<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Opening the Box Meta-level Interfaces Needs and Solutions</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Alan Dix Talis</institution>
          ,
          <addr-line>43 Temple Row, Birmingham, B2 5LS</addr-line>
          ,
          <country>UK and</country>
          <institution>Birmingham University</institution>
          ,
          <addr-line>Edgbaston, Birmingham</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper begins by considering reasons why some form of meta-level interface may be required for modifying or exploring existing user interfaces, from obvious functional reasons of customisation and personalisation to more political and social goals such as education and empowerment. The paper considers examples of systems developed by the author and others, and uses these to present a number of techniques and principles for effective meta-interactions. Some of these concern more surface manipulation, and others deeper levels of code and metadescriptions of the application and UI. It concludes that meta-interaction may be a key element for future liberal society.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;customisation</kwd>
        <kwd>personalisation</kwd>
        <kwd>end-user programming</kwd>
        <kwd>end-user empowerment</kwd>
        <kwd>appropriation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        2.1 Customisation and Personalisation
Of course meta-level user interfaces are common. Every
time a user drags a palette to the side of the screen, selects a
ringtone or modifies the style definition in a document, she
is engaging in an adaptation of the user interface.
However, we also know that beyond a few examples like
this few users actually customise despite having problems
or gripes that could be dealing with through simple
selection of options (for example, turning off some of the
'smart' features in Word). Improving even these basic
features can have a major impact on user experience.
2.2 Appropriation
In particular "plugability and configuration" is one of the
design principles for appropriation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Indeed several of
the design principles discussed in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] are related to
metalevel user interactions; while appropriation is possible
using the interface as given, the user has greater flexibility
if she can peek under the hood (design principle "provide
visibility") and tinker inside ("plugability and
configuration") and share the results with others
("encourage sharing").
2.3 End-user Empowerment
One advantage of appropriation is the sense of ownership
and empowerment it engenders. A sense of control is
important for well being, and the act of tinkering gives this,
whether to improve the user interface for its original
purposes, or make it do something completely novel.
While this is important for all users it is particularly
relevant for those in developing countries, or the
disadvantaged in developed countries, who can be doubly
disadvantaged in a world where access to information is
central to economic and political power [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Existing technology can be appropriated by traditionally
disadvantaged groups; for example, Jensen reports how
mobile phones allowed fishing boats in Kerala, southwest
India, to obtain higher prices for their catches [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and we
have all seen the impact of social media in recent popular
uprisings across North Africa and the Middle East.
However, if those closer to need are in a position to create,
modify or adapt existing software and hardware the results
are likely to be more appropriate than tools designed
primarily for an urban, middle-class, western environment.
This may be the end user, but Marsden et al. argue the case
for 'human access points', local experts, in their case local
health workers, who are given the tools to create and adapt
mobile-phone administered questionnaires [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Prompted
by various workshop discussions [
        <xref ref-type="bibr" rid="ref17 ref20">17, 20</xref>
        ], we have
explored the potential for a range of mobile phone-based
adaptations including compete coding via the mobile-phone
screen [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
2.4 Education
Often modifications to user interfaces require a high degree
of expertise; so education is needed in order to use them.
However, if well designed, meta-level interactions hold the
potential to be a means for education in themselves; as
generations of children who have fiddled with old car
engines can testify. Education, of course, also contributes
to empowerment.
      </p>
      <p>
        The Query-by-Browsing (QbB) intelligent database
interface is an example of this. QbB generates SQL:
queries based on user record preferences, but then reflects
this back to the user both by highlighting the records
selected by the query and by exposing the query itself [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
The user can comprehend the system via the concrete
record selections, but in the process learn the SQL that
produce it (although not the machine learning algorithms
which generate the queries).
2.5 Privacy and Auditability
The control of privacy settings in social applications such
as Facebook, has become a big issue. Höök also argues
that this is an issue likely to be important in future
ubiquitous computing applications [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Indeed the very
openness in low-level architecture required for rich
context-sensitive features in itself creates privacy issues
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Many approaches to privacy, in ubiquitous computing
and elsewhere, focus on restricting information flow.
However I have long argued that it is the eventual use of
the information that is most critical [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; that is systems that
expose what happens to information both currently
(visibility) and in the past (auditability) are far more likely
to support the user's ability to manage information
disclosure.
2.6. Comprehensible Behaviour and Trust
Closely related is the issue of trust, not just for financial
and or personal security, but also at a mundane level of
whether we decide to use particular application features.
This is especially important when systems make choices
automatically for us. The kind of openness needed to allow
a user to adapt a system is very similar to that needed to
allow a user to believe in what it is doing already.
The record listings in Query-by-Browsing [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] are an
example of this as they may be comprehensible to the user,
even if the SQL is not, giving the user confidence that the
query will continue to be appropriate for unseen records.
Another example is MICA, which makes suggestions for
GUI customisation based on user activity, but also
"includes a description of why MICA is making
recommendations and how it generated them" [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], precisely
to support Hook's "predictability and transparency"
principle [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and so engender trust.
3. TECHNIQUES AND PRINCIPLES
So if meta-level investigation and modification is a good
thing, how can it be achieved?
3.1 Cost and Benefit – When it happens
Sometimes people don’t customise because they don’t
know how. However many experts do not customise their
interfaces even if they complain about the things that are
wrong! The key problem is not lack of understanding but
lack of immediate benefit. We are creatures who heavily
discount the future; effort now for future gain is hard. If
customisation can be made closer to the point of use it
becomes more likely. One example are dialogues that ask
for a decision, but have a tick box to say "always do this".
This is effectively asking you set a preference, but at a
point in time when you are in the middle of doing the
requisite action. The benefit is clear and the cost (in terms
of clicks and mental effort) low. Furthermore this is all set
within the context of a concrete example of use (see also
next point)
3.2 Progressive Disclosure –Where It happens
The preferences and customisation of many applications
are buried in a "preferences" menu item far away from the
actual interaction. Somewhere in a preferences panel you
set parameters whilst guessing vaguely what they might be
about. However, others connect customisation closer to the
thing it affects. Back in 1995, Marsden [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] advocated the
advantages of a systematic policy suggesting a 'screw'
metaphor where every component has a small screw icon in
the bottom right hand corner. Clicking the screw 'undoes it'
revealing the circuitry within, and potential the ability to
unscrew other sub-components (see Figure 1).
Today in the Apple Dashboard just such a mechanism is
found on widgets. Instead of a screw a little 'i' for
information icon, clicking it 'turns around' the widget
showing settings behind. Strangely the iPhone reverted to a
special place for settings rather than associating them
closely with their application.
3.3 Tools of Revelation
A similar approach is to use some form of external 'tool' for
meta-level modifications. This happens in the real world;
Figure 3 shows a stud detector, which detects the wooden
studs in a wall so that you can screw into them. The
wooden structure is hidden behind plasterboard and
wallpaper, but the stud detector reveals it – the "provide
visibility" appropriation principle [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] in the physical world.
Note that "provide visibility" does not mean the same as
Nielsen's "visibility of system status" evaluation heuristic
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], as this usually refers to the essential information about
the system for normal use. Instead, if systems reveal a little
more (such as a mobile phone showing signal strength not
just whether or not a call can be made), then the user can
use this in unexpected ways (such as waving the phone
about to seek out better signal).
      </p>
      <p>
        Beaudouin-Lafon's 'instrumental interaction' [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and in
particular Toolglasses [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], follows the same principle as the
stud detector advocating the use of 'instruments' as a means
for modifying and interacting with objects.
3.4 Smooth Transitions
When creating means for user to modify their environment
there is often a temptation to try to do everything – the
spectre of Turing equivalence rises and before long a
simple end-user customisation tool becomes a full-blown
and complex programming language. The effort to produce
something that could, in principle, do everything often ends
up with something that, in practice, is good for nothing.
However, the alternative is often to have very different
means for simple and more complex modifications, so that
users hit barriers; for example, moving from Excel
formulae to Visual Basic.
      </p>
      <p>Mathematicians face a similar problem when modelling
'differential manifiolds' curved spaces such as the surface
of the Earth or the curved space-time of general relativity.
They effectively paper the curved space with flat Euclidean
surfaces (which are easier for a mathematician to handle),
but if you try to use a single flat surface there is at least one
point where things go very wrong, like the place where the
foil is all folded up at the end of an Easter egg. Instead
mathematicians use a collection of small patches, which
overlap in a 'smooth' manner.</p>
      <p>
        One can envisage customisation working like this, with
different levels of customisation (perhaps ending up at
open-source code), where the two ends (use and coding)
have a huge gulf between them, but where each pair of
successive levels overlap with an easy transition. This
sounds like a hard problem, but there are examples that
achieve this to varying extents. HyperCard had a smooth
transition from use to customisation and then to
programming. In consequence, many who would never
consider themselves programmers created complex
HyperCard applications. Xerox Buttons were another
example, where a non-technical user might just use the
button, then peek at its code and change a file name, and
perhaps, over time, start to understand some of the code
that drove the familiar user-interface actions [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Could
the Excel formula to VB step be more like this?
3.5 Ease of collaboration
Another of the appropriation principles is "encourage
sharing" [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In Nardi and Miller's classic study of
spreadsheet use [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], they describe the collaboration
between Buzz and Betty
"When Buzz helps Betty with a complex part of the
spreadsheet such as graphing or a complex formula, his
work is expressed in terms of Betty’s original work. He
adds small, more advanced pieces of code to Betty’s basic
spreadsheet: Betty is the main developer and he plays an
adjunct role as consultant."
The fact that spreadsheets have relatively smooth
transitions (at least between levels of formula use) make
this collaboration possible. Note especially that Betty is
able to do a lot herself, and probably extends this over time
(education). Furthermore Betty is able to determine her
own level and understand when to seek help.
      </p>
      <p>
        Spreadsheets, by their nature allow them to be passed
around. It is far rarer to see other kinds of configurations
shared. In UNIX systems, a lot of configuration is in text
files, such as .login or .profile, and expert users will move
these around. However, it is near impossible to simply take
one person's Word settings and apply them to another users
machine. Xerox Buttons [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] were a simple idea, a button
that executed some Lisp code, but were surprisingly
powerful, in part because you could mail them round,
creating a community. Maker cultures emerge when
people can share ideas and, even better, artefacts.
3.6 From Configuration to Code
Spreadsheets, Xerox Buttons, Query-by-Browsing and
HyperCard are all examples where the user can move in
steps from doing things to raw coding. When looking at
near-end-use development, one of the design lessons was
"reduce the gap between design and execution" [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
"In general, bridging the gaps between environment and
language, design and use, test and bug report [...]
features found in many end-user or near-use software
such as spreadsheets (eliding data, code and execution),
Yahoo! Pipes (design close to execution), and
programming by example (use is design)"
At Talis we are working on tools to bridge this gap for
linked open data [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] as exposed, for example, in
data.gov.uk. This is building on Callimacus, where RDFa
embedded in a web page turns it into a UI generation
template, opening up application building to ordinary web
developers [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
3.7. Meta-Representations for Meta UIs
As well as being the subject of user interaction, semantic
data of some form seems to be a key element of future user
interactions. Whether mashing data for the web or
connecting digital devices in the living room, effective
meta data about devices, applications and their interactive
potential seems an essential start point for more flexible
machine initiated activity, for machine activity to be
explicable, and for users to be able to interrogate and
modify it. Model-based user interfaces are clearly one way
to achieve this, but there could be other solutions, similar to
the way applications expose meta-information for Apple
Scripting on Mac OS or via COM on Windows.
4. CONCLUSIONS
We have discussed various principles and methods for
meta-level interactions., and also some of the reasons why
this is 'a good thing'. As we enter an era of open data and
mashups the ability to digitally tinker seems not just a
hobby, but a key enabler of a broad-based civil society.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Beardon</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Munyampeta</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rout</surname>
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>Maiso</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>ICT for Development, Empowerment or Exploitation: Learning from the Reflect ICTs project</article-title>
          .
          <source>ActionAid</source>
          . (
          <year>2005</year>
          ) http://www.actionaid.org.uk/1413/ict_for_development _empowerment_or_exploitation.html
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Beaudouin-Lafon</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Instrumental interaction: an interaction model for designing post-WIMP user interfaces</article-title>
          .
          <source>in Proc. of the CHI '00</source>
          . ACM Press, (
          <year>2000</year>
          )
          <fpage>446</fpage>
          -
          <lpage>453</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Beaudouin-Lafon</surname>
          </string-name>
          ,
          <article-title>M and Mackay</article-title>
          , W. Reification,
          <article-title>polymorphism and reuse: three principles for designing visual interfaces</article-title>
          .
          <source>in Proc. of AVI '0)</source>
          . (
          <year>2000</year>
          ) ACM Press ,
          <fpage>102</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Linked Data - The Story</surname>
          </string-name>
          So Far.
          <source>International. Journal on Semantic Web and Information Systems</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bunt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Conati</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>McGrenere</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Supporting interface customization using a mixed-initiative approach</article-title>
          .
          <source>In Proc. of IUI '07</source>
          . (
          <year>2007</year>
          ) ACM Press.
          <volume>92</volume>
          -
          <fpage>101</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. [Di90]
          <string-name>
            <surname>Dix</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>1990</year>
          ).
          <article-title>Information processing, context and privacy</article-title>
          .
          <source>in Proc. of INTERACT'90</source>
          , (
          <year>1990</year>
          )
          <article-title>NorthHolland</article-title>
          .
          <fpage>15</fpage>
          -
          <lpage>20</lpage>
          . http://hcibook.com/papers/int90/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. [DP94]
          <string-name>
            <surname>Dix</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Patrick</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>1994</year>
          ).
          <article-title>Query By Browsing</article-title>
          .
          <source>Proc. of IDS'94: The 2nd International Workshop on User Interfaces to Databases</source>
          , (Lancaster, UK,
          <year>1994</year>
          ), Springer Verlag.
          <volume>236</volume>
          -
          <fpage>248</fpage>
          . http://hcibook.com/alan/papers/QbB-IDS94/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dix</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Beyond intention - pushing boundaries with incidental interaction</article-title>
          .
          <source>Proc. of</source>
          Building Bridges: Interdisciplinary
          <string-name>
            <surname>Context-Sensitive</surname>
            <given-names>Computing</given-names>
          </string-name>
          , (Glasgow University, 9 Sept 2002) http://hcibook.com/alan/papers/beyond-intention-2002/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dix</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>Designing for appropriation</article-title>
          .
          <source>In Proc. of HCI2007</source>
          Volume
          <volume>2</volume>
          . (
          <year>2007</year>
          ). BCS,
          <fpage>27</fpage>
          -
          <lpage>30</lpage>
          . http://www.bcs.org/content/conWebDoc/13347
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dix</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozhissery</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ravichandran</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Dayanand</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Content Development Through the Keyhole</article-title>
          .
          <source>in Proc. of EISE2009</source>
          ,
          <article-title>Expressive Interaction for Sustainability and Empowerment, (</article-title>
          <year>2009</year>
          )
          <fpage>67</fpage>
          -
          <lpage>78</lpage>
          . http://hcibook.com/alan/papers/EISE2009-Keyhole/
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Höök</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Steps to take before intelligent user interfaces become real</article-title>
          .
          <source>Interacting with Computers</source>
          ,
          <volume>12</volume>
          (
          <year>2000</year>
          )
          <fpage>409</fpage>
          --
          <lpage>426</lpage>
          ,.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>The Digital Provide: Information (Technology), Market Performance, and Welfare in the South Indian Fisheries Sector</article-title>
          ,
          <source>Quarterly Journal of Economics</source>
          ,
          <volume>122</volume>
          (
          <issue>3</issue>
          ), (
          <year>2007</year>
          )
          <fpage>879</fpage>
          -
          <lpage>924</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Leigh</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wood</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>RDFa as a Query Language</article-title>
          .
          <source>Semantic Technology Conference. (June</source>
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>MacLean</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carter</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lövstrand</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Moran</surname>
            ,
            <given-names>T..</given-names>
          </string-name>
          <article-title>User-tailorable systems: pressing the issues with buttons</article-title>
          .
          <source>In Proc. CHI '90</source>
          . (
          <year>1990</year>
          ) ACM Press,
          <year>1990</year>
          ,
          <fpage>175</fpage>
          -
          <lpage>182</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Marsden</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Overcoming Design and Execute Modes in User Interface Design Environments</article-title>
          .
          <source>in Proc. of HCI 95 people and Computers</source>
          (
          <year>1995</year>
          ),
          <fpage>133</fpage>
          -
          <lpage>137</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Marsden</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maunder</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Parker</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>People are people, but technology is not technology</article-title>
          .
          <source>Phil. Trans. R. Soc. A</source>
          (
          <year>2008</year>
          )
          <volume>366</volume>
          ,
          <fpage>3795</fpage>
          -
          <lpage>3804</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Mobile</surname>
            <given-names>Design Dialog.</given-names>
          </string-name>
          (Cambridge. 3-
          <issue>4</issue>
          <year>April 2008</year>
          ) webpage: http://www.cs.swan.ac.uk/mobdesign/ Mobile Design Dialog discussion: http://mobiledesigndialog.nexo.com/
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>An ethnographic study of distributed problem solving in spreadsheet development</article-title>
          .
          <source>In Proceedings of the 1990 ACM conference on Computer-supported cooperative work (CSCW '90)</source>
          .
          <article-title>(1990) ACM</article-title>
          , Press,
          <fpage>197</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Nielsen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Heuristic evaluation</article-title>
          . In Nielsen, J., and
          <string-name>
            <surname>Mack</surname>
            ,
            <given-names>R.L</given-names>
          </string-name>
          . (Eds.),
          <source>Usability Inspection Methods</source>
          , (
          <year>1994</year>
          ) John Wiley &amp; Sons, New York, USA.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. Winter School on Interactive Technologies.
          <source>(HP Labs in Bangalore, 2nd &amp; 3rd February</source>
          <year>2009</year>
          ).
          <article-title>UK-India Network on Interactive Technologies</article-title>
          . http://www.ukinit.org/02122008/winter-schoolinteractivetechnologies
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>