Page 373 -
P. 373

12.9  Summary     363




                    do not generate server requests, additional data recording measures may be
                    necessary. What other challenges or opportunities can you see in such dynamic
                    applications? Pick an online word processor, spreadsheet, or presentation tool:
                    how would you design a system to study its usability?
                  2.  A hybrid system for automated computer data collection might involve a
                    combination of web server logs—ideally from a proxy that would track all of
                    a participant's interactions—and one or more software packages instrumented
                    to collect data of interest. What would be the pros and cons of such a system
                    relative to a full-scale activity logger that would track all user interactions?

                  3.  Legitimate concerns about user privacy have led some researchers to be very
                    cautious about the data that they collect with keyboard or activity loggers. This
                    appropriate concern for user privacy does not come without a cost: in throwing
                    away details such as document titles, destination addresses for emails, and
                    specifics of visited web pages, researchers lose information that might have been
                    used to develop a more nuanced understanding of the underlying activity. For
                    example, was the user sending email to colleagues at work, or at home? Can
                    you think of ways to configure logging software to collect certain attributes of
                    document titles, email headers, and related information in a manner that might
                    prove useful for research purposes while still being respectful of user privacy?
                    What effect might greater notification—perhaps telling participants that you
                    might record sensitive information—have on your experiments?

                  4.  The Fitts' Law, Children, and Mouse Control sidebar provides an example of
                    experiments that used mouse motion data to study how children differed from
                    adults in their use of mice. Although 3- to 5-year-old children do not make much
                    of use keyboards, slightly older children might begin to type. How would you
                    study differences between children and adults in terms of their use of keyboards?
                    What sort of data would you collect and how would you interpret it? How would
                    this differ if you were considering smaller keyboards such as those used on some
                    cell phones?



                  RESEARCH DESIGN EXERCISES

                  1.  Experiment with web server logs and log analysis on your desktop.
                    (a)  Start by getting or generating a web server log file. You might ask
                        computing support people in your school or company for some web log
                        data. Log files can be very large: you probably only want a small snapshot.
                        If your school or department gets a good deal of web traffic, you should
                        be able to get a few megabytes of log data. Be forewarned, some network
                        administrators may not like the idea of handing out this information. You
                        may have to convince them that you will use it responsibly. Alternatively,
                        you can install a web server and run it. If your computer does not have a
   368   369   370   371   372   373   374   375   376   377   378