how much is too much? - stc india...• the missions, features, capabilities, and functions of the...
TRANSCRIPT
How Much is too Much?A Presentation on Cognitive Load Theory
Seema Gaurav,TIBCO Software
© Copyright 2000-2015 TIBCO Software Inc.
Agenda
Information Overload
Impact of Information Overload
How Do We Learn?
Understanding Cognitive Load Theory
Preventing Cognitive Overload in Documents2
3© Copyright 2000-2015 TIBCO Software Inc.
Information Overload
4
Impact of Information Overload
© Copyright 2000-2015 TIBCO Software Inc.
Automation
Analytics
Cloud
Disrupts learning
Diverts attention
Loss of interest
Prone to errors
Poor decision making
5
Why Does The Mind Get Overloaded?
© Copyright 2000-2015 TIBCO Software Inc.
Working Memory
© Copyright 2000-2015 TIBCO Software Inc.
Exercise
7
What is Working Memory?
© Copyright 2000-2015 TIBCO Software Inc.
• Working Memory is‘memory-in-action.’
• It is the ability totemporarily hold andprocess information forcognitive tasks neededon a daily basis.
8
Working Memory
© Copyright 2000-2015 TIBCO Software Inc.
Allows us to:• Store immediate
experiences.• Retrieve prior knowledge
stored in the long termmemory.
• Process informationbased on the currentgoal.
9
Long-term Memory
© Copyright 2000-2015 TIBCO Software Inc.
As the term suggests, it is a memorymodel in which data can be retained for
a longer period of time.
10
How Do We Learn?
© Copyright 2000-2015 TIBCO Software Inc.
• We learn by building schemas - memory structures that permitus to treat a large number of information elements as one.
11
Novice vs. Expert Users
© Copyright 2000-2015 TIBCO Software Inc.
12
What is Cognitive Load?
© Copyright 2000-2015 TIBCO Software Inc.
Is the amount of itemsthat can be held in theworking memory at anytime.
13
What is Cognitive Limit?
© Copyright 2000-2015 TIBCO Software Inc.
• Is the maximum limit of chunks of
information the working memory
can process at any one time.
• Working Memory can only hold
7 +/-2 items at a time.
15-20 seconds7
Amount ofInformation
Cognitive Limit
items
Length of time
14
An Ideal Situation…
© Copyright 2000-2015 TIBCO Software Inc.
Cognitive Load < Cognitive Limit of theWorking Memory
< Limit of theWorkingMemory
Limit of theWorkingMemory
15© Copyright 2000-2015 TIBCO Software Inc.
Cognitive Load Theory
Is a method of increasing efficiency andease of learning by developinginstructions that creates a cognitive loadthat is less than the cognitive limit of theworking memory.
16
Types of Cognitive Load
© Copyright 2000-2015 TIBCO Software Inc.
17
Extraneous Load
© Copyright 2000-2015 TIBCO Software Inc.
1+1=?
18© Copyright 2000-2015 TIBCO Software Inc.
Intrinsic Load
Complexityassociated withlearning the task.
In the example,1+1=?, the usermust be familiarwith the digits, the‘+’ operator andthe ‘=’ operator.
In Technical Writing,for example, “Add theCLASSPATH to theenvironmentvariables.”
19
Germane Load
© Copyright 2000-2015 TIBCO Software Inc.
Is the relevant or effective load.
Is the effort needed to convertincoming information to schemasand transfer them to long-term
memory.
In the example, “Add theCLASSPATH to the environment
variables.” I understandCLASSPATH, environment variables,
and how to set it.
20
What’s an Ideal Cognitive Load?
© Copyright 2000-2015 TIBCO Software Inc.
Intrinsic Load + Extraneous Load + Germane Load
Manage Minimize Maximize
Cognitive Load Exercise
© Copyright 2000-2015 TIBCO Software Inc.
Exercise
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
BeachIt’s a pleasant sunny day in Goa, andthe beach looks beautiful.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
ManThere’s a man sitting by the shore,soaking the sun and digging his feetin the sand.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
NewspaperAs he is lost in his thoughts, anewspaper cut-out drifts down byhis feet and catches his attention.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
PictureHis eyes stop at the picture of aconvict who seems to have escapedfrom prison.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
ScarfThe man in the picture lookscunning and is wearing a red scarfaround his neck.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
ShoesThe man loses interest, chucks thepaper, wears his shoes, and walksaway.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
JeepJust then, two cops come along anddrag him to their jeep.
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
MirrorThe man looks at the side-viewmirror and adjusts his red scarf.
30
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
How many words do you recollect now?
Preventing Cognitive Overload in Our Documents
31
32
Preventing Cognitive Overload while Planning
© Copyright 2000-2015 TIBCO Software Inc.
Start at the informationgathering stage of the product
Is everything inthe FunctionalSpec relevant?
Should my userknow all of it?
Should everythingtold by the SME
roll into mydocument?
33
Identify Your Target Audience
© Copyright 2000-2015 TIBCO Software Inc.
34
Preventing Cognitive Overload while Writing
© Copyright 2000-2015 TIBCO Software Inc.
Start byidentifying thecontent for the
targetaudience.
• Build on the skills they have.• While introducing new concepts, write in such
a way that they can relate to the concept.• Example:
• Target Audience: DBA• A tuple in FooSpaces is similar to a row in a
table.• Target Audience: Programmers
• A tuple in FooSpaces is similar to aninstance of a class.
35
Preventing Cognitive Overload while Writing
© Copyright 2000-2015 TIBCO Software Inc.
Introduce the components first beforediscussing how they interact with each other.
Logically chunk content into units that theusers can understand.
Convey one idea per topic.
36
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
PNGXMLZIPDOCCA
37
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
PN GXM LZI PDO CCA
38
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
PNG XML ZIP DOC CA
39
Exercise
© Copyright 2000-2015 TIBCO Software Inc.
Which one was easier?
40
Schema Formation
© Copyright 2000-2015 TIBCO Software Inc.
PN GXM LZI PDO CCA
PNG XML ZIP DOC CA
Total chunks: 5 + new schema formation
Total chunks: 5
PNGXMLZIPDOCCATotal chunks: 14
41
Chunking: Bad Example
© Copyright 2000-2015 TIBCO Software Inc.
Fetching Records from a Table Using JDBC
Before beginning, ensure that the database is up and running. You must first include thepackages containing the JDBC classes needed for database programming. Most often,using import java.sql.* will suffice. You must then initialize a driver so you can open acommunications channel with the database. Open a connection using theDriverManager.getConnection() method to create a Connection object, which representsa physical connection with a database server. Using an object of type Statement, buildand submit an SQL statement to select records from a table. Once SQL query isexecuted, you can fetch records from the table. When you are done, explicitly close alldatabase resources instead of relying on the garbage collection provided by JVM.
42
Chunking: Good Example
© Copyright 2000-2015 TIBCO Software Inc.
Fetching Records from a Table Using JDBCPrerequisites: Ensure that the database is up and running.
Importing the packages
Include the packages containing the JDBC classes needed for database programming. Most often, usingimport java.sql.* will suffice.Registering the JDBC driver
Initialize a driver so you can open a communications channel with the database.Opening a connection
Use the DriverManager.getConnection() method to create a Connection object, which represents a physicalconnection with a database server.
43
Chunking: Good Example
© Copyright 2000-2015 TIBCO Software Inc.
Fetching Records from a Table using JDBC (Continued)
Executing a query
Use an object of type Statement for building and submitting an SQL statement to fetch records from a table.Extracting Data
Use the object of type ResultSet to browse through the records fetched from the table.Cleaning up the environment
When the records are fetched, explicitly close all database resources instead of relying on the garbagecollection provided by JVM.
44
Preventing Cognitive Overload while Writing
© Copyright 2000-2015 TIBCO Software Inc.
Keep it simple to reduce extraneous load
Scintillate, Scintillate, asteroid minutia
Twinkle, twinkle, little star
45
Keep it Simple
© Copyright 2000-2015 TIBCO Software Inc.
Bad Example:Socket opened on each connection retry to remote site that was no longerreachable or had already shutdown was not properly released. This hadcaused the operation system to exhaust the maximum limit of open filedescriptors accumulated over a period of time and the primary site can nolonger able to reconnect to the remote site when it became availableagain.
Good Example:All retry attempts to connect to a remote site that was not reachableresulted in a socket leak.
46
Preventing Cognitive Overload while Writing
© Copyright 2000-2015 TIBCO Software Inc.
Use the rule of‘seven plus orminus two’ forlists and steps.
Use substepsfor a lengthyprocedure.
Use subheadersto categorize
them intosmaller chunks.
47
Lists: Bad Example
© Copyright 2000-2015 TIBCO Software Inc.
The following bulleted list has too many items presented at once:
System concept descriptions provide:• The missions, features, capabilities and functions of the system• Major system components and interactions• Operational environment including manual procedures required• Operational modes such as production, backup and maintenance• Interfaces with other systems• Required performance characteristics such as response time, throughput and data volumes• Quality attributes such as availability, reliability and usability• Other considerations such as security, audit, safety and failure modes in emergency situations• Deployment considerations such as acquisition of business data to support the system including data
cleansing and loading• The classes of users that will interact with the system• Requirements for support of the system such as maintenance organization and help desk.
48© Copyright 2000-2015 TIBCO Software Inc.
Lists: Good Example
The chunking principle requires you to classify the items into groups to reduce the information overload as follows:
System concept descriptions provide:
Functional requirements• The missions, features, capabilities, and functions of the system• Major system components and interactions• Operational environment including manual procedures required• Operational modes such as production, backup and maintenance• Interfaces with other systems
Non-functional requirements• Required performance characteristics such as response time, throughput and data volumes• Quality attributes such as availability, reliability and usability• Other considerations such as security, audit, safety and failure modes in emergency situations
Deployment and Operational Requirements• Deployment considerations such as acquisition of business data to support the system including data cleansing and loading• The classes of users that will interact with the system• Requirements for support of the system such as maintenance organization and help desk.
49
Use Illustrations
© Copyright 2000-2015 TIBCO Software Inc.
Diagrams lead to greatestefficiency for spatial tasks ofmedium to high complexity.
Using explanatory calloutsalong with the diagramspromote learning.
Keep the accompanying textand the diagram together.
50
Example of Using an Illustration
© Copyright 2000-2015 TIBCO Software Inc.
With shared-nothing persistence,each node that joins a space as aseeder maintains a copy of thespace data on disk. Each node thatjoins as a seeder writes its data tothe disk and reads the data whenneeded for recovery.
51
Use Infographics
© Copyright 2000-2015 TIBCO Software Inc.
52
Use Videos
© Copyright 2000-2015 TIBCO Software Inc.
53
Avoid Redundancy
© Copyright 2000-2015 TIBCO Software Inc.
Do not repeat the explanation of the same content twice.
Use cross-references to guide users to the relevantsections.
Do not use different terms to mean the same thing.
54
Avoid Redundancy in Sentence Construction
© Copyright 2000-2015 TIBCO Software Inc.
Bad Example Good Example
The purpose of the … systemis to provide…
The … system provides…
This document has beenprepared to outline the … Plan
This document outlines the …Plan
in the form of as
in the event of if
In order to to
exhibits the ability to can
55
Use a Task-based Approach
© Copyright 2000-2015 TIBCO Software Inc.
Bad Example for a Heading Good Example for a Heading
Using a Put Operation Inserting a Tuple into a Space
Using Input Maps Importing Metadata in MDM
Setting a Private Key Encrypting Data
56
Avoid Noun Clusters
© Copyright 2000-2015 TIBCO Software Inc.
Bad Example Good Example
The request acknowledgementexchange data bit is set inHIMEM.
The data bit to exchange requestacknowledgments is set inHIMEM.
The media access controlprotocols are available in threevariants.
The protocols to control mediaaccess are available in threevariants.
This release offers cloud servicedeployment workflows.
This release offers workflows todeploy cloud service.
57
Go The Extra Mile
© Copyright 2000-2015 TIBCO Software Inc.
Provide samples. Provide cheatsheets.
Providesimulations forcomplex tasks.
Provide job aids.For example, achart of default
ports.
58
Tips to Improve Working Memory
© Copyright 2000-2015 TIBCO Software Inc.
Learning aids
• Repeat tasks till you automate them in yourmind.
• Use mnemonics to aid learning. Forexample, VIBGYOR to remember the colorsof the rainbow.
• Learn by association.• Learn by visualisation.
Use braintraining
• https://www.lumosity.com/• http://www.brainhq.com/• Doodle
59
Tips to Improve Working Memory
© Copyright 2000-2015 TIBCO Software Inc.
Playboardgames
• Scrabble• Uno
Exercise• Aerobics• Meditation• Sleep
60
Tips to Improve Working Memory
© Copyright 2000-2015 TIBCO Software Inc.
Learn anew skill
• A new language• A new musical instrument
Eat right
• Greens such as, spinach,lettuce, broccoli, kale
• Fruits such as, bananas,apricots, plums, cherries
• Dark chocolates
61
In Closing
© Copyright 2000-2015 TIBCO Software Inc.
11• Cognitive load is the result of Extraneous Load + Intrinsic Load+ Germane
Load.
22• Reduce the extraneous load, manage the intrinsic load, and increase the
germane load on the user.
33• Working Memory has the capacity of storing 7 +/- 2 items.
44• Ensure that you write in a way that promotes new schema formation.
55• Ensure that the cognitive load on the working memory is manageable.
62
In Closing
© Copyright 2000-2015 TIBCO Software Inc.
Some waysof not
overloadingthe user
Introduce new concepts, one at atime.
Stick to one idea per topic.
Create logical chunks ofinformation.
Follow the 7 +/-2 rule for lists andsteps.
Use illustrations, infographics,videos.
Avoid redundancy and nounstacks.
63
Questions?
© Copyright 2000-2015 TIBCO Software Inc.
64© Copyright 2000-2015 TIBCO Software Inc.
Seema GauravTIBCO Software India Pvt. Ltd. | www.tibco.com