Abstract
We overview our research on the formal modelling of user behaviour, generic user modelling, as a form of usability evaluation looking for design flaws that lead to systematic human error. This involves formalising principles of cognitively plausible behaviour. We combine a user model with a device model so that the actions of the user model are the inputs of the device, and the outputs of the device are linked to the perceptions of the user model. In doing so, we gain a model of the system as a whole. Rather than modelling erroneous behaviour directly, it emerges from the interactions of the principles and the device model. The system can then be verified against properties such as task completion. This approach can be combined with other analysis methods, such as timing analysis, in a complementary way. It can also be used to make the cognitive assumptions specific that have been made for a design and explore the consequences of different assumptions. It can similarly support human-computer interaction experimental work, giving a way to explore assumptions made in an experiment. In addition, the same approach can be used to verify human-centred security properties.
The original version of the book was revised: For detailed information please see Erratum. The erratum to the book is available at 10.1007/978-3-319-51838_21
An erratum to this chapter can be found at http://dx.doi.org/10.1007/978-3-319-51838-1_21
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Altmann E, Trafton J (2002) Memory for goals: an activation-based model. Cognit Sci 26(1):39–83
Barnard PJ, May J (1995) Interactions with advanced graphical interfaces and the deployment of latent human knowledge. In: Interactive systems: design, specification, and verification (DSV-IS’95). Springer, pp 15–49
Bella G, Curzon P, Lenzini G (2015) Service security and privacy as a socio-technical problem: literature review, analysis methodology and challenge domains. J Comput Secur 23(5):563–585. doi:10.3233/JCS-150536
Bowman H, Faconti G (2000) Analysing cognitive behaviour using LOTOS and Mexitl. Formal Aspects Comput 11:132–159
Bredereke J, Lankenau A (2004) A rigorous view of mode confusion. In: Computer safety, reliability and security: SAFECOMP 2002. Lecture notes in computer science, vol 2434. Springer, pp 19–31
Buth B (2004) Analysing mode confusion: an approach using FDR2. In: Computer safety, reliability and security: SAFECOMP 2004. Lecture notes in computer science, vol 3219. Springer, pp 101–114
Butterworth RJ, Blandford AE, Duke DJ (2000) Demonstrating the cognitive plausibility of interactive systems. Formal Aspects Comput 237–259
Byrne M, Bovair S (1997) A working memory model of a common procedural error. Cognit Sci 21(1):31–61
Curzon P, Blandford A (2000) Using a verification system to reason about post-completion errors. In: Palanque P, Paternò F (eds) Participants Proc. of DSV-IS 2000: 7th International workshop on design, specification and verification of interactive systems, at the 22nd International conference on software engineerings, pp 292–308
Curzon P, Blandford A (2001) Detecting multiple classes of user errors. In: Little R, Nigay L (eds) Proceedings of the 8th IFIP working conference on engineering for human-computer interaction (EHCI’01). Lecture notes in computer science, vol 2254. Springer, pp 57–71. doi:10.1007/3-540-45348-2_9
Curzon P, Blandford A (2002) From a formal user model to design rules. In: Forbrig P, Urban B, Vanderdonckt J, Limbourg Q (eds) 9th International workshop on interactive systems. Design, specification and verification. Lecture notes in computer science, vol 2545. Springer, pp 1–15. doi:10.1007/3-540-36235-5_1
Curzon P, Blandford A (2004) Formally justifying user-centred design rules: a case study on post-completion errors. In: Boiten E, Derrick J, Smith G (eds) Proceedings of the 4th international conference on integrated formal methods. Lecture notes in computer science, vol 2999. Springer, pp 461–480. doi:10.1007/b96106
Curzon P, Rukšėnas R, Blandford A (2007) An approach to formal verification of human-computer interaction. Formal Aspects Comput 19(4):513–550. doi:10.1007/s00165-007-0035-6
Curzon P, Blandford A, Thimbleby H, Cox A (2015) Safer interactive medical device design: Insights from the CHI+MED project. In: 5th EAI International conference on wireless mobile communication and healthcare—Transforming healthcare through innovations in mobile and wireless technologies. ACM. doi:10.4108/eai.14-10-2015.2261752
Duke DJ, Barnard PJ, Duce DA, May J (1998) Syndetic modelling. Human Comput Interact 13(4):337–393
Furniss D, Blandford A, Curzon P (2008) Usability work in professional website design: Insights from practitioners’ perspectives. In: Law E, Hvannberg E, Cockton G, Vanderdonckt J (eds) Maturing usability: quality in software. Springer, Interaction and value, pp 144–167
Gray W, Sims C, Fu W, Schoelles M (2006) The soft constraints hypothesis: a rational analysis approach to resource allocation for interactive behavior. Psychol Rev 113(3):461–482
Harrison M, Campos JC, Rukšėnas R, Curzon P (2016) Modelling information resources and their salience in medical device design. In: Engineering interactive computing systems. ACM, pp 194–203. doi:10.1145/2933242.2933250, honourable Mention Award:top 5% papers
John B, Kieras D (1996) The GOMS family of user interface analysis techniques: comparison and contrast. ACM Trans Comput-Hum Interact 3(4):320–351
John BE, Prevas K, Salvucci DD, Koedinger K (2004) Predictive human performance modeling made easy. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI ’04, ACM, pp 455–462
Lankenau A (2001) Avoiding mode confusion in service-robots. In: Integration of assistive technology in the information age, Proceedings of the 7th international conference on rehabilitation robotics. IOS Press, pp 162–167
Masci P, Curzon P, Furniss D, Blandford A (2015a) Using PVS to support the analysis of distributed cognition systems. Innov Syst Softw Eng 11(2):113–130. doi:10.1007/s11334-013-0202-2
Masci P, Curzon P, Thimbleby H (2015b) Early identification of software causes of use-related hazards in medical devices. In: 5th EAI International conference on wireless mobile communication and healthcare—Transforming healthcare through innovations in mobile and wireless technologies. ACM. doi:10.4108/eai.14-10-2015.2261754
Newell A (1990) Unified theories of cognition. Harvard University Press
Nielsen J (2000) Why you only need to test with 5 users. http://www.nngroup.com/articles/why-you-only-need-to-test-with-5-users/
Norman DA (2002) The design of everyday things. Basic Books
Ritter F, Young R (2001) Embodied models as simulated users: introduction to this special issue on using cognitive models to improve interface design. Int J Hum Comput Stud 55:1–14
Rukšėnas R, Curzon P, Blandford A (2007a) Detecting cognitive causes of confidentiality leaks. In: Curzon P, Cerone A (eds) Proceedings of the 1st International workshop on formal methods for interactive systems. Electronic notes in theoretical computer science, vol 183. Elsevier pp 21–38. doi:10.1016/j.entcs.2007.01.059
Rukšėnas R, Curzon P, Blandford A, Back J (2007b) Combining human error verification and timing analysis. In: Proceedings of engineering interactive systems 2007: Joining three working conferences IFIP WG2.7/13.4 10th conference on engineering human computer interaction, IFIP WG 13.2 1st conference on human centered software engineering, DSVIS—14th conference on design specification and verification of interactive systems. Lecture notes in computer science, vol 4940. Springer, pp 18–35. doi:10.1007/978-3-540-92698-6_2
Rukšėnas R, Curzon P, Back J, Blandford A (2008a) Formal modelling of salience and cognitive load. Electron Notes Theoret Comput Sci 208:57–75. doi:10.1016/j.entcs.2008.03.107
Rukšėnas R, Curzon P, Blandford A (2008b) Modelling and analysing cognitive causes of security breaches. Innov Syst Softw Eng 30(2):143–160. doi:10.1007/s11334-008-0050-7
Rukšėnas R, Curzon P, Blandford A (2009) Verification-guided modelling of salience and cognitive load. Formal Aspects Comput 21:541–569. doi:10.1007/s00165-008-0102-7
Rukšėnas R, Curzon P, Harrison MD (2013) Integrating formal predictions of interactive system behaviour with user evaluation. In: Johnsen EB, Petre L (eds) Proceedings of integrated formal methods. LNCS, vol 7940. Springer, pp 238–252. doi:10.1007/978-3-642-38613-8_17
Rukšėnas R, Curzon P, Blandford A, Back J (2014) Combining human error verification and timing analysis: a case study on an infusion pump. Formal Aspects Comput 26(5):1033–1076. doi:10.1007/s00165-013-0288-1
Rushby J (2001) Analyzing cockpit interfaces using formal methods. Electron Notes Theoret Comput Sci 43:1–14. doi:10.1016/S1571-0661(04)80891-0
Rushby J (2002) Using model checking to help discover mode confusions and other automation suprises. Reliab Eng System Safety 75(2):167–177
Su L, Bowman H, Barnard P, Wyble B (2009) Process algebraic modelling of attentional capture and human electrophysiology in interactive systems. Formal Aspects Comput 21:513–539
Thimbleby H (2001) Permissive user interfaces. Int J Hum-Comput Stud 54(3):333–350. doi:10.1006/ijhc.2000.0442
Acknowledgements
This work was in collaboration with a team of people. We are particularly grateful to Michael Harrison, Ann Blandford and Jonathan Back. Much of the work referred to was funded by the EPSRC research grants GR/S67494/01, GR/S67500/01 (Human Error Modelling) and EP/G059063/1 (CHI+MED Computer-Human Interaction for Medical Devices).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Curzon, P., Rukšėnas, R. (2017). Modelling the User. In: Weyers, B., Bowen, J., Dix, A., Palanque, P. (eds) The Handbook of Formal Methods in Human-Computer Interaction. Human–Computer Interaction Series. Springer, Cham. https://doi.org/10.1007/978-3-319-51838-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-51838-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51837-4
Online ISBN: 978-3-319-51838-1
eBook Packages: Computer ScienceComputer Science (R0)