0% found this document useful (0 votes)
4 views

HCI_UNIT_VI

The document discusses various models and theories related to Human-Computer Interaction (HCI), focusing on the Goal and Task Hierarchy Model, GOMS, and the Linguistic Model. It explains how tasks can be decomposed into subtasks for better understanding and execution, and highlights the use of BNF for dialog grammar specification. Additionally, it covers the Keystroke-level model and Hierarchical Task Analysis (HTA) as methods for task decomposition and interface design.

Uploaded by

Umera Rawoot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

HCI_UNIT_VI

The document discusses various models and theories related to Human-Computer Interaction (HCI), focusing on the Goal and Task Hierarchy Model, GOMS, and the Linguistic Model. It explains how tasks can be decomposed into subtasks for better understanding and execution, and highlights the use of BNF for dialog grammar specification. Additionally, it covers the Keystroke-level model and Hierarchical Task Analysis (HTA) as methods for task decomposition and interface design.

Uploaded by

Umera Rawoot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

UNIT – VI

HCI MODELS AND


THEORIES
Goal and Task Hierarchy Model
• Many models make use of the model of mental
processing
• In which user achieves goals by solving sub goals in
divide-and-conquer fashion
• Two such models are GOMS, CCT, TAG, etc.
• Consider an example, we want to generate a report
on sales of introductory HCI textbooks
• To achieve this goal we will divide it into several sub
goals

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 2


Goal and Task Hierarchy Model
produce report
gather data
. find book names
. . do keywords search of names database
<<further subgoals>>
. . sift through names and abstracts by hand
<<further subgoals>>
. search sales database
<<further subgoals>>
layout tables and histograms
<<further subgoals>>
write description
<<further subgoals>>

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 3


GOMS
• Invented by Card, Moran and Newell is
• Acronym for Goals, Operators, Methods & Selection
• Consists of these four elements
• Goals - User’s goals, describing what user wants to
achieve
• Operators - Lowest level of analysis. They are basic
actions that user must perform in order to use system
• Methods - There are several ways in which a goal can be
split into sub goals
• Selection – No random choice, but attempts to predict
which methods will be used
03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 4
GOMS
• Create GOMS description of task of photocopying
an article from a journal. Discuss the issue of
closure in terms of your GOMS description

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 5


03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 6
Linguistic Model
• User’s interaction with computer is often viewed in
terms of language
• Several of the dialog notations on linguistic ideas
• BNF grammars are frequently used to specify the
dialogs
• Models have been proposed for understanding
user’s behavior and analyzing cognitive difficulty of
the interface

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 7


BNF
• Representative of linguistic approach is Reisner’s
use of Backus–Naur Form (BNF) rules to describe
the dialog grammar
• This views the dialog at a purely syntactic level,
ignoring semantics of the language
• BNF has been used widely to specify the syntax of
computer programming languages
• Many system dialogs can be described easily using
BNF rules

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 8


BNF
• For example, imagine a graphics system that has
line-drawing function

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 9


BNF
• Names in description are of 2 types: non-terminals,
in lower case, and terminals, in upper case
• Terminals represent lowest level of user behavior,
such as pressing key, clicking mouse button, etc.
• Non-terminals are higher-level abstractions
• Non-terminals are defined in terms of other non-
terminals and terminals by a definition of form
Name :: = Expression

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 10


BNF
• The ‘::=’ symbol is read as ‘is defined as’
• Only non-terminals may appear on the left of a
definition
• The right-hand side is built up using two operators
‘+’ (sequence) and ‘|’ (choice)

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 11


Physical and Device Models
• Keystroke-level model
• Uses problem solving understanding as a basis for
detailed predictions about user performance
• It is aimed at unit tasks within interaction – execution of
simple command sequences, typically taking no more
than 20 seconds
• Examples of this would be using a search and replace
feature, or changing the font of a word
• It does not extend to complex actions such as producing
a diagram

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 12


Physical and Device Models
• Keystroke-level model
• Assumption is that these more complex tasks would be
split into subtasks (as in GOMS) before user attempts to
map them into physical actions
• The task is split into two phases:
• Acquisition of the task, when the user builds a mental
representation of the task;
• Execution of the task using the system’s facilities

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 13


Physical and Device Models

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 14


Physical and Device Models
• Three-state model

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 15


Hierarchical Task Analysis (HTA)
• Method of task decomposition
• A task is decomposed into several subtasks
• Outputs of HTA are hierarchy of tasks and subtasks
• Also plans describing in what order and under what
conditions subtasks are performed
• Consider an example, task hierarchy for making a
cup of tea
• The main task, ‘make a cup of tea’, is decomposed
into six subtasks

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 16


Hierarchical Task Analysis (HTA)

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 17


Uses of Task Analysis

Detailed
Interface
Requirements Design
Capture and
Manuals and Systems
Tuition Design

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 18


Manuals and Tuition

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 19


Requirements Capture and
Systems Design
• Task analysis can be used to guide the design of
new systems
• Requirements capture is the process of eliciting
what a new system should do
• Task analysis is not a form of requirements capture
as it refers to existing system, not planned system
• It includes many elements which are not part of the
system

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 20


Detailed Interface Design
• Top-level menus can be labeled after the top-level
decomposition, and submenus after next level, etc.
• For this, tree may be first reduced to simple tree,
thus guaranteeing that each object/action is under
exactly one menu
• Alternatively, more complex trees allowing AND &
OR as well as XOR branches can be used
• In this case, an object/action may be found by
several paths through the menus

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 21


Computer Mediated Communication
Email

Virtual Structured
Collaborative Message
Environments System

Video
txt is gr8
Conferencing

03-Oct-18 Parag N Achaliya, SNJB's KBJ COE, Chandwad (Nashik) 22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy