15.4 Predictive Models



Similar documents
User Interface Design for Games. David Kieras. University of Michigan

User Interface Design

Computer Basics: Tackling the mouse, keyboard, and using Windows

What is File Management. Methods for Categorizing Data. Viewing Data on a Computer

EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002

Creating Survey Forms from a Word Table

AODA Mouse Pointer Visibility

Mouse and Keyboard Skills

Using Excel to find Perimeter, Area & Volume

Word 2007: Basics Learning Guide

Explore commands on the ribbon Each ribbon tab has groups, and each group has a set of related commands.

Automate tasks with Visual Basic macros

Windows, Menus, and Universal Document Shortcuts

Using an Access Database

Beginning Microsoft Access

Excel Reports User Guide

Getting Started with Excel Table of Contents

Bad designs. Chapter 1: What is interaction design? Why is this vending machine so bad? Good design. Good and bad design.

Excel macros made easy

Calc Guide Chapter 9 Data Analysis

PA Payroll Exercise for Intermediate Excel

User Manual for the SAP Business Objects BI Platform 4.1 System (BI Suite) CONTENTS

MS Excel. Handout: Level 2. elearning Department. Copyright 2016 CMS e-learning Department. All Rights Reserved. Page 1 of 11

How to make a line graph using Excel 2007

Introduction to MS WINDOWS XP

Almost all spreadsheet programs are based on a simple concept: the malleable matrix.

Web Ambassador Training on the CMS

Introduction to Microsoft Access 2003

Excel 2003 PivotTables Summarizing, Analyzing, and Presenting Your Data

Outlook 2010 Sharing and Using Calendars

Spreadsheet - Introduction

Optomate Training Compendium Appointment Book Page 2

How do you use word processing software (MS Word)?

A system is a set of integrated components interacting with each other to serve a common purpose.

FOR PREPARING THE CALL REPORT EXCEL DATA FILE AND ELECTRONIC SUBMISSION OF THE CRS AND E-DATA

Planning and Managing Projects with Microsoft Project Professional 2013

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

Microsoft Outlook 2013 Workshop

Click on various options: Publications by Wizard Publications by Design Blank Publication

EXCEL EXERCISE #8: Consolidating and Linking Spreadsheets

Outlook Express. a ZOOMERS guide

Microsoft Excel 2007 Consolidate Data & Analyze with Pivot Table Windows XP

Review. Evaluation Techniques. A Story. Evaluating Without Users. Evaluating With Users. Quantitative. What are the main components of the CMN Model?

Outlook . User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA

Advanced Presentation Features and Animation

Creating and Formatting Charts in Microsoft Excel

Migrating to Excel 2010 from Excel Excel - Microsoft Office 1 of 1

Excel basics. Before you begin. What you'll learn. Requirements. Estimated time to complete:

MICROSOFT ACCESS STEP BY STEP GUIDE

ECDL. European Computer Driving Licence. Project Planning Project Management Software BCS ITQ Level 2. Syllabus Version 1.0

Macro s for EIS Using IBM 3270 Personal Communications Emulation Software

Introduction to Computers

Impact Call PC. call001. Impact Call User s Guide

Creating a Poster in PowerPoint A. Set Up Your Poster

Instructions for creating a data entry form in Microsoft Excel

Word basics. Before you begin. What you'll learn. Requirements. Estimated time to complete:

Using Virtual PC 7.0 for Mac with GalleryPro

Exercise 4 - Practice Creating Text Documents Using WordPad

Unified Communications Using Microsoft Office Live Meeting 2007

In this example, Mrs. Smith is looking to create graphs that represent the ethnic diversity of the 24 students in her 4 th grade class.

BusinessObjects: General Report Writing for Version 5

GDP11 Student User s Guide. V. 1.7 December 2011

Rochester Institute of Technology. Oracle Training: Advanced Financial Application Training

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

Outlook 2013 Tips and Tricks Contents

Advanced Excel Charts : Tables : Pivots : Macros

Microsoft Access is an outstanding environment for both database users and professional. Introduction to Microsoft Access and Programming SESSION

How to Change Your Schedule for Holidays

Business Insight Report Authoring Getting Started Guide

Text Basics. Introduction

Advanced Excel 10/20/2011 1

Lesson 07: MS ACCESS - Handout. Introduction to database (30 mins)

PowerPoint 2013 Basics of Creating a PowerPoint Presentation

Microsoft Access Glossary of Terms

How to Use Excel for Law Firm Billing

Budget Main Window (Single Bank Account) Budget Main Window (Multiple Bank Accounts)

Excel Spreadsheet Activity Redo #1

Tommy B. Harrington 104 Azalea Drive Greenville, NC

Using Excel for Analyzing Survey Questionnaires Jennifer Leahy

Guest Article: What will make healthcare software usable?

Operating Systems. and Windows

Finding and Opening Documents

Microsoft Migrating to Access 2010 from Access 2003

Microsoft PowerPoint 2011

Revealing the Secrets of Microsoft Project

Access I Tables, Queries, Forms, Reports. Lourdes Day, Technology Specialist, FDLRS Sunrise

Employee Manual Development Tool Version 7.0. User Guide

EFFECTS OF AUDITORY FEEDBACK ON MULTITAP TEXT INPUT USING STANDARD TELEPHONE KEYPAD

Business Objects. Report Writing - CMS Net and CCS Claims

Excel 2007 Introduction to Macros

Programming in Access VBA

Beginning Microsoft Project

APPLYING BENFORD'S LAW This PDF contains step-by-step instructions on how to apply Benford's law using Microsoft Excel, which is commonly used by

Word 2007 WOWS of Word Office 2007 brings a whole new basket of bells and whistles for our enjoyment. The whistles turn to wows.

Transcription:

521 15.4 redictive Models Similar to inspection methods and analytics, predictive models evaluate a system without users being present. Rather than involving expert evaluators role-playing users as in inspections, or tracking their behavior as in analytics, predictive models use formulas to derive various measures of user performance. redictive modeling provides estimates of the efficiency of different systems for various kinds of task. For example, a cell phone designer might choose to use a predictive method because it can enable her to determine accurately which is the optimal layout of keys on a cell phone for allowing common operations to be performed. A well-known predictive modeling technique is GOMS. This is a generic term used to refer to a family of models that vary in their granularity concerning the aspects of the user s performance they model and make predictions about. These include the time it takes to perform tasks and the most effective strategies to use. The models have been used mainly to predict user performance when comparing different applications and devices. Below we describe two of the most well-known members of the GOMS family: the GOMS model and its daughter, the keystroke level model (KLM). 15.4.1 The GOMS Model The GOMS model was developed in the early 1980s by Card, Moran, and Newell and is described in a seminal paper (Card et al, 1983). It was an attempt to model the knowledge and cognitive processes involved when users interact with systems. The term GOMS is an acronym that stands for goals, operators, methods, and selection rules: Goals refer to a particular state the user wants to achieve (e.g. find a website on interaction design). C15.indd 521 3/1/11 1:59:00 M

522 15 EVALUATION: INSECTIONS, ANALYTICS, AND MODELS Operators refer to the cognitive processes and physical actions that need to be performed in order to attain those goals (e.g. decide on which search engine to use, think up and then enter keywords into the search engine). The difference between a goal and an operator is that a goal is obtained and an operator is executed. Methods are learned procedures for accomplishing the goals. They consist of the exact sequence of steps required (e.g. type in keywords in a Google search box and press the search button). Selection rules are used to determine which method to select when there is more than one available for a given stage of a task. For example, once keywords have been entered into a search engine entry field, many search engines allow users to press the return key on the keyboard or click the go button using the mouse to progress the search. A selection rule would determine which of these two methods to use in the particular instance. Below is a detailed example of a GOMS model for deleting a word in a sentence using Microsoft Word. Goal: delete a word in a sentence Method for accomplishing goal of deleting a word using menu option: Step 1. Recall that word to be deleted has to be highlighted Step 2. Recall that command is cut Step 3. Recall that command cut is in edit menu Step 4. Accomplish goal of selecting and executing the cut command Step 5. Return with goal accomplished Method for accomplishing goal of deleting a word using delete key: Step 1. Recall where to position cursor in relation to word to be deleted Step 2. Recall which key is delete key Step 3. ress delete key to delete each letter Step 4. Return with goal accomplished Operators to use in the above methods: Click mouse Drag cursor over text Select menu Move cursor to command ress key Selection rules to decide which method to use: 1. Delete text using mouse and selecting from menu if a large amount of text is to be deleted. 2. Delete text using delete key if small number of letters are to be deleted. 15.4.2 The Keystroke Level Model (KLM) The KLM differs from the GOMS model in that it provides numerical predictions of user performance. Tasks can be compared in terms of the time it takes to perform them when using different strategies. The main benefit of making this kind of quantitative predictions is that different features of systems and applications can be easily compared to see which might be the most effective for performing specific kinds of task. C15.indd 522 3/1/11 1:59:00 M

523 When developing the KLM, Card et al (1983) analyzed the findings of many empirical studies of user performance in order to derive a standard set of approximate times for the main kinds of operators used during a task. In so doing, they were able to come up with the average time it takes to carry out common physical actions (e.g. press a key, click a mouse button), together with other aspects of user computer interaction (e.g. the time it takes to decide what to do and the system response rate). Below are the core times they proposed for these (note how much variability there is in the time it takes to press a key for users with different typing skills). Operator name Description Time (s) K ressing a single key or button Skilled typist (55 wpm) Average typist (40 wpm) User unfamiliar with the keyboard ressing shift or control key 0.35 (average) 0.28 1.20 0.08 ointing with a mouse or other device to a target on a display Clicking the mouse or similar device 0.20 oming hands on the keyboard or other device D Draw a line using a mouse Variable depending on the length of line M Mentally prepare to do something, e.g. make a decision R(t) System response time counted only if it causes the user to wait when carrying out his/her task t The predicted time it takes to execute a given task is then calculated by describing the sequence of actions involved and then summing together the approximate times that each one will take: T execute T K T T T D T M T R For example, consider how long it would take to insert the word not into the following sentence, using a word-processing program like Microsoft Word: Running through the streets naked is normal. So that it becomes: Running through the streets naked is not normal. First we need to decide what the user will do. We are assuming that she will have read the sentences beforehand and so start our calculation at the point where she is about to carry out the requested task. To begin she will need to think about what method to select. So, we first note a mental event (M operator). Next she will need to move the cursor into the appropriate point of the sentence. So, we note an operator (i.e. reach for the mouse). The C15.indd 523 3/1/11 1:59:00 M

524 15 EVALUATION: INSECTIONS, ANALYTICS, AND MODELS remaining sequence of operators are then: position the mouse before the word normal (), click the mouse button ( ), move hand from mouse over the keyboard ready to type (), think about which letters to type (M), type the letters n, o, and t (3K), and finally press the spacebar (K). The times for each of these operators can then be worked out: Mentally prepare (M) Reach for the mouse () osition mouse before the word normal () Click mouse ( ) Move hands to home position on keys () Mentally prepare (M) Type n (good typist) (K) Type o (K) Type t (K) Type space (K) Total predicted time: 0.20 5.68 seconds When there are many components to add up, it is often easier to put together all the same kinds of operator. For example, the above can be rewritten as 2(M) 2() 1() 1( ) 4(K) 2.70 0.80 0.2 0.88 5.68 seconds. A duration of over 5 seconds seems a long time for inserting a word into a sentence, especially for a good typist. aving made our calculation it is useful to look back at the various decisions made. For example, we may want to think why we included a mental operator before typing the letters n, o, and t, but not before any of the other physical actions. Was this necessary? erhaps we don t need to include it. The decision when to include a time for mentally preparing for a physical action is one of the main difficulties with using the keystroke level model. Sometimes it is obvious when to include one, especially if the task requires making a decision, but for other times it can seem quite arbitrary. Another problem is that, just as typing skills vary between individuals, so too do the mental preparation times people spend thinking about what to do. Mental preparation can vary from under 0.5 of a second to well over a minute. ractice at modeling similar kinds of task and comparing the results with actual times taken can help overcome these problems. Ensuring that decisions are applied consistently also helps, e.g. applying the same modeling decisions when comparing two prototypes. ACTIVITY 15.6 As described in the GOMS model above there are two main ways to delete words from a sentence when using a word processor like Word. These are: 1. Deleting each letter of the word individually by using the delete key. 2. ighlighting the word using the mouse and then deleting the highlighted section in one go. Which of the two methods is quickest for deleting the word not from the following sentence? I do not like using the keystroke level model. C15.indd 524 3/1/11 1:59:00 M

525 Comment 1. Our analysis for method 1 is: Mentally prepare Reach for mouse Move cursor one space after the word not Click mouse ome in on delete key ress delete key four times to remove word plus a space (using value for good typist) Total predicted time 4.33 seconds 2. Our analysis for method 2 is: Mentally prepare Reach for mouse Move cursor to just before the word not Click and hold mouse button down (half a ) Drag the mouse across not and one space Release the mouse button (half a ) ome in on delete key ress delete key (using value for good typist) Total predicted time 4.77 seconds M 4(K) M K 0.20 0.88 0.10 0.10 The result seems counter-intuitive. Why do you think this is? The amount of time required to select the letters to be deleted is longer for the second method than pressing the delete key three times in the first method. If the word had been any longer, for example, keystroke, then the keystroke analysis would have predicted the opposite. There are also other ways of deleting words, such as double clicking on the word to select it and then either pressing the delete key or the combination of Ctrl X keys. What do you think the keystroke level model would predict for either of these two methods? Case Study 15.1 Using GOMS in the redesign of a phone-based response system Usability consultant Bill Killam and his colleagues worked with the US Internal Revenue Service (IRS) several years ago to evaluate and redesign the telephone response information system (TRIS). The goal of TRIS was to provide the general public with advice about filling out a tax return and those of you who have to do this know only too well how complex it is. Although this case study is situated in the USA, such phone-based information systems are widespread across the world. (Continued ) C15.indd 525 3/1/11 1:59:01 M

526 15 EVALUATION: INSECTIONS, ANALYTICS, AND MODELS Typically, telephone answering systems can be frustrating to use. ave you been annoyed by the long menus of options such systems provide when you are trying to buy a train ticket or when making an appointment for a technician to fix your phone line? What happens is that you work your way through several different menu systems, selecting an option from the first list of, say, seven options, only to find that now you must choose from another list of five alternatives. Then, having spent several minutes doing this, you discover that you made the wrong choice back in the first menu, so you have to start again. Does this sound familiar? Other problems are that often there are too many options to remember, and none of them seems to be the right one for you. The usability specialists used the GOMS keystroke level model to predict how well a redesigned user interface compared with the original TRIS interface for supporting users tasks. In addition they also conducted usability testing. 15.4.3 Benefits and Limitations of GOMS One of the main attractions of the GOMS approach is that it allows comparative analyses to be performed for different interfaces, prototypes, or specifications relatively easily. Since its inception, a number of researchers have used the method, reporting on its success for comparing the efficacy of different computer-based systems. Since Card et al developed GOMS and KLM, many new and different types of product have been developed. Researchers wanting to use the KLM to predict the efficiency of key and button layout on devices have adapted it to meet the needs of these new products. Typically, they considered whether the range of operators was applicable and whether they needed additional ones. They also had to check the times allotted to these operators to make sure that they were appropriate. This involved carrying out laboratory tests with users. Today, mobile device and phone developers are using the KLM to determine the optimal design for keypads (e.g. see Luo and John, 2005). For example, in order to do a keystroke model analysis to evaluate the design of advanced cell phone interaction, olleis et al (2007) had to create several new operators including a Macro Attention Shift (SMacro) to describe the time it takes users to shift their attention from the screen of an advanced cell phone to a distant object such as a poster or screen in the real world, or vice versa, as indicated in Figure 15.9. Figure 15.9 Attention shift (S) between the cell phone and objects in the real world C15.indd 526 3/1/11 1:59:01 M

527 From their work these researchers concluded that the KLM could be adapted for use with advanced cell phones and that it was very successful. Like other researchers they also discovered that even expert users vary considerably in the ways that they use these devices and that there is even more variation within the whole user population. While GOMS can be useful in helping make decisions about the effectiveness of new products, it is not often used for evaluation purposes. art of the problem is its highly limited scope: it can only really model computer-based tasks that involve a small set of highly routine data-entry type tasks. Furthermore, it is intended to be used only to predict expert performance, and does not allow for errors to be modeled. This makes it much more difficult (and sometimes impossible) to predict how average users will carry out their tasks when using a range of systems, especially those that have been designed to be used in very flexible ways. In most situations, it isn t possible to predict how users will perform. Many unpredictable factors come into play including individual differences among users, fatigue, mental workload, learning effects, and social and organizational factors. For example, most people do not carry out their tasks sequentially but will be constantly multitasking, dealing with interruptions and talking to others. A challenge with predictive models, therefore, is that they can only make predictions about predictable behavior. Given that most people are unpredictable in the way they behave, it makes it difficult to use them as a way of evaluating how systems will be used in real-world contexts. They can, however, provide useful estimates for comparing the efficiency of different methods of completing tasks, particularly if the tasks are short and clearly defined. C15.indd 527 3/1/11 1:59:01 M