{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:53:53Z","timestamp":1767923633295,"version":"3.49.0"},"publisher-location":"Cham","reference-count":92,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030856229","type":"print"},{"value":"9783030856236","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85623-6_5","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T03:03:43Z","timestamp":1629860623000},"page":"39-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["POISE: A Framework for Designing Perfect Interactive Systems with and for Imperfect People"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5381-971X","authenticated-orcid":false,"given":"Philippe","family":"Palanque","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Accot, J., Zhai, S.: Refining Fitts\u2019 law models for bivariate pointing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2003), pp. 193\u2013200. Association for Computing Machinery, New York (2003). https:\/\/doi.org\/10.1145\/642611.642646","DOI":"10.1145\/642611.642646"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Albinsson, P.A., Zhai, S.: High precision touch screen interaction. In: Proceedings of ACM CHI Conference, pp. 105\u2013112 (2003)","DOI":"10.1145\/642611.642631"},{"key":"5_CR3","unstructured":"Android Material Design guidelines: https:\/\/material.io\/design\/guidelines-overview. Accessed 6 Jul 2021"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Kangasr\u00e4\u00e4si\u00f6, A., Athukorala, K., Howes, A., Corander, J., Kaski, S., Oulasvirta, A.: Inferring cognitive models from data using approximate Bayesian computation. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 1295\u20131306. Association for Computing Machinery, New York (2017).https:\/\/doi.org\/10.1145\/3025453.3025576","DOI":"10.1145\/3025453.3025576"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-3-030-29390-1_76","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"C Ardito","year":"2019","unstructured":"Ardito, C., Bernhaupt, R., Palanque, P., Sauer, S.: Handling security, usability, user experience and reliability in user-centered development processes. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11749, pp. 759\u2013762. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29390-1_76"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2542505","volume":"57","author":"PG Armour","year":"2014","unstructured":"Armour, P.G.: The business of software estimation is not evil. Commun. ACM 57(1), 42\u201343 (2014)","journal-title":"Commun. ACM"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","DOI":"10.1109\/TDSC.2004.2"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Beaudouin-Lafon, M.: Designing interaction, not interfaces. In: Proceedings of the Working Conference on Advanced Visual Interfaces (AVI 2004), pp. 15\u201322. Association for Computing Machinery, New York (2004). https:\/\/doi.org\/10.1145\/989863.989865","DOI":"10.1145\/989863.989865"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11555261_25","volume-title":"Human-Computer Interaction - INTERACT 2005","author":"A Beirekdar","year":"2005","unstructured":"Beirekdar, A., Keita, M., Noirhomme, M., Randolet, F., Vanderdonckt, J., Mariage, C.: Flexible reporting for automated usability and accessibility evaluation of web sites. In: Costabile, M.F., Patern\u00f2, F. (eds.) INTERACT 2005. LNCS, vol. 3585, pp. 281\u2013294. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11555261_25"},{"key":"5_CR10","unstructured":"Benson, B.: Cognitive biases cheat sheet (2016). https:\/\/medium.com\/better-humans\/cognitive-bias-cheat-sheet-55a472476b18. Accessed July 2021"},{"key":"5_CR11","series-title":"Human-Computer Interaction Series","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-1-84628-941-5_5","volume-title":"Maturing Usability","author":"R Bernhaupt","year":"2008","unstructured":"Bernhaupt, R., Navarre, D., Palanque, P., Winckler, M.: Model-based evaluation: a new way to support usability evaluation of multimodal interactive applications. In: Law, E.-C., Hvannberg, E.T., Cockton, G. (eds.) Maturing Usability. HIS, pp. 96\u2013119. Springer, London (2008). https:\/\/doi.org\/10.1007\/978-1-84628-941-5_5"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-319-44902-9_5","volume-title":"Human-Centered and Error-Resilient Systems Development","author":"R Bernhaupt","year":"2016","unstructured":"Bernhaupt, R., Palanque, P., Manciet, F., Martinie, C.: User-test results injection into task-based design process for the assessment and improvement of both usability and user experience. In: Bogdan, C., et al. (eds.) HCSE\/HESSD -2016. LNCS, vol. 9856, pp. 56\u201372. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44902-9_5"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Berry, R.: Common user access \u2013 a consistent and usable human-computer interface for the SAA environments. IBM Syst. J. 27(3) (1988)","DOI":"10.1147\/sj.273.0281"},{"key":"5_CR14","volume-title":"Cost-Justifying Usability: An Update for the Internet Age","author":"RG Bias","year":"2005","unstructured":"Bias, R.G., Mayhew, D.: Cost-Justifying Usability: An Update for the Internet Age. Morgan Kaufmann Publishers Inc., San Francisco (2005)"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Boehm, B., Sullivan, K.: Software economics: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering (ICSE 2000), pp. 319\u2013343 (2000). Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/336512.336584","DOI":"10.1145\/336512.336584"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/978-3-030-29381-9_42","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"E Bouzekri","year":"2019","unstructured":"Bouzekri, E., Canny, A., Martinie, C., Palanque, P., Gris, C.: Deep system knowledge required: revisiting UCD contribution in the design of complex command and control systems. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11746, pp. 699\u2013720. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29381-9_42"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Bouzekri, E., Martinie, C., Palanque, P., Atwood, K., Gris, C.: Should I add recommendations to my warning system? The RCRAFT framework can answer this and other questions about supporting the assessment of automation designs. In: IFIP TC 13 INTERACT,Conference, LNCS. Springer (2021)","DOI":"10.1007\/978-3-030-85610-6_24"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1049\/sej.1993.0025","volume":"8","author":"J Bowen","year":"1993","unstructured":"Bowen, J., Stavridou, V.: Formal methods, safety-critical systems and standards. Softw. Eng. J. 8(4), 189\u2013209 (1993)","journal-title":"Softw. Eng. J."},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Bowen, J., Reeves, S.: Generating obligations, assertions and tests from UI models. Proc. ACM Hum. Comput. Interact. 1, 18 (2017). https:\/\/doi.org\/10.1145\/3095807. EICS, Article 5","DOI":"10.1145\/3095807"},{"key":"5_CR20","volume-title":"Sketching User Experiences: Getting the Design Right and the Right Design","author":"B Buxton","year":"2007","unstructured":"Buxton, B.: Sketching User Experiences: Getting the Design Right and the Right Design. Morgan Kaufmann Publishers Inc., San Francisco (2007)"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Canny, A., Martinie, C., Navarre, D., Palanque, P., Barboni, E., Gris, C.: Engineering model-based software testing of WIMP interactive applications: a process based on formal models and the SQUAMATA tool. Proc. ACM Hum.-Comput. Interact. 5, 30 (2021). https:\/\/doi.org\/10.1145\/3461729. EICS, Article 207","DOI":"10.1145\/3461729"},{"key":"5_CR22","unstructured":"Card, S., Moran, T., Newell, A.: The Psychology of Human-Computer Interaction, pp. I\u2013XIII, 1\u2013469. Erlbaum (1983). ISBN: 0898598591"},{"key":"5_CR23","unstructured":"Card, S.K, Moran, T.P, Newell, A.: The model human processor: an engineering model of human performance. In: Handbook of Perception and Human Performance, Cognitive Processes and Performance, vol. 2, pp. 1\u201335 (1986)"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Cockburn, A., et al.: Turbulent touch: touchscreen input for cockpit flight displays. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 6742\u20136753. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3025453.3025584","DOI":"10.1145\/3025453.3025584"},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Cockburn, A., et al.: Design and evaluation of braced touch for touchscreen input stabilization. Int. J. Hum.-Comput. Stud. 122, 21\u201337 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2018.08.005. ISSN 1071-5819","DOI":"10.1016\/j.ijhcs.2018.08.005"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Cockburn, A., Quinn, P., Gutwin, C.: Examining the peak-end effects of subjective experience. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI 2015), pp. 357\u2013366. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2702123.2702139","DOI":"10.1145\/2702123.2702139"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Creissac Campos, J., Fayollas, C., Harrison, M.D., Martinie, C., Masci, P., Palanque, P.: Supporting the analysis of safety critical user interfaces: an exploration of three formal tools. ACM Trans. Comput.-Hum. Interact. 27(5), 48 (2020). https:\/\/doi.org\/10.1145\/3404199. Article 35","DOI":"10.1145\/3404199"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Cronel, M., Dumas, B., Palanque, P., Canny, A.: MIODMIT: a generic architecture for dynamic multimodal interactive systems. In: Bogdan, C., Kuusinen, K., L\u00e1rusd\u00f3ttir, M., Palanque, P., Winckler, M. (eds.) Human-Centered Software Engineering. HCSE 2018. Lecture Notes in Computer Science, vol. 11262. Springer, Cham (2019).https:\/\/doi.org\/10.1007\/978-3-030-05909-5","DOI":"10.1007\/978-3-030-05909-5"},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Diamantaris, M., Marcantoni, F., Ioannidis, S., Polakis, J.: The seven deadly sins of the HTML5 WebAPI: a large-scale study on the risks of mobile sensor-based attacks. ACM Trans. Priv. Secur. 23(4), 31 (2020). https:\/\/doi.org\/10.1145\/3403947. Article 19","DOI":"10.1145\/3403947"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Diaper, D., Stanton, N.: The Handbook of Task Analysis for Human-Computer Interaction. Lawrence Erlbaum Associates (2003). ISBN 0-8058-4432-5","DOI":"10.1201\/b12470"},{"key":"5_CR31","unstructured":"Dix, A.: Abstract, generic models of interactive systems. In: BCS HCI Conference, pp. 63\u201377 (1988)"},{"key":"5_CR32","unstructured":"DO-178C\/ED-12C: Software Considerations in Airborne Systems and Equipment Certification, published by RTCA and EUROCAE (2012)"},{"key":"5_CR33","unstructured":"DO-333 Formal Methods Supplement to DO-178C and DO-278A, published by RTCA and EUROCAE, 13 Dec 2011 (2011)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Eisenberg, N., Miller, P.A.: The relation of empathy to prosocial and related behaviors. Psychol. Bull. 101(1), 91 (1987)","DOI":"10.1037\/\/0033-2909.101.1.91"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-22723-8_16","volume-title":"Human-Computer Interaction \u2013 INTERACT 2015","author":"R Fahssi","year":"2015","unstructured":"Fahssi, R., Martinie, C., Palanque, P.: Enhanced task modelling for systematic identification and explicit representation of human errors. In: Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P., Winckler, M. (eds.) INTERACT 2015. LNCS, vol. 9299, pp. 192\u2013212. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22723-8_16"},{"key":"5_CR36","doi-asserted-by":"publisher","unstructured":"Fayollas, C., Fabre, J.C., Palanque, P., Cronel, M., Navarre, D., Deleris, Y.: A software-implemented fault-tolerance approach for control and display systems in avionics. In: 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing, pp. 21\u201330 (2014). https:\/\/doi.org\/10.1109\/PRDC.2014.11","DOI":"10.1109\/PRDC.2014.11"},{"key":"5_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-92081-8_9","volume-title":"Global Thoughts, Local Designs","author":"C Fayollas","year":"2018","unstructured":"Fayollas, C., Martinie, C., Palanque, P., Ait-Ameur, Y.: QBP notation for explicit representation of properties, their refinement and their potential conflicts: application to interactive systems. In: Clemmensen, T., Rajamanickam, V., Dannenmann, P., Petrie, H., Winckler, M. (eds.) INTERACT 2017. LNCS, vol. 10774, pp. 91\u2013105. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92081-8_9"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Feiler, P.H., Gluch, D.P., Hudak, J.J.: The Architecture Analysis & Design Language (AADL): An Introduction (No. CMU\/SEI-2006-TN-011). CMU Software Engineering Inst (2006)","DOI":"10.21236\/ADA455842"},{"key":"5_CR39","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1037\/h0055392","volume":"47","author":"PM Fitt","year":"1954","unstructured":"Fitt, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. J. Exp. Psychol. 47, 381\u2013391 (1954)","journal-title":"J. Exp. Psychol."},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10111-011-0191-6","volume":"14","author":"F Flemisch","year":"2012","unstructured":"Flemisch, F., et al.: Towards a dynamic balance between humans and automation: authority, ability, responsibility and control in shared and cooperative control situations. Cogn. Tech. Work 14, 3\u201318 (2012). https:\/\/doi.org\/10.1007\/s10111-011-0191-6","journal-title":"Cogn. Tech. Work"},{"issue":"3","key":"5_CR41","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/3166.3170","volume":"28","author":"ID Gould","year":"1985","unstructured":"Gould, I.D., Lewis, C.: Designing for usability: key principles and what designers think. Commun. ACM 28(3), 300\u2013311 (1985)","journal-title":"Commun. ACM"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"Hamon, A., Palanque, P., Silva, J.-L., Deleris, Y., Barboni, E.: Formal description of multi-touch interactions. In: Proceedings of the 5th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), pp. 207\u2013216. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2494603.2480311","DOI":"10.1145\/2494603.2480311"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Hassenzahl, M., Platz, A., Burmester, M., Lehner, K.: Hedonic and ergonomic quality aspects determine a software\u2019s appeal. In: ACM CHI Conference 2000, pp. 201\u2013208. ACM DL (2000)","DOI":"10.1145\/332040.332432"},{"key":"5_CR44","unstructured":"Hecht, H., Fiorentino, E.: Reliability assessment of spacecraft electronics. In: Annual Reliability and Maintainability Symposium, pp. 341\u2013346. IEEE (1987)"},{"key":"5_CR45","unstructured":"Hollnagel, E.: How resilient is your organisation? An introduction to the resilience analysis grid (RAG). In: Sustainable Transformation: Building a Resilient Organization, Toronto, Canada (2010)"},{"key":"5_CR46","unstructured":"International Standard Organization: \u201cISO 9241\u201311.\u201d Ergonomic requirements for office work with visual display terminals (VDT) \u2013 Part 11 Guidance on Usability (1996)"},{"key":"5_CR47","unstructured":"ISO 9241-210: Ergonomics of human-system interaction \u2013 Part 210: Human-centred design for interactive systems, Geneva"},{"key":"5_CR48","volume-title":"Human-computer Interaction: psychology, task analysis and software engineering","author":"P Johnson","year":"1992","unstructured":"Johnson, P.: Human-computer Interaction: psychology, task analysis and software engineering. McGraw Hill, Maidenhead (1992)"},{"key":"5_CR49","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O Kupferman","year":"2001","unstructured":"Kupferman, O., Vardi, M.Y.: Model checking of safety properties. Formal Methods Syst. Des. 19, 291\u2013314 (2001). https:\/\/doi.org\/10.1023\/A:1011254632723","journal-title":"Formal Methods Syst. Des."},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Lai-Chong, E., Roto, V., Hassenzahl, M., Vermeeren, A., Kort. J.: Understanding, scoping and defining user experience: a survey approach. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pp. 719\u2013728. ACM, New York (2009)","DOI":"10.1145\/1518701.1518813"},{"key":"5_CR51","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TSE.1977.229904","volume":"2","author":"L Lamport","year":"1977","unstructured":"Lamport, L.: Proving the correctness of multiprocess programs. IEEE Trans. Softw. Eng. 2, 125\u2013143 (1977)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR52","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/185403.185412","volume":"1994","author":"C Landwehr","year":"1994","unstructured":"Landwehr, C., Bull, A., McDermott, J., Choi, W.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26(3). Sept. 1994, 211\u2013254 (1994). https:\/\/doi.org\/10.1145\/185403.185412","journal-title":"Sept."},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Laprie, J.-C. et al.: Definition and analysis of hardware and software fault-tolerant architectures. IEEE Comput. 23(7), 39\u201351 (1990)","DOI":"10.1109\/2.56851"},{"key":"5_CR54","volume-title":"Freakonomics: A Rogue Economist Explores the Hidden Side of Everything","author":"SD Levitt","year":"2005","unstructured":"Levitt, S.D., Dubner, S.J.: Freakonomics: A Rogue Economist Explores the Hidden Side of Everything. William Morrow, New York (2005)"},{"key":"5_CR55","first-page":"377","volume":"1990","author":"Z Manna","year":"1990","unstructured":"Manna, Z., Pnueli, A.: A hierarchy of temporal properties. ACM Symp. Principles Distrib. Comput. 1990, 377\u2013410 (1990)","journal-title":"ACM Symp. Principles Distrib. Comput."},{"key":"5_CR56","doi-asserted-by":"publisher","unstructured":"Martinie, C., Navarre, D., Palanque, P., Fayollas, C.: A generic tool-supported framework for coupling task models and interactive applications. In: Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015), pp. 244\u2013253. ACM (2015). https:\/\/doi.org\/10.1145\/2774225.2774845","DOI":"10.1145\/2774225.2774845"},{"key":"5_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-34347-6_5","volume-title":"Human-Centered Software Engineering","author":"C Martinie","year":"2012","unstructured":"Martinie, C., Palanque, P., Navarre, D., Barboni, E.: A development process for usable large scale interactive critical systems: application to satellite ground segments. In: Winckler, M., Forbrig, P., Bernhaupt, R. (eds.) HCSE 2012. LNCS, vol. 7623, pp. 72\u201393. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34347-6_5"},{"key":"5_CR58","doi-asserted-by":"publisher","unstructured":"Mustafa, M., Lindemann, L., Magnor, M.: EEG analysis of implicit human visual perception. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 513\u2013516. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2207676.2207746","DOI":"10.1145\/2207676.2207746"},{"key":"5_CR59","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/0169-8141(89)90038-3","volume":"4","author":"N Meshkati","year":"1989","unstructured":"Meshkati, N.: Technology transfer to developing countries: a tripartite micro- and macro ergonomic analysis of human-organization-technology interfaces. Int. J. Ind. Ergon. 4, 101\u2013115 (1989)","journal-title":"Int. J. Ind. Ergon."},{"key":"5_CR60","doi-asserted-by":"publisher","unstructured":"Navabpour, S., Bonakdarpour, B., Fischmeister, S.: Software debugging and testing using the abstract diagnosis theory. In: Proceedings of the 2011 SIGPLAN\/SIGBED conference on Languages, compilers and tools for embedded systems (LCTES 2011), pp. 111\u2013120. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/1967677.1967693","DOI":"10.1145\/1967677.1967693"},{"key":"5_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/3-540-44675-3_7","volume-title":"Interactive Systems Design, Specification, and Verification","author":"D Navarre","year":"2001","unstructured":"Navarre, D., Palanque, P., Bastide, R., Sy, O.: Structuring interactive systems specifications for executability and prototypability. In: Palanque, P., Patern\u00f2, F. (eds.) DSV-IS 2000. LNCS, vol. 1946, pp. 97\u2013119. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44675-3_7"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Nicolescu, B., Peronnard, P., Velazco, R., Savaria, Y.: Efficiency of transient bit-flips detection by software means: a complete study. In: Proceedings of the 18th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT 2003), pp. 377\u2013384. IEEE Computer Society (2003)","DOI":"10.1109\/DFTVS.2003.1250134"},{"key":"5_CR63","volume-title":"Usability Engineering","author":"J Nielsen","year":"1994","unstructured":"Nielsen, J.: Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco (1994)"},{"key":"5_CR64","unstructured":"Olwal, A., Feiner, S.: Rubbing the fisheye: precise touch-screen interaction with gestures and fisheye views. In: Conference Supplement of UIST 2003, pp. 83\u201384 (2003)"},{"key":"5_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-030-26601-1_4","volume-title":"Computer Safety, Reliability, and Security","author":"P Palanque","year":"2019","unstructured":"Palanque, P., Cockburn, A., D\u00e9sert-Legendre, L., Gutwin, C., Deleris, Y.: Brace touch: a dependable, turbulence-tolerant, multi-touch interaction technique for interactive cockpits. In: Romanovsky, A., Troubitsyna, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11698, pp. 53\u201368. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26601-1_4"},{"key":"5_CR66","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/978-3-030-54549-9_29","volume-title":"Computer Safety, Reliability, and Security","author":"P Palanque","year":"2020","unstructured":"Palanque, P., Cockburn, A., Gutwin, C.: A classification of faults covering the human-computer interaction loop. In: Casimiro, A., Ortmeier, F., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12234, pp. 434\u2013448. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54549-9_29"},{"key":"5_CR67","unstructured":"Palanque, P., Farenc, C., Bastide, R.: Embedding ergonomic rules as generic requirements in a formal development process of interactive software. In: Proceedings of IFIP TC 13 Conference on Human-Computer Interaction INTERACT 1999, Edinburg, Scotland, 1\u20134 Sept 1999 (1999)"},{"key":"5_CR68","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/2000119.2000133","volume":"2011","author":"M Pirker","year":"2011","unstructured":"Pirker, M., Bernhaupt, R.: Measuring user experience in the living room: results from an ethnographically oriented field study indicating major evaluation factors. EuroITV 2011, 79\u201382 (2011)","journal-title":"EuroITV"},{"key":"5_CR69","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: Applications of temporal logic to the specification and verification of reactive systems: a survey of current trends. In: de Bakker, J.W., de Roever, W.P., Rozenberg, G. (eds.) Current Trends in Concurrency. Lecture Notes in Computer Science, vol. 224. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/BFb0027047","DOI":"10.1007\/BFb0027047"},{"key":"5_CR70","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th IEEE Symposium on the Foundations of Computer Science, pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"issue":"3","key":"5_CR71","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s101110200016","volume":"4","author":"P Polet","year":"2002","unstructured":"Polet, P., Vanderhaegen, F., Wieringa, P.: Theory of safety related violation of system barriers. Cogn. Technol. Work 4(3), 171\u2013179 (2002)","journal-title":"Cogn. Technol. Work"},{"key":"5_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-68059-0_48","volume-title":"Human-Computer Interaction \u2013 INTERACT 2017","author":"F Raber","year":"2017","unstructured":"Raber, F., Kosmalla, F., Krueger, A.: Fine-grained privacy setting prediction using a privacy attitude questionnaire and machine learning. In: Bernhaupt, R., Dalvi, G., Joshi, A., K. Balkrishan, D., O\u2019Neill, J., Winckler, M. (eds.) INTERACT 2017. LNCS, vol. 10516, pp. 445\u2013449. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68059-0_48"},{"key":"5_CR73","unstructured":"Reason, J.: Managing the Risks of Organizational Accidents. Ashgate Publishing limited. (1997)"},{"key":"5_CR74","volume-title":"The Human Contribution: Unsafe Acts, Accidents and Heroic Recoveries","author":"J Reason","year":"2008","unstructured":"Reason, J.: The Human Contribution: Unsafe Acts, Accidents and Heroic Recoveries. Taylor and Francis, Routeledge (2008)"},{"key":"5_CR75","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367","volume-title":"Human Error","author":"J Reason","year":"1990","unstructured":"Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)"},{"key":"5_CR76","doi-asserted-by":"publisher","unstructured":"Saint-Lot, J., Imbert, J.-P., Dehais, F.: Red alert: a cognitive countermeasure to mitigate attentional tunneling. In: Proceedings of CHI 2020: CHI Conference on Human Factors in Computing Systems (CHI 2020), 25\u201330 Apr 2020, Honolulu, HI, USA. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376709","DOI":"10.1145\/3313831.3376709"},{"key":"5_CR77","doi-asserted-by":"crossref","unstructured":"Schroeder, B., Pinheiro, E., Weber, W.-D.: DRAM errors in the wild: a large-scale field study. In: ACM SIGMETRICS, Seattle, WA, pp. 193\u2013204 (2009)","DOI":"10.1145\/1555349.1555372"},{"key":"5_CR78","doi-asserted-by":"publisher","unstructured":"Shah, P., Berges, M., Hubwieser, P.: Qualitative content analysis of programming errors. In: Proceedings of the 5th International Conference on Information and Education Technology (ICIET 2017), pp. 161\u2013166. ACM (2017). https:\/\/doi.org\/10.1145\/3029387.3029399","DOI":"10.1145\/3029387.3029399"},{"key":"5_CR79","doi-asserted-by":"crossref","unstructured":"Sistla, A.P.: On characterization of safety and liveness properties in temporal logic. In: Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, pp. 39\u201348, ACM (1985)","DOI":"10.1145\/323596.323600"},{"issue":"6","key":"5_CR80","first-page":"751","volume":"61","author":"W Soukoreff","year":"2004","unstructured":"Soukoreff, W., MacKenzie, S.: Towards a standard for pointing device evaluation, perspectives on 27 years of Fitts\u2019 law research in HCI. IJHCS 61(6), 751\u2013789 (2004)","journal-title":"IJHCS"},{"key":"5_CR81","doi-asserted-by":"publisher","unstructured":"Tankeu Choitat, A, Fabre, J.-C., Palanque, P., Navarre, D., Deleris, Y.: Self-checking widgets for interactive cockpits. In: Proceedings of the 13th European Workshop on Dependable Computing (EWDC 2011), pp. 43\u201348. Association for Computing Machinery, New York (2011). https:\/\/doi.org\/10.1145\/1978582.1978592","DOI":"10.1145\/1978582.1978592"},{"key":"5_CR82","doi-asserted-by":"publisher","unstructured":"Tankeu-Choitat, A., Navarre, D., Palanque, P., Deleris, Y., Fabre, J.-C., Fayollas, C.: Self-checking components for dependable interactive cockpits using formal description techniques. In: 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, pp. 164\u2013173 (2011). https:\/\/doi.org\/10.1109\/PRDC.2011.28","DOI":"10.1109\/PRDC.2011.28"},{"key":"5_CR83","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-03655-2_56","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"MH ter Beek","year":"2009","unstructured":"ter Beek, M.H., Faconti, G.P., Massink, M., Palanque, P.A., Winckler, M.: Resilience of interaction techniques to interrupts: a formal model-based approach . In: Gross, T., et al. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 494\u2013509. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03655-2_56"},{"key":"5_CR84","unstructured":"The cognitive biases codex: 175 cognitive biases: https:\/\/medium.com\/better-humans\/cognitive-bias-cheat-sheet-55a472476b18. Accessed 8 Jul 2021"},{"key":"5_CR85","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-642-23768-3_78","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"V Thoma","year":"2011","unstructured":"Thoma, V., White, E.P.: In two minds about usability? Rationality and intuition in usability evaluations. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6949, pp. 544\u2013547. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23768-3_78"},{"key":"5_CR86","doi-asserted-by":"crossref","unstructured":"Traverse, P., Lacaze, I., Souyris, J.: Airbus fly-by-wire: a total approach to dependability. In: Proceedings of WCC, pp. 191\u2013212 (2004)","DOI":"10.1007\/978-1-4020-8157-6_18"},{"key":"5_CR87","doi-asserted-by":"publisher","unstructured":"Trewin, S., et al.: Age-specific predictive models of human performance. In: CHI '12 Extended Abstracts on Human Factors in Computing Systems, pp. 2267\u20132272. ACM (2012). https:\/\/doi.org\/10.1145\/2212776.2223787","DOI":"10.1145\/2212776.2223787"},{"key":"5_CR88","unstructured":"Turk, D., France, R., Rumpe, B. Limitations of agile software processes. In: Proceedings of International Conference on eXtreme Programming and Agile Processes in Software Engineering Italy (2002)"},{"key":"5_CR89","doi-asserted-by":"publisher","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. 22(5), 297\u2013312 (2012). https:\/\/doi.org\/10.1002\/stvr.456","DOI":"10.1002\/stvr.456"},{"issue":"2","key":"5_CR90","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/S0953-5438(99)00019-3","volume":"12","author":"J Vanderdonckt","year":"1999","unstructured":"Vanderdonckt, J.: Development milestones towards a tool for working with guidelines. Interact. Comput. 12(2), 81\u2013118 (1999)","journal-title":"Interact. Comput."},{"key":"5_CR91","unstructured":"Vicente, K.: Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work.Lawrence Erlbaum Associates (1999)"},{"key":"5_CR92","doi-asserted-by":"publisher","unstructured":"Wahl, N.J.: Responsibility for unreliable software. In: Proceedings of the Conference on Ethics in the Computer Age (ECA 1994), pp. 175\u2013177. Association for Computing Machinery, New York (1994). https:\/\/doi.org\/10.1145\/199544.199611","DOI":"10.1145\/199544.199611"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85623-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:03:00Z","timestamp":1756072980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85623-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856229","9783030856236"],"references-count":92,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85623-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}