SlideShare una empresa de Scribd logo
1 de 31
What trust is?
Definition and things we know
Trust
Background: http://theoatmeal.com/comics/trust
<<…the willingness of a party to be
vulnerable to the actions of another
party, based on the expectation that the other
will perform a particular action>>Mayer, et al (1995) An integrative
model of organizational trust.
Trust Toward Systems
Empirical studies suggest that
people do have a sense of
“trust” toward systems (TTS)
Background: Pinterest: Bruno Mangyoku
6 things we know about TTS from literature
1
2
3
Human-to-Human Trust and TTS are
different types of trust
Our general TTS changes with the use of
technology – Experience with specific products change
trust toward a class products
We learn to recognize trustworthy
features and design elements
experientially based heuristics to judge/assess (even before
use) a product.
Background: pixabay.com
Thatcher, J.B. et al (2011) The Role of Trust in Postadoption IT Exploration: An Empirical
Examination of Knowledge Management Systems. IEEE TEM 58, 56-70
Lankton, N.K., McKnight, D.H., Tripp, J.: Technology, humanness, and trust: Rethinking trust in
technology. JAIS 16, 880 (2015)
6 things we know about TTS from literature
4
5
TTS correlates with perceived qualities
of a technology – High trust because of high
perceived quality e.g., usability, aesthetics, usefulness etc.
TTS could be shaped by design
Trust could be misplaced and violated
Dark patterns, communication techniques
6
pixabay.com
Shneiderman, B. (2000) Designing trust into online experiences. Communications of the ACM 43,
57-59
Pengnate, S., & Sarathy, R. (2017). An experimental investigation of the influence of website
emotional design featureson trust in unfamiliar online vendors. Computersin Human Behavior,
67, 49-60.
Gigerenzer, G., Brighton, H. (2009) Homo heuristicus: Why biased minds make better inferences.
Topics in cognitive science 1, 107-143
Trust toward systems,
deception and manipulation
Trust could be design: Designing for trust
Background:Michael Boeke (2015) Designing for Trust, Codemotion Event
“…methodology that attempts to design our perception
of trust in a system” Cofta, P. (2009). Designing for trust.
Trust could be design: Designing for trust
To make visible and recognizable certain features of the
design that people want to control/experience to trust a
product
Background:Michael Boeke (2015) Designing for Trust, Codemotion Event
Designing for trust and violation
If trust may be designed, then it may also be
manipulated
• Ambiguous design elements
• Some product’s features more visible than others
(less appealing)
Different levels of violation
of trust
Bad design behind a good appearance
It is the right way to
insert the key?
http://www.presentationzen.com/presentationzen/2008/11/design-means-putting-yourself-in-the-users-shoes.html
Deceptive design: Dark patterns
Background: https://darkpatterns.org/
Dark patterns: easy to access difficult to leave
To open an account on Amazon you need about 4 actions (insert and clicks)
To close your account… You need to know how to do it! And it takes time
Surce: https://www.youtube.com/watch?v=kxkrdLI6e6M
Violation of expectations
My expectation Reality
I bought a Smart TV of a well know brand
Packaging and information 
Deceptive / manipulated information
Patrick Vlaskovits (2011) Henry Ford, Innovation, and That “Faster Horse” Quote. Harward
Business Review https://hbr.org/2011/08/henry-ford-never-said-the-fast
“Partial” or deceptive information (illegal)
You bought a car that has less
horsepower than in the description
http://autoweek.com/article/car-news/hyundai-busted-over-performance-claims
During a social exchange people:
may rely on a specialised cognitive mechanism
to detect cheaters;
tend to look at (and remember) cheaters more
than co-operators
are able to recognise and exclude cheaters
from the exchange;
How we may defend our selves
Lessons from evolutionary psychology
1
2
3
Cosmides, L. (1989). The logic of social exchange: Has natural selection shaped how humans reason? Studies with
the Wason selection task. Cognition, 31(3), 187-276.
Verplaetse, J., Vanneste, S., & Braeckman, J. (2007). You can judge a book by its cover: the sequel.: A kernel of truth
in predictive cheating detection. Evolution and Human Behavior, 28(4), 260-271.
What we don’t know
When we select and use a technology…
Are we able to detect if a technology is
worthy or not of trust before we use it?
Is TTS part of (or affects) our
experience with technology?
1
2
Giorgio de Chirico, Mystery and Melancholy of a Street, 1914
Working Hypothesis
Trust as part of UX
UX AND TRUST
Pohlmeyer, et al 2009 User Experience Lifecycle Model ContinUE
Previous knowledge
TRUST pre-use
TRUST Post-use
(change of knowledge)
Our literature-based assumption
Pre-Use
Anticipated
Experience
Past-Use
Retrospective
Experience
Before the use
People are placing (indirectly) their trust
on the fact that manufacturers have
created a product/service with certain set
of qualities and characteristics
e.g., usefulness, safety, learnability, usability and reliability
Assessment of trust after the experience (also affect the Brand)
Trust Toward Systems: our definition
Before the use
We look for cues and information to enrich
our TTS
Visible design and information about tech:
• Are essential to convey a sense of trust
• May trick people trust
Are we able to detect technology cheaters?
TTS is a product-mediated relationship between people
i.e., the end-user and the designer.
1
2
Why trust is important
Lessons learned and yet to be learned
Healthcare technology for home use
lay users are buying and subscribing to more and
more systems for monitoring and informing their
decision making about well-being
Poor devices may e.g., compromise people well-being,
bring to unnecessary medical consultations etc.
A large international study is coming
So far we performed an exploratory (Pilot) analysis with small samples of experts
and lay users to test different tools and to inform our experimental design…and we
have learned some lessons
Lesson 1. Appearance is powerful
The link between trust and appearance is a powerful heuristics, but it could be a false friend
(also for professionals)
• 17 healthcare professionals
• 4 innovative diagnostics device
• Measure of trust before the use
and perceived appearance
Lesson 2. People know that appearance is a false friend
Users (Expert/Lay) are aware of the fact that good appearance is a false friend.
They tend to look for information to confirm or disconfirm that a device is good or bad
(decision making)
• 10 lay users
• 4 commercial Home MD
• Sequential set of information
• Measure of trust before the use
Rank devices trustworthiness without information
Layer of information:Participantmay switch to another (more
trustable) device after each set of information or maintain the
previous choice
Review of
other users
Lesson 3. Technology-Cheater detection mechanism is not impossible
No information
Information
set 1
Information
set 2
Information set
3
Other
people
Review
Very trustable device (HUA) 30% XX% XX% XX% XX%
Cheaters (LUA) - - - - -
Low Appearance but usable
and reliable
30% XX% XX% XX% XX%
Low Usability but reliable
and good appearance
40% XX% XX% XX% -
At least for this small sample, it seems:
Lay users are able to identify just looking at the device (without information) whether a device is or
not trustworthy (technology-Cheaters detection)
Why is important to investigate trust?
2. home MD are more and more available to lay users.
• This increased availability needs transparency of information that is often
missing (about and around) devices.
• Lack of transparency may damage:
• lay people well being, their trust as well as their experience of use.
• (in the long run) the market
1. People trust toward autonomous tech and AI assistant is key topic for the
successful implementation in our society of these emerging technology
Thank you!

Más contenido relacionado

Similar a Simone Borsci - Deceptive design, user experience and trust

Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligencemahaveermalhi1
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Psycology of Digital Trust
Psycology of Digital TrustPsycology of Digital Trust
Psycology of Digital TrustBahaa Al Zubaidi
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Peter Bihr
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2ifi8106tlu
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchPeter Bihr
 
Trustworthy Recommender Systems
Trustworthy Recommender SystemsTrustworthy Recommender Systems
Trustworthy Recommender SystemsWQ Fan
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Peter Bihr
 
Responsible AI in Industry: Practical Challenges and Lessons Learned
Responsible AI in Industry: Practical Challenges and Lessons LearnedResponsible AI in Industry: Practical Challenges and Lessons Learned
Responsible AI in Industry: Practical Challenges and Lessons LearnedKrishnaram Kenthapadi
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015Marianne Sweeny
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongForrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongDuo Security
 
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...Journalism Interactive
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
Predictive analytics: hot and getting hotter
Predictive analytics: hot and getting hotterPredictive analytics: hot and getting hotter
Predictive analytics: hot and getting hotterThe Marketing Distillery
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminarExperience Dynamics
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010Tim Willoughby
 
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AIAICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AIFIAT/IFTA
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityAmy Lenzo
 

Similar a Simone Borsci - Deceptive design, user experience and trust (20)

Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Psycology of Digital Trust
Psycology of Digital TrustPsycology of Digital Trust
Psycology of Digital Trust
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 
Trustworthy Recommender Systems
Trustworthy Recommender SystemsTrustworthy Recommender Systems
Trustworthy Recommender Systems
 
Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)Towards a Trustmark for IoT (30 May 2018)
Towards a Trustmark for IoT (30 May 2018)
 
Responsible AI in Industry: Practical Challenges and Lessons Learned
Responsible AI in Industry: Practical Challenges and Lessons LearnedResponsible AI in Industry: Practical Challenges and Lessons Learned
Responsible AI in Industry: Practical Challenges and Lessons Learned
 
Sweeny group think-ias2015
Sweeny group think-ias2015Sweeny group think-ias2015
Sweeny group think-ias2015
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication WrongForrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
 
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...
Digital Journalism Education Teach-A-Thon | Why UX Design Matters | Journalis...
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Predictive analytics: hot and getting hotter
Predictive analytics: hot and getting hotterPredictive analytics: hot and getting hotter
Predictive analytics: hot and getting hotter
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminar
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AIAICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & Security
 

Más de nois3

Marc Fonteijn - How we tackle the future
Marc Fonteijn - How we tackle the futureMarc Fonteijn - How we tackle the future
Marc Fonteijn - How we tackle the futurenois3
 
Marilia Moita - What if smart cities were people centered
Marilia Moita - What if smart cities were people centeredMarilia Moita - What if smart cities were people centered
Marilia Moita - What if smart cities were people centerednois3
 
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humans
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humansMaria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humans
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humansnois3
 
Charlotte Davies - Researching Voice UX
Charlotte Davies - Researching Voice UXCharlotte Davies - Researching Voice UX
Charlotte Davies - Researching Voice UXnois3
 
Filippo Perlini - From Real to Unreal and Viceversa
Filippo Perlini - From Real to Unreal and ViceversaFilippo Perlini - From Real to Unreal and Viceversa
Filippo Perlini - From Real to Unreal and Viceversanois3
 
Nadia Piet - Design Thinking for AI
Nadia Piet - Design Thinking for AINadia Piet - Design Thinking for AI
Nadia Piet - Design Thinking for AInois3
 
Roberta Tassi - Future Skill sets
Roberta Tassi - Future Skill setsRoberta Tassi - Future Skill sets
Roberta Tassi - Future Skill setsnois3
 
Dee Scarano - Creating Better Products, Faster with Design Sprints
Dee Scarano - Creating Better Products, Faster with Design SprintsDee Scarano - Creating Better Products, Faster with Design Sprints
Dee Scarano - Creating Better Products, Faster with Design Sprintsnois3
 
Carlo Frinolli - Welcome #WUDRome2018
Carlo Frinolli - Welcome #WUDRome2018Carlo Frinolli - Welcome #WUDRome2018
Carlo Frinolli - Welcome #WUDRome2018nois3
 
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...nois3
 
Vincenzo Di Maria - User friendly & abuser unfriendly
Vincenzo Di Maria - User friendly & abuser unfriendly Vincenzo Di Maria - User friendly & abuser unfriendly
Vincenzo Di Maria - User friendly & abuser unfriendly nois3
 
Pietro Gregorini - Solo in Cartolina: creativity for change
Pietro Gregorini - Solo in Cartolina: creativity for changePietro Gregorini - Solo in Cartolina: creativity for change
Pietro Gregorini - Solo in Cartolina: creativity for changenois3
 
Matteo Cadeddu - Change.org: human centered change
Matteo Cadeddu - Change.org: human centered changeMatteo Cadeddu - Change.org: human centered change
Matteo Cadeddu - Change.org: human centered changenois3
 
Lorenzo Fabbri - Le parole sono importanti
Lorenzo Fabbri - Le parole sono importantiLorenzo Fabbri - Le parole sono importanti
Lorenzo Fabbri - Le parole sono importantinois3
 
Katy Arnold - Building trust in public service delivery with human centered d...
Katy Arnold - Building trust in public service delivery with human centered d...Katy Arnold - Building trust in public service delivery with human centered d...
Katy Arnold - Building trust in public service delivery with human centered d...nois3
 
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...nois3
 
Alessandra Petromilli - VUI: Design Patterns and Challenges
Alessandra Petromilli - VUI: Design Patterns and ChallengesAlessandra Petromilli - VUI: Design Patterns and Challenges
Alessandra Petromilli - VUI: Design Patterns and Challengesnois3
 
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...nois3
 
Accredia: proudly powered by co-design & WordPress
Accredia: proudly powered by co-design & WordPressAccredia: proudly powered by co-design & WordPress
Accredia: proudly powered by co-design & WordPressnois3
 
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017Decentralizing design for inclusion - Rosana Ardila, WUDRome2017
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017nois3
 

Más de nois3 (20)

Marc Fonteijn - How we tackle the future
Marc Fonteijn - How we tackle the futureMarc Fonteijn - How we tackle the future
Marc Fonteijn - How we tackle the future
 
Marilia Moita - What if smart cities were people centered
Marilia Moita - What if smart cities were people centeredMarilia Moita - What if smart cities were people centered
Marilia Moita - What if smart cities were people centered
 
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humans
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humansMaria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humans
Maria Rosanna Fossati - Robotics, intelligent machines, prosthetics… and humans
 
Charlotte Davies - Researching Voice UX
Charlotte Davies - Researching Voice UXCharlotte Davies - Researching Voice UX
Charlotte Davies - Researching Voice UX
 
Filippo Perlini - From Real to Unreal and Viceversa
Filippo Perlini - From Real to Unreal and ViceversaFilippo Perlini - From Real to Unreal and Viceversa
Filippo Perlini - From Real to Unreal and Viceversa
 
Nadia Piet - Design Thinking for AI
Nadia Piet - Design Thinking for AINadia Piet - Design Thinking for AI
Nadia Piet - Design Thinking for AI
 
Roberta Tassi - Future Skill sets
Roberta Tassi - Future Skill setsRoberta Tassi - Future Skill sets
Roberta Tassi - Future Skill sets
 
Dee Scarano - Creating Better Products, Faster with Design Sprints
Dee Scarano - Creating Better Products, Faster with Design SprintsDee Scarano - Creating Better Products, Faster with Design Sprints
Dee Scarano - Creating Better Products, Faster with Design Sprints
 
Carlo Frinolli - Welcome #WUDRome2018
Carlo Frinolli - Welcome #WUDRome2018Carlo Frinolli - Welcome #WUDRome2018
Carlo Frinolli - Welcome #WUDRome2018
 
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...
Daniela Petrillo - Progettare una salute accessibile: l'eterna lotta tra la r...
 
Vincenzo Di Maria - User friendly & abuser unfriendly
Vincenzo Di Maria - User friendly & abuser unfriendly Vincenzo Di Maria - User friendly & abuser unfriendly
Vincenzo Di Maria - User friendly & abuser unfriendly
 
Pietro Gregorini - Solo in Cartolina: creativity for change
Pietro Gregorini - Solo in Cartolina: creativity for changePietro Gregorini - Solo in Cartolina: creativity for change
Pietro Gregorini - Solo in Cartolina: creativity for change
 
Matteo Cadeddu - Change.org: human centered change
Matteo Cadeddu - Change.org: human centered changeMatteo Cadeddu - Change.org: human centered change
Matteo Cadeddu - Change.org: human centered change
 
Lorenzo Fabbri - Le parole sono importanti
Lorenzo Fabbri - Le parole sono importantiLorenzo Fabbri - Le parole sono importanti
Lorenzo Fabbri - Le parole sono importanti
 
Katy Arnold - Building trust in public service delivery with human centered d...
Katy Arnold - Building trust in public service delivery with human centered d...Katy Arnold - Building trust in public service delivery with human centered d...
Katy Arnold - Building trust in public service delivery with human centered d...
 
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...
Federica Fragapane - The Stories Behind a Line. Una narrazione visiva del via...
 
Alessandra Petromilli - VUI: Design Patterns and Challenges
Alessandra Petromilli - VUI: Design Patterns and ChallengesAlessandra Petromilli - VUI: Design Patterns and Challenges
Alessandra Petromilli - VUI: Design Patterns and Challenges
 
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...
Donatella Ruggeri - Moral Centered Design. Siamo pronti a progettare esperien...
 
Accredia: proudly powered by co-design & WordPress
Accredia: proudly powered by co-design & WordPressAccredia: proudly powered by co-design & WordPress
Accredia: proudly powered by co-design & WordPress
 
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017Decentralizing design for inclusion - Rosana Ardila, WUDRome2017
Decentralizing design for inclusion - Rosana Ardila, WUDRome2017
 

Último

Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...babafaisel
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️soniya singh
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funneljen_giacalone
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxTusharBahuguna2
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Servicearoranaina404
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 

Último (20)

Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
Kala jadu for love marriage | Real amil baba | Famous amil baba | kala jadu n...
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funnel
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 

Simone Borsci - Deceptive design, user experience and trust

  • 1.
  • 2. What trust is? Definition and things we know
  • 3. Trust Background: http://theoatmeal.com/comics/trust <<…the willingness of a party to be vulnerable to the actions of another party, based on the expectation that the other will perform a particular action>>Mayer, et al (1995) An integrative model of organizational trust.
  • 4. Trust Toward Systems Empirical studies suggest that people do have a sense of “trust” toward systems (TTS) Background: Pinterest: Bruno Mangyoku
  • 5. 6 things we know about TTS from literature 1 2 3 Human-to-Human Trust and TTS are different types of trust Our general TTS changes with the use of technology – Experience with specific products change trust toward a class products We learn to recognize trustworthy features and design elements experientially based heuristics to judge/assess (even before use) a product. Background: pixabay.com Thatcher, J.B. et al (2011) The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems. IEEE TEM 58, 56-70 Lankton, N.K., McKnight, D.H., Tripp, J.: Technology, humanness, and trust: Rethinking trust in technology. JAIS 16, 880 (2015)
  • 6. 6 things we know about TTS from literature 4 5 TTS correlates with perceived qualities of a technology – High trust because of high perceived quality e.g., usability, aesthetics, usefulness etc. TTS could be shaped by design Trust could be misplaced and violated Dark patterns, communication techniques 6 pixabay.com Shneiderman, B. (2000) Designing trust into online experiences. Communications of the ACM 43, 57-59 Pengnate, S., & Sarathy, R. (2017). An experimental investigation of the influence of website emotional design featureson trust in unfamiliar online vendors. Computersin Human Behavior, 67, 49-60. Gigerenzer, G., Brighton, H. (2009) Homo heuristicus: Why biased minds make better inferences. Topics in cognitive science 1, 107-143
  • 8. Trust could be design: Designing for trust Background:Michael Boeke (2015) Designing for Trust, Codemotion Event “…methodology that attempts to design our perception of trust in a system” Cofta, P. (2009). Designing for trust.
  • 9. Trust could be design: Designing for trust To make visible and recognizable certain features of the design that people want to control/experience to trust a product Background:Michael Boeke (2015) Designing for Trust, Codemotion Event
  • 10. Designing for trust and violation If trust may be designed, then it may also be manipulated • Ambiguous design elements • Some product’s features more visible than others (less appealing)
  • 11. Different levels of violation of trust
  • 12. Bad design behind a good appearance It is the right way to insert the key? http://www.presentationzen.com/presentationzen/2008/11/design-means-putting-yourself-in-the-users-shoes.html
  • 13. Deceptive design: Dark patterns Background: https://darkpatterns.org/
  • 14. Dark patterns: easy to access difficult to leave To open an account on Amazon you need about 4 actions (insert and clicks) To close your account… You need to know how to do it! And it takes time Surce: https://www.youtube.com/watch?v=kxkrdLI6e6M
  • 15. Violation of expectations My expectation Reality I bought a Smart TV of a well know brand Packaging and information 
  • 16. Deceptive / manipulated information Patrick Vlaskovits (2011) Henry Ford, Innovation, and That “Faster Horse” Quote. Harward Business Review https://hbr.org/2011/08/henry-ford-never-said-the-fast
  • 17. “Partial” or deceptive information (illegal) You bought a car that has less horsepower than in the description http://autoweek.com/article/car-news/hyundai-busted-over-performance-claims
  • 18. During a social exchange people: may rely on a specialised cognitive mechanism to detect cheaters; tend to look at (and remember) cheaters more than co-operators are able to recognise and exclude cheaters from the exchange; How we may defend our selves Lessons from evolutionary psychology 1 2 3 Cosmides, L. (1989). The logic of social exchange: Has natural selection shaped how humans reason? Studies with the Wason selection task. Cognition, 31(3), 187-276. Verplaetse, J., Vanneste, S., & Braeckman, J. (2007). You can judge a book by its cover: the sequel.: A kernel of truth in predictive cheating detection. Evolution and Human Behavior, 28(4), 260-271.
  • 19. What we don’t know When we select and use a technology… Are we able to detect if a technology is worthy or not of trust before we use it? Is TTS part of (or affects) our experience with technology? 1 2 Giorgio de Chirico, Mystery and Melancholy of a Street, 1914
  • 21. UX AND TRUST Pohlmeyer, et al 2009 User Experience Lifecycle Model ContinUE Previous knowledge TRUST pre-use TRUST Post-use (change of knowledge)
  • 22. Our literature-based assumption Pre-Use Anticipated Experience Past-Use Retrospective Experience Before the use People are placing (indirectly) their trust on the fact that manufacturers have created a product/service with certain set of qualities and characteristics e.g., usefulness, safety, learnability, usability and reliability Assessment of trust after the experience (also affect the Brand)
  • 23. Trust Toward Systems: our definition Before the use We look for cues and information to enrich our TTS Visible design and information about tech: • Are essential to convey a sense of trust • May trick people trust Are we able to detect technology cheaters? TTS is a product-mediated relationship between people i.e., the end-user and the designer. 1 2
  • 24. Why trust is important Lessons learned and yet to be learned
  • 25. Healthcare technology for home use lay users are buying and subscribing to more and more systems for monitoring and informing their decision making about well-being Poor devices may e.g., compromise people well-being, bring to unnecessary medical consultations etc.
  • 26. A large international study is coming So far we performed an exploratory (Pilot) analysis with small samples of experts and lay users to test different tools and to inform our experimental design…and we have learned some lessons
  • 27. Lesson 1. Appearance is powerful The link between trust and appearance is a powerful heuristics, but it could be a false friend (also for professionals) • 17 healthcare professionals • 4 innovative diagnostics device • Measure of trust before the use and perceived appearance
  • 28. Lesson 2. People know that appearance is a false friend Users (Expert/Lay) are aware of the fact that good appearance is a false friend. They tend to look for information to confirm or disconfirm that a device is good or bad (decision making) • 10 lay users • 4 commercial Home MD • Sequential set of information • Measure of trust before the use Rank devices trustworthiness without information Layer of information:Participantmay switch to another (more trustable) device after each set of information or maintain the previous choice Review of other users
  • 29. Lesson 3. Technology-Cheater detection mechanism is not impossible No information Information set 1 Information set 2 Information set 3 Other people Review Very trustable device (HUA) 30% XX% XX% XX% XX% Cheaters (LUA) - - - - - Low Appearance but usable and reliable 30% XX% XX% XX% XX% Low Usability but reliable and good appearance 40% XX% XX% XX% - At least for this small sample, it seems: Lay users are able to identify just looking at the device (without information) whether a device is or not trustworthy (technology-Cheaters detection)
  • 30. Why is important to investigate trust? 2. home MD are more and more available to lay users. • This increased availability needs transparency of information that is often missing (about and around) devices. • Lack of transparency may damage: • lay people well being, their trust as well as their experience of use. • (in the long run) the market 1. People trust toward autonomous tech and AI assistant is key topic for the successful implementation in our society of these emerging technology