skip to main content
10.1145/2470654.2466246acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Benevolent deception in human computer interaction

Published:27 April 2013Publication History

ABSTRACT

Though it has been asserted that "good design is honest", [42] deception exists throughout human-computer interaction research and practice. Because of the stigma associated with deception - in many cases rightfully so - the research community has focused its energy on eradicating malicious deception, and ignored instances in which deception is positively employed. In this paper we present the notion of benevolent deception, deception aimed at benefitting the user as well as the developer. We frame our discussion using a criminology-inspired model and ground components in various examples. We assert that this provides us with a set of tools and principles that not only helps us with system and interface design, but that opens new research areas. After all, as Cockton claims in his 2004 paper "Value-Centered HCI" [13], "Traditional disciplines have delivered truth. The goal of HCI is to deliver value."

References

  1. Adam, N. R., and J. C. Worthmann, "Security-control methods for statistical databases: a comparative study," ACM Computing Surveys, 21(4):515--556, Dec. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Arabe, K. C., "'Dummy' thermostats cool down tempers, not temperatures," Industry Market Trends, Apr. 11, 2003.Google ScholarGoogle Scholar
  3. Armitage, T., "Conversational UI: a short reading list," bit.ly/dFG77o, Dec. 10, 2010.Google ScholarGoogle Scholar
  4. Bell, J. B., and B. Whaley, Cheating and Deception, Transaction Publishers, 1991.Google ScholarGoogle Scholar
  5. Bok, S., Lying: Moral Choice in Public and Private Life, Vintage Press, 1999.Google ScholarGoogle Scholar
  6. Brignull, H., "Adding delays to increase perceived value: does it work?" bit.ly/i7lSCf, Dec. 16, 2010.Google ScholarGoogle Scholar
  7. Boehner, K. and J. T. Hancock, "Advancing ambiguity," CHI 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Brewer, B. R., M. Fagan, R. Kaltzky, and Y. Matsuoka, "Perceptual limits for a robotic rehabilitation environment using visual feedback distortion," IEEE Trans. on Neural System and Rehabilitation Eng., 13:1--11, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  9. Camerer, C. F., G. Loewenstein, and M. Rabin (eds.) Advances in Behavioral Economics, Princeton Press, 2003.Google ScholarGoogle Scholar
  10. Callison, H. R., "A time-sensitive object model for real-time systems," ACM TOSEM, 4(3):287--317, July, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Carter, K., A. Chalmsers, and C. Dalton, "Level of detail: varying rendering fidelity by exploiting human change blindness," Int. Conf on Comp Graphics and Int. Techniques in Aust. and South East Asia, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ciancutti, J., "5 lessons we've learned using AWS," Dec. 16, 2010, Available at: nflx.it/hrjm6J.Google ScholarGoogle Scholar
  13. Cockton, G., "Value-centered HCI," NordiCHI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Conti, G., and E. Sobiesk, "Malicious interface design: exploiting the user," WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cowell, A. J., and K. M. Stanney, "Manipulation of non-verbal interaction style and demographic embodiment to increase anthropomorphic computer character credibility," Int. J. of Human-Computer Studies, 62:281--306, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Dahlbäck, N., A. Jönsson, and L. Ahrenberg "Wizard of Oz studies: why and how," IUI, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Dark Patterns Wiki, http://wiki.darkpatterns.org.Google ScholarGoogle Scholar
  18. de Quetteville, H., "Fake bus stop keeps Alzheimer's patients from wandering off," Telegraph, Jun. 3, 2008.Google ScholarGoogle Scholar
  19. Erat, S., and U. Gneezy, "White lies," Management Science, Article in Advance, online Nov. 4, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Friedman, B., Designing Casinos to Dominate the Competition, ISGCG, University of Nevada, 2000.Google ScholarGoogle Scholar
  21. Friedman, B., Human Values and the Design of Computer Technology, CSLI, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Fogg, B. J., Persuasive Technology: Using Computes to Change What We Think and Do, Morgan Kaufmann, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Gottleieb, H., "The Jack Principles," Jellyvision Inc., bit.ly/9pYnaM, 1997.Google ScholarGoogle Scholar
  24. Hancock, J. T., J. Thom-Santelli, and T. Ritchie, "Deception and design: the impact of communication technology on lying behavior," CHI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Harrison, C., Yeo, Z., and Hudson, S. E., "Faster progress bars: manipulating perceived duration with visual augmentations," CHI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Irani, K. B, V. L. Wallace, and J. H. Jackson, "Conversational design of stochastic service systems from a graphical terminal," Int. Symp on Comp Graphics, 1970.Google ScholarGoogle Scholar
  27. Johnson C. W., "Looking beyond the cockpit: human computer interaction in the causal complexes of aviation accidents," HCI in Aerospace, EURISCO, 2004.Google ScholarGoogle Scholar
  28. Kay, A., "User interface: a personal view," In B. Laurel (ed.), The Art of Human-Computer Interface Design, AddisonWesley, 1991.Google ScholarGoogle Scholar
  29. Klesen, M., M. Kipp, P. Gebhard, "Staging exhibitions: methods and tools for modeling narrative structure to produce interactive performance with virtual actors," Virtual Reality, 2003, 7(1):17--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Krugman, P., "What price fairness?," The New York Times, Oct. 4, 2000.Google ScholarGoogle Scholar
  31. Lakoff, G., and M. Johnson, Metaphors We Live By, University of Chicago Press, 1980.Google ScholarGoogle Scholar
  32. Laurel, B., Computers as Theatre, Addison-Wesley, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Luo, M., "For exercise in New York futility, push button," The New York Times, Feb. 27, 2004.Google ScholarGoogle Scholar
  34. Marling, K. A. (ed.), Designing Disney's Theme Parks: The Architecture of Reassurance, Flammarion, 1997.Google ScholarGoogle Scholar
  35. Mattioli, D., "On Orbitz Mac users steered to pricier hotels," Wall Street Journal, August 23, 2012.Google ScholarGoogle Scholar
  36. Mine, M., "Towards virtual reality for the masses: 10 years of research at Disney's VR Studio," Eurographics, 2003.Google ScholarGoogle Scholar
  37. MitraŰinovi, M., Total Landscape, Theme Parks, Public Space, Ashgate, 2006.Google ScholarGoogle Scholar
  38. Nelson, T. H., "The right way to think about software design," In B. Laurel (ed.), The Art of Human-Computer Interface Design, Addison-Wesley 1991.Google ScholarGoogle Scholar
  39. Norman, Donald, "Some observations of mental models," In Gentner, Dedre & Stevens, Albert L. (eds.), Mental Models, Lawrence Erlbaum Associates, 1983.Google ScholarGoogle Scholar
  40. OCLC, "Fourteen heuristics used in OCLC heuristic evaluations," http://www.oclc.org/, retrieved Jan. 2008.Google ScholarGoogle Scholar
  41. Plauger, P. J., "Chocolate," Embedded Systems Programming, 7(3):81--84, Mar. 1994.Google ScholarGoogle Scholar
  42. Rams, D., "Ten principles for good design," bit.ly/QUk4gY, retrieved Sept. 2012.Google ScholarGoogle Scholar
  43. Reeves, B., and C. Nass, The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places, CSLI, 2003.Google ScholarGoogle Scholar
  44. Richards, J. I., Deceptive Advertising: Behavioral Study of a Legal Concept, Lawrence Erlbaum Associates, 1990.Google ScholarGoogle Scholar
  45. Rubinstein, R., and H. M. Hersh, The Human Factory: Designing Computer Systems for People, Digital, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Schmandt, C., "Illusion in the interface," in The Art of Human-Computer Interface Design, Addison-Wesley, 1991.Google ScholarGoogle Scholar
  47. Sandberg, J., "Some cold employees may never find relief," Wall Street Journal Online, Jan. 17, 2003.Google ScholarGoogle Scholar
  48. Schull, N. D., "Digital gambling: the coincidence of desire and design," Annals of the Am. Ac. Of Poli. And Soc. Sci., January 2005, 597(1):65--81.Google ScholarGoogle ScholarCross RefCross Ref
  49. Stone, A., "Why waiting is torture," New York Times, Aug. 18, 2012.Google ScholarGoogle Scholar
  50. Stuff, J. B., H. J. Kim, and C. N. Ramesh, "Truth biases and aroused suspicion in relational deception," Communications Research, 1992, 19:326--345.Google ScholarGoogle ScholarCross RefCross Ref
  51. Takayama, L., D. Dooley, W. Ju, "Expressing thought: improving robot readability with animation principles," HRI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Tractinsky, N., A. S. Katz, and D. Ikar, "What is beautiful is usable," Interacting with Computers, 13:127--145, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  53. Teevan, J., "The Re:Search Engine: simultaneous support for finding and re-finding." UIST, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Tognazzini, B., "Principles, techniques, and ethics of stage magic and their application to human interface design," INTERCHI, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. West, Mick, "Intelligent mistakes: how to incorporate stupidity into your AI code," bit.ly/Nq0sCL, September 15, 2012.Google ScholarGoogle Scholar
  56. Weyenberg, A., "Is realistic UI design realistic?" bit.ly/9b5Tr0, retrieved Oct. 2010.Google ScholarGoogle Scholar
  57. Zheng, L, "Interview with Oliver Scholz: Vista Speech UX program manager," bit.ly/dCIRWH, Sep. 1, 2006.Google ScholarGoogle Scholar

Index Terms

  1. Benevolent deception in human computer interaction

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2013
      3550 pages
      ISBN:9781450318990
      DOI:10.1145/2470654

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 April 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '13 Paper Acceptance Rate392of1,963submissions,20%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader