SlideShare a Scribd company logo
1 of 44
Trust
Human Computer Interaction
perspective
Plan for today
• We will start by setting
– The theoretical underpinnings of
• Human Computer Trust
• Design Persuasion, Emotion & Trust
– Address the key principles of design for
– Persuasion, Emotion & Trust
– Focus on design for Trust
Trust and HCI
• HCI
– Study computing and computational artifacts as
they relate to the human condition.
• Trust
– Study the dynamic nature of trust in relationships
Human Computer Trust
– how trust influences the human interactions
• Study the socio-technical nature of trust
• Study the role of Trust in user leverage engagement
Theoretical underpinnings
• Persuasion is…
– The act of changing people’s behaviors and beliefs
• Dictionary
– The action or process of persuading
• To make someone to act or believe in something
• HCI perspective
– Design actions or processes of persuading
• To change an attitude or behavior
Theoretical underpinnings
• HCI perspective
– Studding design methodologies to:
• Incentives people to become
– More engaged; and
– More connected with a certain product or ecosystems
• Change an attitude or behavior
– Attitude:
» reflects the way we think of fell about something
– Behaviour:
» reflects The way in which one acts or conducts oneself,
special towards the other
Persuasion, Emotion
& Trust
Design for…
key principles
• The ongoing cultural shift
– The existing ever-widening range of digital
artifacts is transforming our daily lives.
• New design methodologies are needed
– More engaging, compelling, and effective
• PET complements classic
– Usability & user experience best practices
Key principles
• PET aims is to
– Facilitates the “will do”
• Motivates people to complete the task
– Encourage. Motivates, constrains
• Usability aims is to
– Facilitates the “can do”
• Facilitates activities
key principles
• PET assumptions
– Persuasion
• Foster triggers actions;
– Emotion
• Generate an emotional response; and
– Trust
• Leverage credibility and cooperation.
WHY TRUST….
The trust role in…
• Leverage credibility and cooperation
– To assures the success of
• the action/process of persuading
• How it works?
?
Trust is crucial element
• Create trust enabling actions to make…
– activities proceed more smoothly,
– Ensure more transparent behaviours,
– people work with greater confidence.
• To encourage people to
– Cooperate
– Accept certain technologies
– Execute more positive actions
– Creates social bounds
– Establish empathic relations
Trust represents a key value
• In foster more
– Social participation
• eParticipation through civil engagement
– Cooperation
• Peer to peer work
• In encouraging
– Economical transactions
• Ecommerce
– sharing practices
• sharing economy
– Sustainability
• Changing user behaviours incentive more reuse practices
Trust represents a key value
• In incentive designers
– To provide
• GOOD DESIGN patterns
– Avoiding the Evil UX design
• Done by not so honest people
– That deliberately design to fool, trick or exploit users
– To balance on what some refer to
• The vision and values of dark vs good design patterns.
• Examples of this exist on the web,
in software and even in the real world
See http://darkpatterns.org
The challenge to design for trust
• Lies on two main approaches
– one that reflects a strict operational standpoint; and
another
– that sees trust as an internal quality.
• Although both views seem divergent in nature
– We believe that they complement each other
• One focus on technical aspects
– designing for reliable systems with the main aim of preventing
risks
• The other supports the social component of the system
– that sits upon a technical base
Trust is a of a state of mind
• Trust reflects
– a confidence and the predisposition to trust another.
• This come based on a set of perceptions of
– another as 'trustworthy’.
– Gain by the ability to observe reinsurance elements
• Looking for a balance between
– an individual's commitments and the risk involved
Trust is a reinsurance element,
• Trust reflects certain properties that
– help users to cope with the risk
– Support users to perceive intended behaviours
• Trust reflects a balance between
– individual's commitments to engage with
• a certain Tasks,
• a certain person,
• A system or community
– and the risk involved
How it works?
• Trust is dynamic
– It changes through time
• It is likely to have impact on the parties and on the
relationship.
• To trust we rely on
– The identification of certain
• Trustworthy making qualities
– The identification of signs that lead you to perceive
• A society, a person, and or a technological artifact
– Is in fact 'trustworthy’
Common touch points
• Within the user centered design framework
Analysis Design Implementation
Evaluation
Contextual inquiry
Ethnographic research
Competitive research
Interviews
Personas and scenarios
Information architecture
Prototyping
Standard & guidelines
Mental mapping
Design frameworks
Storyboards
Cognitive walkthrough
Usability testing
Wizard of OZ
Thinkaloud protocol
Design challenge
• Contextual overview
– The Sharing Economy has brought new attention
to the everyday practice of sharing.
– Digital tools are changing both what we can do
together across neighbourhoods and
• Reshaping the way we
– think about sharing our time, materials and skills.
• By fostering more trustful sharing practices.
Design challenge
• Create a set of
– Trust enabling sharing task scenarios to persuade
TLU students to
• share time, materials and skills among themselves.
– Context the TLU student community
• The exchange students
• Students that use the dormitory.
The design process
User
Research
&
Understanding
STARTS
Set the Goals
Definition &
Design
Create task
scenarios
ENDS
Procedure
• Step 1
– Create a set of possible sharing goals;
– and
• Step 2
– Create a set of possible sharing tasks;
• Step 3
– Create a set of Trust enabling sharing actions;
• Step 4
– Select the most relevant actions to your trust enabling
sharing scenario
STEP 1 – WHAT DO WE SHARE
What do we share?
• space,
• time,
• things,
• transport,
• skills,
• childcare,
• buying decisions,
• meals,
• celebration
STEP 2 - WHY DO WE SHARE?
Why do we share?
• For sustainability…
– For cooperation and trust
– When facing difficult times;
– For sense and purpose
– Create more gainful activities that give a sense of
purpose;
– To spend less, waste less, consume less.
Why do we share?
• Create a set possible sharing behaviours
What makes us share Why we avoid sharing
To save money Unclear responsibilities and legal
issues of what happens to the property
Students travel light, sharing
is convenient
The fear of not getting one’s item
back.
Get to know people The question of who’s responsible
when an item gets broken.
Third step
• inspection technique
– Use the toolkit to identify a set of
• Trust enabling sharing actions
• The products we will examine are
– http://neighborgoods.net
– http://www.streetbank.com
– https://www.peerby.com
– http://www.justshareit.com
– https://www.airbnb.com
STEP 3 – ANALYTIC TECHNIQUES
The socio-technical model of trust
Trust Predisposition
Competency
Predictability
Reciprocity
Benovelence
Honesty
Motivation
Willingness
Expectations
Rational perception
Emotional
perception
Relationships
Commitments
Engagement
AttitudesQualities IntentionsBeliefs
The model
• This model depicts trust as a construct
– informed by 7 (seven) individual qualities
• The model determines the extent
– to which one relates with one's social and
technical environment.
Toolkit
• Working with user’s expectations
– Incentive or Motivate
• Represents the degree to which an individual believes
(even under conditions of vulnerability and
dependence) h/she has the ability to perform specific
beneficial actions when using a computer.
– Creating Willingness
• Reflects positive or negative feelings about performing
a given action while considering the risk and incentives.
Toolkit
• Working with user’s perceptions
– Perceiving competency
• Reflects the degree of ease of use when associated
with the use of the system.
– Perceiving predictability
• Represents a user's confidence that the system will
help him to perform a desired action in accordance
with what is expected.
Toolkit
• Working with user’s emotions
– Express benevolence
• reflects a user's perception that most people share
similar behaviours and values.
– Show reciprocity
• represents the degree to which an individual sees
oneself as a part of a group.
– Transmit honesty
• reflects an insurance quality when facing apprehension,
or even fear with the possibility of being deceived.
STEP 4 – ANALYTIC TECHNIQUES
Fourth step
• Perform a starfish analysis
– Connecting steps 1 and 2 With 3
• Look at the previous identified set of
– Trust enabling sharing task scenarios;
– Possible sharing goals;
– Possible sharing activities; and
• Select
– The ones that…
Stop
The ones that…
do not bring any added value to
your design solution
Starfish method
Less
The ones that…
don’t bring so much benefits to your
design solution
Starfish method
Keep
The ones that…
are good examples or practices and
you want to use...
Starfish method
More
The ones that…
are good examples or practices that
you fell that you should focus more
on.
Starfish method
Start
The ones that represent the…
Atomic actions or ideas that a team
wants to bring into the design.
Starfish method
Solution
• Create a set of
– Trust enabling sharing scenarios to persuade TLU
students to share time, materials and skills among
themselves.
Resources
• Sousa et al. (2014). A design space for trust
enabling interaction design. In Proceedings of the
International Conference on Multimedia,
Interaction, Design and Innovation MIDI 2014.
ACM.
• Sousa et al. (2015). Value creation through trust
in technologically-mediated social participation.
Technology, Innovation and Education, 1 - 9.
[forthcoming]
• https://humancomputertrust.wordpress.com

More Related Content

Viewers also liked

Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4Sónia
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4Sónia
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3Sónia
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceClare Hooper
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & TransparencyGeek Girls
 
Trust workshop
Trust workshopTrust workshop
Trust workshopSónia
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5Sónia
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsThe Research Thing
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7Sónia
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2Sónia
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsSónia
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1Sónia
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3Sónia
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Sónia
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6Sónia
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Finaljhustad1
 
Workshop 1
Workshop 1Workshop 1
Workshop 1Sónia
 

Viewers also liked (20)

Nettets genkomst?
Nettets genkomst?Nettets genkomst?
Nettets genkomst?
 
Lesson 17
Lesson 17Lesson 17
Lesson 17
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer Science
 
My ph.d Defence
My ph.d DefenceMy ph.d Defence
My ph.d Defence
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & Transparency
 
Trust workshop
Trust workshopTrust workshop
Trust workshop
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviews
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Final
 
Workshop 1
Workshop 1Workshop 1
Workshop 1
 

Similar to Trust from a Human Computer Interaction perspective

The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoLina Angel
 
PET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and TrustPET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and TrustBarry Briggs
 
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...Andrew Bishop
 
5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobsJacobs Australia
 
120903 IMID social media presentation
120903  IMID social media presentation120903  IMID social media presentation
120903 IMID social media presentationGed Carroll
 
An effective way to change organizations
An effective way to change organizationsAn effective way to change organizations
An effective way to change organizationsLeszek Soltysik
 
Workforce webinar september 30, 2015
Workforce webinar   september 30, 2015Workforce webinar   september 30, 2015
Workforce webinar september 30, 2015QuestionPro
 
Introduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryIntroduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryMarc Niola
 
Managerial Decision-Making
Managerial Decision-MakingManagerial Decision-Making
Managerial Decision-MakingLee Schlenker
 
Technologies and Innovation – Decision Making
Technologies and Innovation – Decision MakingTechnologies and Innovation – Decision Making
Technologies and Innovation – Decision MakingLee Schlenker
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision MakingDeni Triyanto
 
Enterprise digital transformation
Enterprise digital transformationEnterprise digital transformation
Enterprise digital transformationSunil Maulik
 
Design Operations
Design OperationsDesign Operations
Design OperationsDave Malouf
 
Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015Doing Something Good
 

Similar to Trust from a Human Computer Interaction perspective (20)

The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in Chicago
 
PET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and TrustPET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and Trust
 
Modeling and Measuring DevOps Culture
Modeling and Measuring DevOps CultureModeling and Measuring DevOps Culture
Modeling and Measuring DevOps Culture
 
4youthcitizens 2
4youthcitizens 24youthcitizens 2
4youthcitizens 2
 
Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020
 
Decision making
Decision makingDecision making
Decision making
 
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...
 
5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs
 
120903 IMID social media presentation
120903  IMID social media presentation120903  IMID social media presentation
120903 IMID social media presentation
 
Scrum
ScrumScrum
Scrum
 
An effective way to change organizations
An effective way to change organizationsAn effective way to change organizations
An effective way to change organizations
 
Workforce webinar september 30, 2015
Workforce webinar   september 30, 2015Workforce webinar   september 30, 2015
Workforce webinar september 30, 2015
 
Introduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryIntroduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual Inquiry
 
10 Ways to Prove the Business Value of Social
10 Ways to Prove the Business Value of Social10 Ways to Prove the Business Value of Social
10 Ways to Prove the Business Value of Social
 
Managerial Decision-Making
Managerial Decision-MakingManagerial Decision-Making
Managerial Decision-Making
 
Technologies and Innovation – Decision Making
Technologies and Innovation – Decision MakingTechnologies and Innovation – Decision Making
Technologies and Innovation – Decision Making
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision Making
 
Enterprise digital transformation
Enterprise digital transformationEnterprise digital transformation
Enterprise digital transformation
 
Design Operations
Design OperationsDesign Operations
Design Operations
 
Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015
 

More from Sónia

MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)Sónia
 
MG673 - Session 1
MG673 - Session 1MG673 - Session 1
MG673 - Session 1Sónia
 
Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Sónia
 
IFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesIFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesSónia
 
IFI7184.DT about the course
IFI7184.DT about the courseIFI7184.DT about the course
IFI7184.DT about the courseSónia
 
Comparative evaluation
Comparative evaluationComparative evaluation
Comparative evaluationSónia
 
Ifi7155 Contextualization
Ifi7155 ContextualizationIfi7155 Contextualization
Ifi7155 ContextualizationSónia
 
Hcc lesson7
Hcc lesson7Hcc lesson7
Hcc lesson7Sónia
 
Hcc lesson6
Hcc lesson6Hcc lesson6
Hcc lesson6Sónia
 
eduHcc lesson2-3
eduHcc lesson2-3eduHcc lesson2-3
eduHcc lesson2-3Sónia
 
Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)Sónia
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignSónia
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-finalSónia
 
Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Sónia
 
Workshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationWorkshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationSónia
 

More from Sónia (15)

MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)
 
MG673 - Session 1
MG673 - Session 1MG673 - Session 1
MG673 - Session 1
 
Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Ifi7184.DT lesson 2
Ifi7184.DT lesson 2
 
IFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesIFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languages
 
IFI7184.DT about the course
IFI7184.DT about the courseIFI7184.DT about the course
IFI7184.DT about the course
 
Comparative evaluation
Comparative evaluationComparative evaluation
Comparative evaluation
 
Ifi7155 Contextualization
Ifi7155 ContextualizationIfi7155 Contextualization
Ifi7155 Contextualization
 
Hcc lesson7
Hcc lesson7Hcc lesson7
Hcc lesson7
 
Hcc lesson6
Hcc lesson6Hcc lesson6
Hcc lesson6
 
eduHcc lesson2-3
eduHcc lesson2-3eduHcc lesson2-3
eduHcc lesson2-3
 
Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction Design
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-final
 
Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)
 
Workshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationWorkshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluation
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Trust from a Human Computer Interaction perspective

  • 2. Plan for today • We will start by setting – The theoretical underpinnings of • Human Computer Trust • Design Persuasion, Emotion & Trust – Address the key principles of design for – Persuasion, Emotion & Trust – Focus on design for Trust
  • 3. Trust and HCI • HCI – Study computing and computational artifacts as they relate to the human condition. • Trust – Study the dynamic nature of trust in relationships Human Computer Trust – how trust influences the human interactions • Study the socio-technical nature of trust • Study the role of Trust in user leverage engagement
  • 4. Theoretical underpinnings • Persuasion is… – The act of changing people’s behaviors and beliefs • Dictionary – The action or process of persuading • To make someone to act or believe in something • HCI perspective – Design actions or processes of persuading • To change an attitude or behavior
  • 5. Theoretical underpinnings • HCI perspective – Studding design methodologies to: • Incentives people to become – More engaged; and – More connected with a certain product or ecosystems • Change an attitude or behavior – Attitude: » reflects the way we think of fell about something – Behaviour: » reflects The way in which one acts or conducts oneself, special towards the other
  • 7. key principles • The ongoing cultural shift – The existing ever-widening range of digital artifacts is transforming our daily lives. • New design methodologies are needed – More engaging, compelling, and effective • PET complements classic – Usability & user experience best practices
  • 8. Key principles • PET aims is to – Facilitates the “will do” • Motivates people to complete the task – Encourage. Motivates, constrains • Usability aims is to – Facilitates the “can do” • Facilitates activities
  • 9. key principles • PET assumptions – Persuasion • Foster triggers actions; – Emotion • Generate an emotional response; and – Trust • Leverage credibility and cooperation.
  • 11. The trust role in… • Leverage credibility and cooperation – To assures the success of • the action/process of persuading • How it works? ?
  • 12. Trust is crucial element • Create trust enabling actions to make… – activities proceed more smoothly, – Ensure more transparent behaviours, – people work with greater confidence. • To encourage people to – Cooperate – Accept certain technologies – Execute more positive actions – Creates social bounds – Establish empathic relations
  • 13. Trust represents a key value • In foster more – Social participation • eParticipation through civil engagement – Cooperation • Peer to peer work • In encouraging – Economical transactions • Ecommerce – sharing practices • sharing economy – Sustainability • Changing user behaviours incentive more reuse practices
  • 14. Trust represents a key value • In incentive designers – To provide • GOOD DESIGN patterns – Avoiding the Evil UX design • Done by not so honest people – That deliberately design to fool, trick or exploit users – To balance on what some refer to • The vision and values of dark vs good design patterns. • Examples of this exist on the web, in software and even in the real world See http://darkpatterns.org
  • 15. The challenge to design for trust • Lies on two main approaches – one that reflects a strict operational standpoint; and another – that sees trust as an internal quality. • Although both views seem divergent in nature – We believe that they complement each other • One focus on technical aspects – designing for reliable systems with the main aim of preventing risks • The other supports the social component of the system – that sits upon a technical base
  • 16. Trust is a of a state of mind • Trust reflects – a confidence and the predisposition to trust another. • This come based on a set of perceptions of – another as 'trustworthy’. – Gain by the ability to observe reinsurance elements • Looking for a balance between – an individual's commitments and the risk involved
  • 17. Trust is a reinsurance element, • Trust reflects certain properties that – help users to cope with the risk – Support users to perceive intended behaviours • Trust reflects a balance between – individual's commitments to engage with • a certain Tasks, • a certain person, • A system or community – and the risk involved
  • 18. How it works? • Trust is dynamic – It changes through time • It is likely to have impact on the parties and on the relationship. • To trust we rely on – The identification of certain • Trustworthy making qualities – The identification of signs that lead you to perceive • A society, a person, and or a technological artifact – Is in fact 'trustworthy’
  • 19. Common touch points • Within the user centered design framework Analysis Design Implementation Evaluation Contextual inquiry Ethnographic research Competitive research Interviews Personas and scenarios Information architecture Prototyping Standard & guidelines Mental mapping Design frameworks Storyboards Cognitive walkthrough Usability testing Wizard of OZ Thinkaloud protocol
  • 20. Design challenge • Contextual overview – The Sharing Economy has brought new attention to the everyday practice of sharing. – Digital tools are changing both what we can do together across neighbourhoods and • Reshaping the way we – think about sharing our time, materials and skills. • By fostering more trustful sharing practices.
  • 21. Design challenge • Create a set of – Trust enabling sharing task scenarios to persuade TLU students to • share time, materials and skills among themselves. – Context the TLU student community • The exchange students • Students that use the dormitory.
  • 22. The design process User Research & Understanding STARTS Set the Goals Definition & Design Create task scenarios ENDS
  • 23. Procedure • Step 1 – Create a set of possible sharing goals; – and • Step 2 – Create a set of possible sharing tasks; • Step 3 – Create a set of Trust enabling sharing actions; • Step 4 – Select the most relevant actions to your trust enabling sharing scenario
  • 24. STEP 1 – WHAT DO WE SHARE
  • 25. What do we share? • space, • time, • things, • transport, • skills, • childcare, • buying decisions, • meals, • celebration
  • 26. STEP 2 - WHY DO WE SHARE?
  • 27. Why do we share? • For sustainability… – For cooperation and trust – When facing difficult times; – For sense and purpose – Create more gainful activities that give a sense of purpose; – To spend less, waste less, consume less.
  • 28. Why do we share? • Create a set possible sharing behaviours What makes us share Why we avoid sharing To save money Unclear responsibilities and legal issues of what happens to the property Students travel light, sharing is convenient The fear of not getting one’s item back. Get to know people The question of who’s responsible when an item gets broken.
  • 29. Third step • inspection technique – Use the toolkit to identify a set of • Trust enabling sharing actions • The products we will examine are – http://neighborgoods.net – http://www.streetbank.com – https://www.peerby.com – http://www.justshareit.com – https://www.airbnb.com
  • 30. STEP 3 – ANALYTIC TECHNIQUES
  • 31. The socio-technical model of trust Trust Predisposition Competency Predictability Reciprocity Benovelence Honesty Motivation Willingness Expectations Rational perception Emotional perception Relationships Commitments Engagement AttitudesQualities IntentionsBeliefs
  • 32. The model • This model depicts trust as a construct – informed by 7 (seven) individual qualities • The model determines the extent – to which one relates with one's social and technical environment.
  • 33. Toolkit • Working with user’s expectations – Incentive or Motivate • Represents the degree to which an individual believes (even under conditions of vulnerability and dependence) h/she has the ability to perform specific beneficial actions when using a computer. – Creating Willingness • Reflects positive or negative feelings about performing a given action while considering the risk and incentives.
  • 34. Toolkit • Working with user’s perceptions – Perceiving competency • Reflects the degree of ease of use when associated with the use of the system. – Perceiving predictability • Represents a user's confidence that the system will help him to perform a desired action in accordance with what is expected.
  • 35. Toolkit • Working with user’s emotions – Express benevolence • reflects a user's perception that most people share similar behaviours and values. – Show reciprocity • represents the degree to which an individual sees oneself as a part of a group. – Transmit honesty • reflects an insurance quality when facing apprehension, or even fear with the possibility of being deceived.
  • 36. STEP 4 – ANALYTIC TECHNIQUES
  • 37. Fourth step • Perform a starfish analysis – Connecting steps 1 and 2 With 3 • Look at the previous identified set of – Trust enabling sharing task scenarios; – Possible sharing goals; – Possible sharing activities; and • Select – The ones that…
  • 38. Stop The ones that… do not bring any added value to your design solution Starfish method
  • 39. Less The ones that… don’t bring so much benefits to your design solution Starfish method
  • 40. Keep The ones that… are good examples or practices and you want to use... Starfish method
  • 41. More The ones that… are good examples or practices that you fell that you should focus more on. Starfish method
  • 42. Start The ones that represent the… Atomic actions or ideas that a team wants to bring into the design. Starfish method
  • 43. Solution • Create a set of – Trust enabling sharing scenarios to persuade TLU students to share time, materials and skills among themselves.
  • 44. Resources • Sousa et al. (2014). A design space for trust enabling interaction design. In Proceedings of the International Conference on Multimedia, Interaction, Design and Innovation MIDI 2014. ACM. • Sousa et al. (2015). Value creation through trust in technologically-mediated social participation. Technology, Innovation and Education, 1 - 9. [forthcoming] • https://humancomputertrust.wordpress.com