SlideShare a Scribd company logo
1 of 69
Download to read offline
Shedding Light on
Dark Patterns
A Case Study on Digital Harms
By Noreen Whysel
Me2B Alliance
April 28, 2021
The Information Architecture Conference
0 1
1 0 1 0
1 0 1 0
0 110 1 1101 0 1
10 11001 0 1 0
11 0 1 101 1
10 111 1 0
11011 1100 110 111 10
01
11 01 110 1 1001 0
010 1 1
Me2B
Relationships
We’re committed
Do you have a personal Relationship
with technology?
Yep.
… a Binding, legal relationship?
...a what now?
It’s kind of Complicated, right?
Heck, Yeah.
Do No Harm
3 Laws of Robotics
First Law
A robot may not injure a human being or, through inaction, allow a human being to come to
harm.
Second Law
A robot must obey the orders given it by human beings except where such orders would
conflict with the First Law.
Third Law
A robot must protect its own existence as long as such protection does not conflict with the
First or Second Law.[1]
Source: Asimov, I. (1950). I, Robot. Gnome Press.
3 Laws of UX Designers
First Law
A Designer may not injure a human being or, through inaction, allow a human being to
come to harm.
Second Law
A Designer must obey the orders given it by other designers, clients, product managers,
etc. except where such orders would conflict with the First Law.
Third Law
A Designer must protect its own existence as long as such protection does not conflict
with the First or Second Law.[1]
Source: Asimov, I. (1950). I, Robot. Gnome Press.
Four Truths of Digital Harm*
1. There is digital harm.
2. There are conditions that create digital harm.
3. We can reduce digital harm.
4. There is path to reducing digital harm.
Respectful technology
And yet, there is harm
*Credit for this idea goes to Lisa LeVasseur of Me2B Alliance.
Four Noble Truths of Buddhism
1. There is suffering.
2. There are conditions that create suffering.
3. We can reduce suffering.
4. There is path to reduce suffering.
Dissatisfaction, Impermanence, Oneness
Suffering is Human
Four Truths of Digital Harm
1. There is digital harm.
2. There are conditions that create digital harm.
3. We can reduce digital harm.
4. There is path to reducing digital harm.
Respectful technology
And yet, there is harm 0 1
1 0 1 0
1 0 1 0
0 110 1 1101 0 1
10 11001 0 1 0
11 0 1 101 1
10 111 1 0
11011 1100 110 111 10
01
11 01 110 1 1001 0
010 1 1
Dark Patterns
Dark Anti-Patterns
What are some
Dark* Patterns?
*We’ll switch back to “Anti-Pattern” after the history lesson.
Dark Patterns
Dark Patterns are tricks used in
websites and apps that make you
do things that you didn't mean to,
like buying or signing up for
something.
—Harry Brignull, darkpatterns.org
Privacy Zuckering
You are tricked into publicly sharing
more information about yourself
than you really intended to. Named
after Facebook CEO Mark
Zuckerberg.
Monteiro, Mike. (2014). How Designers Destroyed the World.
An Event Part. https://vimeo.com/122022963
“Facebook’s privacy settings, which have outed gay
teens to their conservative parents, are working
exactly as designed. “
Roach Motel
You get into a situation very easily,
but then you find it is hard to get out
of it (e.g. a premium subscription).
One of four
clicks to
complete
cancelation
Purdue UXP2. https://darkpatterns.uxp2.com
Trick questions
While filling in a form you respond to
a question that tricks you into giving
an answer you didn't intend. When
glanced upon quickly the question
appears to ask one thing, but when
read carefully it asks another thing
entirely.
Stevie Martin. March 25, 2021. Every time you try and go on
a website. Twitter.
https://twitter.com/5tevieM/status/1375116382770171906
Types of Dark Pattern
● Trick questions
● Sneak into Basket
● Roach Motel
● Privacy Zuckering
● Price Comparison Prevention
● Misdirection
● Hidden Costs
● Bait and Switch
● Confirmshaming
● Disguised Ads
● Forced Continuity
● Friend Spam
The thing is...None of this is New
Purdue UXP2: UX Pedagogy
and Practice Lab
UXP2 categorized and extended Harry
Brignull’s Dark Patterns into five groups,
describing how designers may prioritize
stakeholder value over user experience:
● Nagging
● Obstruction
● Sneaking
● Interface Interference
● Forced Action
UXP2 https://darkpatterns.uxp2.com
These Deceptive Patterns get you to:
● Buy stuff
● Buy extra stuff
● Share information about you
● Share information about others
● Launch or click on ads
● Avoid logging out
● Avoid canceling accounts
● Spread malware
So you can:
● Buy stuff
● Buy extra stuff
● Share information about you
● Share information about others
● Launch or click on ads
● Avoid logging out
● Avoid canceling accounts
● Look good, feel good
● Have more status
● Get personalized service
● Connect with a community
● Get free content
● Have a seamless experience
● One less thing to worry about
This is all simply
Bad Behavior
Omidyar Tech Risk Zones
● Bad Actors
● Disinformation
● Algorithmic Bias
● Exclusion
● Data Control
● Surveillance
● Outsized Power
Ethical Explorer https://www.ethicalexplorer.org
Digital Harms Dictionary - me2ba.org
ICP: Information Collection practices without consent or knowledge
IUP: Information Use Practices involving use and sharing information in ways the consumer
hasn’t agreed to
ISP: Information Sharing Practices, misuse of voluntarily shared information
IPDB: Inverse Privacy/Data Brokers: sharing data in a data brokerage network the consumer
can’t control
LICA: Supplier Lock-In and Contract of Adhesion terms that make ending difficult
IDPR: Identity Practices that allow loss or misuse of personally identifiable data
Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
Digital Harms Dictionary
EOLA: Inadequate Management of End of Life/End of Account, loss of control over ending an
account
SP: Security Practices, poor authentication practices, false sense of security, phishing
IRLH: In Real Life Hybrid practices, physical tracking, bait and switch
BODM: Burden of Decision Making, hidden cookie consent, clickwrap
SURV: Surveillance, always listening, zombie cookies, keystroke tracking, fingerprinting, facial
recognition without consent
Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
Digital Harms Dictionary
TRCO: Transparency and Communication, hidden privacy policies, overly technical or
legalistic
DSGN: Designing Dark Patterns, eliciting addictive behaviors, COPPA/HIPPA violations,
reinforcing gender biases and sexual violence
MNIP: Manipulation: social gravity, forced action, emotion detection and manipulation,
nudging
AIMC: AI Modeling and Computation bias, citizen scoring, automation bias
FID: Information Fidelity, biased search engine filtering
EOR: Employer OverReach, requiring sharing PII such as DNA, genetic predisposition to
disease, prior salary history in some jurisdictions
Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
Respectful Technology
What we want?
A Little Respect.
It’s Personal
People feel they have a relationship
with technology
● It’s emotional
● It’s embodied
● It’s very, very personal
How Personal?
● Name
● Email address
● Gender
● Birthday
● Highest Attained Degree
● Gender Identity
● Physical location
● Where you work
● What you read
● What you ate for breakfast
● What you bought last Tuesday
● Whom you’re dating
● That you’re thinking of breaking
up with them...
If your shop assistant was an app (hidden camera),
Forbrugerrådet Tænk (Danish Consumer Council), December 2014
https://www.youtube.com/watch?v=xYZtHIPktQg
Me2B Relationship
The way in which people (Me-s)
experience our connection to
products and service providers
(B-s)—in both the physical and digital
worlds—are Me2B Relationships.
These relationships begin where
technology and humanity meet.
Me2B Alliance
Respectful Tech
Specification
“Just like a good relationship
between people, the Me2B
Relationship is based on respect.
The [Me2B] Alliance is working to
build respectful behavior into the
technology we use every day. Our
efforts bring into balance the rights
and responsibilities of people and
technology.”
Me2B Alliance
Respectful Human
Relationship
(Our Ethical North Star)
Image: Polaris. Steviep187 Flickr.com)
Me2B Relationships are Layered
Me2B Relationships are Layered
Me2B Relationships are Layered
Me2B Relationships are Layered
So Many Touch Points
Do everyday people
understand
the layered Me2B relationship?
Me2B Relationship Model
Me2B Relationship Model
Me2B Relationship Model
Mapping the Stages
Consented Pseudonymity
The Data Layer
The Parallel Dataverse
Would you close your account if there was bad news?
“No.”
“No, the damage is already done.”
“I would seriously consider closing my account, but maybe now they will be more diligent.”
“I would close my account and then open a new one.”
“I would remove my credit card from the account.”
“Yes. I’ve closed my account when I learned about something bad they did, like something racist.”
A Respectful Tech Specification
Can This Marriage
Be Saved?
The Parallel Dataverse
Respectful Relationships
No Gossip
No Eavesdropping
No Stalking
No Manipulation
No Coercion
Progressive Consent
All Touch Points Should Be Respectful
Respectful Relationships
No Gossip
No Eavesdropping
No Stalking
No Manipulation
No Coercion
Progressive Consent
All Touch Points Should Be Respectful
Data
minimization
Individual
control and
autonomy
Respectful
defaults
Qualitative Research of Consumer Behavior
Product Validation - Are You a Spy?
● Are we spying on our users? Do they know what information we are collecting
about them? Or how we collect that information?
● Are we manipulating users? How much information is really needed? Are we
gathering more than we need, just because we can? Are we using it to force
actions the users wouldn't normally make?
● Are we keeping our promises? Are we being good custodians of our user's
information? Who are we sharing it with? Do we know what they do with our
user's information?
Another Legal
Relationship
Me2BA Rules of Engagement
● Freedom | We agree not to coerce or manipulate each other.
● Respect of Boundaries | We agree to respect each other’s personal boundaries.
● Respectful Defaults | In the absence of stated preferences, we default to the most
conservative behavior.
● Fairness & Non-exploitation | We agree to treat each other fairly and not exploit
things that are shared.
● Good Communication | We agree to be forthright, honest and clear in our
communication.
● Non-Harming | We agree not to willfully harm one another.
● Problem Solving | We agree to respectful, collaborative and fair problem solving
methods.
Respectful Technology Certification
The Me2B Alliance certification will audit data collection and stewardship, product integrity
and security.
Data Integrity: To what degree is the consumer’ data collected, stored and shared with
third parties? If there is a third party agreement, how are they accessing the data?
Product Integrity: Does the user experience communicate what is happening with the
consumers data?
Legal Integrity: Are all consents and disclosures clear and understandable to the average
consumer?
Security Integrity: Is access to the consumer’s data protected?
Product Integrity Testing
Cookies: who is using the browser? Has the user given consent?
Forced account creation: Must the user create an account before they can even
see what the website is about?
Data Minimization: What information is required to create an account?
One-Off Transactions: Can people browse or buy something without creating an
account?
Legal Assurances: Is there a missing or hidden Privacy Policy?
Terms of Service: Is the TOS easy to understand or is it "click wrap"?
Product Integrity Testing
For each item in the testing rubric:
● Which digital harm might be an
issue?
● Supported by what anti-pattern?
● Preventing which IA Heuristic from
being realized?
● Causing what result for the Me2B
Relationship?
Product Integrity Testing
For each item in the testing rubric:
● Which digital harm might be an
issue?
● Supported by what anti-pattern?
● Preventing which IA Heuristic from
being realized?
● Causing what result for the Me2B
Relationship?
Example:
● Individual Control and
Autonomy
● Sneaking: Forced Continuity
● Controllable, Communicative,
Delightful
● Deterioration, Customer
Support calls
Pattern Mapping
Product Integrity Test
Findings: Brief description of findings relative to the user state, including what was
observed on the page and any potential dark patterns or other errors that may affect the
user experience.
Evidence: Description of what the user sees on the page that indicates a potential
problem or good practice. Screenshots are indicated if taken.
User Experience: How the user may experience the component or task flow. This includes
how the website experience either serves or blocks them from meeting their goal and
how it makes them feel.
Recommendation: Ideas to improve the experience
Impact if Corrected: How the corrected problem may improve the user experience.
Product Integrity Test
IA Heuristic: Which information architecture heuristic is affected? Examples include Usable,
Findable, Clear, Controllable, Delightful, Accessible, Credible
UXP2 Lab Pattern: Which dark pattern may be occurring? These can be instances of
sneaky and blocking behaviors like Redirection, Hidden Information, Forced Action, etc.,
that typically leverage biases and psychological states and serve to interrupt or change
users from their goal.
Severity: How bad is the problem? Does it appear to cause harm or risk?
Notes: Additional comments, future testing
Product Integrity—Is there Harm?
“Digital Creator Acceptance Testing”
Qualitative testing, similar to User Acceptance Testing, where we talk with product
managers and developers about the framework.
● Invite a digital creator have their website or app audited
● Test data, product, legal and security practice requirements
● Present a score for each test
● Discuss how it might help them meet legal requirements
● Help them to update legacy thinking and
● Improve their relationship with their customers
Be-s Want to Play
Digital creators—designers and
developers alike—need to unlearn
some practices.
There is a path, but it isn’t going to be
easy.
Yet, the motivation toward good
customer relationships is leading the
way.
Respectful Technology
Digital Harms Dictionary
A deep dive into online harms and what you can do about
them.
GoodTech.wiki
An online reference for B-s and Me-s interested in
learning about respectful technology companies, products
and services.
https://me2ba.org/library/
Thanks!
Noreen Whysel
noreen.whysel@me2ba.org
@nwhysel
View my work in Respectful Tech:
www.me2ba.org

More Related Content

Similar to IAC21: Shedding Light on Dark Patterns.pdf

Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2Andy Hadfield
 
Self Assessment Essay Examples T. Online assignment writing service.
Self Assessment Essay Examples  T. Online assignment writing service.Self Assessment Essay Examples  T. Online assignment writing service.
Self Assessment Essay Examples T. Online assignment writing service.Beth Simner
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of AcademiJody Sullivan
 
How Long Should An Essay Introduction Be
How Long Should An Essay Introduction BeHow Long Should An Essay Introduction Be
How Long Should An Essay Introduction BeCarmen Ercoli
 
F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4Gregory Birgé
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social MediaMathias Klang
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 

Similar to IAC21: Shedding Light on Dark Patterns.pdf (13)

Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2
 
Self Assessment Essay Examples T. Online assignment writing service.
Self Assessment Essay Examples  T. Online assignment writing service.Self Assessment Essay Examples  T. Online assignment writing service.
Self Assessment Essay Examples T. Online assignment writing service.
 
School Essay Examples Of Academi
School Essay Examples Of AcademiSchool Essay Examples Of Academi
School Essay Examples Of Academi
 
How Long Should An Essay Introduction Be
How Long Should An Essay Introduction BeHow Long Should An Essay Introduction Be
How Long Should An Essay Introduction Be
 
F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4F5DIGITAL DigiGen09 workshop_part4
F5DIGITAL DigiGen09 workshop_part4
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social Media
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 

More from Noreen Whysel

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxNoreen Whysel
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentNoreen Whysel
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxNoreen Whysel
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfNoreen Whysel
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gatewaysNoreen Whysel
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...Noreen Whysel
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Noreen Whysel
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Noreen Whysel
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryNoreen Whysel
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer DevelopmentNoreen Whysel
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a differenceNoreen Whysel
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaNoreen Whysel
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonNoreen Whysel
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayNoreen Whysel
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving PerformanceNoreen Whysel
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open SourceNoreen Whysel
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaNoreen Whysel
 

More from Noreen Whysel (20)

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer Development
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gateways
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon Entry
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer Development
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a difference
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in Wikipedia
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thon
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning Gateway
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving Performance
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open Source
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, Atlanta
 

Recently uploaded

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

IAC21: Shedding Light on Dark Patterns.pdf

  • 1. Shedding Light on Dark Patterns A Case Study on Digital Harms By Noreen Whysel Me2B Alliance April 28, 2021 The Information Architecture Conference
  • 2.
  • 3. 0 1 1 0 1 0 1 0 1 0 0 110 1 1101 0 1 10 11001 0 1 0 11 0 1 101 1 10 111 1 0 11011 1100 110 111 10 01 11 01 110 1 1001 0 010 1 1
  • 4. Me2B Relationships We’re committed Do you have a personal Relationship with technology? Yep. … a Binding, legal relationship? ...a what now? It’s kind of Complicated, right? Heck, Yeah.
  • 6. 3 Laws of Robotics First Law A robot may not injure a human being or, through inaction, allow a human being to come to harm. Second Law A robot must obey the orders given it by human beings except where such orders would conflict with the First Law. Third Law A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.[1] Source: Asimov, I. (1950). I, Robot. Gnome Press.
  • 7. 3 Laws of UX Designers First Law A Designer may not injure a human being or, through inaction, allow a human being to come to harm. Second Law A Designer must obey the orders given it by other designers, clients, product managers, etc. except where such orders would conflict with the First Law. Third Law A Designer must protect its own existence as long as such protection does not conflict with the First or Second Law.[1] Source: Asimov, I. (1950). I, Robot. Gnome Press.
  • 8. Four Truths of Digital Harm* 1. There is digital harm. 2. There are conditions that create digital harm. 3. We can reduce digital harm. 4. There is path to reducing digital harm. Respectful technology And yet, there is harm *Credit for this idea goes to Lisa LeVasseur of Me2B Alliance.
  • 9. Four Noble Truths of Buddhism 1. There is suffering. 2. There are conditions that create suffering. 3. We can reduce suffering. 4. There is path to reduce suffering. Dissatisfaction, Impermanence, Oneness Suffering is Human
  • 10. Four Truths of Digital Harm 1. There is digital harm. 2. There are conditions that create digital harm. 3. We can reduce digital harm. 4. There is path to reducing digital harm. Respectful technology And yet, there is harm 0 1 1 0 1 0 1 0 1 0 0 110 1 1101 0 1 10 11001 0 1 0 11 0 1 101 1 10 111 1 0 11011 1100 110 111 10 01 11 01 110 1 1001 0 010 1 1
  • 11.
  • 12.
  • 15. What are some Dark* Patterns? *We’ll switch back to “Anti-Pattern” after the history lesson.
  • 16. Dark Patterns Dark Patterns are tricks used in websites and apps that make you do things that you didn't mean to, like buying or signing up for something. —Harry Brignull, darkpatterns.org
  • 17. Privacy Zuckering You are tricked into publicly sharing more information about yourself than you really intended to. Named after Facebook CEO Mark Zuckerberg. Monteiro, Mike. (2014). How Designers Destroyed the World. An Event Part. https://vimeo.com/122022963 “Facebook’s privacy settings, which have outed gay teens to their conservative parents, are working exactly as designed. “
  • 18. Roach Motel You get into a situation very easily, but then you find it is hard to get out of it (e.g. a premium subscription). One of four clicks to complete cancelation Purdue UXP2. https://darkpatterns.uxp2.com
  • 19. Trick questions While filling in a form you respond to a question that tricks you into giving an answer you didn't intend. When glanced upon quickly the question appears to ask one thing, but when read carefully it asks another thing entirely. Stevie Martin. March 25, 2021. Every time you try and go on a website. Twitter. https://twitter.com/5tevieM/status/1375116382770171906
  • 20. Types of Dark Pattern ● Trick questions ● Sneak into Basket ● Roach Motel ● Privacy Zuckering ● Price Comparison Prevention ● Misdirection ● Hidden Costs ● Bait and Switch ● Confirmshaming ● Disguised Ads ● Forced Continuity ● Friend Spam The thing is...None of this is New
  • 21. Purdue UXP2: UX Pedagogy and Practice Lab UXP2 categorized and extended Harry Brignull’s Dark Patterns into five groups, describing how designers may prioritize stakeholder value over user experience: ● Nagging ● Obstruction ● Sneaking ● Interface Interference ● Forced Action UXP2 https://darkpatterns.uxp2.com
  • 22. These Deceptive Patterns get you to: ● Buy stuff ● Buy extra stuff ● Share information about you ● Share information about others ● Launch or click on ads ● Avoid logging out ● Avoid canceling accounts ● Spread malware
  • 23. So you can: ● Buy stuff ● Buy extra stuff ● Share information about you ● Share information about others ● Launch or click on ads ● Avoid logging out ● Avoid canceling accounts ● Look good, feel good ● Have more status ● Get personalized service ● Connect with a community ● Get free content ● Have a seamless experience ● One less thing to worry about
  • 24. This is all simply Bad Behavior
  • 25. Omidyar Tech Risk Zones ● Bad Actors ● Disinformation ● Algorithmic Bias ● Exclusion ● Data Control ● Surveillance ● Outsized Power Ethical Explorer https://www.ethicalexplorer.org
  • 26. Digital Harms Dictionary - me2ba.org ICP: Information Collection practices without consent or knowledge IUP: Information Use Practices involving use and sharing information in ways the consumer hasn’t agreed to ISP: Information Sharing Practices, misuse of voluntarily shared information IPDB: Inverse Privacy/Data Brokers: sharing data in a data brokerage network the consumer can’t control LICA: Supplier Lock-In and Contract of Adhesion terms that make ending difficult IDPR: Identity Practices that allow loss or misuse of personally identifiable data Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
  • 27. Digital Harms Dictionary EOLA: Inadequate Management of End of Life/End of Account, loss of control over ending an account SP: Security Practices, poor authentication practices, false sense of security, phishing IRLH: In Real Life Hybrid practices, physical tracking, bait and switch BODM: Burden of Decision Making, hidden cookie consent, clickwrap SURV: Surveillance, always listening, zombie cookies, keystroke tracking, fingerprinting, facial recognition without consent Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
  • 28. Digital Harms Dictionary TRCO: Transparency and Communication, hidden privacy policies, overly technical or legalistic DSGN: Designing Dark Patterns, eliciting addictive behaviors, COPPA/HIPPA violations, reinforcing gender biases and sexual violence MNIP: Manipulation: social gravity, forced action, emotion detection and manipulation, nudging AIMC: AI Modeling and Computation bias, citizen scoring, automation bias FID: Information Fidelity, biased search engine filtering EOR: Employer OverReach, requiring sharing PII such as DNA, genetic predisposition to disease, prior salary history in some jurisdictions Me2B Alliance Digital Harms Dictionary https://www.me2ba.org
  • 30. What we want? A Little Respect.
  • 31. It’s Personal People feel they have a relationship with technology ● It’s emotional ● It’s embodied ● It’s very, very personal
  • 32. How Personal? ● Name ● Email address ● Gender ● Birthday ● Highest Attained Degree ● Gender Identity ● Physical location ● Where you work ● What you read ● What you ate for breakfast ● What you bought last Tuesday ● Whom you’re dating ● That you’re thinking of breaking up with them... If your shop assistant was an app (hidden camera), Forbrugerrådet Tænk (Danish Consumer Council), December 2014 https://www.youtube.com/watch?v=xYZtHIPktQg
  • 33. Me2B Relationship The way in which people (Me-s) experience our connection to products and service providers (B-s)—in both the physical and digital worlds—are Me2B Relationships. These relationships begin where technology and humanity meet.
  • 34. Me2B Alliance Respectful Tech Specification “Just like a good relationship between people, the Me2B Relationship is based on respect. The [Me2B] Alliance is working to build respectful behavior into the technology we use every day. Our efforts bring into balance the rights and responsibilities of people and technology.” Me2B Alliance
  • 35. Respectful Human Relationship (Our Ethical North Star) Image: Polaris. Steviep187 Flickr.com)
  • 40. So Many Touch Points Do everyday people understand the layered Me2B relationship?
  • 48. Would you close your account if there was bad news? “No.” “No, the damage is already done.” “I would seriously consider closing my account, but maybe now they will be more diligent.” “I would close my account and then open a new one.” “I would remove my credit card from the account.” “Yes. I’ve closed my account when I learned about something bad they did, like something racist.”
  • 49. A Respectful Tech Specification
  • 52. Respectful Relationships No Gossip No Eavesdropping No Stalking No Manipulation No Coercion Progressive Consent All Touch Points Should Be Respectful
  • 53. Respectful Relationships No Gossip No Eavesdropping No Stalking No Manipulation No Coercion Progressive Consent All Touch Points Should Be Respectful Data minimization Individual control and autonomy Respectful defaults
  • 54. Qualitative Research of Consumer Behavior
  • 55. Product Validation - Are You a Spy? ● Are we spying on our users? Do they know what information we are collecting about them? Or how we collect that information? ● Are we manipulating users? How much information is really needed? Are we gathering more than we need, just because we can? Are we using it to force actions the users wouldn't normally make? ● Are we keeping our promises? Are we being good custodians of our user's information? Who are we sharing it with? Do we know what they do with our user's information?
  • 57. Me2BA Rules of Engagement ● Freedom | We agree not to coerce or manipulate each other. ● Respect of Boundaries | We agree to respect each other’s personal boundaries. ● Respectful Defaults | In the absence of stated preferences, we default to the most conservative behavior. ● Fairness & Non-exploitation | We agree to treat each other fairly and not exploit things that are shared. ● Good Communication | We agree to be forthright, honest and clear in our communication. ● Non-Harming | We agree not to willfully harm one another. ● Problem Solving | We agree to respectful, collaborative and fair problem solving methods.
  • 58. Respectful Technology Certification The Me2B Alliance certification will audit data collection and stewardship, product integrity and security. Data Integrity: To what degree is the consumer’ data collected, stored and shared with third parties? If there is a third party agreement, how are they accessing the data? Product Integrity: Does the user experience communicate what is happening with the consumers data? Legal Integrity: Are all consents and disclosures clear and understandable to the average consumer? Security Integrity: Is access to the consumer’s data protected?
  • 59. Product Integrity Testing Cookies: who is using the browser? Has the user given consent? Forced account creation: Must the user create an account before they can even see what the website is about? Data Minimization: What information is required to create an account? One-Off Transactions: Can people browse or buy something without creating an account? Legal Assurances: Is there a missing or hidden Privacy Policy? Terms of Service: Is the TOS easy to understand or is it "click wrap"?
  • 60. Product Integrity Testing For each item in the testing rubric: ● Which digital harm might be an issue? ● Supported by what anti-pattern? ● Preventing which IA Heuristic from being realized? ● Causing what result for the Me2B Relationship?
  • 61. Product Integrity Testing For each item in the testing rubric: ● Which digital harm might be an issue? ● Supported by what anti-pattern? ● Preventing which IA Heuristic from being realized? ● Causing what result for the Me2B Relationship? Example: ● Individual Control and Autonomy ● Sneaking: Forced Continuity ● Controllable, Communicative, Delightful ● Deterioration, Customer Support calls
  • 63. Product Integrity Test Findings: Brief description of findings relative to the user state, including what was observed on the page and any potential dark patterns or other errors that may affect the user experience. Evidence: Description of what the user sees on the page that indicates a potential problem or good practice. Screenshots are indicated if taken. User Experience: How the user may experience the component or task flow. This includes how the website experience either serves or blocks them from meeting their goal and how it makes them feel. Recommendation: Ideas to improve the experience Impact if Corrected: How the corrected problem may improve the user experience.
  • 64. Product Integrity Test IA Heuristic: Which information architecture heuristic is affected? Examples include Usable, Findable, Clear, Controllable, Delightful, Accessible, Credible UXP2 Lab Pattern: Which dark pattern may be occurring? These can be instances of sneaky and blocking behaviors like Redirection, Hidden Information, Forced Action, etc., that typically leverage biases and psychological states and serve to interrupt or change users from their goal. Severity: How bad is the problem? Does it appear to cause harm or risk? Notes: Additional comments, future testing
  • 66. “Digital Creator Acceptance Testing” Qualitative testing, similar to User Acceptance Testing, where we talk with product managers and developers about the framework. ● Invite a digital creator have their website or app audited ● Test data, product, legal and security practice requirements ● Present a score for each test ● Discuss how it might help them meet legal requirements ● Help them to update legacy thinking and ● Improve their relationship with their customers
  • 67. Be-s Want to Play Digital creators—designers and developers alike—need to unlearn some practices. There is a path, but it isn’t going to be easy. Yet, the motivation toward good customer relationships is leading the way.
  • 68. Respectful Technology Digital Harms Dictionary A deep dive into online harms and what you can do about them. GoodTech.wiki An online reference for B-s and Me-s interested in learning about respectful technology companies, products and services. https://me2ba.org/library/
  • 69. Thanks! Noreen Whysel noreen.whysel@me2ba.org @nwhysel View my work in Respectful Tech: www.me2ba.org