skip to main content
10.1145/2305484.2305540acmconferencesArticle/Chapter ViewAbstractPublication PageseicsConference Proceedingsconference-collections
short-paper

Differential formal analysis: evaluating safer 5-key number entry user interface designs

Published:25 June 2012Publication History

ABSTRACT

Differential Formal Analysis (DFA) is an evaluation method based on stochastic simulation for evaluating safety critical user interfaces with subtle programming differences. This method enforces rigorous science by requiring two or more researchers to perform the analysis which in itself, raises important issues for discussion. This method is demonstrated through a case study on 5-key number entry systems which are a safety critical interface found in various popular commercial medical infusion pumps. The results of the case study are an important contribution of this paper since it provides device manufacturers guidelines to update their device firmware to make their 5 key number entry UIs safer, as well as a method that could be applied to other designs.

References

  1. S. K. Card, A. Newell, and T. P. Moran. The Psychology of Human-Computer Interaction. L. Erlbaum Associates Inc., Hillsdale, NJ, USA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Curzon, R. Ruksšėnas, and A. Blandford. An approach to formal verification of human-computer interaction. Formal Aspects of Computing, 4(19):512--550, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  3. B. Dean, M. Schachter, C. Vincent, and N. Barber. Prescribing errors in hospital inpatients: their incidence and clinical significance. Quality and Safety in Health Care, 11(4):340--344, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  4. R. E. Fields. Analysis of erroneous actions in the design of critical systems. DPhil thesis, University of York, 2001.Google ScholarGoogle Scholar
  5. P. Masci, R. Ruksšėnas, P. Oladimeji, A. Cauchi, A. Gimblett, Y. Li, P. Curzon, and H. Thimbleby. On formalising interactive number entry on infusion pumps. In FMIS2011, the 4th Intl. Workshop on Formal Methods for Interactive Systems, 2011.Google ScholarGoogle Scholar
  6. P. Oladimeji, H. Thimbleby, and A. Cox. Number entry interfaces and their effects on error detection. In Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV, INTERACT'11, pages 178--185, Berlin, Heidelberg, 20 Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Thimbleby. Interaction walkthrough: Evaluation of safety critical interactive systems. In G. Doherty and A. Blandford, editors, Proceedings The XIII International Workshop on Design, Specification and Verification of Interactive Systems - DSVIS 2006, volume 4323 of Lecture Notes in Computer Science, pages 52--66. Springer Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Thimbleby, A. Cauchi, A. Gimblett, P. Masci, and P. Curzon. Evaluating safer 5-key number entry user interface designs using differential formal analysis. Technical report, Swansea University, 2012.Google ScholarGoogle Scholar
  9. K. J. Vicente, K. Kada-Bekhaled, G. Hillel, A. Cassano, and B. A. Orser. Programming errors contribute to death from patient-controlled analgesia: case report and estimate of probability. Canadian Journal of Anesthesia, 50(4):328--332, 2003.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Differential formal analysis: evaluating safer 5-key number entry user interface designs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      EICS '12: Proceedings of the 4th ACM SIGCHI symposium on Engineering interactive computing systems
      June 2012
      350 pages
      ISBN:9781450311687
      DOI:10.1145/2305484

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 June 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate73of299submissions,24%

      Upcoming Conference

      EICS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader