374:
32:
175:"The idea is that people form a model. You present them with some instruments, tools, like a faucet, electric stove or something like that and demonstrate how it works. They then form in their heads a model that shows how it works inside to help them remember how to use it in the future. It may be a totally erroneous model of what is going on inside the black box."
218:
of Unix as being "a disaster for the casual user." However the "casual user" is not the target audience for UNIX and as the Condon quote above indicates, a high level of user interface abstraction leads to cognitive models that may be "totally erroneous."
411:
259:
238:
435:
56:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
214:
cited principles of cognitive engineering in his 1981 article, "The truth about Unix: The user interface is horrid." Norman criticized the
347:
127:
108:
80:
204:
According to Condon, the ideas of cognitive engineering were developed later than, and independent from, the early work on the
404:
87:
228:
53:
94:
440:
49:
76:
397:
65:
148:
332:
144:
42:
20:
180:
168:
101:
151:
to design and develop engineering systems to support or improve the cognitive processes of users.
430:
61:
282:
57:
328:
303:
185:
274:
233:
164:
381:
215:
424:
373:
211:
160:
286:
278:
48:
Please help to demonstrate the notability of the topic by citing
205:
258:
Wilson, Kyle M.; Helton, William S.; Wiggins, Mark W. (2013).
25:
167:
of a system based upon common metaphors. As explained, by
385:
348:"The truth about Unix: The user interface is horrid"
267:Wiley Interdisciplinary Reviews: Cognitive Science
159:It was an engineering method used in the 1970s at
173:
304:"Interview with Joseph H. Condon (transcript)"
186:"Interview with Joseph H. Condon (transcript)"
405:
8:
412:
398:
128:Learn how and when to remove this message
308:History of Science, Princeton University
190:History of Science, Princeton University
250:
380:This engineering-related article is a
239:Outline of human–computer interaction
7:
370:
368:
298:
296:
16:Method of study of neuro-psychology
14:
372:
30:
163:, focused on how people form a
1:
229:Cognitive systems engineering
384:. You can help Knowledge by
357:. Vol. 27, no. 12.
43:general notability guideline
143:is a method of study using
457:
436:Human–computer interaction
367:
50:reliable secondary sources
39:The topic of this article
18:
41:may not meet Knowledge's
19:Not to be confused with
260:"Cognitive engineering"
77:"Cognitive engineering"
202:
149:cognitive neuroscience
141:Cognitive engineering
346:Norman, Don (1981).
333:Princeton University
327:Michael S. Mahoney.
145:cognitive psychology
21:Cognitive ergonomics
335:History of Science.
181:Joseph Henry Condon
169:Joseph Henry Condon
329:"Joseph H. Condon"
208:operating system.
45:
441:Engineering stubs
393:
392:
138:
137:
130:
112:
40:
448:
414:
407:
400:
376:
369:
359:
358:
352:
343:
337:
336:
324:
318:
317:
315:
314:
300:
291:
290:
279:10.1002/wcs.1204
264:
255:
200:
199:
197:
196:
133:
126:
122:
119:
113:
111:
70:
34:
33:
26:
456:
455:
451:
450:
449:
447:
446:
445:
421:
420:
419:
418:
365:
363:
362:
350:
345:
344:
340:
326:
325:
321:
312:
310:
302:
301:
294:
262:
257:
256:
252:
247:
234:History of Unix
225:
201:
194:
192:
184:
179:
165:cognitive model
157:
134:
123:
117:
114:
71:
69:
47:
35:
31:
24:
17:
12:
11:
5:
454:
452:
444:
443:
438:
433:
423:
422:
417:
416:
409:
402:
394:
391:
390:
377:
361:
360:
338:
319:
292:
249:
248:
246:
243:
242:
241:
236:
231:
224:
221:
216:user interface
177:
156:
153:
136:
135:
38:
36:
29:
15:
13:
10:
9:
6:
4:
3:
2:
453:
442:
439:
437:
434:
432:
429:
428:
426:
415:
410:
408:
403:
401:
396:
395:
389:
387:
383:
378:
375:
371:
366:
356:
349:
342:
339:
334:
330:
323:
320:
309:
305:
299:
297:
293:
288:
284:
280:
276:
272:
268:
261:
254:
251:
244:
240:
237:
235:
232:
230:
227:
226:
222:
220:
217:
213:
209:
207:
191:
187:
182:
176:
172:
170:
166:
162:
154:
152:
150:
146:
142:
132:
129:
121:
118:December 2015
110:
107:
103:
100:
96:
93:
89:
86:
82:
79: –
78:
74:
73:Find sources:
67:
63:
59:
55:
51:
44:
37:
28:
27:
22:
386:expanding it
379:
364:
354:
341:
322:
311:. Retrieved
307:
273:(1): 17–31.
270:
266:
253:
210:
203:
193:. Retrieved
189:
174:
158:
140:
139:
124:
115:
105:
98:
91:
84:
72:
54:independent
425:Categories
355:Datamation
313:2017-05-17
245:References
212:Don Norman
195:2017-05-17
88:newspapers
62:redirected
431:Bell Labs
161:Bell Labs
52:that are
287:26304173
223:See also
178:—
155:History
102:scholar
66:deleted
285:
104:
97:
90:
83:
75:
58:merged
351:(PDF)
263:(PDF)
109:JSTOR
95:books
64:, or
382:stub
283:PMID
206:Unix
147:and
81:news
275:doi
427::
353:.
331:.
306:.
295:^
281:.
269:.
265:.
188:.
183:,
171::
60:,
413:e
406:t
399:v
388:.
316:.
289:.
277::
271:4
198:.
131:)
125:(
120:)
116:(
106:·
99:·
92:·
85:·
68:.
46:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.