Advertisement

Activity Modelling for Low-Intention Interaction

  • Alan DixEmail author
Chapter
Part of the Human–Computer Interaction Series book series (HCIS)

Abstract

When modelling user interactions, we normally assume that the user is acting with intention: some very explicit such as opening a valve in a nuclear power station, others more tacit, hardly needing any thought, for example tipping a tablet to turn a page. However, there are also a range of system behaviours that make use of unintentional user actions, where the user acts, but the system decides that the action has meaning, and how to make use of that meaning. Again, these may operate on a variety of levels from ‘incidental interactions’, which operate entirely without the user realising, perhaps subtle changes in search results based on past activity, to more ‘expected interactions’ such as automatic doors that open as you approach. For intentional interaction, there is long-standing advice—making sure that the user can work out what controls do, where information is, interpret the available information, receive feedback on actions—and also long-standing modelling techniques. Low-intention interactions, where the system has more autonomy, require different design strategies and modelling techniques. This chapter presents early steps in this direction. Crucial to this is the notion of two tasks: the sensed task, which the system monitors to gain information and the supported task, which the system augments or aids. First, this chapter demonstrates and develops techniques in the retrospective modelling of a familiar low-intention interaction system, car courtesy lights. These techniques are then applied proactively in the design of a community public display, which is now deployed and in everyday use.

Keywords

Ubiquitous Computing Kinetic User Interface Hierarchical Task Analysis Intentional Interaction Implicit Interaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

Many thanks to Rory Gianni who created the Internet-enabled open sign.

References

  1. Alexander A, Ishikawa S, Silverstein M Ingrid K, Angel S, Jacobsen M (1977) A pattern language. towns, buildings, construction. Oxford University Press. https://archive.org/details/APatternLanguage
  2. BBC (2015) Google apologises for Photos app’s racist blunder. BBC News, Technology. http://www.bbc.co.uk/news/technology-33347866. Accessed 1 July 2015
  3. Beigl M, Gellersen H, Schmidt A (2001) MediaCups: experience with design and use of computer-augmented everyday objects. Comput Netw 35(4):401–409CrossRefGoogle Scholar
  4. Benford S, Schnadelbach H, Koleva B, Gaver B, Schmidt A, Boucher A, Steed A, Anastasi R, Greenhalgh C, Rodden T, Gellersen H (2005) Expected, sensed, and desired: a framework for designing sensing-based interaction. ACM Trans Comput-Hum Interact (TOCHI) 12(1):3–30CrossRefGoogle Scholar
  5. Biggs J (2012) Augmented reality explorer Steve Mann assaulted at Parisian McDonald’s. TechCrunch. http://techcrunch.com/2012/07/16/augmented-reality-explorer-steve-mann-assaulted-at-parisian-mcdonalds/. Accessed 16 July 2012
  6. Boer L, Donovan J (2012) Provotypes for participatory innovation. In: Proceedings of the DIS ‘12. ACM, p. 388–397. 2012. doi: 10.1145/2317956.2318014
  7. Bruegger P, Lisowska A, Lalanne D, Hirsbrunner B (2010) Enriching the design and prototyping loop: a set of tools to support the creation of activity-based pervasive applications. J Mobile Multim 6(4):339–360Google Scholar
  8. Bruegger P (2011). uMove: a wholistic framework to design and implement ubiquitous computing systems supporting user’s activity and situation. PhD thesis, University of Fribourg, Switzerland. http://doc.rero.ch/record/24442
  9. Council of the European Union (2016) Position of the council on general data protection regulation. 8 April 2016. http://www.europarl.europa.eu/sed/doc/news/document/CONS_CONS(2016)05418(REV1)_EN.docx
  10. Dey A (2001) Understanding and using context. Pers Ubiquit Comput J 5(1):4–7MathSciNetCrossRefGoogle Scholar
  11. Dix A (1990) Information processing, context and privacy. In: Diaper G, Cockton G, Shakel B (eds) Human-computer interaction—INTERACT’90 North-Holland. pp 15–20. http://alandix.com/academic/papers/int90/
  12. Dix A (1991) Formal methods for interactive systems. Academic Press, London. ISBN 0-12-218315-0. http://www.hiraeth.com/books/formal/
  13. Dix A (1992) Human issues in the use of pattern recognition techniques. In: Beale R, Finlay J (eds) Neural networks and pattern recognition in human computer interaction, Ellis Horwood, pp 429–451. http://alandix.com/academic/papers/neuro92/neuro92.html
  14. Dix A, Abowd G (1996) Modelling status and event behaviour of interactive systems. Softw Eng J 11(6):334–346CrossRefGoogle Scholar
  15. Dix A, Rodden T, Davies N, Trevor J, Friday A, Palfreyman K (2000a) Exploiting space and location as a design framework for interactive mobile systems. ACM Trans Comput-Hum Interact (TOCHI) 7(3):285–321CrossRefGoogle Scholar
  16. Dix A, Beale R, Wood A (2000b). Architectures to make simple visualisations using simple systems. In: Proceedings of the Working Conference on Advanced visual interfaces (AVI ‘00). ACM, New York, USA, pp 51–60. doi:http://dx.doi.org/10.1145/345513.345250
  17. Dix A (2002) Beyond Intention—pushing boundaries with incidental interaction. In: Proceedings of building bridges: interdisciplinary context-sensitive computing. Glasgow University. http://alandix.com/academic/papers/beyond-intention-2002/. Accessed 9 Sept 2002
  18. Dix A, Finlay J, Abowd G, Beale R (2004) Modeling rich interaction. Chapter 18 in Human–computer interaction, 3rd edn. Prentice Hall, Englewood Cliffs. http://www.hcibook.com/e3/
  19. Dix A (2006) Car courtesy lights—designing incidental interaction. Case study in HC Book online! 2004/2006. http://www.hcibook.com/e3/casestudy/car-lights/
  20. Dix A, Leite J, Friday A (2007). XSED—XML-based description of status-event components and systems. In: Proceedings of engineering interactive systems 2007, IFIP WG2.7/13.4 conference, Salamanca, March 22–24, 2007, LNCS, vol 4940, pp 210–226Google Scholar
  21. Dostal J, Dix A (2011) Tiree tech wave. Interfaces, Summer 2011, pp 16–17 http://tireetechwave.org/events/ttw-1/interfaces-article/
  22. Forbrig P, Märtin C, Zaki M (2013). Special challenges for models and patterns in smart environments. In: Kurosu M (ed) Proceedings of the 15th international conference on human-computer interaction: human-centred design approaches, methods, tools, and environments - Volume Part I (HCI’13), vol Part I. Springer, Berlin, pp 340–349Google Scholar
  23. Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley, LongmanGoogle Scholar
  24. Gellersen H, Beigl M, Krull H (1999) The MediaCup: awareness technology embedded in an everyday object. In: International Symposium on Handheld and Ubiquitous Computing (HUC99) Karlsruhe, GermanyGoogle Scholar
  25. Ghazali M, Dix A (2006) Natural inverse: physicality, interaction & meaning. In: Let’s get physical: tangible interaction and rapid prototyping in, for, and about design workshop at 2nd international conference on design computing & cognition 2006, TU/e Eindhoven. http://alandix.com/academic/papers/DCC-2006-LGP-natural-inverse/. Accessed 8–12 July 2006
  26. Gibbs S (2015) Google says sorry over racist Google Maps White House search results. The Guardian, 20 May 2015. http://www.theguardian.com/technology/2015/may/20/google-apologises-racist-google-maps-white-house-search-results
  27. Goodman B, Flaxman S (2016) EU regulations on algorithmic decision-making and a “right to explanation”. Presented at 2016 ICML workshop on human interpretability in machine learning (WHI 2016), New York, NY. http://arxiv.org/abs/1606.08813v1
  28. Green T, Petre M M (1996) Usability analysis of visual programming environments: a ‘cognitive dimensions’ framework. J Visual Lang Comput 7(2):131–174. doi: 10.1006/jvlc.1996.0009 CrossRefGoogle Scholar
  29. Greenfield A (2006) Everyware: the dawning age of ubiquitous computing. Peachpit Press, BerkeleyGoogle Scholar
  30. Heidegger M (1927) Sein und Zeit,. (English translation: Being and Time. Harper, 2008)Google Scholar
  31. Hern A (2015) Flickr faces complaints over ‘offensive’ auto-tagging for photos. The Guardian, 20 May 2015. http://www.theguardian.com/technology/2015/may/20/flickr-complaints-offensive-auto-tagging-photos
  32. Hinze A, Malik P, Malik R (2006) Interaction design for a mobile context-aware system using discrete event modelling. In: Proceedings of the 29th Australasian computer science conference, vol 48 (ACSC ‘06), Vladimir Estivill-Castro and Gillian Dobbie (Eds.), Vol. 48. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, p 257–266Google Scholar
  33. Hutchins E, Holland J, Norman D (1986) Direct manipulation interfaces. In: Norman DA, Draper SW (eds) User centered system design. Lawrence Erlbaum Associates, Hillsdale, NJ, pp 87–124Google Scholar
  34. Hutchinson H, Mackay W, Westerlund B, Bederson B, Druin A, Plaisant C, Beaudouin-Lafon M. Conversy S, Evans H, Hansen H, Roussel N, Eiderbäck B (2003) Technology probes: inspiring design for and with families. In CHI’03: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 17–24Google Scholar
  35. Ju W, Leifer L (2008) The design of implicit interactions: making interactive systems less obnoxious. Des Issues 24(3):72–84. doi: 10.1162/desi.2008.24.3.72 CrossRefGoogle Scholar
  36. Kingma B, van Marken Lichtenbelt W (2015) Energy consumption in buildings and female thermal demand. Nat Clim Change 5:1054–1056. doi: 10.1038/nclimate2741 CrossRefGoogle Scholar
  37. Mann S, Nolan J, Wellman B (2003) Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surv Soc 1(3):331–355. http://www.surveillance-and-society.org/articles1(3)/sousveillance.pdf
  38. Mori M (1970). The uncanny valley. Energy 7(4):33–35. (in Japanese). Translated MacDorman, K. and Kageki, N. (2012) IEEE Spectrum, 12 Jun 2012. http://spectrum.ieee.org/automaton/robotics/humanoids/the-uncanny-valley
  39. Newman W, Eldridge M, Lamming M (1991). Pepys: generating autobiographies by automatic tracking. In: Proceedings of the second European conference on computer supported cooperative work—ECSCW ‘91, 25–27 Sept 1991, Kluwer Academic Publishers, Amsterdam, pp 175–188Google Scholar
  40. Nielsen J (1993) Usability engineering. Academic Press, San DiegozbMATHGoogle Scholar
  41. Norman D (1990) The design of everyday things. Doubleday, New YorkGoogle Scholar
  42. Norman D (2010). Natural user interfaces are not natural. Interactions 17(3):6–10. doi: 10.1145/1744161.1744163
  43. Pallotta V, Bruegger P, Hirsbrunner B (2008) Kinetic user interfaces: physical embodied interaction with mobile ubiquitous computing systems. In: Kouadri-Mostéfaoui S, Maamar M, Giaglis P (eds) Advances in Ubiquitous computing: future paradigms and directions. IGI Global Publishing, pp 201–228. ISBN: 978-1-599-04840-6Google Scholar
  44. Paterno F (2012) Model-based design and evaluation of interactive applications. SpringerGoogle Scholar
  45. Popper B (2012) New evidence emerges in alleged assault on cyborg at Paris McDonald’s. The Verge. http://www.theverge.com/2012/7/19/3169889/steve-mann-cyborg-assault-mcdonalds-eyetap-paris. Accessed 19 July 2012
  46. Rehman K, Stajano F, Coulouris G (2007) An architecture for interactive context-aware applications. IEEE Perv Comput 6(1):73–80. doi:http://dx.doi.org/10.1109/MPRV.2007.5
  47. Salber D, Dey A, Abowd G (1999) The context toolkit: aiding the development of context-enabled applications. In: Proceedings of the 1999 conference on human factors in computing systems (CHI ‘99), Pittsburgh, PA, 15–20 May 1999, pp 434–441Google Scholar
  48. Schmidt A (2013) Context-aware computing. The encyclopedia of human–computer interaction, 2nd edn. In: Soegaard M, Friis R (eds) Interaction design foundation. https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-interaction-2nd-ed/context-aware-computing-context-awareness-context-aware-user-interfaces-and-implicit-interaction
  49. Schmidt A (2000) Implicit human computer interaction through context. Pers Technol 4(2–3):191–199. doi: 10.1007/BF01324126 MathSciNetCrossRefGoogle Scholar
  50. Schilit B, Adams N, Want R (1994). Context-aware computing applications. In: Proceedings of the 1994 first workshop on mobile computing systems and applications (WMCSA ‘94). IEEE Computer Society, Washington, DC, USA, pp 85–90. doi:http://dx.doi.org/10.1109/WMCSA.1994.16
  51. Shepherd A (1989) Analysis and training in information technology tasks. In: Diaper D (ed) Task analysis for human-computer interaction, Chapter 1. Ellis Horwood, Chichester, pp 15–55Google Scholar
  52. Shneiderman B (1982) The future of interactive systems and the emergence of direct manipulation. Behav Inf Technol 1(3):237–256CrossRefGoogle Scholar
  53. Shneiderman B (1998) Designing the user interface—Strategies for effective human-computer interaction, 3rd edn. Addison WesleyGoogle Scholar
  54. Tang L, Yu Z, Wang H, Zhou X, Duan Z (2014) Methodology and tools for pervasive application development. Int J Distrib Sens Netw 10(4). http://dx.doi.org/10.1155/2014/516432
  55. Want R, Schilit B, Adams N, Gold R, Petersen K, Goldberg D, Ellis J, Weiser M (1995) An overview of the PARCTAB ubiquitous computing experiment. IEEE Pers Commun 2(6):28–43. doi: 10.1109/98.475986
  56. Wigdor D, Wixon D (2011) Brave NUI world: designing natural user interfaces for touch and gesture. Morgan KaufmannGoogle Scholar
  57. Wilde A, Pascal B, Hirsbrunner B (2010) An overview of human-computer interaction patterns in pervasive systems. In: International conference on user science and engineering 2010 (i-USEr 2010), Sha-Allam, Malaysia, 13–15 Dec 2010Google Scholar
  58. Wurdel M (2011) An integrated formal task specification method for smart environments. University of Rostock. ISBN:978-3-8325-2948-2Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Computer ScienceUniversity of BirminghamBirminghamUK
  2. 2.Talis Ltd. BirminghamBirminghamUK

Personalised recommendations