ArticlePDF Available

Keyboard Shortcut Usage: The Roles of Social Factors and Computer Experience

Authors:

Abstract

Previous research (Lane, Napier, Peres, & Sándor, in press) has shown that despite the fact that it typically takes half as much time to issue a command to a computer application using that command's keyboard shortcut, most people issue a particular command by clicking an icon on a toolbar or by selecting the command from a pull-down menu. This study examined reasons why that might be the case with a web survey that focused on demographic characteristics of people who do and do not use keyboard shortcuts, as well as social factors of computer use that might influence use of keyboard shortcuts. Participants' shortcut usage was influenced by social factors, such as working in an environment with other shortcut users and experiential factors, primarily the hours spent using a computer per week.
KEYBOARD SHORTCUT USAGE:
THE ROLES OF SOCIAL FACTORS AND COMPUTER EXPERIENCE
S. Camille Peres, Franklin P. Tamborello II, Michael D. Fleetwood,
Phillip Chung, and Danielle L. Paige-Smith.
Department of Psychology, Rice University
Houston, TX
Previous research (Lane, Napier, Peres, & Sandor, in press) has shown
that despite the fact that it typically takes half as much time to issue a
command to a computer application using that command’s keyboard
shortcut, most people issue a particular command by clicking an icon on a
toolbar or by selecting the command from a pull-down menu. This study
examined reasons why that might be the case with a structured interview
survey and web survey that focused on demographic characteristics of
people who do and do not use keyboard shortcuts, as well as social factors
of computer use that might influence use of keyboard shortcuts.
Participants’ shortcut usage was influenced by social factors, such as
working in an environment with other shortcut users and experiential
factors, primarily the hours spent using a computer per week.
INTRODUCTION
There is a significant body of work to
support the benefits of keyboard shortcuts (KBS)
from a timesaving perspective. Formal Human-
Computer Interaction methods such as GOMS (John
& Kieras, 1996) use keystroke operator times to
compare competitive interfaces. A study by Lane,
Napier, Peres, and Sándor (in press)presented an in-
depth look at the timesaving of KBSs in Microsoft
Word. While they were the most efficient method of
interaction in terms of time, experienced users
frequently did not use them. Rosson (1984) also
found that utilization of more advanced keyboard
commands in a text editing software (XEDIT) did
not increase with experience. Neither did many self-
labeled computer experts use the most advanced
and efficient methods in software such as Word and
CAD (Bhavnani & John, 1997; Rosson, 1984),
suggesting the barrier to KBS usage may persist
over time.
Galitz (1996) reported that graphical
interfaces were easier to use because they made the
set of possible commands visible during the use of
software, eliminating the need to memorize specific
commands. Indeed, it is now widely accepted in the
usability community (Zhang & Norman, 1994) that
interfaces presenting information “on the device”
are easier to use than those that require knowledge
“in the head,” due to the decreased demands on
memory. This also corresponds with evidence of
hill-climbing in instances of interaction with a
computer (Gray, 2000; Polson & Lewis, 1990).
Essentially, users were found to use perceptual
similarity and cues on the interface alone to guide
their actions, in keeping with our general tendencies
as “cognitive misers.”
The influence of social factors on computer
usage pertaining to such phenomena as online trust,
organizational culture, group collaboration, etc. has
been widely reported in the literature (Bailey,
Gurak, & Konstan, 2003; Dourish & Bly, 1992).
There is a dearth of information, however, on
whether or not social factors affect computer micro-
strategies. Previous studies have compared the
efficiency of various computer input devices and
strategies (Card, Moran, & Newell, 1983) as well as
their adoption by various categories of users
(Bhavnani & John, 1997; Lane et al., in press).
However, the specifics of how and why users adopt
different micro-strategies has not been deeply
explored from a social perspective.
Structured Interviews
As an exploratory procedure to begin to
investigate why people do and do not use keyboard
shortcuts, structured interviews were conducted
with nine individuals. We asked questions about
usage of KBS, general computer usage and
demographic information. The results suggested
that a primary method by which people learned to
use KBS was through social interaction, such as
working with and watching other people who used
KBS. The results of these interviews were
incorporated into an online questionnaire designed
to further explore the relationship between KBS
usage and social environments.
METHOD
A questionnaire was administered via a
website (http://psych.rice.edu/HFES/) to 82
individuals - 49 women and 31 men (with one
respondent not providing their gender). There were
21 respondents who classified themselves as not
using KBS and 61 who used KBS to some degree.
Users were asked a variety of questions about their
computer usage, certain personality characteristics,
how they came to their level of computer usage, and
the computer usage of coworkers and
acquaintances.
RESULTS
Differences were found between those who
use KBS and those who do not use KBS on all of
the questions regarding the environment where they
use the computer. As seen in Figure 1, those who
did not use KBS had lower ratings of agreement on
all seven items than those who did use KBS and all
differences were significant at p = .02 or less. The
most notable difference between these two groups
was found on the item asking if the respondent
worked with people who use KBS.
Subjects who did not use KBS were asked
what it would take for them to start using keyboard
shortcuts. The results are provided in Table 1 and
show that the most endorsed statement was “I
would start using keyboard shortcuts if I had
someone to train me to use them.” While the least
endorsed statement was “I would start using KBS if
I thought they would save me time.”
1
2
3
4
5
Work with KBS
users
Work with others
at computer
Watch others
using a computer
Have seen others
use KBS
Know people that
use a lot of KBS
Observe KBS
users on their
computers
Observe KBS
users using KBS
Question
Not Use KBS
Use KBS
Doesn't apply
to me
Strong applies
to me
Figure 1 Mean responses for questions regarding participants’ environments as a
function of whether or not they used KBS.
I would use keyboard shortcuts, if…
Mean
I had someone train me to use them
3.2
they were easier to remember
3.4
they were easier to learn
3.6
I could use them more frequently
3.6
they were easier to execute
3.8
I thought they would save me more
time
4.1
Participant’s ratings on all statements
regarding observing the use of KBS in social
situations were correlated with their report of the
percentage of time they use KBS for issuing
commands (0% was used for those that did not use
shortcuts). There was a correlation between the
percentage of time that participants used shortcuts
and the degree to which participants (1) are in a
working environment with people who use KBS, r =
0.43, p < 0.001, (2) watch other people use a
computer, r = 0.34 p < 0.001, (3) know people that
use a lot of keyboard shortcuts, r = 0.33, p < 0.001,
(4) work at a single computer with a group of
people, r = 0.29, p < 0.01, (5) observe people using
keyboard shortcuts when they issue commands, r =
0.27, p < 0.01, (6) have seen other people using
keyboard shortcuts, r = 0.26, p < 0.001, and (7) are
able to watch KBS users at their computers, r =
0.21, p = 0.03.
Table 2 Mean responses for level of expertise (10 =
expert), hours p/week using a personal computer,
and years using a personal computer.
Group
Not Use KBS
Use KBS
Expertise
3.2
6.7
Hours p/week on PC
16.7
36.0
Years using a PC
12.2
12.5
Table 2 shows participants’ responses to
demographic questions as a function of whether or
not they used KBS. These results show that the
participants who did not use KBS rated their degree
of expertise with computers as lower than those
who do use KBS, t(85) = -8.108, p < 0.001. KBS
users also reported spending more time on a
computer each week, t(70.9) = -5.629, p <0.01, and
spend more time using the internet each week,
t(79.8) = -4.512, p < 0.001. Interestingly, there was
not a reliable difference in the reported number of
years since they started using computers between
the two usage groups, t(29.1) = 0.260, p < 0.797.
The relationships between the percent of
time participants reported using KBS and reported
computer use was examined. Reliable correlations
were found between the percentage of time that
participants used shortcuts and (1) their ranking of
their level of computer expertise, r = 0.66, p <
0.001, (2) the number of hours that they use a
personal computer per week, r = 0.50, p < 0.001,
(3) the number of hours that they use the internet
per week, r = 0.35, p < 0.001. There was not a
correlation between the percentage of time that
participants used shortcuts, and the number of years
that they had been using a personal computer, r =
0.23, p < 0.08. There was a negative correlation
between the percentage of time that participants
used shortcuts and their age, r = -0.32, p < 0.01.
DISCUSSION
Bhavnani and John (1997)suggested that
experience alone may not determine use of efficient
strategies and that there seems to be an influence of
the environment in which the computer is used.
Responses to the current survey certainly support
the role of social factors in the adoption of efficient
computer usage strategies. In the current study,
being around and watching others use shortcuts
corresponded to self-reports of keyboard shortcut
use. Additionally, the results suggest that people
who do not use KBS would not be motivated to
learn keyboard shortcuts because of possible
timesavings but instead want someone around to
train them on how to use the shortcuts. The finding
that those who use KBS are more likely to have
people around them who also use KBS suggest that
the micro-strategy of using keyboard shortcuts
increases when users have co-workers to teach them
how and when to use this efficient strategy.
Although the prevalence of social influence
is well known in other arenas, it is interesting that
such factors come to bear in the use of keyboard
shortcuts, a seemingly automatic micro-strategy
adopted by a subset of computer users.
While it would seem intuitive that more
experienced computer users would be more efficient
computer users, past research has not found any
support for a link between experience with a
personal computer, or a particular program, and its
efficient use (Bhavnani & John, 1997; Lane et al., in
press). The current research also found no
relationship between years of experience with a
computer and the use of KBS, however, we did find
a relationship between use of keyboard shortcuts
and hours spent using a computer per week. These
findings suggest that the amount of time someone
currently spends on the computer may be a more
predictive a factor for the efficient use of a
computer program than the number of years or level
of expertise a person has with a particular program.
It is important to note that Lane et al. did not
find a relationship between hours per week on the
computer and KBS usage. A possible reason that
they did not find a relationship between these two
variables and our study did is the nature of the data
collected. Specifically, the current study collected a
continuous measure of the number of hours per
week spent on the computer while Lane et al used a
forced-choice measure of experience. As shown in
Table 3, 72% of their sample reported more than 15
hours per week on the computers. While we had a
similar sample, with nearly 70% reporting more
than 15 hours per week on the computer, the use of
a continuous scale allowed for a more even
distribution.
Table 3 Comparison of hours p/week of computer use
for current sample and Lane et al.
Hours per Week
Current Sample
Lane et al.
< 1
0
0.4
1 - 5
4.7
6.4
6 - 10
15.3
14.4
11 - 15
10.6
56
16 - 20
9.4
72
21 - 25
5.9
26 - 30
14.1
31 - 35
7.1
36 - 40
10.5
41 - 45
2.4
46 - 50
8.2
> 50
11.8
At the same time, the current study asked
subjects to report the “overall” percentage of time
they used KBS while Lane et al. asked subjects to
report the percentage of time they used KBS for
fourteen commands in Microsoft Word. Thus the
current study may not have as clear a picture of the
participants KBS usage as Lane et al.
While an individual may not save a large
amount of time by issuing commands via the
keyboard (e.g. one would have to issue at least 450
commands to save 15 minutes per day; (Lane et al.,
in press), timesavings to an organization would be
more prominent. Additionally, keyboard shortcuts
are just one way of using a computer program
efficiently and it is conceivable that any principles
discovered regarding increasing keyboard short use
might also be applicable to increasing other
efficient strategies. Finally, computers users report
less musculoskeletal discomfort when using a
keyboard rather than mouse (Jorgensen, Garde,
Laursen, & Jensen, 2002).
These findings have implications for
computer training and suggest that it would be
advantageous to an organization to construct
training courses in such a manner as to facilitate
social interaction – either during the training and/or
after the training. That is, an optimal training
environment for the instruction of the efficient use
of computer applications may be to have a group of
co-workers in an interactive training setting. If the
co-workers are trained together, they may then be
able to act as support for each other when they
return to work and implement what they have
learned.
To further explore the self-report results
described herein, future research will attempt to
experimentally examine the roles of experience and
social factors in the use of efficient software
strategies. Although these factors have been
identified as relevant, the importance of each factor
in the adoption of shortcut strategies remains
unresolved. Further, the nature of the effect of the
social dynamic is also of interest. For instance,
seeing a coworker may alter the schema of
command issuance by presenting an alternate
method prior to the execution of that command
(rather than presenting the shortcut after the menu
item has already been selected). If that is indeed the
case, altering the presentation of shortcut reminders
may be equivalent to the social influence of
coworkers.
References
Bailey, B., Gurak, L., & Konstan, J. (2003). Trust in
Cyberspace. In J. Ratner (Ed.), Human
Factors in Web Development (2nd ed., pp.
311-321). Mahwah, N.J.: Lawrence Erlbaum
Associates.
Bhavnani, S. K., & John, B. E. (1997). From
Sufficient to Efficient Usage: An Analysis of
Strategic Knowledge. Paper presented at the
ACM CHI '97, Atlanta, GA.
Card, S. K., Moran, T. P., & Newell, A. (1983). The
Psychology of Human-Computer
Interaction. Hillsdale, NJ.: LEA.
Dourish, P., & Bly, S. (1992). Portholes:
Supporting Awareness in a Distributed
Work Group Systems for Media-Supported
Collaboration. Paper presented at the ACM
CHI'92 Human Factors in Computing
Systems.
Galitz, W. O. (1996). The essential guide to user
interface design: An introduction to GUI
design principles and techniques: John
Wiley & Sons, Inc.
Gray, W. D. (2000). The Nature and Processing of
Errors in Interactive Behavior. Cognitive
Science, 24(2), 205-248.
John, B. E., & Kieras, D. E. (1996). Using GOMS
for User Interface Design and Evaluation:
Which Technique? ACM Transactions on
Computer-Human Interaction, 3(4), 287-
319.
Jorgensen, A., Garde, A., Laursen, B., & Jensen, B.
(2002). Using Mouse and Keyboard Under
Time Pressure: Preference, Strategies, and
Learning. Behavior and Information
Technology, 21(317-319).
Lane, D. M., Napier, H. A., Peres, S. C., & Sandor,
A. (in press). The Hidden Costs of Graphical
User Interfaces: The Failure to Make the
Transition from Menus and Icon Tool Bars
to Keyboard Shortcuts. International
Journal of Human Computer Interaction.
Polson, P. G., & Lewis, C. H. (1990). Theory-based
Design for Easily Learned Interfaces.
Human-Computer Interaction, 5, 191-220.
Rosson, M. B. (1984). Patterns of experience in text
editing. Human Factors, 26, 463-475.
Zhang, J., & Norman, D. A. (1994). Representations
in Distributed Cognitive Tasks. Cognitive
Science, 18, 87-122.
... One method that has been studied is the use of the Keyboard to Issue Commands (KIC). However, despite the fact that KIC are more efficient than other command methods, studies have shown that people have a tendency not to use them (Lane, Napier, Peres, & Sandor, 2005;Peres, Tamborello, Fleetwood, Chung, & Paige-Smith, 2004). ...
... Previous work performed by Peres et al. (2005) has provided evidence that there may be a functional relationship between users' assessments of the costs and benefits of using KIC and their selfreported use of the keyboard to enter commands in MSWord®. Additionally, Peres et al. (2004) found an association between users' association with others who use KIC, and their self-reported use of the keyboard to enter commands in Microsoft Word. Thus, it is conceivable that a theory of the adoption of efficient human performance should include whether the observation of others using KIC impacts peoples' weighing of the costs and benefits of KIC usage. ...
... p = 0.42). Peres et al., 2004 found that, …"those who use KBS (also known as KIC) are more likely to have people around them that use KBS (p.3)" and emphasized the importance of "social factors on computer usage (Peres et al, 2004, p.1)". Additionally, Peres et al., 2005 found that people who claimed to use KIC also weighted the benefit of using KIC more heavily. ...
... For example, no relationships have been found between age, typing abilities, familiarity with computers and the use of keyboard shortcuts (Peres et al., 2005). A relationship that has been found several times is between hours per week someone uses a computer and the use of keyboard shortcuts (Peres et al., 2004(Peres et al., , 2005. Peres et al. (2004) investigated the impact of social factors on keyboard shortcut usage. ...
... A relationship that has been found several times is between hours per week someone uses a computer and the use of keyboard shortcuts (Peres et al., 2004(Peres et al., , 2005. Peres et al. (2004) investigated the impact of social factors on keyboard shortcut usage. A strong relationship was found between whether users are in a working environment with people who are keyboard shortcut users and whether the respondents were keyboard shortcut users themselves. ...
... No significant correlations were found between the use of keyboard shortcuts and either the number of hours per week participants used a computer (r s = 0.097, P > 0.5) or the number of hours per week participants used Microsoft Word (r s = 0.019, P > 0.9). In some previous studies, a (weak) correlation was found between hours per week someone used a computer and the use of keyboard shortcuts (Peres et al., 2004(Peres et al., , 2005. On the other hand, in the study by Lane et al. (2005), no significant correlations between the hours per week the participants used a computer or the hours per week they used Microsoft Word and the use of keyboard shortcuts were found. ...
Article
Keyboard shortcuts are generally accepted as the most efficient method for issuing commands, but previous research has suggested that many people do not use them. In this study we investigate the use of keyboard shortcuts further and explore reasons why they are underutilized by users. In Experiment 1, we establish two baseline findings: (1) people infrequently use keyboard shortcuts and (2) lack of knowledge of keyboard shortcuts cannot fully account for the low frequency of use. In Experiments 2 and 3, we furthermore establish that (3) even when put under time pressure users often fail to select those methods they themselves believe to be fastest and (4) the frequency of use of keyboard shortcuts can be increased by a tool that assists users learning keyboard shortcuts. We discuss how the theoretical notion of ‘satisficing’, adopted from economic and cognitive theory, can explain our results.
... (34) In our experience, even the native PACS shortcuts are underused despite evidence that they are superior to GUI elements. This is consistent with a pattern of underuse of keyboard shortcuts among computer users (22,23,35). ...
... In our group, observing others using AIDs encouraged users to adopt these new techniques. This is consistent with observations of similar social factors involved in keyboard shortcut use (35). Adopters required verbal instruction before and during the transition to using AIDs. ...
Article
Full-text available
Using alternative input devices and AutoHotkey scripts is an inexpensive and efficient method to personalize the workstation and reduce time spent performing repetitive tasks. Radiologists rely heavily on the digital radiology workstation. They spend most of their time interacting with software applications that use multiple input devices, including mice, keyboards, and microphones. The efficiency of this relationship depends on the interface of the different software applications, their interoperability, and input device effectiveness. Because of the repetition of a radiologic workflow, even small inefficiencies can accumulate into significant losses of time and productivity and contribute to user fatigue. Alternative input devices (AIDs) with onboard memory can be used as ergonomic human-computer interfaces. These devices can also be coupled with AutoHotkey scripts to complete complex tasks in one keystroke. Radiologists can use modern AIDs and simple scripts to minimize frustration, improve and personalize their routines, and streamline interactions with the workstation. The authors discuss hardware and software features that do not require support from information technology professionals and can be implemented with any software that relies on user input.
... Finally, users might discover the existence of swhidgets from their own social network, typically through friends, colleagues or family. Indeed, impact on input mechanism adoption of witnessing others performing them has already been observed in the context of keyboard shortcuts [23]. ...
... Finally, the low numbers of swhidgets discovered following a demonstration of the input method (4.9%) or remembering seeing someone else using it (3.1%) was however surprising. Indeed, social interaction had been found to play a major role in disseminating useful system capabilities [23]. Similarly to usage of swhidgets, it is possible that users have a wrong estimation of the performance benefits of a swhidget when witnessing someone using it. ...
Conference Paper
Revealing a hidden widget with a dedicated sliding gesture is a common interaction design in today's handheld devices. Such "Swhidgets" (for swipe-revealed hidden widgets) provide a fast (and sometime unique) access to some commands. Interestingly, swhidgets do not follow conventional design guidelines in that they have no explicit signifiers, and users have to discover their existence before being able to use them. In this paper, we discuss the benefits of this signifierless design and investigate how iOS users deal with this type of widgets. We report on the results of a laboratory study and an online survey, investigating iOS users' experience with swhidgets. Our results suggest that swhidgets~are moderately but unevenly known by participants, yet the awareness and the discovery issues of this design is worthy of further discussion.
... This is the notion that people generally do not want to stop their work to learn new or more efficient techniques even though it may be beneficial in the end, implying that users weigh the benefits of acquiring new knowledge against the costs to stopping their work. Some people nevertheless are motivated to learn efficient methods and do take the time to do so (Peres, Tamborello, Fleetwood, Chung, & Paige-Smith, 2004). Those people who learn efficient methods see something beneficial in acquiring more knowledge than the people who do not learn. ...
... One mechanism that has been associated with increased efficiency is the observation of efficient users, often termed peer learning. Evidence for learning from peers has been obtained in several studies (Bhavnani et al., 1996) including some recent work (Peres et al., 2004) finding that people who use keyboard shortcuts are more likely to work with and/or around others who use KICs. Given these findings, it is conceivable that observing others using efficient techniques may affect a user's CBA and thus influence their selection rules. ...
Conference Paper
There is sample evidence that computer users often do not progress from novice to expert levels of performance, particularly when efficiency is included in the definition of performance. This paper describes a theoretical argument that one of the pieces missing in the understanding of this process is an accurate assessment of how people calculate a cost/benifit analysis(CBA) of learning and using new techniques and strategies. While there are many expanations for why people often do not use accurate methods of calculating the ratio, there is little discussion describing why some people do. We suggest that an important and predictible influence on whether an individual uses an accurate CBA is the observation of others using effecient techniques. We propose that with amore full understanding of the CBA calculation process, it will be possible to predict when users will and will not utilize a more efficient technique.
... Several studies show that many people do not use these expert interaction techniques despite their benets [60,81,92]. ...
Article
Full-text available
Despite the benefits of expert interaction techniques, many users do not learn them and continue to use novice ones. This article aims at better understanding if, when and how users decide to learn and ultimately adopt expert interaction techniques. This dynamic learning process is a complex skill-acquisition and decision-making problem. We first present and compare three generic benchmark models, inspired by the neuroscience literature, to explain and predict the learning process for shortcut adoption. Results show that they do not account for the complexity of users’ behavior. We then introduce a dedicated model, Transition, combining five cognitive mechanisms: implicit and explicit learning, decay, planning and perseveration. Results show that our model outperforms the three benchmark models both in terms of model fitting and model simulation. Finally, a post-analysis shows that each of the five mechanisms contribute to goodness-of-fit, but the role of perseveration is unclear regarding model simulation.
... shortcuts (Peres et al., 2004) or how fast they type (Kinkead, 1975). The biggest disadvantage of low-level loggers is their lack of context. ...
Article
MultiLog is a logging tool that controls, gathers, and combines the output, on-the-fly, from existing research and commercial logging applications or "loggers." Loggers record a specific set of user actions on a computing device, helping researchers to better understand environments or interactions, guiding the design of new or improved interfaces and applications. MultiLog reduces researchers' required implementation effort by simplifying the set-up of multiple loggers and seamlessly combining their output. This in turn increases the availability of logging systems to non-technical experimenters for both short-term and longitudinal observation studies. MultiLog supports two operating modes: "researcher mode" where experimenters configure multiple logging systems, and "deployment mode" where the system is deployed to user-study participants' systems. Researcher mode allows researchers to install, configure log filtering and obfuscation, observe near real-time event streams, and save configuration files ready for deployment. Deployment mode simplifies data collection from multiple loggers by running in the system tray at user log-in, starting loggers, combining their output, and securely uploading the data to a web-server. It also supports real-time browsing of log data, pausing of logging, and removal of log lines. Performance evaluations show that MultiLog does not adversely affect system performance, even when simultaneously running several logging systems. Initial studies show the system runs reliably over a period of 10 weeks.
... While CommunityCommands uses one form of collaborative information to assist vocabulary extension, several other researchers have noted that other forms of social influence are also important. For example, Banovic et al. [2012] showed that social influence was important for encouraging tool palette customization; Peres et al. [2004] found that users were more likely to use keyboard shortcuts if they worked with others who did so; and Bateman et al. [2012] found that the queries issued to a search engine became more expert when the interface showed aggregate information about the user's past searches together with examples from experts' profiles. ...
Article
Interface design guidelines encourage designers to provide high-performance mechanisms for expert users. However, research shows thatmany expert interface components are seldom used and that there is a tendency for users to persistently fail to adopt faster methods for completing their work. This article summarizes and organizes research relevant to supporting users in making successful transitions to expert levels of performance. First, we provide a brief introduction to the underlying human factors of skill acquisition relevant to interaction with computer systems. We then present our focus, which is a review of the state of the art in user interfaces that promote expertise development. The review of interface research is based around four domains of performance improvement: intramodal improvement that occurs as a factor of repetition and practice with a single method of interaction; intermodal improvement that occurs when users switch from one method to another that has a higher performance ceiling; vocabulary extension, in which the user broadens his or her knowledge of the range of functions available; and task mapping, which examines the ways in which users perform their tasks. The review emphasizes the relationship between interface techniques and the human factors that explain their relative success.
Thesis
At the heart of this thesis is a common but problematic situation that users of digital systems often face in their daily interactions: to interact with the system, they need some knowledge of an interaction possibility, some piece of information about the interface, but this information is not provided in the context in which they need it. I call such interaction possibilities non-signified, and signifier-less designs the interfaces and interaction techniques that rely on non-signified interaction possibilities.An example of modern signifier-less design is what I call "swhidgets" for "SWIpe-revealed HIDden WIDGETS": widgets that are hidden under the screen bezels or other interface elements, out of view and not advertised by any graphical mark, but that can be revealed by dragging them into view with a swipe gesture relying on a physical manipulation metaphor. Swhidgets are an important component of touch-based smartphone and tablets interfaces, and will be the principal signifier-less design studied in this thesis.When facing a signifier-less design, users may be confused about what they should do and how to achieve their goals; or they might have to use suboptimal ways of achieving their goals because they are unaware of the existence of more efficient options. It is thus usually advised to avoid signifier-less designs. Yet, despite designers’ awareness of the problems they may cause, signifier-less designs are common in user interfaces. They thus deserve a deeper analysis than simply advising to avoid them in interface design. Indeed, there might be good reasons to apply this design: maybe they provide some benefits that are hard to see with our current understanding of these designs, or maybe there is no way to avoid them.In this thesis, I study the question of why designers would create interfaces that do not clearly expose some of their interaction possibilities, taking the case of swhidgets as an example and focus of inquiry. As a preliminary work on swhidgets, I focus on the following questions: What are signifier-less designs and what aspects of swhidgets design make them unique? Do users know the swhidgets provided by their system? How did they get to know them despite their lack of signifiers? What are the benefits of not having signifiers in the design of swhidgets?My contributions to these questions are:- I define signifier-less designs and provide observations of this type of design in user interfaces.- I provide an analysis of the fundamental notions required to define signifier-less designs: affordances, signifiers and semiotics.- I propose a model of user discovery and adoption of interaction techniques in general, relying on three dimensions and their relationships: users’ current knowledge and skills, users’ motivations, and the design means of informing users provided by the interfaces.- I propose the notions of Degree of Knowledge and Source of Knowledge derived from this model, that can be used in experiments to evaluate how well the participants know an interaction technique and how they discovered it.- I present the design and results of two studies on iOS swhidgets that investigate how well users known them, how they discover them, their reasons for not using them, how they generally feel about them, and how they integrate them in the way they think about their interactions with the system. These studies revealed that swhidgets were globally appreciated and relatively well known by users, although there is still room for improvement, notably for some specific swhidgets.I conclude with perspective for future works regarding the transfer of knowledge about swhidgets from one application to another, the pertinence of considering all aspects of user experience to understand the design of swhidgets, and the possibility to increase the discoverability of swhidgets by using animated transitions between interface views.
Conference Paper
Keyboard shortcuts allow fast interaction, but they are known to be infrequently used, with most users relying heavily on traditional pointer-based selection for most commands. We describe the goals, design, and evaluation of ExposeHK, a new interface mechanism that aims to increase hotkey use. ExposeHK's four key design goals are: 1) enable users to browse hotkeys; 2) allow non-expert users to issue hotkey commands as a physical rehearsal of expert performance; 3) exploit spatial memory to assist non-expert users in identifying hotkeys; and 4) maximise expert performance by using consistent shortcuts in a flat command hierarchy. ExposeHK supports these objectives by displaying hotkeys overlaid on their associated commands when a modifier key is pressed. We evaluated ExposeHK in three empirical studies using toolbars, menus, and a tabbed \'18ribbon' toolbar. Results show that participants used more hotkeys, and used them more often, with ExposeHK than with other techniques; they were faster with ExposeHK than with either pointing or other hotkey methods; and they strongly preferred ExposeHK. Our research shows that ExposeHK can substantially improve the user's transition from a \'18beginner mode' of interaction to a higher level of expertise.
Article
Full-text available
Understanding the nature of errors in a simple, rule-based task - programming a VCR - required analyzing the interactions among human cognition, the artifact, and the task. This analysis was guided by least-effort principles and yielded a control structure that combined a rule hierarchy task-to-device with display-based difference-reduction. A model based on this analysis was used to trace action protocols collected from participants as they programmed a simulated VCR. Trials that ended without success (the show was not correctly programmed) were interrogated to yield insights regarding problems in acquiring the control structure. For successful trials (the show was correctly programmed), steps that the model would make were categorized as matches to the model; steps that the model would not make were violations of the model. The model was able to trace the vast majority of correct keystrokes and yielded a business-as-usual account of the detection and correction of errors. Violations of the model fell into one of two fundamental categories. The model provided insights into certain subcategories of errors; whereas, regularities within other subcategories of error suggested limitations to the model. Although errors were rare when compared to the total number of correct actions, they were important. Errors were made on 4% of the keypresses that, if not detected, would have prevented two-thirds of the shows from being successfully recorded. A misprogrammed show is a minor annoyance to the user. However, devices with the approximate complexity of a VCR are ubiquitous and have found their way into emergency rooms, airplane cockpits, power plants, and so on. Errors of ignorance may be reduced by training; however, errors in the routine performance of skilled users can only be reduced by design.
Article
Full-text available
Many important computer applications require that users be able to use them effectively with little or no formal training. Current examples include bank teller machines and airport information kiosks. Today successful systems of this kind can only be developed by iteration using costly empirical testing. This article aims to provide a theoretical foundation for the design of such systems, a model of learning by exploration called CE +. The theory incorporates assumptions from (a) the GOMS model and cognitive complexity theory (CCT) on the representation of procedural knowledge as productions, (b) the EXPL model on learning from examples, and (c) research on problem-solving processes for simple puzzlelike problems. Design guidelines for systems that can be learned by exploration, 'design for successful guessing,' are derived from the theory. These principles are compared with those developed by Norman (1988).
Conference Paper
Full-text available
Can good design guarantee the eflicient use of computer tools? Can experience guarantee it? We raise these questions to explore why empirical studies of real-world usage show even experienced users under-utilizing the capabilities of computer applications. By analyzing the use of everyday devices and computer applications, as well as reviewing empirical studies, we conclude that neither good design nor experience may be able to guarantee efficient usage. Efficient use requires task decomposition strategies that exploit capabilities offered by computer applications such as the ability to aggreguteobjects, and to manipulate the aggregates with powerful operators. To understand the effects that strategies can have on performance, we present results from a GOMS analysis of a CAD task. Furthermore, we identify some key aggregation strategies that appear to generalize across applications. Such strategies may provide a framework to enable users to move from a sufficient to a more ef)icient use of computer tools.
Conference Paper
Full-text available
We are investigating ways in which media space technologies can support distributed work groups through access to information that supports general awareness. Awareness involves knowing who is "around", what activities are cxcurring, who is talking with whom, it provides a view of one another in the daily work environments. Awareness may lead to informal interactions, spontaneous connections, and the development of shared cultures-all important aspects of maintaining working relationships which are denied to groups distributed across multiple sites.
Article
Full-text available
Graphical interfaces allow users to issue commands using pull-down menus, icon toolbars, and keyboard shortcuts. Menus and icon toolbars are easier to learn, whereas keyboard shortcuts are more efficient. It would seem natural for users to migrate from the use of easy-to-learn menu and icon methods to the more efficient method of key- board shortcuts as they gain experience. To investigate the extent to which this transi- tion takes place, 251 experienced users of Microsoft Word were given a questionnaire assessing their choice of methods for the most frequently occurring commands. Con- trary to our expectations, most experienced users rarely used the efficient keyboard shortcuts, favoring the use of icon toolbars instead. A second study was done to verify that keyboard shortcuts are, indeed, the most efficient method. Six participants per- formed common commands using menu selection, icon toolbars, and keyboard short- cuts. The keyboard shortcuts were, as expected, the most efficient. We conclude that even experienced users are inefficient in their use of graphical interfaces. One possible way to improve user efficiency is for training programs to provide a roadmap for users to make the transition from using pull-down menus and clicking icon toolbars to issu- ing keyboard shortcuts.
Article
What are the effects of experience on text editing behavior? Do users inevitably develop optimal strategies for getting their work done? The answer to such questions are becoming increasingly important, as more and more individuals begin to use word processing equipment routinely. In the best of all possible worlds, experienced users do become experts, able to quickly and accurately choose and execute optimal procedures to accomplish any given goal. Such a state of affairs would make designers of editing systems very happy indeed. But another alternative exists, that at least some proportion of experienced and frequent users stabilize at some nonoptimal level of skill. An initial survey of relevant research is encouraging. So, for example, Card, Moran, and Newell (1980) were able to deduce selection rules from experienced users' editing behavior that predicted 80% of their editing decisions, suggesting that experienced users have fairly well-defined heuristics for carrying out editing tasks. Tyler and Roth (1982) followed up on this work, demonstrating that novices were less likely to demonstrate selection rules than experienced users, preferring instead to rely on a single, sometimes inefficient, strategy. Finally, Folley and Williges (1982) demonstrated that when confronted with the description of a novel editor, users experienced on other systems make use of a greater number of commands in carrying out a paper-and-pencil application of the editor than do complete novices.
Article
Routine users of a text editor at a research lab were surveyed about their experiences in learning and using the editor and were asked to describe their likes, dislikes, and suggestions for additions to the system. The 121 users responding to the survey represented samples from three user classes - secretaries, nonprogrammer research members, and programmers - and they varied considerably in their experience both with the editor in question and with other text editors. Experience with the system itself predicted a number of survey measures, such as the customization of programmable function keys, the extension of the editor through macros, and the number and type of additions suggested. However, strong effects of both work type and prior experience with other editors were observed, even for users who were very experienced with the system.
Article
Understanding the nature of errors in a simple, rule-based task—programming a VCR—required analyzing the interactions among human cognition, the artifact, and the task. This analysis was guided by least-effort principles and yielded a control structure that combined a rule hierarchy task-to-device with display-based difference-reduction. A model based on this analysis was used to trace action protocols collected from participants as they programmed a simulated VCR. Trials that ended without success (the show was not correctly programmed) were interrogated to yield insights regarding problems in acquiring the control structure. For successful trials (the show was correctly programmed), steps that the model would make were categorized as matches to the model; steps that the model would not make were violations of the model. The model was able to trace the vast majority of correct keystrokes and yielded a business-as-usual account of the detection and correction of errors. Violations of the model fell into one of two fundamental categories. The model provided insights into certain subcategories of errors; whereas, regularities within other subcategories of error suggested limitations to the model. Although errors were rare when compared to the total number of correct actions, they were important. Errors were made on 4% of the keypresses that, if not detected, would have prevented two-thirds of the shows from being successfully recorded. A misprogrammed show is a minor annoyance to the user. However, devices with the approximate complexity of a VCR are ubiquitous and have found their way into emergency rooms, airplane cockpits, power plants, and so on. Errors of ignorance may be reduced by training; however, errors in the routine performance of skilled users can only be reduced by design.
Article
In this article we propose a theoretical framework of distributed representations and a methodology of representational analysis for the study of distributed cognitive tasks—tasks that require the processing of information distributed across the internal mind and the external environment. The basic principle of distributed representations Is that the representational system of a distributed cognitive task is a set of internal and external representations, which together represent the abstract structure of the task. The basic strategy of representational analysis is to decompose the representation of a hierarchical task into its component levels so that the representational properties at each level can be independently examined. The theoretical framework and the methodology are used to analyze the hierarchical structure of the Tower of Hanoi problem. Based on this analysis, four experiments are designed to examine the representational properties of the Tower of Hanoi. Finally, the nature of external representations is discussed.