-
sion of the system was tested at any time. In the TRIS test a larger number of participants
were involved and the tests were more like an experiment. TRIS is complex, particularly the
mapping between TRIS and the underlying functionality, although the system's purpose is
clearly defined. By the time the usability specialists started the tests, they believed that they
had fixed the major usability problems because they had responded first to the expert re-
viewers' feedback and then to the GOMS analysis. They were therefore confident that the
new design would be better than the original one, but they had to demonstrate this to the
IRS. This style of testing was also possible because there were thousands of potential users
and the cost savings over 50 million calls justified the cost of this elaborate testing procedure.
How did they ensure that the participants tested were a representative set of users?
In order to get demographic information to make sure the participants were repre-
sentative, a questionnaire was given to all of them. It revealed a broad range of eth-
nicity, educational accomplishment, and income among the 18 women and 14 men
who took part in the tests. Most had submitted tax returns during the last five years
and most were experienced with interactive voice response systems. Eight partici-
pants indicated strong negative feelings about IVR systems, saying they were frus-
trating, time-consuming, and user-unfriendly.
What data was collected during the user testing? A total of 185 subnavigation steps
made up the two tasks for the current TRIS. Participants successfully completed 91
steps on their first attempt (49% of the total). This was compared with a similar
number of steps for the redesigned system: 187 subnavigation steps made up the
same tasks for the redesigned TRIS. Participants were able to complete 117 of the
steps on the first attempt (62% of the total), indicating an improvement of over 10%.
The average time to perform tasks was also analyzed. The summary data for
the two tasks is shown in Table 15.1. As you can see, performance time on the re-
designed system was much better for both tasks.
How was the user's satisfaction with the system assessed? At the end of each task,
participants were asked to evaluate how well they thought the system enabled
488 Chapter 15 Design and evaluation in the real world: communicators and advisory systems
Table 15.1 Average total task completion time by systems in seconds (s)
User satisfaction questionnaires like the ones just described enable usability specialists to
get answers to questions they regard as important. How can you make sure you collect opin-
ions on all the topics that are most important to users?
Comment Asking users' opinions informally after pilot testing the questionnaire helps to make sure
that you cover everything, but it is not foolproof. Furthermore, you may not want to increase
the length of the questionnaire. Two other approaches that could be used separately are to
ask users to think aloud and to use open-ended interviews. However, the think aloud
method can distort the performance measures, so that is not such a good idea. Open-ended
interviews are better, and this was done by the usability specialists in this case.
Participants were also invited to make any additional comments they wanted about
the two systems. These were then categorized in terms of how easy the new system
was considered to navigate, whether it was less confusing, faster, etc. Specific com-
plaints included that some wording was still unclear and that not being able to re-
turn to previous menus easily was annoying. No matter how much usability testing
and redesign you do, there is always room for improvement.
Would it have been better to redesign the entire system? It would have been far too
expensive and time-consuming to redesign and test the whole system. A skill that
usability specialists need when dealing with this much complexity is how to limit
the scope of what they do and still produce useful results.
This case study has illustrated how to use different techniques in the evaluation
and redesign of a system. Expert critiques and GOMS analyses are both useful tools
for analyzing current systems and for predicting improvements with a proposed new
design. But until the systems are actually tested with users, there is no way of knowing
whether the predictions are accurate. What if users can theoretically carry out their
tasks faster but in practice the interface is so poor that they cannot use it? In many
cases, testing with real users is needed to ensure that the new design really does offer
an improvement in usability. In this case study, results from usability testing were able
to indicate that not only was the new design faster but users also liked it much better.
Summary
The three case studies illustrate how different combinations of design and evaluation tech-
niques can be used effectively together to arrive at a design for a new product or redesign of
an existing system. Quite different demands are placed on the design team when redesigning
an existing product compared with designing a new product. Many practical problems and
constraints will be encountered in both situations and experience of designing different sys-
tems will help you learn how to deal with them.
Key points
Design involves trade-offs that can limit choices but can also result in exciting design
challenges.
Prototypes can be used for a variety of purposes throughout development, including for
marketing presentations and evaluations.
The design space for making changes when upgrading a product is limited by previous
decisions.
The design space is much greater when building new products.
Rapid prototyping and evaluation cycles help designers to choose among alternatives in
a very short time.
Simulations are useful for evaluating large systems intended for millions of users when it
is not feasible to work on the system directly.
Piecing together evidence from data from different sources can provide a rich picture of
usability problems, why they occur, and possible ways of fixing them.
Further Reading
BREWSTER, S., AND DUNLOP, M. (2000) (eds.) Personal Tech- tains an excellent collection of practical articles describing how
nologies. Special issue on Human Computer Interaction and different information appliances have been developed, from
Mobile Devices, 4, 2&3. This collection of articles discusses interactive toys and games to a vehicle navigation system.
many issues in the design of mobile devices and would be a KILLAM, H. W. AND AUTR,., M. (2000) IVR interface design
good starting point for anyone interested in pursuing this area. standards: A practical analysis. proceedings of
BERGMAN, ERIC. (2000) (ed.) Information Appliances and Be- HFESIIEA 44th Annual Meeting. This paper describes as-
yond. San Francisco, CA: Morgan Kaufinann. This book con- pects of the TRIS study in more detail.
Reflections from the Authors
TO end the book, we each present some of our views about interaction design.
L* Helen: When I worked electronic. There is so much to learn from each other.
I look forward to it!
Yvonne: Writing this spaces to design for. For example, interaction design-
book has made me real- ers are now involved in designing interactive products
ize how much and how for use both indoors and outdoors (e.g., handheld de-
rapidly the field of inter- vices, wearables), for work, home, school, and leisure,
action design has ex- for both very large surfaces (e.g., interactive white-
panded in the last ten boards) and very small screens (e.g., mobile phone
years. When we wrote displays)-to name but a few.
our first textbook on What this amounts to is a growing need for new
human-computer inter- methods and techniques to help in the design and
action in the early '90s, evaluation of this new range of user experiences. As
the web hadn't even ar- we point out in the book, techniques developed for
rived and mobile and screen-based systems often do not scale up very well
wireless devices were and are inappropriate for other kinds of systems (e.g.,
still very much a dream. very large collaborative virtual environments or "in-
"WIMP" was very much habited TV" where there may be thousands of users
the paradigm which interface designers (sic) devel- interacting at the same time). In addition, new theo-
oped applications for. Now everything has changed. ries will also need to be developed to inform the de-
Technology has advanced so rapidly that interaction sign of user experiences that are enjoyable and
designers (sic) now need to think about a whole host meaningful and expand our cognitive and social capa-
of different issues, besides the way an interface bilities. I believe it is a very challenging time for both
should look and behave. Moreover, there is greater academic researchers and designers working in the
eclecticism, in terms of users, settings, activities, and commercial world.
References
ANNETT,J. AND DUNCAN, K. D. (1967) Task analysis multimedia publishing. In Proceedings of CSCW'97,
and training design, Occupational Psychology, 41, 279-286.
211-21. BEN ACHOUR, C. (1999) Extracting Requirements by
APPLE COMPUTER INC. (1993) Making IT Macintosh: Analyzing Text Scenarios, Thkse de Doctorat de
The Macintosh Human Interface Guidelines Com- UniversitC Paris-6.
panion (CD-ROM). BENFORD,S., BEDERSON, B. B., AKESSON, K. P.,
APPLE COMPUTER INC., (1987) Human Interface BAYON,V., DRUIN, A., HANSSON, P., HOURCADE,
Guidelines. Harlow, UK: Addison-Wesley. J. P., INGRAM, R., NEALE, H., O'MALLEY,C., SIM-
ANDREWS, D., PREECE, J., AND TUROFF, M. (2001) A SARIAN, K. T., STANTON, D., SUNBLAND, Y., AND
conceptual framework for demographic groups re- TAXEN,G. (2000) Designing storytelling technolo-
sistant to online community interaction. In Pro- gies to encourage collaboration between young
ceedings of IEEE Hawaiian International children. In Proceedings of CHZ'2000, 556-563.
Conference on System Science (HZCSS). BENNETT,J. (1984) Managing to meet usability re-
ATKINSON, P., AND HAMMERSLEY, M. (1994) Ethnog- quirements. In J. Bennett, D. Case, J. Sandelin,
raphy and participant observation. In N. K. Den- and M. Smith (eds.) Visual Display Terminals: Us-
zin and Y. S. Lincoln (eds.) Handbook o f ability Issues and Health Concern. Englewood
Qualitative Research. London: Sage. Cliffs, NJ: Prentice-Hall.
AUSTIN, J. L. (1962) How to Do Things with Words. BEWLEY, W. L., ROBERTS, T. L., SCHROIT, D., AND
Cambridge, MA: Harvard University Press. VERPLANK, W. (1990) Human factors testing in the
BAILEY, B. (2000) How to improve design decisions design of Xerox's 8010 'Star' office workstation. In
by reducing reliance on superstition. Let's start J. Preece and L. Keller (eds.). Human-Computer
with Miller's Magic 722. Human Factors Interna- Interaction: A Reader. Heme1 Hempstead, U K :
tional, Znc. www.humanfactors.com Prentice Hall, 368-382.
BAILEY, R. W. (2001) Insights from Human Factors BERGMAN, E . AND HAITANI, R. (2000) Designing the
International, Inc. (HFI) Providing consulting and Palmpilot: a conversation with Rob Haitani. In
training in software ergonomics. January. Information Appliances. San Francisco: Morgan
www.humanfactors.com/home/ Kaufmann.
BAINBRIDGE, D. (1999) Software Copyright Law (4th BEYER, H. AND HOLTZBLATT, K. (1998) Context~al
ed.). London: Butterworths. Design: Defining Customer-Centered Systems. San
BASILI,V., CALDIERA, G., AND ROMBACH, D. H. Francisco: Morgan Kauffman.
(1994) The Goal Question Metric Paradigm: Ency- BEYNON-DAVIES, P. (1997) Ethnography and infor-
clopedia of Software Engineering. New York: John mation systems development: ethnography of, for
Wiley & Sons. and within IS development. Information and Soft-
BATES, J. (1994) The role of emotion in believable ware Technology, 39,531-540.
characters. Communications of the A C M , 37(7), BIAS, R. G. (1994) The pluralistic usability walk-
122-125. through-coordinated empathies. In J. Nielsen
BAUM, F. L., AND DENSLOW, W. (1900) The Wizard of and R. L. Mack (eds.) Usability Inspection Meth-
O z . New York: Random House, Inc. ods. New York: John Wiley & Sons.
BAYM, N. (1997) lnterpreting soap operas and creat- BLUMBERG, B. (1996) Old Tricks, New Dogs: Ethol-
ing community: inside an electronic fan culture. In ogy and Interactive Creatures. PhD Dissertation.
S. Kiesler (ed.) Culture of the Internet. Hillsdale, MIT Media Lab.
NJ: Lawrence Erlbaum Associates, 103-119. BLY, S. (1997) Field work: is it product work? A C M
BELLOTTI, V AND ROGERS, Y. (1997) From web press Interactions Magazine, January and February,
to web pressure: multimedia representations and 25-30.
494 References
BBDKER, S. (2000) Scenarios in user-centered de- CARROLL, J. M. (1990) The Nurnberg Funnel. Cam-
sign-setting the stage for reflection and action. bridge, MA: MIT Press.
Interacting with Computers, 13(1), 61-76. CASSELL, J. (2000) Embodied conversational inter-
BBDKER, S., GREENBAUM, J. AND KYNG, M. (1991) face agents. communications of the ACM, 43(3),
Setting the stage for design as action. In J. Green- 70-79.
baum and M. Kyng (eds.) Design at Work: Cooper- CHENG, L., STONE, L., FARNHAM, S., CLARK, A. M.,
ative Design of Computer Systems. Hillsdale, NJ: A N D ZANER-GODSEY, M. (2000) Hutchworld:
Lawrence Erlbaum Associates, 139-154. Lessons Learned. A Collaborative Project: Fred
BOEHMB., EGYED A., KWAN, J., PORT, D. SHAH A., Hutchinson Cancer Research Center & Microsoft
AND MADACHY, R. (1998) Using the WinWin spi- Research. In Proceedings of the Virtual Worlds
ral model: a case study. IEEE Computer, 31(7), Conference 2000, Paris, France.
3344. CHI Panel (2000) Scaling for the Masses: Usability
BOEHM, B. W. (1988) A spiral model of software de- Practices for the Web's Most Popular Sites.
velopment and enhancement, IEEE Computer, CHIN, J. P., DIEHL,V. A., AND NORMAN, K. L. (1988)
21(5), 61-72. Development of an instrument measuring user sat- 1
BOGDEWIC, S. P. (1992) Participant observation. In B. isfaction of the human-computer interface. In Pro-
F. Crabtree and W. L. Miller (eds.) Doing Qualita- ceedings of CHI'88.
tive Research. Newbury Park, CA: Sage, 45-69. COCKBURN, A. (1995) Structuring use cases with
BORCHERS, J. (2001) A Pattern Approach to Interac- goals. members.aol.com/acockburn/papers/usecases. i
tion Design. Chichester, U K : John Wiley & Sons. htm.
BRAITERMAN, J., VERHAGE, S. AND CHOO, R. (2000) COGDILL, K. (1999) MEDLINEplus Interface Evalua-
Designing with Users in Internet Time. ACM Zn- tion: Final Report. College Park, MD: College of
teractions Magazine, VII.5,23-27. Information Studies, University of Maryland.
BREAZEAL, C. (1999) Kismet: A robot for social interac- COMER, E. R. (1997) Alternative lifecycle models. In
tions with humans. www.ai.mit.edu/projects/kismet/ Merlin Dorfman and Richard H. Thayer (eds.)
BRINKLIN, D. (2001) VisiCalc: Information from its Sofnsare Engineering. Piscataway, NJ: IEEE Com-
creators. www.bricklin.com/visicalc.htm puter Society Press.
BROWN, B. A., SELLEN,A. J., AND O'HARA, K. P. CONKLIN, J. AND BEGEMAN, M. L. (1989) gIBIS: A
(2000) A diary study of information capture in tool for all reasons. Journal of the American Soci-
working life. In Proceedings of CHI 2000, The ety for Information Science, 40(3), 200-213.
Hague, Holland, 43&445. CONSTANTINE, L. L. AND LOCKWOOD, L. A. D. (1999)
BUCHENAU, M. AND SURI, J. F. (2000) Experience Software for use. Harlow, UK: Addison-Wesley.
prototyping. In Proceedings of DZS 2000 Design COYLE, A. (1995) Discourse analysis. In G. M. Break-
Interactive Systems: Processes, Practices, Methods, well, S. Hammond, and C. Fife-Schaw (eds.) Re-
Techniques, 17-19. search Methods in Psychology. London: Sage.
BUTTON,G. A N D SHARROCK, W. (1994) Occasioned CRAIK, K. J. W. (1943) The Nature of Explanation.
practices in the work of software engineers. In Cambridge University Press.
Jirotka, M. and Goguen, J. A. (eds.) Requirements CRAMPTON SMITH, G. (1995) The hand that rocks the
Engineering: Social and Technical Issues. San cradle. ID Magazine, MaylJune, 60-65.
Diego: Academic Press, 217-240. CUSUMANO, M. A. AND SELBY, R. W. (1995) Mi-
CARD, S. K., MACKINLEY, J. D., AND SHNEIDERMAN, crosoft Secrets. London: Harper-Collins Business.
B. (1999) (eds.) Readings in Information Visualiza- CUSUMANO, M. A. AND SELBY, R.W. (1997) How Mi-
tion: Using Vision to Think. San Francisco: Mor- crosoft builds software. Communications of the
gan Kaufmann. ACM, 40(6), 53-61.
CARD, S. K., MORAN, T. P. AND NEWELL,A. (1983) DANIS,C. AND BOIES, S. (2000) Using a technique
The Psychology of Human-Computer Interaction. from graphic designers to develop innovative
Hillsdale, NJ: Lawrence Erlbaum Associates. systems design. In Proceedings of DZS 2000,
CARROLL, J. M. (2000) Introduction to the special 20-26.
issue on "Scenario-Based Systems Development," DENZIN, N. K., AND LINCOLN, Y . S. (1994) Handbook
Interacting with Computers, 13(1), 41-42. of Qualitative Research. London: Sage.
References 495
DIX, A., FINLAY,J., ABOWD, G., AND BEALE,R. ERIKSON, T. D., AND SIMON, H. A. (1985) Protocol
(1993) Human-Computer Interaction (2nd ed.). Analysis: Verbal Reports as Data. Cambridge, MA:
London: Prentice-Hall Europe. The MIT Press.
DOURISH, P. AND BELLO~TI, V. (1992) Awareness and FETTERMAN, D. M. (1998) Ethnography: Step by Step
coordination in shared workspaces. In Proceedings (2nd ed.) Thousand Oaks, CA: Sage.
of CSCW'92,107-114. FISH, R.S. (1989) Cruiser: a multimedia system for so-
DOURISH, P. AND BLY, S. (1992) Portholes: supporting cial browsing. SIGGRAPH Video Review (video
awareness in a distributed work group. In Proceed- cassette) Issue 45, Item 6.
ings of CH1'92,541-547. FISKE, J. (1994) Audiencing: cultural practice and cul-
DRAY, S. M. AND MRAZEK, D. (1996) A day in the life tural studies. In N. K. Denzin and Y. S. Lincoln
of a family: an international ethnographic study. In (eds.) Handbook of Qualitative Research. Thou-
D. Wixon and J. Ramey (eds.) Field Methods sand Oaks, CA: Sage, 189-198.
Casebook for Software Design. New York: John FITTS, P. M. (1954) The information capacity of the
Wiley and Sons, 145-156. human motor system in controlling amplitude of
DRUIN, A. (2000) The role of children in the design of movement. Journal of Experimental Psychology,
new technology. University of Maryland, Human- 47,381-391.
Computer Interaction Laboratory Technical Re- FITZPATRICK, G., MANSFIELD, T., KAPLAN, S.,
port 99-23. www.cs.umd.edu/hcil. ARNOLD., D., PHELPS, T., AND SEGALL, B. (1999)
DRUIN, A. (1999) The Design of Children's Sofnvare. Augmenting the workaday world with Elvin. In
San Francisco, CA: Morgan-Kaufmann. Proceedings of the Sixth European Conference on
DUMAS, J. S., A N D REDISH,J. C. (1999) A Practical Computer-Supported Cooperative Work. Dor-
Guide to Usability Testing (Revised Edition). Ex- drecht, The Netherlands: Kluwer, 431-450.
eter, UK: Intellect. FONTANA, A., AND FREY, J. H. (1994) Interviewing:
EASON, K. (1987) Information Technology and Orga- The art of science. In N. Denzin and Y. Lincoln
nizational Change. London: Taylor and Francis. (eds.) Handbook of Qualitative Research. London:
EBLING, M. R., AND JOHN, B. E. (2000) On the Con- Sage, 361-376.
tributions of different empirical data in usabil- FROHLICH, D. AND MURPHY, R.(1999) Getting physi-
ity testing. In Proceedings of ACM DIS 2001, cal: what is fun computing in tangible form? In
289-296. Computers and Fun 2, Workshop, 20 Dec. York,
EDWARDS, A. D. N. (1992) Graphical user interfaces UK.
and blind people. In Proceedings of ICCHP '92, GAVER, B., DUNNE, T., AND PACENTI, E. (1999) Cul-
Vienna: Austrian Computer Society, 114-119. tural probes. ACM Interactions Magazine, January
EHN, P. (1989) Word-oriented Design of Computer and February, 21-29.
Artifacts (2nd edn.) Hillsdale, NJ: Lawrence Erl- GENTNER,D. AND NIELSEN,J. (1996) The anti-Mac
baum Associates. interface. Communictions of the ACM, 39 (8)
E HN, P. AND KYNG,M. (1991) Cardboard computers: 70-82.
mocking-it-up or hands-on the future. In J. Green- GILL, J. AND SHIPLEY, T. (1999) Telephones-What
baum and M. Kyng (eds.). Design at Work. Hills- Features do Disabled People Need? RNIB.
dale, NJ: Lawrence Erlbaum Associates. GOETZ, J. P., AND LECOMFTE,M. D. (1984) Ethnogra-
EICK, S. G. (2001) Visualizing online activity. Com- phy and Qualitative Design in Educational Re-
munications of the ACM, 44(8), 45-50. search. Orlando, FL: Academic Press.
ERICKSON, T. D. (1990) Working with interface GOUGH, P. A., FODEMSKI, F. T., HIGGINS, S. A., A N D
metaphors. In B. Laurel (ed.). The Art of Human- R AY , S. J. (1995) Scenarios-an industrial case
Computer Interface Design. Boston: Addison- study and hypermedia enhancements. In Pro-
Wesley 65-73. ceedings of 2nd IEEE Symposium on Require-
ERICKSON, T., SMITH, D. N., KELLOGG, W. A., LAW, ments Engineering, IEEE Computer Society,
M., RICHARDS, J. T., AND BRADNER, E. (1999) SO- 10-17.
cially translucent systems: social proxies, persistent GOULD, J. D., AND LEWIS, C. H. (1985) Designing for
conversation and the design of "Babble". In Pro- usability: key principles and what designers think.
ceedings of CHZ'99,72-79. Communications of the ACM, 28(3), 300-311.
496 References
GOULD, J. D., BOIES, S. J., LEVY, S., RICHARDS, J. T., HARTSON, H. R. A N D HIX, D. (1989) Toward empiri-
AND SCHOONARD, J. (1987) The 1984 Olympic cally derived methodologies and tools for human-
Message System: a test of behavioral principles of computer interface development. International
system design. Communications of the ACM, Journal of Man-Machine Studies, 31,477-494.
30(9), 758-769. HAUMER, P., JARKE, M., POHL, K., AND WEIDEN-
GOULD, J. D., BOIES, S. J., LEVY, S., RICHARDS, J. T., HAUPT, K. (2000) Improving reviews of conceptual
AND SCHOONARD, J. (1990) The 1984 Olympic models by extended traceability to captured system
Message System: a test of behavioral principles of usage. Interacting with Computers, 13(1),77-95.
system design. In J. Preece and L. Keller (eds.) HEATH, C. AND LUFF, P. (1992) Collaboration and
Human-Computer Interaction (Readings). Heme1 control: crisis management and multimedia tech-
Hempstead, UK: Prentice Hall International Ltd., nology in London Underground line control
26S283. rooms. In Proceedings of CSCW'92,1,1-2,69-94.
GRAY, W. D., JOHN, B. E., AND ATWOOD,M. E. HEATH, C., JIROTKA, M., LUFF, P., AND HINDMARSH,
(1993) Project Ernestine: validating a GOMS J. (1993) Unpacking collaboration: the interac-
analysis for predicting and explaining real-world tional organization of trading in a city dealing
performance. Human-Computer Interaction, 8(3), room. In Proceedings of the Third European Con-
237-309. ference on Computer-Supported Cooperative
GREEN, T. R. G. (1990) The cognitive dimension of Work. Dordrecht: Kluwer.
viscosity: A sticky problem for HCI. In D. DIAPER, HEINBOKEL, T., SONNENTAG, S., FRESE, M., STOLTE,
D. GILMORE, G. COCKTON A N D B. SHAKEL (eds.) W., and BRODBECK, F. C. (1996) Don't underesti-
Human-Computer Interaction-INTERACT'90. mate the problems of user centredness in software
Elsevier Publishers, 79-86. development projects-there are many! Behaviour
GREIF, I. (1988) Computer Supported Cooperative & Information Technology, 15(4), 226-236.
Work: a book of readings. San Francisco: Morgan HOCHHEISER, H., AND SHNEIDERMAN, B. (2001) Using
Kaufmann. interactive visualization of WWW log data to char-
GRUDIN, J. (1989) The case against user interface con- acterize access patterns and inform site design.
sistency. Communications of the ACM, 32(10), Journal of the American Society for Information
1164-1173. Science, 52,4,331-343.
GRUDIN, J. (1990) The computer reaches out: the his- HOLTZBLAT~, K. AND JONES, S. (1993) Contextual In-
torical continuity of interface design. In Proceed- quiry: a participatory technique for systems design.
ings of CH1'90,261-268. In D. Schuler, and A. Namioka, (eds.) Participa-
GUINDON, R. (1990) Designing the design process: ex- tory Design: Principles and Practice, Hillsdale, NJ:
ploiting opportunistic thoughts. Human-Computer Lawrence Erlbaum Associates, 177-210.
Interaction, 5(2&3), 305-344. HOLTZBLATT, K., AND BEYER, H. (1996) Contextual
HALVERSON, C. (1995) Inside the cognitive work- Design: principles and practice. In D. Wixon and J.
place: new technology and air traffic control. PhD Ramey, (eds.) Field Methods Casebook for Soft-
Thesis, Dept. of Cognitive Science, University of ware Design. New York: John Wiley and Sons,
California, San Diego. 301-333.
HAMMERSLEY, M. AND ATKINSON, P. (1983) Ethnog- HUGHES, J. A., KING, RANDALL, D. AND SHARROCK
raphy: principles in practice. London: Tavistock. (1993) Ethnography for system design: a guide,
HARPER, R. (2000) The organization of ethnography, COMIC working paper, COMIC-LANCS-2-N.
In Proceedings of CSCW 2000,239-264. More information about COMIC is available from
HARRISON, S., BLY,S. ANDERSON, S. AND MINNEMAN Cooperative Systems Engineering Group, Com-
(1997) The media space. In Finn, K. E. Sellen, A. puting Department, Lancaster University, UK.
and Wilbur, S. B. (eds.) Video-Mediated Commu- HUGHES, J. A., KING, V., RODDEN,T., AND ANDER-
nication. Mahwah, NJ: Lawrence Earlbaum Asso- SEN, H. (1994) Moving out of the control room:
ciates, 273-300 ethnography in system design. In Proceedings of
HARTFIELD, B. AND WINOGRAD, T. (1996) Profile: CSCW'94, Chapel Hill, NC.
IDEO. In T. Winograd (ed.) Bringing Design to HUGHES, J. A., O'BRIEN, J., RODDEN,T. AND
Software. ACM Press. ROUNCEFIELD, M. (1997) Designing with Ethnog-
References 497
raphy: a Presentation Framework for Design. In KEMPTON, W. (1986) Two theories of home heat con-
Proceedings of DIS '97,147-159. trol. Cognitive Science, 10,75-90.
HUGHES, J. A., SOMMERVILLE, I., BENTLEY,R. AND KETOLA, P., HJELMEROOS, H., AND RAIHA, K.-J.
RANDALL, D. (1993a) Designing with ethnogra- (2000) Coping with consistency under multiple de-
phy: making work visible. Interacting with Com- sign constraints: The case of the Nokia 9000 WWW
puters, 5(2), 239-253. browser. Personal Technologies 4(2&3), 86-95.
HUTCHINS, E. (1995) Cognition in the Wild. Cam- KIM, S. (1990) Interdisciplinary cooperation. In The
bridge, MA: MIT Press. Art of Human-Computer Interface Design. B. Lau-
ISENSEE,S., KALINOSKI,K. AND VOCHATZER, K. rel (ed.) Reading, MA: Addison-Wesley.
(2000) Designing Internet appliances at Netpli- KOENEMANN-BELLIVEAU, J., CARROLL, J. M.,
ance. In E. Bergman (ed.) Information Appliances R o s s o ~M.
, B., AND SINGLEY, M. K. (1994) Com-
and Beyond. San Francisco: Morgan Kaufmann. parative usability evaluation: critical incidents and
ISHII,H. AND ULLMER, B. (1997) Tangible bits: to- critical threads. In Proceedings of CHI'94.
wards seamless interfaces between people, bits KOTONYA, G. AND SOMMERVILLE, I. (1998) Require-
and atoms. In Proceedings of CHI'97,234-241. ments engineering: processes and techniques.
ISHII, H., KOBAYASHI, hi., AND Grudin, J. (1993) Inte- Chichester, UK: John Wiley & Sons.
gration of interpersonal space and shared work- KRAUT, R.,FISH, R., ROOT, R. AND CHALFONTE, B.
space: Clearboard design and experiments. ACM (1990) Informal communications in organizations:
Transactions on In formation Systems, 11 (4), form, function and technology. In S. Oskamp and
349-375. S. Spacapan (eds.) People's Reactions to Technol-
JACOBSON, I., CHRISTERSON, M., JONSSON, P. AND ogy in Factories, OfJices and Aerospace. The Clare-
OVERGAARD, G. (1992) Object-Oriented Software mont Symposium on Applied Social Psychology.
Engineering-A Use Case Driven Approach. Har- Thousand Oaks, CA.: Sage Publications, 145-199.
low, UK: Addison-Wesley. KUHN, S. (1996) Design for people at work. In
JOHNSON, M. and LAKOFF,G. (1980) Metaphors We T. Winograd, (ed.) Bringing Design to Software.
Live By. Chicago: The University of Chicago Press. Boston: Addison-Wesley.
JOHNSON-LAIRD, P. N. (1983) Mental Models. Cam- KUJALA,S. AND MANTYLA,M. (2000) Is user involve-
bridge: Cambridge University Press. ment harmful or useful in the early stages of product
KAHN,R.,AND CANNELL, C. (1957) The Dynamics of development? In CHI 2000 Extended Abstracts,
Interviewing. New York: John Wiley & Sons. ACM Press, 285-286.
KARAT, C. M. (1993) The cost-benefit and business LAKOFF,G . AND JOHNSON, M. (1980) Metaphors we
case analysis of usability engineering. InterChi '93, Live By. Chicago: The University of C cago
Amsterdam, Tutorial Notes 23. Press.
KARAT, C.-M. (1994) A comparison of user interface LAMBOURNE, R.,B I Z , K., AND RIGOT, B. (1997) SO-
evaluation methods. In J. Nielsen and R. L. Mack cia1 trends and product opportunities: Philips' Vi-
(eds.) Usability Inspection Metho&. New York: sion of the Future Project. In Proceedings of
John Wiley & Sons. CHI'97,494-501.
KARAT, J. (1995) Scenario Use in the Design of a LANSDALE, M. (1988) The psychology of personal in-
Speech Recognition System. In J. M. Carroll (ed.) formation management. Applied Ergonomics, 55,
Scenario-based Design, 109-134. New York: John 55-66.
Wiley & Sons. LANSDALE, M. AND EDMONDS, E. (1992) Using mem-
KARAT, J. AND BENNET, J. L. (1991) Using scenarios ory for events in the design of personal filing sys-
in design meetings. In Karat, J. (ed.) Taking De- tems. International Journal of Human-Computer
sign Seriously. London: Academic Press. Studies, 26,97-126.
KAY, A. (1969) The Reactive Engine. PhD Disserta- LARSON, K., AND CZERWINSKI, M. (1998) Web page
tion, Electrical Engineering and Computer Sci- design: implications of memory, structure and
ence, University of Utah. scent for information retrieval. In Proceedings of
KEIL, M. AND CARMEL, E. (1995) Customer-devel- CHI '98,25-32.
oper links in software development. Communica- LAUREL, B. (1993) Computers as Theatre. New York:
tions of the ACM, 38(5), 33-44. Addison-Wesley.
498 References
LAZAR, J., AND PREECE, J. (1999) Designing and im- MANDLER, R., SALOMON, G. AND WONG, Y. Y. (1992)
plementing web-based surveys. Journal of Com- A 'pile' metaphor for supporting casual organization
puter Information Systems, xxxix (4), 63-67. of information. In Proceedings of CH1'92,627-634.
LEE, J., KIM, J., AND MOON, JAE YUN (2000) What MANN, S. (1996) Smart clothing: wearable multimedia
makes Internet users visit cyber stores again? Key computing and personal imaging to restore the
design factors for customer loyalty. In Proceedings technological balance between people and their
of CHI 2000, 305-312. environment. In Proceedings of ACM Multimedia,
LESTER, J. C., AND STONE, B. A. (1997) Increasing be- 96,163-174.
lievability in animated pedagogical agent. In Pro- MARCUS, A. (1993) Human communication issues in
ceedings of Autonomous AgentsP7, 16-21. advanced UIs. Communications of the ACM,
LESTER, J. C., CONVERSE, S. A., STONE, B. A., AND 101-109.
BHOGAL, R. S. (1997) The personal effect: affec- MARK, b.,FUCHS, L. AND SOHLENKAMP, M. (1997)
tive impact of animated pedagogical agents. In Supporting groupware conventions through con-
Proceedings of CHI'97,359-366. textual awareness. In Proceedings of the Fifth
LIDDLE, D. (1996) Design of the conceptual model. In European Conference on Computer-Supported Co-
T. Winograd, (ed.) Bringing Design to Software. operative Work. Dordrecht, The Netherlands:
Reading, MA: Addison-Wesley, 17-31. Kluwer, 253-268.
LUND, A. M. (1994) Ameritech's usability laboratory: MARMASSE, N. AND SCHMANDT, C. (2000) Location-
from prototype to final design. Behaviour & Infor- aware information delivery with ComMotion. In
mation Technology, 13(1 & 2), 67-80. Proceedings of Handheld and Ubiquitous Comput-
LYNCH, P. J., AND HORTON, S. (1999) Web Style Guide ing, Second International Symposium, HUC 2000,
(Preliminary Version). New Haven, CT, and Lon- Springer-Verlag, 157-171.
don: Yale University Press. MARSHALL, C., AND ROSSMAN, G. B. (1999) Design-
M880 (2000) OSS CD part of M880 Software Engi- ing Qualitative Research (3rd ed.). Thousand
neering. Milton Keynes, UK: The Open Univer- Oaks, CA: Sage Publications.
sity. MARTIN, H. AND GAVER, B. (2000) Beyond the snap-
MACKAY, W. E., RATZER, A. V., AND JANECEK, P. shot: from speculation to prototypes in audiopho-
(2000) Video artifacts for design: bridging the gap tography. In Proceedings of DIS 2000,55-65.
between abstraction and detail. In Proceedings of MATEAS, M., SALVADOR, T., SCHOLTZ, J. AND
DIS 2000,72-82. SORENSEN, D. (1996) Engineering ethnography in
MACKENZIE, I. S. (1992) Fitts' law as a research and the home. Companion for CHI '96, ACM, 283-284.
design tool in human-computer interaction. MAYHEW,D. J. (1999) The Usability Engineering
Human-Computer Interaction, 7,91-139. Lifecycle. San Francisco: Morgan Kaufmann.
MAES, P. (1995) Intelligent software. Scientijic Ameri- MCLAUGHLIN, M., GOLDBERG, S. B., ELLISON, N. AND
can, 273(3), 84-86. L u c ~ s J.
, (1999) Measuring Internet audiences:
MAGLIO, P. P., MATLOCK, T., RAPHAELY, D., CHER- patrons of an online art museum. In S. Jones (ed.)
NICKY, B., AND KIRSH D. (1999) Interactive skill in Doing Internet Research: Critical Issues and Meth-
Scrabble. In Proceedings of Twenty-first Annual ods for Examining the Net. Thousand Oaks, CA:
Conference of the Cognitive Science Society. Mah- Sage, 163-178.
wah, NJ: Lawrence Erlbaum Associates. MICROSOFT CORPORATION (1992) The Windows Inter-
MAHER,M. L. AND Pu, P. (1997) Issues and Applica- face, An Application Design Guide. Microsoft Press.
tions of Case-Based Reasoning in Design. Hills- MILLER, G. (1956) The Magical Number Seven, Plus
dale, NJ: Lawrence Erlbaum Associates, or Minus Two: Some Limits on our Capacity for
MAIDEN, N. A. M. AND RUGG, G. (1996) ACRE: se- Processing Information. Psychological Review, 63,
lecting methods for requirements acquisition. Soft- 81-97.
ware Engineering Journal, 11(3),183-192. MILLER, L.H. AND JOHNSON, J. (1996) The Xerox
MALONE, T. W. (1983) How do people organize their Star: an influential user interface design. In
desks? Implications for the design of office infor- M. Rudisill, C. Lewis, P. G. Polson, and T. D.
mation systems. ACM Transactions on Ofice In- McKay, (eds.) Human-Computer Interface Design.
formation Systems, 1(1) 99-112. San Francisco: Morgan-Kaufmann.
References 499
MILLINGTON, D. AND STAPLETON, J. (1995) Special re- NIE, N. H., AND EBRING, L. (2000) Internet and Soci-
port: developing a RAD standard. IEEE SofnYare, ety. Preliminary Report. Stanford, CA: The Stan-
12(5), 54-6. ford Institute for the Quantitative Study of
MONTEMAYOR, J., DRUIN, A. AND HELANDER, J. Society.
(2000) PETS: A personal electronic teller of sto- NIELSEN, J. (1992) Finding usability problems through
ries.' In C.A. Druin & J. Helander (eds.) Robots heuristic evaluation. In Proceedings of CHI'92,
for Kids. San Francisco: Morgan Kaufmann. 373-800.
MORAN, T. P., AND R. J. ANDERSON (1990) The NIELSEN, J. (1993) Usability Engineering. San Fran-
workaday world as a paradigm for CSCW design. cisco: Morgan Kaufmann.
In Proceedings of the CSCW '90,381-393. NIELSEN, J. (1994a) Heuristic evaluation. In J. Nielsen
MORIKAWA, 0 . AND MAESAKO, T. (1998) HyperMirror: and R. L. Mack (eds.) Usability Inspection Meth-
towards pleasant-to-use video mediated communi- ods. New York: John Wiley & Sons.
cation system. In Proceedings of CSCW'98, NIELSEN, J. (1994b) Enhancing the explanatory power
149-158. of usability heuristics. In Proceedings of ACM
MOSIER, J. N. AND TAMMARO, S. G., (1997) When are CH1'94,152-158.
group scheduling tools useful? In Proceedings of NIELSEN, J. (1999) www.useit.com
CSCW '97,6,53-70. NIELSEN, J. (2000) Designing Web Usability. Indi-
MULLER, M. J. (1991) PICTIVE-An exploration in anapolis: New Riders Publishing.
participatory design. In Proceedings of CHI '91, NIELSEN, J. (2001) Ten Usability Heuristics.
225-231. www.useit.com/papers/heuristic
MULLER, M. J., TUDOR, L. G., WILDMAN, D. M., NIELSEN, J., AND MACK, R. L. (1994) Usability Inspec-
WHITE, E. A., ROOT, R. W., DAYTON, T., CARR, tion Methods. New York: John Wiley & Sons.
R., DIEKMAN, B., AND DYKSTRA-ERICKSON, E. NODDER,C., WILLIAMS, G., AND DUBROW, D. (1999)
(1995) Bifocal tools for scenarios and representa- Evaluating the usability of an evolving collabora-
tions in participatory activities with users. In J. M. tive product--changesin user type, tasks and eval-
Carroll (ed.) Scenario-Based Design. New York: uation methods over time. In Proceedings of
John Wiley & Sons, 135-163. GROUP'99,150-159.
MULLET, K. AND SANO, D. (1995) Designing Visual NOLDUS (2000) The Observer Video-Pro. www.noldus.
Interfaces. Mountain View, CA: Prentice-Hall. com/products/observer/obs~spvta30.html.
MYERS, B. A. (1995) State of the Art in User Inter- NONNECKE, B., AND PREECE, J. (2000) Lurker demo-
face Software Tools. In R. Baecker, J. Grundin, graphics: counting the silent. In Proceedings of
W. Buxton, and S. Greenberg (eds.) Readings in CHI 2000,73-80.
Human-Computer Interaction: Toward the Year NORMAN, D. (1983) Some observations on mental
2000 (2nd ed.) San Francisco: Morgan Kaufmann, models. In Gentner, D. and A. L. Stevens (eds.)
344-356. Mental Models. Hillsdale, NJ: Lawrence Earlbaum
MYERS, B., HUDSON, S. E., AND PAUSCH, R. (2000) Associates.
Past, present and future of user interface software NORMAN, D. (1988) The Design of Everyday Things.
tools. ACM Transactions on Computer-Human In- New York: Basic Books.
teraction, 7(1), 3-28. NORMAN, D. (1990) Four (more) issues for Cognitive
NARDI, B. A., AND O'DAY,V. L. (1999) Information Science. Cognitive Science Technical Report No.
Ecologies: Using Technology with a Heart. Cam- 9001, Dept. of Cognitive Science, UCSD, USA.
bridge, MA: The MIT Press. NORMAN, D. (1993) Things That Make Us Smart.
NELSON, T. (1980) Interactive Systems and the design Reading, MA: Addison-Wesley.
of Virtuality. Creative Computing, Nov.-Dec., 1980. NORMAN, D. (1999) Affordances, conventions and de-
NELSON, T, (1990) The right way to think about soft- sign. ACM Interactions Magazine, MaylJune 1999,
ware design. In B. Laurel, (ed.) The Art of 38-42.
Human-Computer Design. Reading, MA: Addison- NYGAARD, K. (1990) The origins of the Scandinavian
Wesley. school, why and how? Participatory Design Con-
NEWMAN, W. AND LAMMING, N. (1995) Interactive ference I990 Transcript, Computer Professionals
System Design. Harlow, UK: Addison-Wesley. for Social Responsibility.
500 References
OLSON, J. S., AND MORAN, T. P. (1996) Mapping the REEVES, B., AND NASS, C. (1996) The Media Equa-
method muddle: guidance in using methods for tion: How People Treat Computers, Television, and
user interface design. In M. Rudisill, C. Lewis, New Media like Real People and Places. Cam-
P. B. Polson and T. D. McKay (eds.) Human- bridge: Cambridge University Press.
Computer Interface Design: Success Stories, RETTIG,M. (1994) Prototyping for tiny fingers. Com-
Emerging Methods, Real-World Context, San Fran- munications of the A C M , 37(4), 21-27.
cisco: Morgan Kaufmann, pp. 269-300. RHODES, B., MINAR, N. AND WEAVER, J. (1999)
OOSTERHOLT, R., KUSANO, M., AND DEVRIES, G. (1996) Wearable computing meets ubiquitous computing:
Interaction design and human factors support in the reaping the best of both worlds. In Proceedings o f
development of a personal communicator for chil- the Third International Symposium on Wearable
dren. In Proceedings of CHI '96,450465. Computers (ISWC '99), San Francisco, 141-149.
OPPENHEIM, A. N. (1992) Questionnaire Design, Inter- RIBA (1988) Architect's Job Book: Volume 1, Job
viewing and Attitude Measurement. London: Pinter Administration (5th edition), London: RIBA Pub-
Publishers. lications.
OREN,T., SALOMON, G., KREITMAN, K. AND DON, A. ROBERTSON, S. AND ROBERTSON, J. (1999) Mastering
(1990) Guides: characterizing the interface. In the Requirements Process. Boston: Addison-Wesley.
B. Laurel (ed.) The Art of Human-Computer Inter- ROBINSON, J. P., AND GODBEY,G. (1997) Time for
face Design. Reading, MA: Addison-Wesley, Life: The Surprising Ways that Americans Use
1 367-381. Their Time. University Park, PA: The Pennsylva-
PAGE, S. R. (1996) User-centered Design in a com- nia State University Press.
I mercial software company. In D. Wixon and ROBSON, C. (1993) Real World Research. Oxford, UK:
J. Ramey, (eds.) Field Methods Casebook for Soft- Blackwell.
ware Design. New York: John Wiley & Sons, ROBSON,C. (1994) Experimental Design and Statistics
197-213. in Psychology. Aylesbury, England: Penguin Psy-
PAYNE, S. (1991) A descriptive study of mental mod- chology
els. Behaviour and Information Technology, 10, ROGERS, Y. (1993) Coordinating computer-mediated
3-21. work. Computer Supported Cooperative Work, 1,
Penpoint hci.stanford.edu/csI47/notes/penpoint.html 2995-3315.
PICARD,R. W. (1998) Affective Computing. Cam- ROGERS, Y. AND SCAIFE,M. (1998) How can inter-
bridge, MA: MIT Press. active multimedia facilitate learning? In J. Lee
PLOWMAN, L., ROGERS, Y. AND RAMAGE,M. (1995) (ed.) Intelligence and Multimodality in Multime-
What are workplace studies for? In Proceedings of dia Interfaces: Research and Applications. Menlo
the Fourth European Conference on Computer- Park, CA: AAAI Press.
Supported Cooperative Work, Dordrecht: The ROSE, A., SHNEIDERMAN, B., AND PLAISANT, C.
Netherlands, Kluwer, 309-324. (1995) An applied ethnographic method for re-
POTTER,J. AND WETHERELL, M. (1987) Discourse and designing user interfaces. In Proceedings of DIS
Social Psychology. London: Sage. 95,115-122.
PREECE, J. (2000) Online Communities: Designing Us- ROTH, I. (1986) An introduction to object percep-
ability, Supporting Sociability. Chichester, UK: tion. In I. Roth and J.B. Frisby (eds.) Perception
John Wiley & Sons. and Representation: A Cognitive Approach. Mil-
PREECE, J., ROGERS, Y., SHARP, H., BENYON,D., ton Keynes: Open University.
HOLLAND, S., AND CAREY, T. (1994) Human-Corn- RUBIN,J., (1994) Handbook of Usability testing: How
puter Interaction. Wokingham, U K : Addison-Wes- to Plan, Design and Conduct Effective tests. New
ley. York: John Wiley & Sons.
PRESSMAN, R. (1992) Software Engineering: A Practi- RUBINSTEIN, R.AND HERSH, H. (1984) The Human
tioner%Approach. New York: McGraw-Hill. Factor: Designing Computer Systems for People.
QUINTANAR, L. R., CROWELL, C. R., AND PRYOR,J. B. Woburn, MA: Digital Press.
(1982) Human-computer interaction: a preliminary RUDD,J., STERN, K. R. AND ISENSEE, S. (1996) Low
social psychological analysis. Behavior Research: vs. High-fidelity Prototyping Debate. ACM Inter-
Methods and Instrumentation,13, (2), 210-220. actions Magazine, January, 76-85.
References 501
RUDMAN, C. AND ENGELBECK, G. (1996) Lessons in process improvement. In EUROMICRO '99, Pro-
choosing methods for designing complex graphical ceedings o f 25th EUROMICRO Conference. Pis-
user interfaces. In M. Rudisill, C. Lewis, P. B. cataway, NJ: IEEE Press, 11,170-176.
Polson and T. D. McKay (eds.). Human-Computer SCHEGLOFF, E. A., AND SACKS, H. (1973) Opening up
Interface Design: Success Stories, Emerging Meth- closings. Semiotics, 7,289-327.
ods, Real-World Context. San Francisco: Morgan SHNEIDERMAN, B. (1983) Direct manipulation: a step
Kaufmann, 198-228. beyond programming languages. IEEE Computer,
SACKS, H., SCHEGLOFF, E., AND JEFFERSON, G. (1978) 16(8), 57-69.
A simplest systematics for the organization of SHNEIDERMAN, B. (1998) Designing the User Inter-
turn-taking for conversation. Language, 50, face: Strategies for Effective Human-Computer
696-735. Interaction (3rd ed.). Reading, MA: Addison-
SCAIFE, M. AND ROGERS, Y. (1996) External cogni- Wesley.
tion: how do graphical representations work? In- SHNEIDERMAN, B. (1998a) Relate-Create-Donate: A
ternational Journal of Human-Computer Studies, teaching philosophy for the cyber-generation.
45,185-213. Computers in Education, 31(1), 25-39.
SCAIFE,M., AND ROGERS, Y. (2001) Informing the de- SILFVERBERG, M., MACKENZIE, I. S., AND KORHONEN,
sign of virtual environments. International Journal P. (2000) Predicting text entry speed o n mobile
o f Human-Computer Systems, 55(2), 115-143. phones. In Proceedings of CHI'2000,9-16.
SCAIFE,M., ROGERS, Y., ALDRICH, F., AND DAVIES, SMITH, D., IRBY, C., KIMBALL, R., VERPLANK, B. AND
M. (1997) Designing for or designing with? Infor- HARSLEM, E. (1982) Designing the Star user inter-
mant design for interactive learning environments. face. Byte, 7(4), 242-82.
In Proceedings of CHI '97,343-350. SMITH, S. L. AND MOSIER, J. N. (1986) Guidelines for
SCHANK, R. C. (1982) Dynamic Memory: a Theory Designing User Interface Software. Report ESD-
of Learning in Computers and People. Cam- TR-86-278, Electronic Systems Division, Bedford,
bridge, UK: Cambridge University Press. MA: The Mitre Corporation.
SCHBN,D. (1983) The Reflective Practitioner: How SOMMERVILLE, I. (2001) Software Engineering (6th
Professionals Think in Action. New York: Basic ed.) Boston and Harlow, UK: Addison-Wesley.
Books. SPENCER, R. (2000) The streamlined cognitive walk-
SCHRAGE,M. (1996) Cultures of prototyping. In T. through method: working around social con-
Winograd (ed.) Bringing Design to Software. straints encountered in a software development
Boston: Addison-Wesley. company. In Proceedings of CHI 2000,253-359.
SEARLE, J. (1969) Speech Acts. Cambridge: Cam- SPIEGEL, D., BLOOM, J. R., KRAEMER, H. C., AND
bridge University Press. GOTTHEIL,E. (1989) Effect of psychosocial treat-
SEGALL, B., AND ARNOLD, D. (1997) Elvin has left the ment on survival of patients with metastatic breast
building: A publish/subscribe notification service cancer. The Lancet, October 4,888-891.
with quenching. In Proceedings of AUUG Sunzmer SPREENBERG, P., SALOMON, G.,AND JOE, P. (1995) In-
Technical Conference, Brisbane, Australia. teraction design at lDEO product development. In
SHACKEL, B. (1990) Human factors and usability. In J. Proceedings of A C M CHZ'95 Conference Compan-
Preece and L. Keller (eds.) Human-Computer Zn- ion, 164-165.
teraction: Selected Readings. Heme1 Hempstead, SPROULL, L., SUBRAMANI, M. M., KIESLER, S., WALKER,
U K : Prentice-Hall, 27-41. J. H., AND WATERS, K. (1996) When the interface is
SHAPIRO, D. (1995) Noddy's guide to . . . ethnography a face. Human-Computer Interaction, 11,97-124.
and HCI. HCZ Newsletter 27,&10. STROMMEN, E. (1998) When the interface is a
SHARF,B. F. (1999) Beyond netiquette: the ethics of talking dinosaur: learning across media with
doing naturalistic discourse research on the Inter- ActiMates Barney. In Proceedings of CHI'98,
net. In S. Jones (ed.) Doing Internet Research: Crit- 288-295.
ical issues and methods for examining the net. SUCHMAN, L. A. (1983) Office procedures as practical
Thousand Oaks, CA: Sage Publications, 243-256. action: models of work and system design. ACM
SHARP, H. C., ROBINSON, H. M., AND WOODMAN, M. Transactions o n OfJice Information Systems, 1(4),
(1999) The role of culture in successful software 320-328.
I 502 References
SUCHMAN, L. A. (1987) Plans and Situated Actions. WELLNER, P. (1993) Interacting with paper on the
Cambridge: Cambridge University Press. digital desk. Communications of the ACM, 36(7),
SULLIVAN, K. (1996) Windows 95 user interface: A 86-96.
case study in usability engineering. In Proceedings WHARTON, C., RIEMAN, J., LEWIS, C., AND POLSON,P.
of CHI '96,473480. (1994) The cognitive walkthrough method: a prac-
TAYLOR, A. (2000) IT projects: sink or swim. The titioner's guide. In J. Nielsen and R. L. Mack
Computer Bulletin, January, 24-26. (eds.), Usabilicv Inspection Methods. New York:
TEASLEY, B., LEVENTHAL, L., BLUMENTHAL, B., IN- John Wiley & Sons.
STONE, K., A N D STONE, D. (1994) Cultural diversity WHITESIDE, J., BENNEIT, J. AND HOLTZBLATT, K.
in user interface design. SIGCHI Bulletin, 26(1), (1988) Usability engineering: our experience and
36-40. evolution. In Handbook of Human-Computer In-
THIMBLEBY, H. (1990) User Interface Design. Harlow, teraction. Helander, M . (ed.) Amsterdam: Elsevier
UK: Addison Wesley. Science Publishers, 791-817.
TRACTINSKY, N. (1997) Aesthetics and apparent us- WHITTAKER,S., AND SCHWARTZ, H. (1995) Back to
ability: empirically assessing cultural and method- the future: pen and paper technology supports
ological issues. In Proceedings of CHZ'97,115-122. complex group coordination. In Proceedings of
TUDOR, L. G. (1993) A participatory design technique CH1'95,495-502.
for high-level task analysis, critique and redesign: WILLIAMS, F., RICE, R. E., AND ROGERS, E. M. (1988)
The CARD method. In Proceedings of the Human Research Methods and the New Media. New York:
Factors and Ergonomics Society 1993 Meeting, The Free Press, Macmillan Inc.
Seattle, October 1993,295-299. WITMER,D. F., COLMAN, R. W., AND KATZMAN, S. L.
VAANANEN-VAINIO-MATTILA, K. AND RUUSKA, S. (1999) From paper-and-pencil to screen-and-key-
(2000) Designing mobile phones and communica- board. In S. Jones (ed.) Doing Internet Research:
tors for consumers' needs at Nokia. In E. Bergman Critical Issues and Methods for Examining the Net.
(ed.) Information Appliances and Beyond. San Thousands Oaks, CA: Sage, 145-161.
Francisco: Morgan Kaufmann, 169-204. WINOGRAD, T. (1988) A languagelaction perspec-
VEEN,J. (2001) The Art and Science of Web Design. tive on the design of cooperative work. Human-
I
Indianapolis: New Riders Publishing. Computer Interaction, 3,3-30.
VERPLANK, B. (1989) Tutorial Notes. In Proceedings WINOGRAD, T. (1994) Categories, disciplines, and so-
of CH1'89 Conference. cial coordination. Computer Supported Coopera-
VERPLANK, B. (1994) Interview with Bill Verplank. In tive Work, 2,191-197.
PREECE, J., ROGERS, Y., SHARP, H., BENYON,D., WINOGRAD, T. (1996) (ed.) Bringing Design to Soft-
HOLLAND, S., AND CAREY, T., Human-Computer ware. Reading, MA: Addison-Wesley.
Interaction. Wokingham, UK: Addison-Wesley, WINOGRAD, T. (1997) From computing machinery to
467-468. interaction design. In P. Denning and R. Metcalfe
VILLER, S. AND SOMMERVILLE, I. (1999) Coherence: (eds.) Beyond Calculation: the Next Fifty Years of
an approach to representing ethnographic analy- Computing. Amsterdam: Springer-Verlag, 149-162.
ses in systems design. Human-Computer Interac- WINOGRAD, T. AND FLORES, W. (1986) Understanding
tion, 14. Computers and Cognition. Norwood, NJ: Addison-
WALKER, J., SPROULL, L., AND SUBRAMANI, R. (1994) Wesley.
Using a human face in an interface. In Proceedings WIXON, D., AND WILSON, C. (1997) The usability en-
of CHI'94, 85-91. gineering framework for product design and evalu-
WEBB, B. R. (1996) The role of users in interactive ation (Chapter 27). In M. G. Helander, T. K.
systems design: when computers are theatre, do we Landauer, and P. V. Prabju (eds.) Handbook of
want the audience to write the script? Behaviour Human-Computer Interaction. Amsterdam, Hol-
and Information Technology, 15(2), 76-83. land: Elsevier, 653-688.
WEISER, M. (1991) The computer for the 21st Cen- WOOD, J. AND SILVER, D.(1995) Joint Applications De-
tury. Scientijic American, 265 (3), 94-104. velopment (2nd ed.) New York: John Wiley & Sons.
Credits
Inc.; Figure 8.6(a) and (b): photographs reproduced exploration in participatory design, Figures 1 and 2
by permission of ICE Ergonomics Ltd., (page 26) in CHI'91 Proceedings, reprinted by
Loughborough, UK; Figure 8.7: text quoted from permission of Association for Computing Machinery,
Mayhew, D. (1999) The Usability Engineering Inc.; Figure 9.1 2: Muller, M. J. et al. (1995) Bifocal
Lifecycle, pages 212-214, reproduced by permission tools for scenarios and representations in
of Academic Press Inc.; Figure 8.8: reprinted from participatory activities with users, Figure 6.3 (page
Interacting with Computers, 13 (1) Bodker, S. 149) in Scenario-based Design (Carroll, J., ed.) O
Scenarios in user-centred design-setting the stage for John Carroll, reproduced by permission of John
reflection and action, Figure 2 (page 70), O 2000 with Carroll, Virginia Tech.; Cartoon: Reproduced by
permission from Elsevier Science; Figure 8.1 2: an permission of Randy Glasbergen.
excerpt from BS-EN-IS0 9241 concerning how to
group items in a menu reproduced by permission of Chapter 10
the British Standards Institute; Figure 8.14: Figures 10.1 and 10.2: Gould, J. D. et al. (1990) The
screenshot of "arrange a meeting" icon from 1984 Olympic Message System-a test of behavioral
http://www.palm.net/Registration/RegistrationAdd.jsprinciples of system design, in Preece, J. and Keller,
p reproduced by permission of Palm, Inc.; Figure L. (eds.) Human-Computer Interaction (Readings)
8.15: reproduced by permission of New Riders Figures 12.4 (page 265) and 12.1 (page 263) O
Publishing, copyright O 2001 Jeffrey Veen, from Selection and editorial material, the Open University,
the book The Art and Science of Web Design by reprinted by permission of Pearson Education Ltd.;
Jeffrey Veen; Figure 8.1 6: screenshot of the front Figures 10.3-1 0.8: Figure 1 (page 6), Appendix A of
web page of the Aftonbladet Newspaper from Usability study, Figure 3 (page lo), Appendix B
http://www.aftonbladet.se reproduced by permission (pages 14,15) of Usability study, Table 3 (page 6) of
of Aftonbladet Nya Medier; Cartoon: Copyright O Usability study, Summary (page 8) of Usability study
Cartoonstock, www.CartoonStock.com. from Cheng, L. et al. (2000) Hutchworld: lessons
learned. A collaborative project: Fred Hutchsinson
Cancer Research Center and Microsoft Research,
Chapter 9 Virtual Worlds Conference 2000, Paris, France O
Figures 9.1-9.3: Tables 1-3 (pages 7,8), Tables 4-7 Springer-Verlag GmbH & Co., reproduced by
(pages 9,10), Table 9 (page 15) from Viller, S. and permission of Springer-Verlag GmbH & Co. and the
Somerville, I. (1999) Coherence: an approach to author.
representing ethnographic analyses in systems design,
Human-Computer Interaction, 14 (special issue on
representations in interactive systems and
Chapter 1 1
development) reproduced by permission of Lawrence Cartoon: Reproduced by permission of Randy
Erlbaum Associates, Inc.; Figures 9.4-9.8: Figure Glasbergen.
11.5 (page 206), Figure 17.4 (page 315), Figure 17.5
(page 316), Figure 17.2 (page 312), Figure 17.3 (page Chapter 12
313) from Wixon, D. and Ramey, J. (eds.) Field Figures 12.1 and 12.2: screenshots from
Methods Casebook for Software Design, O 1996 John http:llwww.northernlight.com reproduced by
Wiley & Sons, Inc., reprinted by permission of John permission of Northern Light Technology, Inc.;
Wiley & Sons, Inc.; Figure 9.9: Beyer, H. and Figure 12.3: Figure 5 (pages 7 and 8) from
Holtzblatt, K. (1998) Contextual Design, Figure 9.1 Hochheiser, H. and Shneiderman, B. (2001) Using
(page 155) reproduced by permission of Academic interactive visualizations of WWW log data to
Press, Inc.; Figure 9.10: Ehn, P. and Kyng, M. (1991) characterize access patterns and inform site design,
Cardboard computers: mocking-it-up or hands-on the Journal of the American Society for Information
future, sort machine mock-up (page 175) in Design at Science (in press) reproduced by permission from
Work: Cooperative Design of Computer Systems University of Maryland, Human-Computer
(Greenbaum, J . and Kyng, M., eds.) reproduced by Interaction Lab; Cartoon: HERMAN 8 is reprinted
permission of Lawrence Erlbaum Associates, Inc.; with permission from Laughingstock Licensing Inc.,
Figure 9.1 1: Muller, M. J. (1991) PICTIVE-an Ottawa, Canada, all rights reserved.
Credits 507
Eudora, safe and unsafe menus, expert opinions, 346,347t gesturing, 106,108
15 Hutchworld case study, 325 gIBIS, 114t
evaluation,12,169-170,317-318. in quick and dirty evaluation, 341 gimmicks, user frustration with,
See also DECIDE evaluation in TRIS redesign, 485,488 148
framework; field studies; exploration-based conceptual GOMS model (goals, operators,
predictive evaluation; usability models, 41,49 methods, and selection rules),
testing; user testing expressive interfaces, 143-147 102,231,346
ethical issues, 352-355 external cognition, 98-101 benefits and limitations, 453-454
formative and summative, 323 externalization,of memories, described, 449-450
goals, 360-361 98-99 in TRIS redesign, 485,488
Hutchworld case study, 318, Google, 22,77
324-336,440 facial expressions, 106 background information on
insider vs. outsider, 342,361-364 feedback operation, 95
integration with design, 461-462 design and usability principles for, graphical user interfaces, 7,42,60
and lifecycle model, 186 20-21 and affordance, 25-26
mobile communicators case study, in evaluation paradigms, 344t and learning through doing, 86
See mobile communicators interview-like, 397 memory aspects, 79-80
Nokia mobile communicators, and iterative design, 170 memory load reduction, 101
466-467 in observation, 376t shading for menu item
Philips mobile communicator, field studies, 341. See also deactivation,21-22
482 ethnography graphic design, 416
phone-based response system challenges, 388 relation to interaction design, 8
redesign case study, 482-489 described, 342 graphics, avoiding gratuitous use on
pilot studies, 356 goals, 360 websites, 416
practical issues, 350-351 observation, 359,363-364,368-370 group interviews, 390
reasons for, 319-323 techniques applied, 347t described, 396-397
terminology, 340,345 user screening, 350 Groupsystem, 113t
what to evaluate, 318-319 file locking, for coordinating groupware,105. See also
when to evaluate, 323-324 collaborative technologies, 122 collaborative technologies
when to stop, 334 file management systems, 81,83 GUIs, See graphical user interfaces
evaluation paradigms, 340,341-345, and pile phenomenon, 91 GVU survey, 406
344t film industry, relation to interaction
choosing in DECIDE framework, design, 9 Hawthorne effect, 356
349 Fitts' Law, 454-455 HCI Bibliography Project, xxii, xxiii
techniques used with, 347t flaming, 113t, 153 hearing,77
evaluation techniques, 345-347 flexibility, 409 help, 409
choosing in DECIDE framework, of observation data-collection as usability principle, 27
349 techniques, 376t helpfulness, user experience goal,
event languages, 276 usability principle, 27 18,19
flight strips, 296 Herman the Bug, 158
flow chart diagrams, for heuristic evaluation, 26,341,343
expectation management, and user constraining,22 adapting to Web, 248-249
involvement, 280-281 focus groups described, 408-410
experiential cognition, 74 use in evaluation, 396-397 MEDLINEplus, 412416,432
experimental conditions, 444 use in requirements activity, 213t, of online communities, 417-419
experiments, 430,431,443-444 214,217 problems with, 411
allocation of participants to formal communication,110 process of, 410-412
conditions, 445-446 formal language-based tools, 276 walkthroughs, 210,420-423
data collection and analysis, formative evaluations, 323 of websites, 412-417
446-448 Fred Hutchison Cancer Research heuristics, 26-27,28,408-409,
usability testing contrasted, Center, 324-325,334 419420. See also usability
457-458 friendly interface agents, 144,146 principles
variables and conditions,430, fun, user experience goal, 18,19 for predictive evaluation, 343
443-445 functional requirements, 205,206 for website evaluation, 412-413
website design structure, 447 analysis, 220-221 Hierarchical Task Analysis,
expert crit, 410 and conceptual model, 258-259 231-233
Index 513
1 high-fidelity prototyping, 245-246, inspections, 407-408. See also interaction styles, 41,250
I 246t, 263 heuristic evaluation; interactive development
high-level programming languages, walkthroughs environment, 422
7 walkthroughs, 210,420-423 interactive graphical tools, 276
Holtzblatt, Karen, interview with, instruction-basedconceptual interactivelinteraction designers, 11
313-315 models, 4 1 , 4 2 4 interactive learning environments,7
HOME RUN heuristic,409 interaction design. See also affective interactive pets, 157
horizontal prototyping, 248 aspects; cognition; conceptual interactive phone-based response
human-computer interaction, design; conceptual models; system redesign, 482-489
458-459 interaction design process; interactive products, 1-2. See also
design patterns, 272 lifecycle models; physical conceptual models; evaluation
and ethnography, 342 design; requirements; usability defined, 2n
lifecycle models in, 192-196 goals; user experience goals; interaction paradigms, 4 0 , 6 0 4
relation to interaction design, 9 specific types of interfaces interface metaphors, 4 0 , 5 5 4
human factors, relation to aim of, 1-2 problem space, 36-39
interaction design, 9 and anthropomorphism, 153-157 interactive toys, 5
Hutchinson Cancer Research in business, 10-12 interactive voice response systems,
Center, 324-325,334 defined, 6-12,166-168 485
HutchWorld case study, 318, emulation of physical world interface designers, 11
324-336,440 knowledge, 90-91 interface metaphors, 40,5540,
hyperlinks, 273-274 good and poor contrasted, 2-6 253-257
HyperMirror, 118 history,7-8 Philips mobile communicators,
hypertext, 274,276 and human-computer interaction, 8 474-475
hypotheses, 4 4 3 4 , 4 4 5 integration with evaluation, intergenerational design teams, 479
461-462 internal consistency, ..413.414
.
IBM usability laboratory, 441 iterative nature of, See iterative internal locus of control, 266,413
icons, 268 design Internal Revenue Service, TRIS
design, 270-271 mobile communicatorscase study, redesign (telephone response
IDEO Scout, 12 See mobile communicators information system), 443,
IDEO TechBox, 176-178 multidisciplinary teams for, 9-10, 482-489
incidents, analyzing in observational 282 inter-research reliability rating, 383
data, 381-382 notation for, 222 interrupt-driven tasks, 319
independent variables, 444 and other approaches, 9 interviews. See also semi-structured
index cards, prototyping with, 244 phone-based response system interviews; structured
indirect observation, 377-379 redesign case study, 482-489 interviews; unstructured
industrial design, relation to realism or abstraction?, 66-67 interviews
interaction design, 9 relation of other approaches, 8 believability of responses, 397
informal communication,110 terminology, 11 data analysis, 398
informatics, relation to interaction from theory to practice, 100-101 in evaluation pilot studies, 356
design, 9 trade-offs, 166 field studies technique, 342
information appliances, 9 what to design: activities HutchWorld case study, 330
information architects, 11 supported, 4-6 planning for, 391
information design, of websites, interaction design process, 12-13, question development, 390-391
416 165-170. See also alternative in requirements activity, 210,211,
information display design, designs; lifecycle models; 213t, 214,215,217
274-275 prototyping retrospective, 372
information processing, 96-98 activities associated with, 16&170 types of, 392-397
information retrieval, 81,83 building interactive design usability testing technique, 340,341
information visualization,7,101 versions, 12,169 for user opinion solicitation, 346
informed consent, 352-353,354,365 practical issues, 170-182 i-opener, 191
unstructured interviews, 392 interaction logs, 354,365 IS0 9241,268,269
infrared sensing, 7 described, 377-379 IS0 13407,268
innovation interaction modes, 40-55,250-253 I S 0 14915,268
and prototyping culture, 247-248 interaction paradigms, 40 iterative design, 64-65,68
and user involvement, 247-248 and conceptual design, 257 in conceptual design, 250,264
insider evaluation, 342,361-364 types of, 60-64 and feedback, 170
514 Index
iterative design, (Continued) liveboards (ubiquitous computing Microsoft Corporation. See also
in physical design, 265 device), 61,62 Windows environment
in prototyping, 239,247,248 logical constraints, 22-23 Hutchworld involvement, 324,
real world pressure, 461 London Underground, 125-126, 326,328
in requirements activity, 203 361 synch and stabilize software
and user-centered development, low-fidelity prototyping, 243-245, design process, 183,184-185
285,462 246t, 249,263 usability laboratory, 441,442
in user need identification, 203 for rapid feedback, 250 user involvement, 282
IT project failure, 203 lurking behavior, 378 Microsoft Office 4.0, usability
testing, 282
jargon, avoiding in interviews, 391 Macintosh Microsoft Windows, See Windows
Java, 57 direct manipulation as conceptual environment
Java Beans, 276 model, 47-49 Microsoft Word 2001, sorting
Joint Application Development expressive interface: smiling and operation, 24-25
(JAD) workshops, 190,214 sad Macs, 143 minimalist design, 27,409
garbage can, user confusion with, minus scenarios, 260-261
keystroke level method, 102,346 49,58 mnemonics, 81
described, 450-453 pile approach used by, 91 mobile communicators, 463-464
scope, 356 Macromedia Director, for Nokia's approach to design,
KidPad, l l 4 t prototyping, 245 464-474
Kismet, 142 Magic Cap, 66 Philips' approach to design,
knowledge manipulation-based conceptual 474-482
circulation in social circles, 106 models, 41,4749 mobile computing, 7
emulation of physical world's, mapping, 23 mobile telephones, See cell phones
90-91 marble phone answering machine, mobile usability laboratories, 365,442
Knowledge Navigator, 161 example of good design, 3-4 mockup and text with customers
KordGrip (WetPC), 208 matched-participants design, of (contextual Design method),
I
experiments, 446,446t 296
la6oratory studies, 345 measurement, 285. See also user mockups, 240-241,307
ecological validity, 356 testing monitors (visual display units), 7
observation, 359,363,365-368 importance of, 457 MOOS, 111
user screening, 350 in usability testing, 341-342 motivation, user experience goal, 18,
languagelaction framework, 130-133 media spaces, 110,111,112t 19,141
laptop computers, in observation, MEDLINEplus MUDS, 111,112t
369,374 heuristic evaluation, 412-416, multidisciplinary teams, 9-10
large interactive screens, 9 432 user involvement with, 282
learnability user testing, 432-438 multimedia applications, 5,7
usability criteria, 18 MeetingMaker, 120 dynaiinking, 87
usability goal, 14,1617 meetings, 290 MUMMS (Measuring the Usability
learning, 86 MEMOIRS, 83 of Multi-Media Systems), 407
design implications, 87 memorability musical playing devices, 23
, resistance to time spent, 94 usability criteria, 18
library catalog, 252,256 usability goal, 14,17,19 naturalistic observation, 279. See
task description and analysis, memory, 78-85 also field studies
222-234 design implications, 85,266, use in requirements activity, 213t,
lifecycle models, 182-186 268,413 214,217
in human-computer interaction, externalizing to reduce load, natural-language-based systems, 44,
192-196 98-99 88
Nokia mobile communicators, and information processing, navigation, 415
465-467 97 navigation-based conceptual
in software development, 187-192 and perception, 76 models, 41,4749
Likert scales, 401-403 seven chunks theory, 82 need identification, See user need
listening, 86-88 mental models, 92-95,101 identification
design implications, 89 menus, 268 NetMeeting, 442
listserver discussion groups, lurking design, 268-270 Netpliance, 173
behavior, 378 messaging, 110,112t spiral development cycle, 191-192
networked classrooms, 114t online interviews, 397 Philips Vision of the Future Project,
networked clothing, 5 online patient support communities 10
networking, 7 evaluation, 322 phone answering system (marble
Nielson, Jakob, interview with, HutchWorld case study, 318, answering machine), as example
426-427 324-336 of good design, 3-4
Nokia, mobile communicator design online questionnaires, 405-407 phone banking, 83-85
approach, 464474 online tutorials, 16 phone-based response system
Nokia 9000 communicator, 467 open-ended interviews, See redesign, 482-489
Nokia 9210 communicator, 465 unstructured interviews photocopiers, 179-180
Nokia 7110 mobile phone, 470-471 open-ended problem spaces, 39 problems with, 1
Nokia 9000 web browser, 472-473 order effects, 446 PhotoFinder, 458459
nonfunctional requirements, 205,206 ordering effects, 445 physical constraints, 22
non-verbal communication, 106,119 organizational environment, 207 and evaluation, 340
Northernlight, 365-367 orphan pages, 415 Nokia mobile communicators,
note taking outsider evaluation, 342,361-364 470-473
in observation, 365,369,370,374, overhearing, 125-126 physical design, 239,265-266
376t overseeing, 125-126 from conceptual model to, 64-68
in requirements identification, 218 ownership, and user involvement, guidelines and standards, 266-267,
noticeboards, 121 280,281 268
NUDIST, 381,382,383,398 icons, 270-271
pads (ubiquitous computing device), information displays, 274-275
object-based conceptual models, 61,62 menus, 267-270
51-53,250,253 Palmpilot, 60,63 screens, 271-272,274
objective evaluations, 345 requirements activity, 205-206 physical limitations, 286
object-oriented programming, 276 wooden prototype, 241 physical model (Contextual Design
object-oriented software paradigms, 183n. See also evaluation method), 302,303,305
engineering, 195,259 paradigms; interaction physicallvirtual integration, 63
Object Oriented SofhYare paradigms; lifecycle models PICTIVE (Plastic Interface for
Engineering, 226 PARC Media Space project, 387 Collaborative Technology
observation. See also naturalistic participant observation, 342,361, Initiatives through Video
observation 363. See also observation Exploration), 307-309
approaches to, 363-364 with children and adults, 479480 pilot studies
in controlled environments, described, 364,370-373 in evaluation, 356
365-368 Philips mobile communicator, for refining structured interview
data gathering, 363,365,371,372, 478 questions, 394
373-377,376t participatory design, 306311,310t in requirements identification, 217
data interpretation and analysis, participatory prototyping, 210 pleasure factors, See user experience
365,372,376t, 379-385,387 patenting, 179 goals
described, 345-346,347t patterns plug-and-play interfaces, %
ethical issues, 378 analyzing in observational data, plug-ins, user frustration with,
in field studies, 342,368-370 381-382 151-152
framework for, 368-369 analyzing in questionnaires, 407 pluralistic walkthroughs, 420,423
goals, 360-361 design, 272 plus scenarios, 260-261
HutchWorld case study, 327 PDAs, 463 Pokemon, 157
indirect, 377-379 perception, 76-78 POLITeam workspace system, 135
trend toward real world design implications, 78 pop-up menus, 268
observation, 319 Perl, 276 portal website, conceptual model, 56
usability testing technique, 340,341 personalization Portholes, 126127,127
what and when to observe, 361-363 Nokia mobile communicator, 468 predictive evaluation, 449. See also
when to stop, 372 Philips mobile communicator, 478 GOMS model; keystroke level
Observer Video-Pro, 382-383 personal workstations, 7 method
Olympic Messaging System (1984), pervasive computing, 60,257 benefits and limitations, 453-454
285,319,323,336 Phil, Knowledge Navigator agent, defined, 343,344t
described, 320-321 160-161 Fitts' Law, 454-455
online communities, heuristic Philips, mobile communicator techniques applied, 347t
evaluation, 417419 design approach, 474-482 predictive models<\#208>455
516 Index