Human–computer interaction: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: title. Add: date, chapter. Removed parameters. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox3 | #UCB_webform_linked 906/2306
m clean up
Line 37:
 
==Goals for computers==
Human–computer interaction studies the ways in which humans make—or do not make—use of computational artifacts, systems, and infrastructures. Much of the research in this field seeks to ''improve'' the human–computer interaction by improving the ''usability'' of computer interfaces.<ref name=Grudin1992usability>{{cite journal|last1=Grudin|first1=Jonathan|title=Utility and usability: research issues and development contexts|journal=Interacting with Computers|date=1992|volume=4|issue=2|pages=209–217|doi=10.1016/0953-5438(92)90005-z}}</ref> How usability is to be precisely understood, how it relates to other social and cultural values, and when it is, and when it may not be a desirable property of computer interfaces is increasingly debated.<ref>{{Cite book|last1=Chalmers|first1=Matthew|last2=Galani|first2=Areti|title=Proceedings of the 5th conference on Designing interactive systems: Processes, practices, methods, and techniques |chapter=Seamful interweaving |date=2004 |pages=243–252|doi=10.1145/1013115.1013149|year=2004|isbn=978-1581137873|s2cid=12500442|url=http://eprints.gla.ac.uk/3457/1/Seamful_Interweaving.pdf|access-date=2019-10-04|archive-date=2020-08-01|archive-url=https://web.archive.org/web/20200801180740/http://eprints.gla.ac.uk/3457/1/Seamful_Interweaving.pdf|url-status=live}}</ref><ref>{{cite journal|last1=Barkhuus|first1=Louise|last2=Polichar|first2=Valerie E.|title=Empowerment through seamfulness: smart phones in everyday life|journal=Personal and Ubiquitous Computing|date=2011|volume=15|issue=6|pages=629–639|doi=10.1007/s00779-010-0342-4|doi-access=free}}</ref>
 
Much of the research in the field of human–computer interaction takes an interest in:
Line 47:
* Methods for determining whether or not the user is human or computer.
* Models and theories of human–computer use as well as conceptual frameworks for the design of computer interfaces, such as [[cognitivism (psychology)|cognitivist]] user models, [[Activity Theory]], or [[ethnomethodology|ethnomethodological]] accounts of human–computer use.<ref>{{cite journal|last1=Rogers|first1=Yvonne|title=HCI Theory: Classical, Modern, and Contemporary|journal=Synthesis Lectures on Human-Centered Informatics|date=2012|doi=10.2200/S00418ED1V01Y201205HCI014|volume=5|issue=2|pages=1–129}}</ref>
* Perspectives that critically reflect upon the values that underlie computational design, computer use, and HCI research practice.<ref>{{Cite book|last1=Sengers|first1=Phoebe|last2=Boehner|first2=Kirsten|last3=David|first3=Shay|last4=Joseph|first4=Kaye|title=Proceedings of the 4th decennial conference on Critical computing: Between sense and sensibility |chapter=Reflective design |date=2005 |volume=5|pages=49–58|doi=10.1145/1094562.1094569|year=2005|isbn=978-1595932037|s2cid=9029682|url=https://www.semanticscholar.org/paper/06c5e804c0f0292231d2d7be407bf3f1ac01c0d3}}</ref>
 
Visions of what researchers in the field seek to achieve might vary. When pursuing a cognitivist perspective, researchers of HCI may seek to align computer interfaces with the mental model that humans have of their activities. When pursuing a [[post-cognitivist]] perspective, researchers of HCI may seek to align computer interfaces with existing social practices or existing sociocultural values.
Line 141:
 
===Security interactions===
Security interactions are the study of interaction between humans and computers specifically as it pertains to [[information security]]. Its aim, in plain terms, is to improve the [[usability]] of security features in [[end user]] applications.
 
Unlike HCI, which has roots in the early days of [[Xerox PARC]] during the 1970s, HCISec is a nascent field of study by comparison. Interest in this topic tracks with that of [[Internet security]], which has become an area of broad public concern only in very recent years.
Line 257:
* [[Andrew Sears]] and Julie A. Jacko (Eds.). (2007). Human–Computer Interaction Handbook (2nd Edition). CRC Press. {{ISBN|0-8058-5870-9}}
* Julie A. Jacko and Andrew Sears (Eds.). (2003). Human–Computer Interaction Handbook. Mahwah: Lawrence Erlbaum & Associates. {{ISBN|0-8058-4468-6}}
* Dix, A. (2004). Human-computerHuman–computer interaction (3rd ed.). Pearson Education. {{ISBN|0-1304-6109-1}}
 
; Historically important classic{{citation needed|date=February 2013}}
Line 312:
*[http://hcibib.org/ The HCI Bibliography] Over 100,000 publications about HCI.
*[https://web.archive.org/web/20110817181257/http://hccedl.cc.gatech.edu/ Human-Centered Computing Education Digital Library]
*[http://hcibib.org/hci-sites/organizations HCI Webliography]
 
{{Digital media use and mental health}}
{{Authority control}}
 
[[Category:Human–computer interaction| ]]
{{DEFAULTSORT:Human-computer interaction}}
[[Category:Human–computer interaction| ]]