SlideShare a Scribd company logo
Human computer interaction.
Presenter’s
Usman Mukhtar 125/046
Shahbaz Khan 141/030
Contents
• User Support System
• RequirementsOf User support System
• ApproachesTo User Support System
• AdoptiveHealth System
• Design For User Support System
Introduction
• Usersrequiredifferent typesof support at
different times.
• Basic requirements
– availablebut unobtrusive
– accurateand robust
– consistent and flexible
• Design of user support must takeaccount of:
– presentation issues
– implementation issues
Typesof support
• Quick reference
• Task specific help
• Full explanation
• Tutorial
Typesof support
• Quick reference
– reminder of details; assumesfamiliarity
– eg command syntax, options, etc.
Usage: telnet [-8] [-#] [L] [-a] [-d] [-e char]
[-l user] [-n tracefile] [-r] [host-name [port]]
 Task specific help
 addressesproblemswith
particular tasks
 focused on what iscurrently
being done
Typesof Support
• Full explanation
– for moreexperienced and inquisitiveusers
– likely to includeinformation not needed now
– Unix man command
• Tutorial
– aimed at new users
Typesof support
• Fo ur types are co mplementary
• Together they support rangeof pointsin
user’sexperiencewith system
• Each typemay beon-lineand off-line
(documentation)
– should beconsistent in content
– presentation medium may haveimpact on design
– general principlesfor both
Requirements
• Availability
• Accuracy and Completeness
• Consistency
• Robustness
• Flexibility
• Unobtrusiveness
Requirements
• Availability
– accessibleany timeduring application interaction
• Accuracy and completeness
– consider incremental update/feature-adding of
releases
• Consistency
– different partsof help system and documentation
consistent in content, terminology and
presentation
Requirements
• Robustness
– system itself should berobust
– even moreimportant with support, becauseusersare
in troublewhen using it
• Flexibility
– meetsneedsof user allowsuser to get information in
an appropriateform
– context sensitiveor adaptivehelp systems
• Unobtrusiveness
– shouldn’t block work in application
Approachesto User Support
• Command Assistance
• Command Prompts
• Context-Sensitivehelp
• On-linetutorials
• On-linedocumentation
• Wizards
• Assistants
Approachesto user support
• Command assistance
– good for referenceon command, eg man or help
– user must know what to look for
• Command prompts
– provideinformation when error occurs
– good for syntactic errors
– won’t tell you if you need adifferent command
• Context sensitivehelp
– dependson what user isdoing
– eg. completing adialog, tool tip
Approachesto User Support
• On-linetutorials
– introducesuser to componentsof system
– structureprogress, maybeat user’sown speed
– includesexamples, test environment to simulate
interface
– useful, but inflexible
• On-linedocumentation
– printed material in electronic form
– eg readmefiles
– continually availablebut can bedifficult to browse
– Hypertext can support browsing
Approachesto User Support
• Wizards
– task specific tool that leadsuser through task step-by-
step
– user answers‘questions’ along theway
– constraining - may not offer options
– should haveprogressindicator and allow back up
Approachesto User Support
• Assistants
– monitor user behavior and
offer suggestions
– unobtrusiveand under user
control
– ‘Clippy’ not unobtrusive,
suggestionsinappropriate
– MSXPsmart tags appear near
object of interest
AdaptiveHelp Systems
• Useknowledgeof theuser, task, domain and
instruction to providehelp adapted to user’s
needs.
• Problems:
– Knowledgerequirementsconsiderable
• must collect dataon by monitoring interaction
– Issueof control - how active?
– What should beadapted?
– What isscopeof adaptation?:
User modeling
• User modeling
– single, generic user (non-intelligent)
– user-configured model (adaptable)
– system-configured model (adaptive)
• Static help systemscan’t addressall user
differences.
• Adaptivehelp systemsmodel users,
refining themodel by monitoring auser’s
activities, and present help tailored to the
particular user.
Approachesto User modeling
• Quantification
– user movesbetween levelsof expertisebased on
quantitativemeasureof what heknows
Movefrom level 1 to level 2 if
system hasbeen used morethan twice
commandsx and y used effectively
help hasnot been accessed in thissession
system hasbeen used in last 5 days
Approachesto User modeling
• Stereotypes
– user is classified into aparticular category
• Overlay
– an idealized model of expert useisconstructed
– actual usecompared to it
– can determinehow far user isfrom optimal use
– can suggest optimal usestrategies
Domain and Task Modeling
• Usually involvesanalysisof command
sequences
– Assistantsand agents
• Covers
– common errorsand tasks
– command sequencesfor current task
• Problems
– interleaved tasks
– user intention
Designing User Support
• User support isnot an ‘add on’ - it should be
designed integrally with system.
• Should concentrateon content and context
of help rather than technological issues
• Therearepresentation issuesand
implementation issues
Presentation issues
• How ishelp requested?
– Command
– button
– function (on/off)
– separate application
• How ishelp displayed?
– New window
– whole screen orsplit screen
– pop-up box
– hint icons
Designing User Support :
Presentation issues
• Effectivepresentation requires
– clear, familiar, consistent language
– instructional rather than descriptivelanguage
– avoid of blocksof text
– summary and example
Designing User Support Systems:
Implementation Issues
• Ishelp
– OScommand
– metacommand
– application
• What resourcesareavailable
– screen space
– memory capacity
– speed
Designing User Support Systems:
Implementation Issues
• Structureof help data
– singlefile
– filehierarchy
– database
• Consider
– flexibility and extensibility
– hard copy
– browsing
Summary
• Usersrequiredifferent support at different times
• User support should be:
– availablebut unobtrusive
– accurateand robust
– consistent and flexible
• User support comesin anumber of styles:
– command-based, context sensitivehelp
– tutorial, onlinedoc, wizardsand assistants
– adaptivehelp
• Design of user support must takeaccount of:
– presentation and implementation issues
THANKYOU
For Your AttentionZ
ANY
QUESTI ONZ???
.

More Related Content

What's hot

Hci activity#3
Hci activity#3Hci activity#3
Hci activity#3
Desalegn Aweke
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
Alan Dix
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration models
Alan Dix
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniques
Alan Dix
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation support
Alan Dix
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
N.Jagadish Kumar
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software process
Alan Dix
 
Chapter 7 design rules
Chapter 7 design rulesChapter 7 design rules
Chapter 7 design rules
MLG College of Learning, Inc
 
Human computer interaction -Input output channel
Human computer interaction -Input output channelHuman computer interaction -Input output channel
Human computer interaction -Input output channel
N.Jagadish Kumar
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4
Alan Dix
 
hci in software development process
hci in software development processhci in software development process
hci in software development process
Kainat Ilyas
 
Human Computer Interaction HCI
Human Computer Interaction HCI Human Computer Interaction HCI
Human Computer Interaction HCI
Gaditek
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
Alan Dix
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
VijiPriya Jeyamani
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principals
Anwal Mirza
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: Paradigms
Alan Dix
 
Wimp interface
Wimp interfaceWimp interface
Wimp interface
Abrish06
 
golden rules of user interface design
golden rules of user interface designgolden rules of user interface design
golden rules of user interface design
gadige harshini
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
Alan Dix
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
koolkampus
 

What's hot (20)

Hci activity#3
Hci activity#3Hci activity#3
Hci activity#3
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
 
HCI 3e - Ch 14: Communication and collaboration models
HCI 3e - Ch 14:  Communication and collaboration modelsHCI 3e - Ch 14:  Communication and collaboration models
HCI 3e - Ch 14: Communication and collaboration models
 
HCI 3e - Ch 9: Evaluation techniques
HCI 3e - Ch 9:  Evaluation techniquesHCI 3e - Ch 9:  Evaluation techniques
HCI 3e - Ch 9: Evaluation techniques
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation support
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software process
 
Chapter 7 design rules
Chapter 7 design rulesChapter 7 design rules
Chapter 7 design rules
 
Human computer interaction -Input output channel
Human computer interaction -Input output channelHuman computer interaction -Input output channel
Human computer interaction -Input output channel
 
HCI - Chapter 4
HCI - Chapter 4HCI - Chapter 4
HCI - Chapter 4
 
hci in software development process
hci in software development processhci in software development process
hci in software development process
 
Human Computer Interaction HCI
Human Computer Interaction HCI Human Computer Interaction HCI
Human Computer Interaction HCI
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principals
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: Paradigms
 
Wimp interface
Wimp interfaceWimp interface
Wimp interface
 
golden rules of user interface design
golden rules of user interface designgolden rules of user interface design
golden rules of user interface design
 
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirementsHCI 3e - Ch 13:  Socio-organizational issues and stakeholder requirements
HCI 3e - Ch 13: Socio-organizational issues and stakeholder requirements
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
 

Similar to user support system in HCI

E3 chap-11
E3 chap-11E3 chap-11
E3 chap-11
Welly Dian Astika
 
e3-chap-11.ppt
e3-chap-11.ppte3-chap-11.ppt
e3-chap-11.ppt
BabaShaikh3
 
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptxLecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
aliyafatimauwu
 
Chapter 10 User Support
Chapter 10 User SupportChapter 10 User Support
Chapter 10 User Support
MLG College of Learning, Inc
 
HCI chp: 11
HCI chp: 11HCI chp: 11
HCI chp: 11
Muhammad Aslam
 
Human Factors and User Interface Design
Human Factors and User Interface DesignHuman Factors and User Interface Design
Human Factors and User Interface Design
SaggitariusArrow
 
User Interface.ppt
User Interface.pptUser Interface.ppt
User Interface.ppt
KiplangatGideon2
 
E3 chap-09
E3 chap-09E3 chap-09
E3 chap-09
Welly Dian Astika
 
Human Computer Interaction Evaluation
Human Computer Interaction EvaluationHuman Computer Interaction Evaluation
Human Computer Interaction Evaluation
LGS, GBHS&IC, University Of South-Asia, TARA-Technologies
 
e3-chap-09.ppt
e3-chap-09.ppte3-chap-09.ppt
e3-chap-09.ppt
KingSh2
 
Evaluation techniques
Evaluation techniquesEvaluation techniques
Evaluation techniques
PhD Research Scholar
 
Module 4.4-structuring various documents-geeta
Module 4.4-structuring various documents-geetaModule 4.4-structuring various documents-geeta
Module 4.4-structuring various documents-geeta
Geeta Hindowar
 
Lecture (User Interface Design).ppt
Lecture (User Interface Design).pptLecture (User Interface Design).ppt
Lecture (User Interface Design).ppt
skknowledge
 
USER INTERFACE DESIGN - unit-1 last part.ppt
USER INTERFACE DESIGN - unit-1 last part.pptUSER INTERFACE DESIGN - unit-1 last part.ppt
USER INTERFACE DESIGN - unit-1 last part.ppt
Sandhya Gandham
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
Saqib Shehzad
 
prototyping-chap-03.ppt
prototyping-chap-03.pptprototyping-chap-03.ppt
prototyping-chap-03.ppt
CustomerYZ
 
The User Edit Method - What is it and how can I use it?
The User Edit Method - What is it and how can I use it?The User Edit Method - What is it and how can I use it?
The User Edit Method - What is it and how can I use it?
Chris LaRoche
 
UDSA Unit 4.pptx
UDSA Unit 4.pptxUDSA Unit 4.pptx
UDSA Unit 4.pptx
SrilekhaK12
 
Equipment manual writing may, 2014 final
Equipment manual writing may, 2014 finalEquipment manual writing may, 2014 final
Equipment manual writing may, 2014 final
bb2koontz
 
Game Design 2: Expert Evaluation of User Interfaces
Game Design 2: Expert Evaluation of User InterfacesGame Design 2: Expert Evaluation of User Interfaces
Game Design 2: Expert Evaluation of User Interfaces
David Farrell
 

Similar to user support system in HCI (20)

E3 chap-11
E3 chap-11E3 chap-11
E3 chap-11
 
e3-chap-11.ppt
e3-chap-11.ppte3-chap-11.ppt
e3-chap-11.ppt
 
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptxLecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
Lecturvxxxxxxxxxxxxxxxxxxxxxxxxe 17.pptx
 
Chapter 10 User Support
Chapter 10 User SupportChapter 10 User Support
Chapter 10 User Support
 
HCI chp: 11
HCI chp: 11HCI chp: 11
HCI chp: 11
 
Human Factors and User Interface Design
Human Factors and User Interface DesignHuman Factors and User Interface Design
Human Factors and User Interface Design
 
User Interface.ppt
User Interface.pptUser Interface.ppt
User Interface.ppt
 
E3 chap-09
E3 chap-09E3 chap-09
E3 chap-09
 
Human Computer Interaction Evaluation
Human Computer Interaction EvaluationHuman Computer Interaction Evaluation
Human Computer Interaction Evaluation
 
e3-chap-09.ppt
e3-chap-09.ppte3-chap-09.ppt
e3-chap-09.ppt
 
Evaluation techniques
Evaluation techniquesEvaluation techniques
Evaluation techniques
 
Module 4.4-structuring various documents-geeta
Module 4.4-structuring various documents-geetaModule 4.4-structuring various documents-geeta
Module 4.4-structuring various documents-geeta
 
Lecture (User Interface Design).ppt
Lecture (User Interface Design).pptLecture (User Interface Design).ppt
Lecture (User Interface Design).ppt
 
USER INTERFACE DESIGN - unit-1 last part.ppt
USER INTERFACE DESIGN - unit-1 last part.pptUSER INTERFACE DESIGN - unit-1 last part.ppt
USER INTERFACE DESIGN - unit-1 last part.ppt
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
 
prototyping-chap-03.ppt
prototyping-chap-03.pptprototyping-chap-03.ppt
prototyping-chap-03.ppt
 
The User Edit Method - What is it and how can I use it?
The User Edit Method - What is it and how can I use it?The User Edit Method - What is it and how can I use it?
The User Edit Method - What is it and how can I use it?
 
UDSA Unit 4.pptx
UDSA Unit 4.pptxUDSA Unit 4.pptx
UDSA Unit 4.pptx
 
Equipment manual writing may, 2014 final
Equipment manual writing may, 2014 finalEquipment manual writing may, 2014 final
Equipment manual writing may, 2014 final
 
Game Design 2: Expert Evaluation of User Interfaces
Game Design 2: Expert Evaluation of User InterfacesGame Design 2: Expert Evaluation of User Interfaces
Game Design 2: Expert Evaluation of User Interfaces
 

More from Usman Mukhtar

Software reliability
Software reliability Software reliability
Software reliability
Usman Mukhtar
 
Risk management
Risk managementRisk management
Risk management
Usman Mukhtar
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
Usman Mukhtar
 
LRA and TORA in MANETS
LRA and TORA in MANETSLRA and TORA in MANETS
LRA and TORA in MANETS
Usman Mukhtar
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBP
Usman Mukhtar
 

More from Usman Mukhtar (6)

Software reliability
Software reliability Software reliability
Software reliability
 
Risk management
Risk managementRisk management
Risk management
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
LRA and TORA in MANETS
LRA and TORA in MANETSLRA and TORA in MANETS
LRA and TORA in MANETS
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBP
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

user support system in HCI

  • 3. Contents • User Support System • RequirementsOf User support System • ApproachesTo User Support System • AdoptiveHealth System • Design For User Support System
  • 4. Introduction • Usersrequiredifferent typesof support at different times. • Basic requirements – availablebut unobtrusive – accurateand robust – consistent and flexible • Design of user support must takeaccount of: – presentation issues – implementation issues
  • 5. Typesof support • Quick reference • Task specific help • Full explanation • Tutorial
  • 6. Typesof support • Quick reference – reminder of details; assumesfamiliarity – eg command syntax, options, etc. Usage: telnet [-8] [-#] [L] [-a] [-d] [-e char] [-l user] [-n tracefile] [-r] [host-name [port]]  Task specific help  addressesproblemswith particular tasks  focused on what iscurrently being done
  • 7. Typesof Support • Full explanation – for moreexperienced and inquisitiveusers – likely to includeinformation not needed now – Unix man command • Tutorial – aimed at new users
  • 8. Typesof support • Fo ur types are co mplementary • Together they support rangeof pointsin user’sexperiencewith system • Each typemay beon-lineand off-line (documentation) – should beconsistent in content – presentation medium may haveimpact on design – general principlesfor both
  • 9. Requirements • Availability • Accuracy and Completeness • Consistency • Robustness • Flexibility • Unobtrusiveness
  • 10. Requirements • Availability – accessibleany timeduring application interaction • Accuracy and completeness – consider incremental update/feature-adding of releases • Consistency – different partsof help system and documentation consistent in content, terminology and presentation
  • 11. Requirements • Robustness – system itself should berobust – even moreimportant with support, becauseusersare in troublewhen using it • Flexibility – meetsneedsof user allowsuser to get information in an appropriateform – context sensitiveor adaptivehelp systems • Unobtrusiveness – shouldn’t block work in application
  • 12. Approachesto User Support • Command Assistance • Command Prompts • Context-Sensitivehelp • On-linetutorials • On-linedocumentation • Wizards • Assistants
  • 13. Approachesto user support • Command assistance – good for referenceon command, eg man or help – user must know what to look for • Command prompts – provideinformation when error occurs – good for syntactic errors – won’t tell you if you need adifferent command • Context sensitivehelp – dependson what user isdoing – eg. completing adialog, tool tip
  • 14. Approachesto User Support • On-linetutorials – introducesuser to componentsof system – structureprogress, maybeat user’sown speed – includesexamples, test environment to simulate interface – useful, but inflexible • On-linedocumentation – printed material in electronic form – eg readmefiles – continually availablebut can bedifficult to browse – Hypertext can support browsing
  • 15. Approachesto User Support • Wizards – task specific tool that leadsuser through task step-by- step – user answers‘questions’ along theway – constraining - may not offer options – should haveprogressindicator and allow back up
  • 16. Approachesto User Support • Assistants – monitor user behavior and offer suggestions – unobtrusiveand under user control – ‘Clippy’ not unobtrusive, suggestionsinappropriate – MSXPsmart tags appear near object of interest
  • 17.
  • 18. AdaptiveHelp Systems • Useknowledgeof theuser, task, domain and instruction to providehelp adapted to user’s needs. • Problems: – Knowledgerequirementsconsiderable • must collect dataon by monitoring interaction – Issueof control - how active? – What should beadapted? – What isscopeof adaptation?:
  • 19. User modeling • User modeling – single, generic user (non-intelligent) – user-configured model (adaptable) – system-configured model (adaptive) • Static help systemscan’t addressall user differences. • Adaptivehelp systemsmodel users, refining themodel by monitoring auser’s activities, and present help tailored to the particular user.
  • 20. Approachesto User modeling • Quantification – user movesbetween levelsof expertisebased on quantitativemeasureof what heknows Movefrom level 1 to level 2 if system hasbeen used morethan twice commandsx and y used effectively help hasnot been accessed in thissession system hasbeen used in last 5 days
  • 21. Approachesto User modeling • Stereotypes – user is classified into aparticular category • Overlay – an idealized model of expert useisconstructed – actual usecompared to it – can determinehow far user isfrom optimal use – can suggest optimal usestrategies
  • 22. Domain and Task Modeling • Usually involvesanalysisof command sequences – Assistantsand agents • Covers – common errorsand tasks – command sequencesfor current task • Problems – interleaved tasks – user intention
  • 23. Designing User Support • User support isnot an ‘add on’ - it should be designed integrally with system. • Should concentrateon content and context of help rather than technological issues • Therearepresentation issuesand implementation issues
  • 24. Presentation issues • How ishelp requested? – Command – button – function (on/off) – separate application • How ishelp displayed? – New window – whole screen orsplit screen – pop-up box – hint icons
  • 25. Designing User Support : Presentation issues • Effectivepresentation requires – clear, familiar, consistent language – instructional rather than descriptivelanguage – avoid of blocksof text – summary and example
  • 26. Designing User Support Systems: Implementation Issues • Ishelp – OScommand – metacommand – application • What resourcesareavailable – screen space – memory capacity – speed
  • 27. Designing User Support Systems: Implementation Issues • Structureof help data – singlefile – filehierarchy – database • Consider – flexibility and extensibility – hard copy – browsing
  • 28. Summary • Usersrequiredifferent support at different times • User support should be: – availablebut unobtrusive – accurateand robust – consistent and flexible • User support comesin anumber of styles: – command-based, context sensitivehelp – tutorial, onlinedoc, wizardsand assistants – adaptivehelp • Design of user support must takeaccount of: – presentation and implementation issues