By Topic

The evolution of the Common User Access Workplace Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Berry, R.E. ; IBM Personal Systems Programming, 11400 Burnet Road, Austin, Texas 78758, USA ; Reeves, C.J.

This paper describes some of the influences contributing to and issues in dealing with the evolution of user interface guidelines over time. In particular, we focus on the evolution of IBM's user interface architecture, the Common User Access™ (CUA™) interface, over a period of six years. Discussed are the key architectural and design elements of the CUA Workplace Model, the fundamental shifts in computer-human interaction that have occurred since the first publication of the guidelines in 1987, and how user interface design, operating systems, and tools have interacted in the evolution of the guidelines. The information should help designers of user interfaces and developers of useirn terface guidelines to appreciate some of the factors involved in the long-term evolution of a user interface style. The paper provides an introduction to the most recent evolutionary step in the CUA style (the Workplace Model) to help the reader place these factors in perspective relative to the degree of evolutionary change.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Systems Journal  (Volume:31 ,  Issue: 3 )