The invisible, ubiquitous computer has arrived, ensnaring almost any conceivable activity within its grasp. This raises wonderful opportunities and challenges to the field of human-computer interaction, for if the computer is everywhere, then everything is within our domain of study.
It is time to consider where the next application areas might be. As I look to the future, I see numerous domains of concern, but with three large, overriding issues:
- the ever-increasing complexity of everyday things
- the ever-increasing burden of security, authentication, and identification
- the ever-increasing use of automation
Obviously, this list of three hardly covers everything. After all, if the field covers almost everything, the list itself should be of almost everything, from voting machines to educational systems, finance to entertainment, health to child care. But these items encompass enough to keep us busy for many years.
The Ever-Increasing Complexity of Everyday Things
As our demands for services, functions, and features grow, the complexity of our devicescameras and cell phones, audio and television equipment, kitchen appliances and automobile dashboardsincreases beyond reasonable comprehension. Some home toilets now require electricity, display panels, and instruction manuals. This complexity often leads to frustration and sometimes poses serious safety hazards. In particular, automobile dashboards require multiple button-pushes and glances at visual menusdangerous while driving. Mobile phone usage is a known danger, with at least one study showing it is more dangerous to drive while talking on a mobile phone, even using hands-free phones, than to drive while legally drunk .
Although the science of complexity reduction is well understood, the practice is not. Automobile cockpits have special requirements because their controls must work well with unskilled people, under stress, in limited time, where the device is usually not the major focus of attention. When a driver wishes to change the interior temperature, or change the radio station or music selection, this activity should not distract the driver from the primary task of driving. This means that the instrument panel, already crowded with displays, navigational devices, controls for multiple-passenger temperature setting, driving parameters, and entertainment must be able to be used by someone relatively unskilled at both the task at hand and even the primary task of driving. Moreover, the eyes should not leave the road for more than two seconds. Why two seconds? Both common sense and the results of a well-documented field trial show that accident rates increase sharply as the time during which the driver’s gaze is off the road exceeds two seconds .
What’s true in the automobile also applies to the home, although without the same time stress and safety concerns. Appliances are increasing in complexity. Washers and dryers, dishwashers and microwave ovens, coffeemakers and refrigerators are all now available with complex menus, multiple choices, and microprocessors.
The Ever-Increasing Burden of Security, Authentication, and Identification
The terrorists are coming, the terrorists are coming! And yes, they really are. And not just terrorists, but crooks, thieves, mischief-makers, and the curious. All want access to our records and our lives. Our records are not secure; our means of identifying ourselves are laughably impoverished; and the distinctions between security, identification, and authentication are poorly understood, least of all by those implementing the systems that control our lives. Worse, there is a tradeoff between ease of use and security requirements, so that in an effort to ensure perfect security (an impossibility), the security demands are onerous. But there is a paradox: The more thorough the demands of security, the less secure the result. Why? Because when the demands of security get in the way of doing our jobs, we find ways around them. We write passwords on paper, hiding them in insecure locations. We prop open doors, make copies of sensitive materialall because we are dedicated to getting the job done. Thus, the honest worker undermines the entire security apparatus. Here is a field in desperate need of sanity, one based not only on technical considerations but psychological and social ones, as well.
The Ever-Increasing Use of Automation
One solution to the problems of complexity and security is to add more layers of technology. Alas, this often solves one set of problems while introducing others. Difficulties with automation have been documented in every domain that has been automated, yet each new domain fails to learn from others but must learn the problems anew. The next domains of automation are the home, the automobile, and medical facilities. Automation can be valuable. If properly deployed, it can reduce stress and workload, decrease error and accidents. But if badly deployed, it can do just the opposite: increase stress and workload, and change the type of error and accident, often to a much greater extent than was possible in the nonautomated state.
This is what happened in aviation and commercial industrial plants. It is now beginning to happen in medicine, the home, and in automobiles.
The Lesson for the Field of Human-Computer Interaction
Let us learn from the introduction of technology to other domains. Let us work to ensure that the trend toward higher complexity, onerous security demands, and overautomation is stopped. Mind you, the problems faced in these domains are real, so in reducing complexity, we must still figure out how to give people the choices they want and need. In reducing the complexity of security, we must still manage to increase the security itself, distinguishing when it is necessary to identify someone from when it is simply necessary to know if they are authorized to use a service. And in introducing automation into everyday things, let us provide the benefits but be ever wary of introducing the perils of overautomation.
Is this list complete? Of course not. I have left off some of my favorite peeves:
Health care. Medical errors. Home care. Packaging in general, blister packages in particular.
There is a lot for us to do.
1. Klauer, S. G., Dingus, T. A., Neale, V. L., Sudweeks, J. D., & Ramsey, D. J. (2006). The Impact of Driver Inattention on Near-Crash/Crash Risk: An Analysis Using the 100-Car Naturalistic Driving Study Data. Retrieved. from http://www-nrd.nhtsa.dot.gov/departments/nrd-13/driver-distraction/PDF/DriverInattention.pdf.
2. Strayer, D. L., Drews, F. A., & Crouch, D. J. (2006). A Comparison of the Cell Phone Driver and the Drunk Driver. Human Factors: The Journal of the Human Factors and Ergonomics Society, 48 (2), 381-391.
Donald A. Norman
Nielsen Norman Group and Northwestern University
About the Author:
Don Norman wears many hats, including cofounder of the Nielsen Norman Group, professor at Northwestern University, and author; his latest book is Emotional Design. Some of the material in this column is from his forthcoming book, The Design of Future Things (in preparation). He lives at www.jnd.org.
©2007 ACM 1072-5220/07/0100 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2007 ACM, Inc.