An Empirical Evaluation of Undo Mechanisms Aaron G. Cass Chris S.T. Fernandes Andrew Polidore Computer Science Dept. Union College Schenectady, NY, USA.

Slides:



Advertisements
Similar presentations
Multilevel Models with Latent Variables Daniel J. Bauer Department of Psychology University of North Carolina 9/13/04 SAMSI Workshop.
Advertisements

Python Programming Chapter 5: Fruitful Functions Saad Bani Mohammad Department of Computer Science Al al-Bayt University 1 st 2011/2012.
Causality Visualization Using Animated Growing Polygons Niklas Elmqvist Philippas Tsigas IEEE 2003 Symposium.
Outline 1) Objectives 2) Model representation 3) Assumptions 4) Data type requirement 5) Steps for solving problem 6) A hypothetical example Path Analysis.
Managing Marketing Information
Survey Design Steps in Conducting a survey.  There are two basic steps for conducting a survey  Design and Planning  Data Collection.
User Testing & Experiments. Objectives Explain the process of running a user testing or experiment session. Describe evaluation scripts and pilot tests.
Improving Photo Retrieval in a User’s Browser History Maria Tobin Advisors: Aaron Cass and Chris Fernandes.
1 Pertemuan 2 How the “Electronic” Changing Business Tugas-3 Matakuliah: F0662/ Web Based Accounting Tahun: 2005 Versi: 1/0.
Evaluating Hypotheses Chapter 9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics.
It’s good to talk What is our greatest learning resource?
Empirically Assessing End User Software Engineering Techniques Gregg Rothermel Department of Computer Science and Engineering University of Nebraska --
Retrieval Evaluation. Brief Review Evaluation of implementations in computer science often is in terms of time and space complexity. With large document.
Design and Control in Experimental Research Lawrence R. Gordon Psychology Research Methods I.
Chapter 4 Conducting & Reading Research Baumgartner et al Chapter 4 Developing the Research Plan.
Retrieval Evaluation. Introduction Evaluation of implementations in computer science often is in terms of time and space complexity. With large document.
RESEARCH METHODS Lecture 19
Evaluating the usability of the BlueJ environment. Marilyn Barallon Supervisor: Dr.Linda McIver.
Empirical Validation of UML Statechart Diagram Metrics: A Family of Three Experiments José A. Cruz-Lemus Department of Computer Science University of Castilla.
The Computer Science Course at Omar Al-Mukhtar University, Libya The Computer Science Course at Omar Al-Mukhtar University, Libya User-Centered Design.
MGT-491 QUANTITATIVE ANALYSIS AND RESEARCH FOR MANAGEMENT OSMAN BIN SAIF Session 14.
ACA 2014 Applications of Computer Algebra Session: Computer Algebra in Education Fordham University New York, NY, USA, July 9-12.
An Empirical Study Of Alternative Syntaxes For Expressing Model Uncertainty CSC2125 Project Report December 19 th 2012 Stephanie Santosa and Michalis Famelis.
Research in Psychology. Research Basics  All psychological research MUST follow the scientific method  Improves accuracy and validity of findings 
Managing Marketing Information ROAD MAP: Previewing the Concepts Explain the importance of information to the company and its understanding of.
The Evaluation of Innovative Learning Technologies: the Case of Mobile Learning John Traxler & Agnes Kukulska-Hulme University of Wolverhampton & Open.
Comparing the Effectiveness of Alternative Approaches for Displaying Edit-Error Messages in Web Forms Bill Mockovak Office of Survey Methods Research Bureau.
Chapter Four Managing Marketing Information. Copyright 2007, Prentice Hall, Inc.4-2 The Importance of Marketing Information  Companies need information.
Copyright 2007, Prentice Hall, Inc. 1 1 Principles of Marketing Fall Term MKTG 220 Fall Term MKTG 220 Dr. Abdullah Sultan Dr. Abdullah Sultan.
The attraction hypothesis
1 Chapter 1 Research Methods When sociologists do quantitative research, they generally use either surveys or precollected data.quantitative research Qualitative.
URBDP 591 I Lecture 3: Research Process Objectives What are the major steps in the research process? What is an operational definition of variables? What.
BSc Final Year Projects in Computing Computer Science, Creative Computing, Games Programming, Business Computing Dr Rodger Kibble.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Qualitative and Quantitative Research Methods
Research Design Week 6 Part February 2011 PPAL 6200.
An Expanded Model of Evidence-based Practice in Special Education Randy Keyworth Jack States Ronnie Detrich Wing Institute.
Part 5 Advanced topics in CGI/Perl Psychological Science on the Internet: Designing Web-Based Experiments From the Ground Up R. Chris Fraley | APS 2006.
Lesson 4.5 – Conducting a Survey to Collect Two-Variable Data.
THE PROCESS OF TEACHING BAR GRAPHS. STUDENT PAGE CONSTURCT A BAR GRAPH WEB-QUEST DESIGNED BY GROUP 2 MEMBERS TITLE INTRODUCTION TASK PROCESS EVALUATION.
Chapter 2 Notes Ms. Sager. Science as Inquiry What is Science? – Word derived from Latin – means “to know” – A way of knowing – How to answer questions.
Multiple-goal Search Algorithms and their Application to Web Crawling Dmitry Davidov and Shaul Markovitch Computer Science Department Technion, Haifa 32000,
Chapter 10 (3.8) Marketing Research.  What is Marketing Research? Marketing research is the systematic design, collection, analysis, and reporting of.
1 1 Principles of Marketing Spring Term MKTG 220 Spring Term MKTG 220 Dr. Abdullah Sultan Dr. Abdullah Sultan.
Research And Evaluation Differences Between Research and Evaluation  Research and evaluation are closely related but differ in four ways: –The purpose.
Development of a prototype tool for measuring the context of care in intellectual disability settings in the UK Professor Bob Gates 1, Dr Kay Mafuba 2,
Ivan Lanese Computer Science Department University of Bologna/INRIA Italy Causal-Consistent Reversibility in a Tuple-Based Distributed Language Joint work.
Zachary Starr Dept. of Computer Science, University of Missouri, Columbia, MO 65211, USA Digital Image Processing Final Project Dec 11 th /16 th, 2014.
The Scientific Method Science Problem Solving Skills Created by Scott D. Richman.
Lesson 1-4 AP Computer Science Principles
Marketing Research and Information Systems
Technology and 21st Century Skills Assessment Rubric
PROBLEM OF RESEARCH.
Real-Time Parameterized Avatar Face Generation
Conducting a User Study
Survey Design Steps in Conducting a survey
The Scientific Method Ms MacCormack Fall 2017.
Starter Name the two types of data One disadvantage of primary data
Framework for Interactive Applications
The Scientific Method Ms MacCormack Fall 2018.
Fundamentals of Human Computer Interaction (HCI)
User interface design.
CognitiveGenesis Academic Performance Education on
M.V. de la Fuente; D. Ros; M.A. Ferrrer; J. Suardíaz;
RESEARCH METHODS Lecture 19
Case Study: OPM High Delivery Cycle Time Impacting Payment Cycle.
Unit 1 Lesson 3 What Are Some Types of Investigations?
1. INTRODUCTION.
Managing Marketing Information to Gain Customer Insights
Presentation transcript:

An Empirical Evaluation of Undo Mechanisms Aaron G. Cass Chris S.T. Fernandes Andrew Polidore Computer Science Dept. Union College Schenectady, NY, USA

2 of 18 Talk Outline Types of undo Problem statement Empirical evaluation design –Pilot study –Broad evaluation Results Future Work Conclusion

3 of 18 Linear Undo

4 of 18 Selective Undo Undo arbitrary action without requiring the undoing of subsequent steps [Berlage ’94]

5 of 18 Selective Undo Script model [Archer, et al ’84] –Removing action A i results in state: –A 1, A 2, …, A i-1, A i+1, …, A n Cascading model [Cass, Fernandes ’05] –Accounts for dependencies between actions –If A j dependent on existence or result of A i (j > i), A j also undone Differing semantics:

Problem Statement Selective undo is believed to be superior to linear undo But…  Will it be easier for users to use?  Is this a natural model for undo?  Does it match users’ mental models?

7 of 18 Goal Compare three different models of undo –Linear –Script selective –Cascade selective Conduct a user study to find out!

8 of 18 The Study Want to determine users’ mental model of undo Design a task that elicits their mental model in the performance of that task

9 of 18 The Instrument Paper-based instrument –Not associated with a computer application –User freedom –Selective undo not widely implemented

10 of 18 The Instrument Steps taken to create this picture: 1. Draw Circle 2. Draw Square 3. Draw Triangle 4. Color Circle Assume you have already done the steps above. Draw what you think the outcome should be if you were to undo step 4 (step 1).

11 of 18 Two Tasks 1. Draw Circle 2. Draw Square 3. Draw Triangle 4. Color Circle Undo Step 1 LinearScriptCascade Undo Step 4 All models

12 of 18 Pilot Study Concern that word “undo” may trigger response based on past experience Compare with “reverse the effects of” 4 subjects Result: kept “undo” in instrument wording

13 of 18 Evaluation Methods 29 subjects –Undergraduate population –Experience with widespread applications –Little experience with specialized applications Within-subjects design Post-task questionnaire Single dependent variable  2 analysis

14 of 18 Results (N=28) 1 (4%) 7 (25%) 18 (64%) 2 (7%)

15 of 18  2 Analysis Expected one model to be preferred p<0.05 Expected cascade to be preferred over linear p<0.05

16 of 18  2 Analysis Expected script to be preferred over linear   2 not applicable Expected either script or cascade to be preferred over the other p<0.05

17 of 18 Conclusions In familiar applications –Cascading selective is more natural than script selective –Cascading selective is more natural than linear –Script is more natural than linear (the data suggests)

18 of 18 Future Work Use a more complete application –Pilot study with presentation software already complete Use a richer set of dependencies Implement selective undo in a representative application

19 of 18 Validity threats –Scalability To complex tasks To other applications