skip to main content
10.1145/800049.801747acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article
Free Access

Computer commands labelled by users versus imposed commands and the effect of structuring rules on recall

Published:15 March 1982Publication History

ABSTRACT

In the office of the future, computers will be found in the work environment to accomplish many various tasks. Often times, one will find computer command languages built from words of natural language, thereby facilitating the use of these new office automation systems for users inexperienced with computers. The study presented here focuses on very simple languages, without embedded features and where each computer command label corresponds to only one function. Three different approaches have been taken in order to improve the design of such simple languages: evaluation of existing languages (Scapin [1]); study of experimental languages that differ on linguistic or semantic variables (Hammond et al. [2]; Carroll [3]; Scapin [4]); research on the design of languages by the users themselves (Carroll [3]; Bisseret et Scapin [5]).

References

  1. 1.Scapin, D.L. Evaluation of an electronic mail language. Proceeding of the ACM International Computing Symposium on System Architecture, 1981, 425-432.Google ScholarGoogle Scholar
  2. 2.Hammond, N., Barnard, P., Clark, I., Morton, J., and Long, J. Structure and content in interactive dialogue. Medical Research Council Report, 1980.Google ScholarGoogle Scholar
  3. 3.Carroll, J.M. Learning, using and designing command paradigms. IBM Research Report RC 8141, 1980.Google ScholarGoogle Scholar
  4. 4.Scapin, D.L. Computer commands in restricted natural language: some aspects of memory and experience. Human Factors, 1981, 23 (3), 365-375.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.Bisseret, A. et Scapin, D.L. Ergonomie du service Agora-Teletel. II. Etude du langage de commande de la messagerie. Technical INRIA Report BUR R06, 1980.Google ScholarGoogle Scholar
  6. 6.Broadbent, D.E. and Broadbent, M.H.P. The allocation of descriptor terms by individuals in a simulated retrieval system. Ergonomics, 1978,21, 343-354.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7.Slamecka, N.J. and Graf, P. The generation effect: Delineation of a phenomenon. Journal of Experimental Psychology: Human Learning and Memory, 1978, 4 (6), 592-604.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.Jacoby, L.L. On interpreting the effects of repetition: solving a problem versus remembering a solution. Journal of Verbal Learning and Verbal Behavior, 1978, 17 (6), 649-667.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.Mc Farland, Jr., C.E., Frey, T.J., and Rhodes, D.D. Retrieval of internally versus externally generated words in episodic memory. Journal of Verbal Learning and Verbal Behavior, 1980, 19(2), 210-225.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10.Scapin, D.L. et Lasserre, C. Essai de construction d'un vocabulaire de commande. INRIA Note CA 7909 R3, 1979.Google ScholarGoogle Scholar
  11. 11.Moran, T.P. Introduction to the command language grammar. Xerox Report SSL-78-3, AIP Memo 111, 1978.Google ScholarGoogle Scholar
  12. 12.Morton, J., Barnard, P., J. Hammond, N. V., and Long, J.B. Interacting with a computer: a framework. In E.J. Boutmy and A. Danthine (Eds.), Teleinformatics 79. Amsterdam: North Holland, 1979, 201-208.Google ScholarGoogle Scholar
  13. 13.Carroll, J.M. Naming as a mapping between n-dimensional geometries. IBM Research Report, 1980.Google ScholarGoogle Scholar
  14. 14.Carroll, J.M. Towards an integrated study of creative naming. IBM Research Report, 1980.Google ScholarGoogle Scholar

Index Terms

  1. Computer commands labelled by users versus imposed commands and the effect of structuring rules on recall

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '82: Proceedings of the 1982 Conference on Human Factors in Computing Systems
        March 1982
        399 pages
        ISBN:9781450373890
        DOI:10.1145/800049

        Copyright © 1982 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 March 1982

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        CHI '82 Paper Acceptance Rate75of165submissions,45%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader