Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1122935.1122943acmotherconferencesArticle/Chapter ViewAbstractPublication PagestamodiaConference Proceedingsconference-collections
Article

A cognitive modeling of the user's exploratory behavior with prior knowledge

Published: 26 September 2005 Publication History

Abstract

Users tend to learn and use system functions and mechanisms through interacting with devices without referring to manuals or task instructions. In this exploratory behavior, a user's non-planned, opportunistic interaction activity is guided by the user's current knowledge and the system's responses. The user's interaction reasoning is bidirectional, including both top-down and bottom-up search processes. A top-down search is usually task-based and a bottom-up search is predominantly device-oriented. In this paper, we probe a method of cognitive modeling to account for the user's exploratory behavior. This cognitive model includes the user's prior knowledge of declarative knowledge, procedural knowledge, and meta-knowledge. Declarative knowledge concerns the characteristics and structures of tasks and interfaces. Procedural knowledge more directly affects the selection of the operations and sequences during exploration. Meta-knowledge is the knowledge that guides the use of the user's task knowledge and interface knowledge. Through user observations, we analyzed users' opportunistic behavior while interacting with two convergence devices, and elicited the users' prior knowledge utilized during the exploration.

References

[1]
Anderson, J. R., Rules of the mind, Hillsdale, NJ: Lawrence Erlbaum Associates, Inc. (1993).
[2]
Guindon, R., Requirements and design of design vision, an object-oriented graphical interface to an intelligent software design assistant, Proc. of CHI 1992, 499--506, New York: ACM Press (1992), 499--506.
[3]
Howes, A., A model of the acquisition of menu knowledge by exploration. Proc. CHI 1994, New York, NY: Association for Computing Machinery (1994), 445--451.
[4]
Howes, A., and Young, R. M., Learning consistent, interactive and meaningful task-action mappings: A computational model. Cognitive Science, 20, (1996), 301--356.
[5]
Kintsch, W., The role of knowledge in discourse comprehension: A construction-integration model, Psychological Review, 95, (1988), 63--182
[6]
Kitajima, M., and Polson, P. G., A comprehension-based model of correct performance and errors in skilled, display-based, human-computer interaction, International Journal of Human-Computer Studies, 43, (1995), 65--99.
[7]
May, J., and Barnard, P. J., The case for supportive evaluation during design, Interacting with Computers, 7(2), (1995), 115--143.
[8]
May, J., and Barnard, P. J., Cognitive Tasks Analysis in Interaction Cognitive Subsystems, Diaper, D., and Stanton. N. A. (Ed.), the Handbook of Task Analysis for Human-Computer Interaction. Mahwa, NJ: Lawrence Erlbaum Associates, (2004), 291--325.
[9]
Newell, Unified theories of cognition, Cambridge, MA: Harvard University Press, (1990).
[10]
Polson, P. G., and Lewis, C. H., Theory-based design for easily learned interfaces, Human-Computer Interaction, 5, (1990), 191--220.
[11]
Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., and Carey, T., Human-computer interaction. Reading, MA: Addison-Wesley (1994).
[12]
Rasmussen, J., Pejtersen, A., and Goodstein, L. P., Cognitive System Engineering, New York: Wiley, (1994).
[13]
Rieman, J., Young, R. M., and Howes, A., A dual-space model of iteratively deepening exploratory learning, Int. J. Human-Computer Studies, 44, (1996), 743--775
[14]
Yoon W. C., Park J., and Lee, S. H., A Diagrammatic model for representing user's interface knowledge of task procedures. Proc. Cognitive Systems Engineering in Process Control, (1996), 276--285.
[15]
Yoon, W. C., Identifying, organizing and exploring problem space for interaction design, 8th IFAC/IFIP/IFORS/IEA Symposium on Analysis, Design, and Evaluation of Human-Machine Systems, (2001), 81--86.
[16]
Visser, W., Use of episodic knowledge and information in design problem solving, In N. Cross, H. Christiaans, and K. Dorst (Ed.), Analysing Design Activity, New York: Wiley (1996), 271--289.

Cited By

View all
  • (2009)Risk Perceptions of Information SecurityProceedings of the 2009 International Conference on Computational Science and Engineering - Volume 0310.1109/CSE.2009.449(462-469)Online publication date: 29-Aug-2009

Index Terms

  1. A cognitive modeling of the user's exploratory behavior with prior knowledge

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      TAMODIA '05: Proceedings of the 4th international workshop on Task models and diagrams
      September 2005
      161 pages
      ISBN:1595932208
      DOI:10.1145/1122935
      • Conference Chair:
      • Marcin Sikorski
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 September 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cognitive model
      2. convergence device
      3. exploratory behavior
      4. non-planned task
      5. opportunistic activity
      6. prior knowledge

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2009)Risk Perceptions of Information SecurityProceedings of the 2009 International Conference on Computational Science and Engineering - Volume 0310.1109/CSE.2009.449(462-469)Online publication date: 29-Aug-2009

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media