SlideShare uma empresa Scribd logo
1 de 26
+

Captology and Credibility
Current Issues in Web Technology
Michael Heron
+

Introduction


Captology is a topic that is hugely informed by previous
concepts discussed during the module.




The most important differentiating factor is „to what end are the
concepts used‟




Especially the psychological aspects of all the various topics.

For Captology, we are looking to bring about positive changes in
behaviour through the use of technology.

It‟s easier to do this badly than it is to do it well.


As with many of the things we‟ve discussed over the past couple of
months.
+

Mistakes in Behaviour Change


Fogg and others put together „10 Mistakes in Behaviour
Change‟




These are „anti patterns‟ that should be avoided.

They focus on giving „too much credence‟ to old folk-wisdom
saws.



„You need to exercise your willpower‟





„You just need to control yourself‟
„You just need to make an effort‟

For reasons we‟ve spoken about before (our minds are exertion
averse for example) these are unhelpful suggestions.
+

Mistakes in Behaviour Change


Relying on willpower for long-term change.




Attempting big leaps instead of baby steps.




„Change your context and change your life‟

Trying to stop old behaviours instead of creating new ones.




„Seek tiny successes – one after another‟

Ignoring how environment shapes behaviours.




„Imagine willpower doesn‟t exist. That‟s step 1 to a better future‟

„Focus on action, not avoidance‟

Blaming failures on a lack of motivation.


„Solution: Make the behaviour easier to do‟
+

Mistakes in Behaviour Change


Underestimating the power of triggers.




Believing that information leads to action.




„Abstract: Get in shape. Concrete: Walk 15 min today‟

Seeking to change a behaviour forever, not for a short time.




„We humans aren‟t so rational‟

Focusing on abstract goals more than concrete behaviours.




„No behaviour happens without a trigger‟

„A fixed period works better than “forever”‟

Assuming that behaviour change is difficult.


„Behaviour change is not so hard when you have the right process‟
+

Captology


Captology acknowledges a basic truth about cost and benefit.




By aligning available information with useful triggers,
captological devices can enact small changes.




It‟s not about evoking some mystical change in a person, it‟s about
realigning those two key elements.

Small changes on a regular basis.

„You can‟t fight city hall‟, and city hall is human nature.


At best, you can try to even the odds a bit.
+

Captology

http://edweb.sdsu.edu/people/arossett/pie/Interventi
ons/captology_2.htm
+

Types of Persuasion


Reduction – Persuading through simplifying.



Tunneling – guiding actions through persuasion



Tailoring – Persuasion through customised options



Suggestions – intervening at the ritht time.



Self-monitoring – making it easier for people to monitor their
own behaviour.



Surveillance – allowing technology to track our behaviour
through sensors and tools.



Conditioning – reinforcing the right kinds of behaviours.
+

Credibility


Before technology can be persuasive, it must be credible.




Credibility itself is based on two factors.






We are unlikely to be swayed by technology which we consider to be dubious.

Perceived trustworthiness,
 The degree to which technology is honest with us.
 Truthfulness, lack of bias, honesty
Perceived expertise.
 The degree to which the people presenting the technology are perceived to be
experts.
 Experience, intelligence, knowledge, power, authority

These two factors lead to perceived credibility.



This must be high to get the best impact.
Importantly, both must be present.
+

Credibility


Credibility is enhanced by real world feel.




Credibility is enhanced by professionalism of appearance.




You can‟t judge a book by its cover, but many people do anyway.

Credibility is enhanced by verifiability.




We trust technology more when we can see the people or
organizations behind the technology.

If you make a claim, support it.

Credibility is enhanced by „organisational association‟


Show that there are real organisations behind what you do.



A simple physical address can help this.
+

Credibility


Credibility is important because of two main elements.




It serves to help change user attitudes.
 Positive thoughts about the technology.
 Enhances the self of comfort that individuals have engaging with
technology.
 Makes it more likely individuals will embrace the fundamental
assumptions of a piece of technology.

It‟s also vital for increasing compliance with necessary
captology prerequisites.




Providing information
Creating long term engagement
Completing activities.
+

Credibility


Highlight biographies of contributors.


If you have experts or authorities in the team, make sure everyone
knows.




Show the human face of interaction.




Let people know there are real people behind the technology.

Make it easy for people to get in touch.




Conversely, make sure it‟s real expertise or authority.

If you‟re inaccessible, people will wonder why.

Make the technology easy to use, and useful.


Manage your cost/benefit ratio
+

Credibility


Make sure people can see regular signs of updates or reviews.




Technology that „looks‟ abandoned will „feel‟ abandoned.

Be wary of „quick cash in‟ options.





Such as ads or pop-ups.
People may wonder why you‟re trying to hit them up for extra
money.

Avoid errors in your presentation.


No matter how small. Even typos have a huge negative impact on
credibility.
+

Most Important Elements

http://captology.stanfo
rd.edu/resources/what
-makes-a-websitecredible.html
+

Credibility Examples - High

http://captology.stanford.edu/resources/what-makes-a-website-credible.html
+ Credibility Examples - Low

http://captology.stanford.edu/resources/what-makes-a-website-credible.html
+

Credibility


The prominence of elements is important, as is the instant
value judgement a person makes.





Prominence is modified by amount of attention being paid, your
presentation, the content and the way it‟s presented.




That which is highly prominent and interpreted harshly is going to
have high impact on general credibility.
That which is not prominent but interpreted well is going to have a
low impact on general credibility.

Google ads for example are highly prominent but most people
simply filter them out.

Value judgements are modified by assumptions, culture,
expertise and experience.
+

Credibility


Types of credibility:










Presumed
 Based on assumptions
Reputed
 Based on recommendations of a third party
Surface credibility
 What we decided based on a simple reading of the most prominent
elements of the technology.
Earned credibility
 Credibility based on previous interactions with a piece of technology.

All are important in creating a good impression of technology.


And thus, on providing hooks for captological influence.
+

Ethics


The last thing to be discussed about captology is ethics.




Persuasion when applied well and responsibly can bring about
considerably positive beneficial impact.





Like most of the things we‟ve discussed over the module, there is a
dark side to all of this.

But what right does any developer have to influence people in this
manner?
Consider the example of the „nudge‟ from last week.

One area seems to be unambigiously okay – when people optin to captology.


„I need to change my behaviour, I wonder if there‟s a tool to help me
do that‟
+

Ethics


Technology does not have to be complicated to be persuasive.


https://www.youtube.com/watch?v=uhjpIlasdgQ


Motivation – I want to stop eating so much.



Ability – I can choose not to eat.



Trigger – The oink reminds me of my motivation.



This means that many devices exist to persuade us in one form
or another.



To what extent is this „okay‟?
+

Ethics


What about when well meaning people persuade people to
make decisions that will be better for then?






Doctors?
 Providing persuasive devices to help with exercise? Alcohol
abuse? Drug abuse?
Parents?
 Providing persuasive toys to help children learn important life
lessons?
 Keep your room tidy
 Share with others
Technologists like yourself?
 Computer security?
 Virus control?
+

Ethics


When deception is involved, we clearly move into unethical
territory.




But many cognitive biases rely on deception.
 These biases work most of the time, it‟s just that when tickled in the
wrong kind of way in the wrong kind of context…

Is it unethical to use the foot in the door technique?


What impact does it have on credibility if your target is aware of the
approach?



Is framing something in a positive way unethical?



Is anchoring unethical?



Can we persuade at all without some means of deception?
+

Presentations


Next week, we don‟t have a lecture.




Instead, we start doing your powerpoint presentations.




Shhh, stop cheering.

Yeah, that stopped you cheering.

We‟ll do these over two weeks.


It‟s not really logistically possible to do them in the last week.



The presentations take the form of a five minute talk (from you)
and then five minutes of questions (from us).



Questions may not specifically be about your presentation.


They may be about how your presentation related to the wider topic.
+

Presentation


There will be four slots during the two weeks, each containing 6
talks.


Allocated on a first come first serve basis.



The slots are: Week 1, 9am, Week 1, 10am, Week 2, 9am,
Week 2, 10am



During your slot, you‟ll be asked to stand up and give your talk
to everyone in the class.




I know, we all hate presentations. Channel that hate into
productivity.

I‟ll be keeping an eye on the clock.
+

Presentation


There is no class exercise for this week.




But, I do need people to indicate the slots they want to take.




Remember, first come first served.

I want to do the absolute minimum amount of work to arrange
this.




Work on your presentations instead.

Absolute minimum.

So, I will pass around a sheet – if your preferred slot is
overbooked by the time it gets to you, you can arrange a swap
with someone else.
+

Captology


Captology is the academic field dedicated to creating
persuasive technologies.



Credibility is hugely important in developing credible devices.




There are many important things that come into building
credibility.




If we don‟t find devices credible, we can‟t be persuaded by them.

Some are more important than others.

As with all our topics, there are ethical dilemmas in the
application of captology.

Mais conteúdo relacionado

Mais procurados

"What have the techies ever done for us?"Can technology help lawyers lead a h...
"What have the techies ever done for us?"Can technology help lawyers lead a h..."What have the techies ever done for us?"Can technology help lawyers lead a h...
"What have the techies ever done for us?"Can technology help lawyers lead a h...Ethien
 
You touched it last: digital governance in devolved institutions
You touched it last: digital governance in devolved institutionsYou touched it last: digital governance in devolved institutions
You touched it last: digital governance in devolved institutionsGareth Edwards
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJSherry Jones
 
Ovation 17: Key Soundbites
Ovation 17: Key SoundbitesOvation 17: Key Soundbites
Ovation 17: Key SoundbitesJemma Smith
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialWill Gallego
 
John Kenagy at Consumer Centric Health, Models for Change '11
John Kenagy at Consumer Centric Health, Models for Change '11John Kenagy at Consumer Centric Health, Models for Change '11
John Kenagy at Consumer Centric Health, Models for Change '11HealthInnoventions
 
5G and the Invisible Interface
5G and the Invisible Interface5G and the Invisible Interface
5G and the Invisible InterfaceExperience UX
 
Who Says Big Companiers Can't Innovate?
Who Says Big Companiers Can't Innovate? Who Says Big Companiers Can't Innovate?
Who Says Big Companiers Can't Innovate? Booz Allen Hamilton
 
Blameless Post-mortems: Everything You Ever Wanted to Know
Blameless Post-mortems: Everything You Ever Wanted to KnowBlameless Post-mortems: Everything You Ever Wanted to Know
Blameless Post-mortems: Everything You Ever Wanted to KnowVictorOps
 

Mais procurados (12)

"What have the techies ever done for us?"Can technology help lawyers lead a h...
"What have the techies ever done for us?"Can technology help lawyers lead a h..."What have the techies ever done for us?"Can technology help lawyers lead a h...
"What have the techies ever done for us?"Can technology help lawyers lead a h...
 
You touched it last: digital governance in devolved institutions
You touched it last: digital governance in devolved institutionsYou touched it last: digital governance in devolved institutions
You touched it last: digital governance in devolved institutions
 
Nudge theory
Nudge theory Nudge theory
Nudge theory
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
 
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJWhy the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
Why the ‘Old Brain’ Struggles with Big Data - Deloitte CIO - WSJ
 
Ovation 17: Key Soundbites
Ovation 17: Key SoundbitesOvation 17: Key Soundbites
Ovation 17: Key Soundbites
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
 
CORE_CONSULTING
CORE_CONSULTINGCORE_CONSULTING
CORE_CONSULTING
 
John Kenagy at Consumer Centric Health, Models for Change '11
John Kenagy at Consumer Centric Health, Models for Change '11John Kenagy at Consumer Centric Health, Models for Change '11
John Kenagy at Consumer Centric Health, Models for Change '11
 
5G and the Invisible Interface
5G and the Invisible Interface5G and the Invisible Interface
5G and the Invisible Interface
 
Who Says Big Companiers Can't Innovate?
Who Says Big Companiers Can't Innovate? Who Says Big Companiers Can't Innovate?
Who Says Big Companiers Can't Innovate?
 
Blameless Post-mortems: Everything You Ever Wanted to Know
Blameless Post-mortems: Everything You Ever Wanted to KnowBlameless Post-mortems: Everything You Ever Wanted to Know
Blameless Post-mortems: Everything You Ever Wanted to Know
 

Destaque

09 11 26 Media Production 4
09 11 26 Media Production 409 11 26 Media Production 4
09 11 26 Media Production 4Jorge Zapico
 
Climate Persuasive Services
Climate Persuasive ServicesClimate Persuasive Services
Climate Persuasive ServicesJorge Zapico
 
Guidelines for a Sustainable Internet
Guidelines for a Sustainable InternetGuidelines for a Sustainable Internet
Guidelines for a Sustainable InternetJorge Zapico
 
DC Action Design Meetup - March 2013
DC Action Design Meetup - March 2013DC Action Design Meetup - March 2013
DC Action Design Meetup - March 2013Danny Boice
 
2013 hacking for sustainability ict course
2013 hacking for sustainability   ict course2013 hacking for sustainability   ict course
2013 hacking for sustainability ict courseJorge Zapico
 
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyStanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyMargarita Quihuis
 

Destaque (6)

09 11 26 Media Production 4
09 11 26 Media Production 409 11 26 Media Production 4
09 11 26 Media Production 4
 
Climate Persuasive Services
Climate Persuasive ServicesClimate Persuasive Services
Climate Persuasive Services
 
Guidelines for a Sustainable Internet
Guidelines for a Sustainable InternetGuidelines for a Sustainable Internet
Guidelines for a Sustainable Internet
 
DC Action Design Meetup - March 2013
DC Action Design Meetup - March 2013DC Action Design Meetup - March 2013
DC Action Design Meetup - March 2013
 
2013 hacking for sustainability ict course
2013 hacking for sustainability   ict course2013 hacking for sustainability   ict course
2013 hacking for sustainability ict course
 
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive TechnologyStanford Social M CONVERGE: Mass Engagement through Persuasive Technology
Stanford Social M CONVERGE: Mass Engagement through Persuasive Technology
 

Semelhante a COMPISSUES08 - Credibility of Technology

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Tunde digital innovation sep 2010
Tunde digital innovation sep 2010Tunde digital innovation sep 2010
Tunde digital innovation sep 2010Tunde Cockshott
 
How Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and TechnologyHow Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and TechnologyMorten Rand-Hendriksen
 
Myth busting for primary care innovators
Myth busting for primary care innovatorsMyth busting for primary care innovators
Myth busting for primary care innovatorsRobert Varnam Coaching
 
Nudge theory
Nudge theoryNudge theory
Nudge theoryvikashita
 
How to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web DesignHow to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web DesignMorten Rand-Hendriksen
 
Hurricane change 3 methods for preparing for disruptive change in business
Hurricane change   3 methods for preparing for disruptive change in businessHurricane change   3 methods for preparing for disruptive change in business
Hurricane change 3 methods for preparing for disruptive change in businessMatthew Hawkins
 
Stefanos karagos-design-forum CONTENT IS KING
Stefanos karagos-design-forum CONTENT IS KINGStefanos karagos-design-forum CONTENT IS KING
Stefanos karagos-design-forum CONTENT IS KINGThomas Nuth
 
Tools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentTools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentGraeme Bodys
 
Incremental innovations are good enough
Incremental innovations are good enoughIncremental innovations are good enough
Incremental innovations are good enoughRajagopalan V
 
ThinkBehaviour: 8 practical tips
ThinkBehaviour: 8 practical tipsThinkBehaviour: 8 practical tips
ThinkBehaviour: 8 practical tipsPrime Decision
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
 
You Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxYou Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxjeffevans62972
 
World Interaction Design Day 2019 // Mito Digital - Social Behavior Design
World Interaction Design Day 2019 // Mito Digital - Social Behavior DesignWorld Interaction Design Day 2019 // Mito Digital - Social Behavior Design
World Interaction Design Day 2019 // Mito Digital - Social Behavior DesignMito
 
Persuasion in the Metaverse
Persuasion in the MetaversePersuasion in the Metaverse
Persuasion in the MetaverseGabrieleMorelli4
 
Google's guide to innovation: How to unlock strategy, resources and technology
Google's guide to innovation: How to unlock strategy, resources and technologyGoogle's guide to innovation: How to unlock strategy, resources and technology
Google's guide to innovation: How to unlock strategy, resources and technologyrun_frictionless
 
#CSOAUS: Innovation - for a brighter future at News Corp Australia
#CSOAUS: Innovation - for a brighter future at News Corp Australia#CSOAUS: Innovation - for a brighter future at News Corp Australia
#CSOAUS: Innovation - for a brighter future at News Corp AustraliaMark Drasutis
 
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...Turing Fest
 

Semelhante a COMPISSUES08 - Credibility of Technology (20)

ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Tunde digital innovation sep 2010
Tunde digital innovation sep 2010Tunde digital innovation sep 2010
Tunde digital innovation sep 2010
 
How Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and TechnologyHow Not to Destroy the World: Ethics in Design and Technology
How Not to Destroy the World: Ethics in Design and Technology
 
Myth busting for primary care innovators
Myth busting for primary care innovatorsMyth busting for primary care innovators
Myth busting for primary care innovators
 
Nudge theory
Nudge theoryNudge theory
Nudge theory
 
How to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web DesignHow to Not Destroy the World - the Ethics of Web Design
How to Not Destroy the World - the Ethics of Web Design
 
Hurricane change 3 methods for preparing for disruptive change in business
Hurricane change   3 methods for preparing for disruptive change in businessHurricane change   3 methods for preparing for disruptive change in business
Hurricane change 3 methods for preparing for disruptive change in business
 
Stefanos karagos-design-forum CONTENT IS KING
Stefanos karagos-design-forum CONTENT IS KINGStefanos karagos-design-forum CONTENT IS KING
Stefanos karagos-design-forum CONTENT IS KING
 
Tools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparentTools & Techniques to help make workplace more transparent
Tools & Techniques to help make workplace more transparent
 
When left brain is not enough
When left brain is not enoughWhen left brain is not enough
When left brain is not enough
 
Incremental innovations are good enough
Incremental innovations are good enoughIncremental innovations are good enough
Incremental innovations are good enough
 
ThinkBehaviour: 8 practical tips
ThinkBehaviour: 8 practical tipsThinkBehaviour: 8 practical tips
ThinkBehaviour: 8 practical tips
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
You Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxYou Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docx
 
World Interaction Design Day 2019 // Mito Digital - Social Behavior Design
World Interaction Design Day 2019 // Mito Digital - Social Behavior DesignWorld Interaction Design Day 2019 // Mito Digital - Social Behavior Design
World Interaction Design Day 2019 // Mito Digital - Social Behavior Design
 
Persuasion in the Metaverse
Persuasion in the MetaversePersuasion in the Metaverse
Persuasion in the Metaverse
 
Google's guide to innovation: How to unlock strategy, resources and technology
Google's guide to innovation: How to unlock strategy, resources and technologyGoogle's guide to innovation: How to unlock strategy, resources and technology
Google's guide to innovation: How to unlock strategy, resources and technology
 
Critical Reflection In Nursing
Critical Reflection In NursingCritical Reflection In Nursing
Critical Reflection In Nursing
 
#CSOAUS: Innovation - for a brighter future at News Corp Australia
#CSOAUS: Innovation - for a brighter future at News Corp Australia#CSOAUS: Innovation - for a brighter future at News Corp Australia
#CSOAUS: Innovation - for a brighter future at News Corp Australia
 
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...
Ivana McConnell — Ethics, Software and Identity in the Age of Data (Turing Fe...
 

Mais de Michael Heron

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMichael Heron
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconductMichael Heron
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkMichael Heron
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility SupportMichael Heron
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and AutershipMichael Heron
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interactionMichael Heron
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityMichael Heron
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - TexturesMichael Heron
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)Michael Heron
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)Michael Heron
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationMichael Heron
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsMichael Heron
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsMichael Heron
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationMichael Heron
 

Mais de Michael Heron (20)

Meeple centred design - Board Game Accessibility
Meeple centred design - Board Game AccessibilityMeeple centred design - Board Game Accessibility
Meeple centred design - Board Game Accessibility
 
Musings on misconduct
Musings on misconductMusings on misconduct
Musings on misconduct
 
Accessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS FrameworkAccessibility Support with the ACCESS Framework
Accessibility Support with the ACCESS Framework
 
ACCESS: A Technical Framework for Adaptive Accessibility Support
ACCESS:  A Technical Framework for Adaptive Accessibility SupportACCESS:  A Technical Framework for Adaptive Accessibility Support
ACCESS: A Technical Framework for Adaptive Accessibility Support
 
Authorship and Autership
Authorship and AutershipAuthorship and Autership
Authorship and Autership
 
Text parser based interaction
Text parser based interactionText parser based interaction
Text parser based interaction
 
SAD04 - Inheritance
SAD04 - InheritanceSAD04 - Inheritance
SAD04 - Inheritance
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
GRPHICS07 - Textures
GRPHICS07 - TexturesGRPHICS07 - Textures
GRPHICS07 - Textures
 
GRPHICS06 - Shading
GRPHICS06 - ShadingGRPHICS06 - Shading
GRPHICS06 - Shading
 
GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)GRPHICS05 - Rendering (2)
GRPHICS05 - Rendering (2)
 
GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)GRPHICS04 - Rendering (1)
GRPHICS04 - Rendering (1)
 
GRPHICS03 - Graphical Representation
GRPHICS03 - Graphical RepresentationGRPHICS03 - Graphical Representation
GRPHICS03 - Graphical Representation
 
GRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D GraphicsGRPHICS02 - Creating 3D Graphics
GRPHICS02 - Creating 3D Graphics
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
GRPHICS09 - Art Appreciation
GRPHICS09 - Art AppreciationGRPHICS09 - Art Appreciation
GRPHICS09 - Art Appreciation
 
2CPP18 - Modifiers
2CPP18 - Modifiers2CPP18 - Modifiers
2CPP18 - Modifiers
 
2CPP17 - File IO
2CPP17 - File IO2CPP17 - File IO
2CPP17 - File IO
 
2CPP16 - STL
2CPP16 - STL2CPP16 - STL
2CPP16 - STL
 
2CPP15 - Templates
2CPP15 - Templates2CPP15 - Templates
2CPP15 - Templates
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

COMPISSUES08 - Credibility of Technology

  • 1. + Captology and Credibility Current Issues in Web Technology Michael Heron
  • 2. + Introduction  Captology is a topic that is hugely informed by previous concepts discussed during the module.   The most important differentiating factor is „to what end are the concepts used‟   Especially the psychological aspects of all the various topics. For Captology, we are looking to bring about positive changes in behaviour through the use of technology. It‟s easier to do this badly than it is to do it well.  As with many of the things we‟ve discussed over the past couple of months.
  • 3. + Mistakes in Behaviour Change  Fogg and others put together „10 Mistakes in Behaviour Change‟   These are „anti patterns‟ that should be avoided. They focus on giving „too much credence‟ to old folk-wisdom saws.   „You need to exercise your willpower‟   „You just need to control yourself‟ „You just need to make an effort‟ For reasons we‟ve spoken about before (our minds are exertion averse for example) these are unhelpful suggestions.
  • 4. + Mistakes in Behaviour Change  Relying on willpower for long-term change.   Attempting big leaps instead of baby steps.   „Change your context and change your life‟ Trying to stop old behaviours instead of creating new ones.   „Seek tiny successes – one after another‟ Ignoring how environment shapes behaviours.   „Imagine willpower doesn‟t exist. That‟s step 1 to a better future‟ „Focus on action, not avoidance‟ Blaming failures on a lack of motivation.  „Solution: Make the behaviour easier to do‟
  • 5. + Mistakes in Behaviour Change  Underestimating the power of triggers.   Believing that information leads to action.   „Abstract: Get in shape. Concrete: Walk 15 min today‟ Seeking to change a behaviour forever, not for a short time.   „We humans aren‟t so rational‟ Focusing on abstract goals more than concrete behaviours.   „No behaviour happens without a trigger‟ „A fixed period works better than “forever”‟ Assuming that behaviour change is difficult.  „Behaviour change is not so hard when you have the right process‟
  • 6. + Captology  Captology acknowledges a basic truth about cost and benefit.   By aligning available information with useful triggers, captological devices can enact small changes.   It‟s not about evoking some mystical change in a person, it‟s about realigning those two key elements. Small changes on a regular basis. „You can‟t fight city hall‟, and city hall is human nature.  At best, you can try to even the odds a bit.
  • 8. + Types of Persuasion  Reduction – Persuading through simplifying.  Tunneling – guiding actions through persuasion  Tailoring – Persuasion through customised options  Suggestions – intervening at the ritht time.  Self-monitoring – making it easier for people to monitor their own behaviour.  Surveillance – allowing technology to track our behaviour through sensors and tools.  Conditioning – reinforcing the right kinds of behaviours.
  • 9. + Credibility  Before technology can be persuasive, it must be credible.   Credibility itself is based on two factors.    We are unlikely to be swayed by technology which we consider to be dubious. Perceived trustworthiness,  The degree to which technology is honest with us.  Truthfulness, lack of bias, honesty Perceived expertise.  The degree to which the people presenting the technology are perceived to be experts.  Experience, intelligence, knowledge, power, authority These two factors lead to perceived credibility.   This must be high to get the best impact. Importantly, both must be present.
  • 10. + Credibility  Credibility is enhanced by real world feel.   Credibility is enhanced by professionalism of appearance.   You can‟t judge a book by its cover, but many people do anyway. Credibility is enhanced by verifiability.   We trust technology more when we can see the people or organizations behind the technology. If you make a claim, support it. Credibility is enhanced by „organisational association‟  Show that there are real organisations behind what you do.  A simple physical address can help this.
  • 11. + Credibility  Credibility is important because of two main elements.   It serves to help change user attitudes.  Positive thoughts about the technology.  Enhances the self of comfort that individuals have engaging with technology.  Makes it more likely individuals will embrace the fundamental assumptions of a piece of technology. It‟s also vital for increasing compliance with necessary captology prerequisites.    Providing information Creating long term engagement Completing activities.
  • 12. + Credibility  Highlight biographies of contributors.  If you have experts or authorities in the team, make sure everyone knows.   Show the human face of interaction.   Let people know there are real people behind the technology. Make it easy for people to get in touch.   Conversely, make sure it‟s real expertise or authority. If you‟re inaccessible, people will wonder why. Make the technology easy to use, and useful.  Manage your cost/benefit ratio
  • 13. + Credibility  Make sure people can see regular signs of updates or reviews.   Technology that „looks‟ abandoned will „feel‟ abandoned. Be wary of „quick cash in‟ options.    Such as ads or pop-ups. People may wonder why you‟re trying to hit them up for extra money. Avoid errors in your presentation.  No matter how small. Even typos have a huge negative impact on credibility.
  • 15. + Credibility Examples - High http://captology.stanford.edu/resources/what-makes-a-website-credible.html
  • 16. + Credibility Examples - Low http://captology.stanford.edu/resources/what-makes-a-website-credible.html
  • 17. + Credibility  The prominence of elements is important, as is the instant value judgement a person makes.    Prominence is modified by amount of attention being paid, your presentation, the content and the way it‟s presented.   That which is highly prominent and interpreted harshly is going to have high impact on general credibility. That which is not prominent but interpreted well is going to have a low impact on general credibility. Google ads for example are highly prominent but most people simply filter them out. Value judgements are modified by assumptions, culture, expertise and experience.
  • 18. + Credibility  Types of credibility:      Presumed  Based on assumptions Reputed  Based on recommendations of a third party Surface credibility  What we decided based on a simple reading of the most prominent elements of the technology. Earned credibility  Credibility based on previous interactions with a piece of technology. All are important in creating a good impression of technology.  And thus, on providing hooks for captological influence.
  • 19. + Ethics  The last thing to be discussed about captology is ethics.   Persuasion when applied well and responsibly can bring about considerably positive beneficial impact.    Like most of the things we‟ve discussed over the module, there is a dark side to all of this. But what right does any developer have to influence people in this manner? Consider the example of the „nudge‟ from last week. One area seems to be unambigiously okay – when people optin to captology.  „I need to change my behaviour, I wonder if there‟s a tool to help me do that‟
  • 20. + Ethics  Technology does not have to be complicated to be persuasive.  https://www.youtube.com/watch?v=uhjpIlasdgQ  Motivation – I want to stop eating so much.  Ability – I can choose not to eat.  Trigger – The oink reminds me of my motivation.  This means that many devices exist to persuade us in one form or another.  To what extent is this „okay‟?
  • 21. + Ethics  What about when well meaning people persuade people to make decisions that will be better for then?    Doctors?  Providing persuasive devices to help with exercise? Alcohol abuse? Drug abuse? Parents?  Providing persuasive toys to help children learn important life lessons?  Keep your room tidy  Share with others Technologists like yourself?  Computer security?  Virus control?
  • 22. + Ethics  When deception is involved, we clearly move into unethical territory.   But many cognitive biases rely on deception.  These biases work most of the time, it‟s just that when tickled in the wrong kind of way in the wrong kind of context… Is it unethical to use the foot in the door technique?  What impact does it have on credibility if your target is aware of the approach?  Is framing something in a positive way unethical?  Is anchoring unethical?  Can we persuade at all without some means of deception?
  • 23. + Presentations  Next week, we don‟t have a lecture.   Instead, we start doing your powerpoint presentations.   Shhh, stop cheering. Yeah, that stopped you cheering. We‟ll do these over two weeks.  It‟s not really logistically possible to do them in the last week.  The presentations take the form of a five minute talk (from you) and then five minutes of questions (from us).  Questions may not specifically be about your presentation.  They may be about how your presentation related to the wider topic.
  • 24. + Presentation  There will be four slots during the two weeks, each containing 6 talks.  Allocated on a first come first serve basis.  The slots are: Week 1, 9am, Week 1, 10am, Week 2, 9am, Week 2, 10am  During your slot, you‟ll be asked to stand up and give your talk to everyone in the class.   I know, we all hate presentations. Channel that hate into productivity. I‟ll be keeping an eye on the clock.
  • 25. + Presentation  There is no class exercise for this week.   But, I do need people to indicate the slots they want to take.   Remember, first come first served. I want to do the absolute minimum amount of work to arrange this.   Work on your presentations instead. Absolute minimum. So, I will pass around a sheet – if your preferred slot is overbooked by the time it gets to you, you can arrange a swap with someone else.
  • 26. + Captology  Captology is the academic field dedicated to creating persuasive technologies.  Credibility is hugely important in developing credible devices.   There are many important things that come into building credibility.   If we don‟t find devices credible, we can‟t be persuaded by them. Some are more important than others. As with all our topics, there are ethical dilemmas in the application of captology.