<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Reading between the lines: identifying user behaviour between logged interactions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Max L. Wilson</string-name>
          <email>m.l.wilson@swansea.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>m.c. schraefel</string-name>
          <email>mc+uiir@ecs.soton.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Future Interaction Technologies Lab, Swansea University</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Electronics and Computer Science, University of Southampton</institution>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2009</year>
      </pub-date>
      <abstract>
        <p>Log analyses are often used simply to quantify interactions with different aspects of a user interface. The position held here is that much of a user's search experience does not involve direct interaction with the interface, and may not be logged at all. Many models highlight the cognitive aspects of searching behaviour, and many consider that if a user does not like a user interface, then they do not interact with it very much. Consequently, we suggest that a grand challenge for logging searcher experiences should be to study the gaps in usage logs rather than the entries alone.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The think aloud approach is one example method used for
eliciting qualitative details of user experience, but both the
experimenter effect and the weaknesses of introspection are
well known [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Some physiological logging approaches,
such as eye tracking, heart rate, body temperature, and
pupil-size monitoring can also be used if the participant is
in a lab environment. Studies even consider brain scanning
methods to estimate user cognitive load [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Can we elicit
cognitive aspects from logs of distant users? This position
paper explores the potential of eliciting cognitive actions
from usage logs, which we know are part of search.
COGNITIVE ACTIONS DURING SEARCH
Many models of information seeking assume that there are
cognitive stages in the search process. Marchionini [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
Ellis [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and Kuhlthau [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], all identify stages such as need
identification, examining results, and reflecting on whether
a task has been completed. Similarly relevance judgments
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] are presumed to be a key part of searching as a user
chooses which search results to view.
      </p>
      <p>
        Many analytical evaluation methods for interfaces define
cognitive actions. The Keystroke Level Model (KLM) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
was designed to estimate how long it would take to perform
a task with a user interface, by providing time estimates for
actions like clicking and typing. Further, KLM suggests that
the average time for a mental action is around 1.2 seconds
and may include actions such as: initiating a task, making a
strategy decision, retrieving a chunk from memory, visual
search on the screen, thinking of a task parameter (like a
keyword for a query), and verifying that something has
happened. The GOMS method (Goals, Operators, Methods,
and Selection rules) identified two types of non-interactive
actions: cognitive and perceptual. Cognitive actions include
initiating, choosing, planning. Perceptual actions include
reading and performing visual search. These were later
made more explicit in a variation called CPM-GOMS
(Cognitive-Perceptual-Motor GOMS – also Critical Path
Method GOMS), suggesting these cognitive, perceptual and
motor (interactive) actions may occur in parallel [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Bates discussed both mental and physical actions in an
analysis of different levels of search strategies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Her
model, which was operationalised in a recent information
seeking evaluation framework [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], suggests that there are
four levels of strategy: Strategies, Stratagems, Tactics, and
Moves. She defines these moves as ‘An identifiable thought
or action that is a part of information searching’. Tactics,
such as comparing, narrowing results, expanding results,
varying queries, etc, are made up of moves. Stratagems,
such as checking journal issues or searching for citations,
are made up of a combination of tactics and joining moves.
Finally strategies, which are similar to realistic work tasks
like verifying a citation, or researching for a report, are
made up of a combination of stratagems, tactics, and
moves. Consequently, all four levels involve cognitive
actions. Bates’ definition of moves, and subsequently the
information seeking evaluation method by Wilson and
colleagues, takes a much less rigid view of mental actions
compared to timeframe analyses like KLM and GOMS.
INTERFACE ELEMENTS FOR FEEDBACK
Elements or features of user interfaces are often designed to
provide feedback to users or support orientation. Although
these often-passive elements, like breadcrumbs, can be used
to navigate around an interface, they may be often used
without any direct interaction. Anecdotally, Pickens has
blogged about the dependence on usage logs1 and the value
that can be gained from classifications without direct
interaction2. This topic was discussed in the CHI09
Sensemaking workshop. Further, at CHI09, an audience
question asked whether tag clouds are better for aiding
retrieval or providing contextual information about results.
Empirically, Wilson and colleagues have shown that users
can recall labels from faceted classifications that did not
receive direct interaction [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        IDENTIFYING COGNITIVE ACTIONS IN USAGE LOGS
The solution for identifying cognitive actions from usage
logs is by no means obvious. Several existing studies,
however, can provide some insights into how we might
begin to do so. Multiple studies have, for example, noted
that users sometimes move their mouse to the most relevant
result seen so far while continuing to scan results [
        <xref ref-type="bibr" rid="ref12 ref2">2, 12</xref>
        ].
The combination of eye tracking and mouse tracking used
tells us more about both perceptual actions (scanning the
results) and cognitive actions (judging relevance), before
interaction occurs (clicking). Further this reinforces the
notion that we can use triangulation of, in this case, logging
methods to build richer pictures of search experiences.
Similarly, in a study performed by schraefel and colleagues
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], audio previews were provided with labels in the facets
of a classical music dataset. The hypothesis was that
multiple previews would improve user choices while
browsing, and would ‘back out’ of their decisions less
often. This mental action of ‘backing out’ on a decision was
measured in logs by a pattern of interactions showing the
user clicking on higher levels of the classifications from
their previous position. In this case, therefore, certain
cognitive actions were modeled as a sequence of physical
interactions, in an environment where mouse and eye
tracking were not used. Although schraefel and colleagues
identified specific mental actions, it may be possible to
identify common interaction patterns that abstractly
represent known perceptual and cognitive search Moves.
CONCLUSIONS
Search is irrefutably made up of both mental and physical
actions: we cannot interact with a system without first
choosing how to interact with it. The challenge, therefore, is
to try to elicit common mental actions from logs of physical
interactions. There are two key avenues that we envisage
for beginning to do so. First, triangulation of multiple
measures is already known to provide a richer
understanding of user experiences and applies to logging
too. Second, modeling sequences of physical interactions
may allow us to estimate what has happened in the gaps.
Regardless of how it is eventually achieved, the key
position held here is that evaluating searcher experiences
with usage logs should focus on what happens between the
captured physical interactions.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Bates</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          <article-title>Where should the person stop and the information search interface start? Inf</article-title>
          . Process. Manage.,
          <volume>26</volume>
          ,
          <issue>5</issue>
          (
          <year>1990</year>
          ).
          <fpage>575</fpage>
          -
          <lpage>591</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Brumby</surname>
            ,
            <given-names>D.P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Howes</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Strategies for Guiding Interactive Search: An Empirical Investigation Into the Consequences of Label Relevance for Assessment and Selection</article-title>
          .
          <string-name>
            <surname>Hum</surname>
          </string-name>
          .-Comput. Interact.,
          <volume>23</volume>
          ,
          <issue>1</issue>
          (
          <year>2008</year>
          ).
          <fpage>1</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Card</surname>
            ,
            <given-names>S.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moran</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Newell</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>The keystrokelevel model for user performance time with interactive systems</article-title>
          .
          <source>Commun. ACM</source>
          ,
          <volume>23</volume>
          ,
          <issue>7</issue>
          (
          <year>1980</year>
          ).
          <fpage>396</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Ellis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>A behavioural approach to information retrieval system design</article-title>
          .
          <source>J</source>
          . Doc.,
          <volume>45</volume>
          ,
          <issue>3</issue>
          (
          <year>1989</year>
          ).
          <fpage>171</fpage>
          -
          <lpage>212</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Hirshfield</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , et al.,
          <article-title>Brain measurement for usability testing and adaptive interfaces: an example of uncovering syntactic workload with functional near infrared spectroscopy</article-title>
          .
          <source>in CHI'09</source>
          , (
          <year>2009</year>
          ),
          <fpage>2185</fpage>
          -
          <lpage>2194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Ingwersen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Cognitive Information</surname>
          </string-name>
          <article-title>Retrieval</article-title>
          . ARIST,
          <volume>34</volume>
          (
          <year>1999</year>
          ).
          <fpage>3</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>John</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Gray</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <article-title>CPM-GOMS: an analysis method for tasks with parallel activities</article-title>
          .
          <source>in CHI'95</source>
          , (
          <year>1995</year>
          ), ACM,
          <fpage>393</fpage>
          -
          <lpage>394</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>John</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kieras</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>The GOMS family of user interface analysis techniques: Comparison and contrast</article-title>
          .
          <source>ACM Trans. Comput.-Hum. Interact., 3</source>
          ,
          <issue>4</issue>
          (
          <year>1996</year>
          ).
          <fpage>320</fpage>
          -
          <lpage>351</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kuhlthau</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          <article-title>Inside the search process: Information seeking from the user's perspective</article-title>
          .
          <source>JASIS</source>
          ,
          <volume>42</volume>
          ,
          <issue>5</issue>
          (
          <year>1991</year>
          ).
          <fpage>361</fpage>
          -
          <lpage>371</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Marchionini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Information Seeking in Electronic Environments</article-title>
          . Cambridge University Press,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Rocchio</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Relevance feedback in information retrieval</article-title>
          . in Salton, G. ed.
          <source>The SMART Retrieval System: Experiments in Automatic Document Processing</source>
          , Prentice Hall,
          <year>1971</year>
          ,
          <fpage>313</fpage>
          -
          <lpage>323</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Rodden</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <article-title>Exploring how mouse movements relate to eye movements on web search results pages</article-title>
          .
          <source>in WISI'07</source>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13] schraefel, m.c., Wilson,
          <string-name>
            <given-names>M.L.</given-names>
            and
            <surname>Karam</surname>
          </string-name>
          , M. Preview Cues: Enhancing Access to Multimedia Content, School of Electronics and Computer Science, University of Southampton,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Van Someren</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barnard</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sandberg</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>The Think Aloud Method: A practical guide to modelling cognitive processes</article-title>
          . Academic Press London,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] Wilson,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>André</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            and schraefel, m.c.,
            <surname>Backward</surname>
          </string-name>
          <string-name>
            <surname>Highlighting</surname>
          </string-name>
          :
          <article-title>Enhancing Faceted Search</article-title>
          . in UIST'
          <volume>08</volume>
          , (
          <year>2008</year>
          ), ACM,
          <fpage>235</fpage>
          -
          <lpage>238</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] Wilson,
          <string-name>
            <given-names>M.L.</given-names>
            , schraefel, m.c. and
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.W. Evaluating</surname>
          </string-name>
          <article-title>Advanced Search Interfaces using Established Information-Seeking Models</article-title>
          .
          <source>JASIST</source>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>