SlideShare a Scribd company logo
1 of 5
Establishing Trust via Context, Content, Process, and
          Leadership: A Pattern Language Approach
                                              John C. Thomas
                                     IBM T. J. Watson Research Center
                                PO Box 704, Yorktown Heights, NY 10598 USA
                                           jcthomas@us.ibm.com
                                             (01)-914-784-7561
ABSTRACT                                                             Nonetheless, most of the interactions of most people most
In this paper, we describe some often overlooked factors             of the time were face to face. The characteristics of this
relating to trust. We describe those parts of a socio-               spatial reality automatically worked to help generate trust.
technical Pattern Language that should lead to greater trust.        One characteristic of typical face to face interactions is
These deal with context, content, process, and leadership.           reciprocity of information. When I speak, we can both hear
We describe how some of these apply to a series of large,            what I am saying. If I can see you, you can see me.
on-line events called “Jams.”                                        Moreover, if we are in close physical proximity, the
                                                                     possibility for doing physical harm is always present.
Author Keywords                                                      When physical harm does not occur, though it could, trust is
Trust,    community-building,     collaboration,   on-line           built. Furthermore, it is relatively easy for us to look at an
communities, problem solving, virtual communities, pattern           artifact or vista from nearly the same angle; that is, we are
language.                                                            largely subject to and aware of the same physical stimuli.
                                                                     The possibility exists for rhythmically coordinated physical
ACM Classification Keywords                                          action such as dancing, singing, clapping, rowing a boat,
H5.m. Information interfaces and presentation (e.g., HCI):           pulling on a rope, and so on. The act of engaging in such
Miscellaneous.                                                       activities makes us seem to be part of a larger whole. Even
                                                                     in speech, people tend to coordinate their gestures and
INTRODUCTION                                                         rhythms. When strangers meet face to face, they often
People in industry, academia, politics, and commerce often           engage in shared ritualistic behavior as well; e.g., stating
find themselves engaged in communication, collaboration,             names, shaking hands, saluting, exchanging small talk,
and transactions taking place at a distance, sometimes with          striving to “find connections” of shared experiences,
strangers, often without face to face contact. In our                people, or places.
evolutionary history, this is a relatively recent development,
though not unique to the recent proliferation of computing           In the widespread remote collaborations that people engage
and communication equipment and the Internet. For the                in today, some of these many methods for creating and
last few thousand years, some people have followed                   maintaining trust do not naturally occur. Yet, we know that
“orders” purportedly given by kings, priests, and military           trust is important. For example, a high degree of mutual
leaders, often without personal contact with those leaders.          trust is one of four major characteristics of long-lived
Various mechanisms were put in place to insure the                   organizations deGues, [1]. Putnam et al [2] found it to be
veracity of these communications; e.g., a letter might be            an excellent indicator of which regions in Italy were
sealed with the “King’s Seal;” officers might wear the color         “successful” and which ones were not. Researchers writing
of the King’s army and insignia designating rank. In many            on trust have variously distinguished two, three, or even
cases, a chain of trusted associations was used to transfer          seven types or dimensions of trust. While these distinctions
information across time and space.                                   are important, there is no consensus on a typology. In this
                                                                     paper, I argue that the patterns presented help build mutual
                                                                     trust without specifying the type(s) of trust most affected. I
                                                                     describe some of the aspects of context, content, process,
                                                                     and leadership that may lead to greater mutual trust and
                                                                     show how these may be applied in the case of remote
                                                                     collaborations. I then show how some of these means were
                                                                     used in a series of on-line collaborations called “Jams.”
                                                                     Space does not permit a complete rendering of each of the
                                                                     ideas presented; they are more fully explained in the form
                                                                     of a socio-technical pattern language. A pattern is a named
                                                                     recurring problem along with the outline of a solution. A


                                                                 1
pattern language is an organized set of patterns designed to           •    An expectation of what happens (based on story
cover a field [3].        The author’s may be found at                      and experience) can help mold what does happen.
www.truthtable.com/websitewelcome_page_index.html and
a more extensive collaborative site can be found at                Solution: All the sub-groups that need to cooperate in a
http://trout.cpsr.org/program/sphere/patterns/.                    larger group should get together periodically for a meeting
                                                                   of “Greater Gathering.” This should be periodic and
                                                                   structured. Activities need to be formulated that help
PATTERNS RELATING TO CONTEXT
What is appropriate at a “beer bash” is quite different from       everyone visualize and experience common ground.
what is appropriate at a wedding, a funeral, or a cocktail         Eating, drinking, dancing, singing, athletic contests, and
party. In the physical world, we have numerous cues about          other physical activities should also be included since these
the types of behavior expected in various places. This is          are experiences people will relate to and enjoy regardless
captured in a pattern called, Context-setting Entrance             of which sub-group they belong to or which sub-problem
which explains that it is important that the initial screen of a   they are working on.
website or collaborative interface provide cues about the          Examples: Company picnics. Company sponsored sporting
type of behavior that will be appropriate; e.g., how formal        events, Boy Scout Jamborees, CHI Conferences, Family
or informal the behavior is expected to be. When people            reunions,early IBM yearly 100 % club meetings, the “Jams”
are given such cues and they behave appropriately, trust is        referred to later in this paper.
enhanced. When they do not, trust is diminished, but
appropriately so. Without such cues, people may behave in          Abstract Social Proxy is a pattern that refers to a display,
a way to “accidentally” reduce trust.                              available equally to all participants, that shows various
                                                                   properties of participation.        For example, such a
Another pattern relevant to setting a trust-inducing context       representation might show who is “present” in a
is Greater Gathering. To give a flavor for the basic format        collaboration space, each person’s recent level of activity,
of a pattern, this one is shown in shortened form below:           history of activity, what tasks they are working on and the
Greater Gathering                                                  level of completion. Richer descriptions of such proxies
                                                                   and the design rationale behind them may be found in [4].
Context: A group of people has been attempting to
accomplish a task effectively and efficiently. To do this, a       Another related pattern of use in generating trust is
common method is to break down a large, complex task               Reminders of Shared Goals. While this reminding may
into smaller, less complex tasks. Often, those people              also be dynamically introduced by proper leadership
working on a subtask naturally spend more time with others         activity, a collaborative tool or website can help by
on that subtask. Since people spend a lot of time together,        providing a statement or icon that reminds people of why
they may develop common interests and also spend leisure           they are collaborating in the first place. For example, the
time together as well. Sharing common sub-goals, physical          home page of Greenpeace has this statement prominently
contexts, and leisure activities and working on the same           displayed along with poignant and apt images:
subtasks may eventually lead to an “in-group” feeling.             “Welcome to Greenpeace International: Greenpeace exists
Problem: People in the “in-group” may begin to limit their         because this fragile Earth deserves a voice. It needs
learning because of a lack of diversity in perspective.            solutions. It needs change. It needs action.”
Furthermore, they may come to work so hard to solve their          PATTERNS RELATED TO PROCESS
own sub-problem that they lose sight of the larger problem
and make sub-optimizing decisions.                                 Other patterns relate to various processes that may help the
                                                                   group to be more productive while simultaneously helping
Forces:                                                            to build trust. One of these is Small Successes Early.
                                                                   Here is a short version of this pattern.
    •     People working on a common problem often bond
          as well.                                                 Small Successes Early
    •     People working on a common sub-problem often             Context: A complex undertaking requires the interaction
          lose sight of the larger problem.                        of many people with various backgrounds, skills, and
                                                                   temperaments. They have not worked together before. The
    •     Social sanctions can lead to a lack of diversity of      group wants to get started and wants to be successful.
          perspectives.
                                                                   Problem: Although diversity is a potential source of
    •     All people share certain basic drives.                   strength, at first, when strangers try to work together, there
    •     Shared special events help build social bonds.           is likely to be natural confusion about how to proceed
                                                                   because people will have different experiences about the
    •     People enjoy novel experiences and viewpoints,           best way to organize and proceed. This natural confusion,
          under some circumstances
combined with different backgrounds may lead to mistrust,             ignored if they are temporarily unavailable for a discussion
block communication, and limit future success.                        or decision. Such a process helps bind the interests of the
                                                                      community across the peculiarities of a specific situation.
Discussion: At the kick-off to a software development
project, rather than “throw” an event for them, encourage             Another useful process pattern is presented below.
them to organize a party, cookout, pot-luck, song-fest, or
                                                                      Support Flow and Breakdown.
storytelling event among themselves. In the process, they
will learn about each other’s styles, to trust each other, and        Context: A group of people has been attempting to
be encouraged by success.                                             accomplish some task as effectively and efficiently as
                                                                      possible. To do this, they naturally have developed various
Alternatively, the team might simply work on an easy
                                                                      individual habits, social conventions, and have adopted
aspect of the problem to be solved, provided it is something
                                                                      certain technologies. Now, some change in some aspects of
fairly clear that will result in “success” quickly. For
                                                                      work is needed. This can be due to a change in the nature
instance, the team might initially work profitably on a short
                                                                      of the problem, the nature of the context in which they are
presentation, poster, or scenario.
                                                                      working, learning, or the invention of new technological
Solution: Therefore:                                                  support. A plan is being developed to manage change.
When bringing new teams or organizations together, it is              Problem: How can people re-organize their work to reflect
useful to begin with a small success. In this way, people             the new situation while at the same time retaining progress
begin to learn about each other and trust each other. This            that has been made, keeping what still works and avoiding
makes tackling more difficult problems later relatively               the case where people resist change? One way of
easier.                                                               minimizing the need for change being too sudden or radical
                                                                      is to allow change to be more evolutionary and part of the
Another process pattern is Who Speaks for Wolf? See [5]
                                                                      ongoing process of a workgroup, community, or
for an expanded version of this pattern based on a Native
                                                                      organization. How can such learning be incorporated into
American story recounted by Paula Underwood [6].
                                                                      work processes in such a way that it minimizes any
Who Speaks for Wolf?                                                  negative impact on productivity?
Context: A group is designing and developing a complex                Forces:
system such as a new social institution or a complex
                                                                          •     People have a drive to learn and practice new
interactive system. There are many stakeholders.
                                                                                skills.
Problem: Those responsible for the system may not be
aware of the goals, contexts, expertise and perspectives of               •     People have a drive to acquire new experiences.
all the stakeholders. Without these views, the builders will              •     People have a drive to defend against change that
build a system that will probably not be accepted and will                      is too sudden, radical, or where the consequences
probably be deficient in major ways.                                            are perceived to be too negative or too uncertain.
Discussion: Briefly, a tribe had someone so empathic with                 •     The costs of change tend to be more front-loaded
wolves that he was known as “Wolf.” While he was away                           than the benefits.
on a long hunting expedition, the tribe decided to move to a
new location. Shortly after, they discovered that they had                •     People are most productive when they are in a
moved into the spring breeding ground of the wolves which                       state of “flow.”
were now stealing food and threatening the children. The                  •     In order to learn effectively, people need to be in a
tribe now decided to move again, but asked themselves,                          reflective state about their own behaviors.
“How can we prevent ourselves from making a similar
mistake in the future?” “If Wolf had been present, he                 Solution: Intelligent change should be supported by
would have counseled against our move. From now on,                   instrumenting on-going productive processes so that all
when we make decisions, we will ask, ‘Who speaks for                  relevant data is collected with no or minimum impact on
wolf?’ to remind us about missing stakeholders.”                      productivity. When flow breaks down or an integral piece
                                                                      of work is finished, use the data collected during productive
Solution: Therefore, provide automated reminders of                   work to guide a feedback, reflective learning and practice
stakeholders who are not present. These could be                      cycle.
procedural (as the Native Americans who ask, "Who
Speaks for Wolf?") or technological.                                  Examples: It is not helpful to analyze your strengths and
                                                                      weaknesses and make corrections during a golf match, a
Such a process has benefit beyond an improved solution to             speech, or a tightly scheduled software development. It is
the problem. As community members observe this process,               helpful to set aside specific times, places, and processes for
they gain trust that their viewpoints and interests will not be



                                                                  3
getting feedback and practicing changes.                         facilitators should encourage behaviors that reflected other
                                                                 patterns such as Expressive Communication Builds
Such a pattern helps build trust for two reasons. First,
                                                                 Mutual Trust, and Follow the Pain. The training sessions
people are not interrupted during on-going work flow in a
                                                                 themselves which included demonstration and practice with
way that draws attention and blame. Second, they can work
                                                                 Babble, constituted a use of Small Successes Early.
more confidently in the moment knowing that there will be
a later time for reflection and improvement.                     Several additional Jams have been held; for instance, July
                                                                 29th through August 1, 2003, all IBMers worldwide were
PATTERNS RELATING TO CONTENT
                                                                 encouraged to participate in a 3 day on-line collaborative
Patterns also provide some guidance about content. For           discussion to develop new defining values for IBM. Fifty
instance, Expressive Communication Builds Mutual Trust           thousand IBMers viewed some of the Jam content, and over
suggests that communications such as stories that reveal         10,000 posted. Within a few weeks of the summary being
something about the personality, interests, and values of the    posted, over 200,000 IBMers globally viewed the article on
teller are more trust-inducing than are merely                   the Intranet. The design rationale for using this mechanism
“instrumental” communications that describe objective            to develop values is laid out in a Harvard Business Review
reality or attempt to achieve some business goal.                interview with the IBM CEO (2004).
One of the patterns that can help guide on-line discussions      On December 1-3, 2005, IBM co-sponsored, along with
is Follow the Pain, an expression taken from Gerry Spence        UN-Habitat and the government of Canada, a world-wide
[7]. Basically, he suggests that when someone gets angry,        on-line Jam to discuss how to make cities better and more
the natural reaction is to become defensive and get angry        sustainable. In the spirit of Who Speaks for Wolf? a
back. A more effective technique is to determine what the        number of mechanisms were used to extend this Jam to
hurt is beneath the anger and to address that hurt.              stakeholders who had no direct access to the Internet. Jam
                                                                 participants registered from all 191 UN-member countries.
Another guide for effective content (on-line or face to face)
                                                                 There were 459,402 page hits.
is to focus on “I-talk” rather than “you-talk.” “I get nervous
when the car is moving so fast” typically causes less            CONCLUSION
defensiveness than, “You drive too fast.”                        Patterns provide a succinct way to capture what works in
                                                                 terms of facilitating on-line trust. These can be used both to
PATTERNS RELATING TO LEADERSHIP
                                                                 aid in the design of on-line systems and in guiding human
Several patterns relate specifically to suggestions about
                                                                 behavior in the use of the systems.
leadership. For example, a higher level pattern is Special
Roles and then there are several specific varieties such as      REFERENCES
Rater, Facilitator, Moderator, Stake Warrior, and                1.De Gues, A. (1997). The living company. Boston, MA:
Authority Figure.                                                  Harvard Business School Press.
EXAMPLE: PATTERNS INHERENT IN ON-LINE “JAMS”                     2.Putnam, R.D., Leonardi, R., Nanetti, R. (1993). Making
Partly inspired by a paper [8], in May 21-24, 2001, all            democracy work: Civic traditions in modern Italy.
300,000 IBMers were invited to participate in “WorldJam”,          Princeton, NJ: Princeton University Press.
an on-line collaborative meeting to improve IBM organized        3.Alexander, C., Ishikawa, S., Silverstein, M. Jacobson, M.,
around 10 topics. Fifty two-thousand visitors showed up            Fiksdahl-King, I. and Angel, S. (1977). A pattern
and viewed an average of six postings each. Over 6000              language. New York: Oxford University Press.
suggestions were made. Results were analyzed into
                                                                 4.Erickson, T. and Kellogg, W.A. (2000).       Social
categories using natural language clustering techniques.
                                                                   translucence: An approach to designing systems that
The Jam itself was an example of Greater Gathering.
                                                                   support social processes.    ACM Transactions on
The prospect of having employees discuss company                   Computer-Human Interaction, 7(1), pp. 59-83.
problems and how to solve them could prove daunting. In          5.Thomas, J. (2002). “Who Speaks for Wolf?” IBM
this case, people used their normal user ID’s and hence            Research Report. RC-22644.
contributions were easily traceable to individuals.
Moreover, both the website itself and preliminary publicity      6.Underwood, P. (1983). Who speaks for Wolf: A Native
were used to create a Context-Setting Entrance. An                 American Learning Story. Georgetown TX (now San
Abstract Social Proxy was designed into the website.               Anselmo, CA): A Tribe of Two Press.
Another was also provided a back-channel (Babble) for            7.Spence, G. (1995). How to argue and win every time.
moderators, facilitators, and the technical support staff to       New York: St. Martin’s Press.
communicate any problems or solutions (Support Flow              8.Thomas, J. C. (2001). An HCI Agenda for the Next
and Breakdown).. The site also used Reminders of Shared            Millennium: Emergent Global Intelligence. In R.
Goals. In training sessions, we suggested moderators and
Earnshaw, R. Guedj, A. van Dam, and J. Vince (Eds.),       Springer-Verlag.
Frontiers of human-centered computing, online
communities, and virtual environments. London:




                                                       5

More Related Content

Viewers also liked

JSAI paper on Collaborative Innovation Tools
JSAI paper on Collaborative Innovation ToolsJSAI paper on Collaborative Innovation Tools
JSAI paper on Collaborative Innovation ToolsJohn Thomas
 
Patterns for collaborative creativity
Patterns for collaborative creativityPatterns for collaborative creativity
Patterns for collaborative creativityJohn Thomas
 
The year was 1967
The year was 1967The year was 1967
The year was 1967John Thomas
 
Understanding and harnessing conflict1
Understanding and harnessing conflict1Understanding and harnessing conflict1
Understanding and harnessing conflict1John Thomas
 
E learning panel at INTERACT 2007
E learning panel at INTERACT 2007E learning panel at INTERACT 2007
E learning panel at INTERACT 2007John Thomas
 
Motivation and incentives
Motivation and incentivesMotivation and incentives
Motivation and incentivesJohn Thomas
 
Design rationale for turing's nightmares
Design rationale for turing's nightmaresDesign rationale for turing's nightmares
Design rationale for turing's nightmaresJohn Thomas
 
Making sense of sensemaking
Making sense of sensemakingMaking sense of sensemaking
Making sense of sensemakingJohn Thomas
 
Conversational analysis
Conversational analysisConversational analysis
Conversational analysisJohn Thomas
 

Viewers also liked (12)

JSAI paper on Collaborative Innovation Tools
JSAI paper on Collaborative Innovation ToolsJSAI paper on Collaborative Innovation Tools
JSAI paper on Collaborative Innovation Tools
 
Patterns for collaborative creativity
Patterns for collaborative creativityPatterns for collaborative creativity
Patterns for collaborative creativity
 
The year was 1967
The year was 1967The year was 1967
The year was 1967
 
Stories in HCI
Stories in HCIStories in HCI
Stories in HCI
 
Understanding and harnessing conflict1
Understanding and harnessing conflict1Understanding and harnessing conflict1
Understanding and harnessing conflict1
 
E learning panel at INTERACT 2007
E learning panel at INTERACT 2007E learning panel at INTERACT 2007
E learning panel at INTERACT 2007
 
Motivation and incentives
Motivation and incentivesMotivation and incentives
Motivation and incentives
 
Design rationale for turing's nightmares
Design rationale for turing's nightmaresDesign rationale for turing's nightmares
Design rationale for turing's nightmares
 
Asean
AseanAsean
Asean
 
Theory of mind
Theory of mindTheory of mind
Theory of mind
 
Making sense of sensemaking
Making sense of sensemakingMaking sense of sensemaking
Making sense of sensemaking
 
Conversational analysis
Conversational analysisConversational analysis
Conversational analysis
 

Similar to Chi2006 workshop paper on trust

Narrative methods as supplement to field experience
Narrative methods as supplement to field experienceNarrative methods as supplement to field experience
Narrative methods as supplement to field experienceJohn Thomas
 
Contested Collective Intelligence: Resilience, Complexity & Sensemaking
Contested Collective Intelligence: Resilience, Complexity & SensemakingContested Collective Intelligence: Resilience, Complexity & Sensemaking
Contested Collective Intelligence: Resilience, Complexity & SensemakingSimon Buckingham Shum
 
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCESHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCENetworked Research Lab, UK
 
How To Write An Essay From An Interview.pdf
How To Write An Essay From An Interview.pdfHow To Write An Essay From An Interview.pdf
How To Write An Essay From An Interview.pdfTakyra Roberts
 
Informal Essay Examples. Informal Interview Essay Interview Essays Free 30...
Informal Essay Examples. Informal Interview Essay  Interview  Essays  Free 30...Informal Essay Examples. Informal Interview Essay  Interview  Essays  Free 30...
Informal Essay Examples. Informal Interview Essay Interview Essays Free 30...Ashley Rosas
 
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smith
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.SmithBeyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smith
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smithkategn
 
Topics For Synthesis Essay. The purpose of Synthesis essay writing
Topics For Synthesis Essay. The purpose of Synthesis essay writingTopics For Synthesis Essay. The purpose of Synthesis essay writing
Topics For Synthesis Essay. The purpose of Synthesis essay writingSusan Belcher
 
Leadership, Culture, Communication, and Diversity3Chapt.docx
Leadership, Culture,  Communication, and Diversity3Chapt.docxLeadership, Culture,  Communication, and Diversity3Chapt.docx
Leadership, Culture, Communication, and Diversity3Chapt.docxDIPESH30
 
A complexity approach to managing technology enabled business transformation ...
A complexity approach to managing technology enabled business transformation ...A complexity approach to managing technology enabled business transformation ...
A complexity approach to managing technology enabled business transformation ...Mikkel Brahm
 
Everyone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on TwitterEveryone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on TwitterPath of the Blue Eye Project
 
bus.communication.pdf
bus.communication.pdfbus.communication.pdf
bus.communication.pdfssusered9eaf
 
Essay Papers For Sale.pdf
Essay Papers For Sale.pdfEssay Papers For Sale.pdf
Essay Papers For Sale.pdfLydia Jana
 
*Handout10 weave oxford
*Handout10 weave oxford*Handout10 weave oxford
*Handout10 weave oxfordKatie King
 
List some of the key elements that make a team effective, as discuss.docx
List some of the key elements that make a team effective, as discuss.docxList some of the key elements that make a team effective, as discuss.docx
List some of the key elements that make a team effective, as discuss.docxgauthierleppington
 
Fences and Bridges; a look at social capital vs. spiritual capital
Fences and Bridges; a look at social capital vs. spiritual capitalFences and Bridges; a look at social capital vs. spiritual capital
Fences and Bridges; a look at social capital vs. spiritual capitalDennel Tyon
 
Discourse analysis
Discourse analysisDiscourse analysis
Discourse analysisfzoratti
 
99% of networking is a waste of time
99% of networking is a waste of time99% of networking is a waste of time
99% of networking is a waste of timeDarryl Howes MSc
 

Similar to Chi2006 workshop paper on trust (20)

Narrative methods as supplement to field experience
Narrative methods as supplement to field experienceNarrative methods as supplement to field experience
Narrative methods as supplement to field experience
 
Contested Collective Intelligence: Resilience, Complexity & Sensemaking
Contested Collective Intelligence: Resilience, Complexity & SensemakingContested Collective Intelligence: Resilience, Complexity & Sensemaking
Contested Collective Intelligence: Resilience, Complexity & Sensemaking
 
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCESHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
SHARED VOCABULARIES FOR COLLECTIVE INTELLIGENCE
 
How To Write An Essay From An Interview.pdf
How To Write An Essay From An Interview.pdfHow To Write An Essay From An Interview.pdf
How To Write An Essay From An Interview.pdf
 
Informal Essay Examples. Informal Interview Essay Interview Essays Free 30...
Informal Essay Examples. Informal Interview Essay  Interview  Essays  Free 30...Informal Essay Examples. Informal Interview Essay  Interview  Essays  Free 30...
Informal Essay Examples. Informal Interview Essay Interview Essays Free 30...
 
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smith
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.SmithBeyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smith
Beyond Buzz - Web 2.0 Expo - K.Niederhoffer & M.Smith
 
Topics For Synthesis Essay. The purpose of Synthesis essay writing
Topics For Synthesis Essay. The purpose of Synthesis essay writingTopics For Synthesis Essay. The purpose of Synthesis essay writing
Topics For Synthesis Essay. The purpose of Synthesis essay writing
 
Leadership, Culture, Communication, and Diversity3Chapt.docx
Leadership, Culture,  Communication, and Diversity3Chapt.docxLeadership, Culture,  Communication, and Diversity3Chapt.docx
Leadership, Culture, Communication, and Diversity3Chapt.docx
 
A complexity approach to managing technology enabled business transformation ...
A complexity approach to managing technology enabled business transformation ...A complexity approach to managing technology enabled business transformation ...
A complexity approach to managing technology enabled business transformation ...
 
Everyone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on TwitterEveryone's An Influencer: Quantifying Influence on Twitter
Everyone's An Influencer: Quantifying Influence on Twitter
 
bus.communication.pdf
bus.communication.pdfbus.communication.pdf
bus.communication.pdf
 
Essay Papers For Sale.pdf
Essay Papers For Sale.pdfEssay Papers For Sale.pdf
Essay Papers For Sale.pdf
 
*Handout10 weave oxford
*Handout10 weave oxford*Handout10 weave oxford
*Handout10 weave oxford
 
November 2010 CPYF Dialogue Newsletter: People Centered Organizations
November 2010 CPYF Dialogue Newsletter: People Centered OrganizationsNovember 2010 CPYF Dialogue Newsletter: People Centered Organizations
November 2010 CPYF Dialogue Newsletter: People Centered Organizations
 
List some of the key elements that make a team effective, as discuss.docx
List some of the key elements that make a team effective, as discuss.docxList some of the key elements that make a team effective, as discuss.docx
List some of the key elements that make a team effective, as discuss.docx
 
Fences and Bridges; a look at social capital vs. spiritual capital
Fences and Bridges; a look at social capital vs. spiritual capitalFences and Bridges; a look at social capital vs. spiritual capital
Fences and Bridges; a look at social capital vs. spiritual capital
 
Discourse analysis
Discourse analysisDiscourse analysis
Discourse analysis
 
Unit 4
Unit 4Unit 4
Unit 4
 
Slideshare #2
Slideshare #2Slideshare #2
Slideshare #2
 
99% of networking is a waste of time
99% of networking is a waste of time99% of networking is a waste of time
99% of networking is a waste of time
 

More from John Thomas

Slideshowfor nw jct
Slideshowfor nw jctSlideshowfor nw jct
Slideshowfor nw jctJohn Thomas
 
Sigchi extended abstractsjct
Sigchi extended abstractsjctSigchi extended abstractsjct
Sigchi extended abstractsjctJohn Thomas
 
Social computing jct
Social computing jctSocial computing jct
Social computing jctJohn Thomas
 
Walking People analysis
Walking People analysisWalking People analysis
Walking People analysisJohn Thomas
 
HCII 2005 paper
HCII 2005 paper HCII 2005 paper
HCII 2005 paper John Thomas
 
Ecscw 2007 workshop position paper on handovers
Ecscw 2007 workshop position paper on handovers Ecscw 2007 workshop position paper on handovers
Ecscw 2007 workshop position paper on handovers John Thomas
 
Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop John Thomas
 
Sensemaking position paper for chi 2005 workshop
Sensemaking position paper for chi 2005 workshopSensemaking position paper for chi 2005 workshop
Sensemaking position paper for chi 2005 workshopJohn Thomas
 
Public accountability pattern in plml format
Public accountability pattern in plml formatPublic accountability pattern in plml format
Public accountability pattern in plml formatJohn Thomas
 
Chi 2001 workshop proposal on narrative techniques
Chi 2001 workshop proposal on narrative techniquesChi 2001 workshop proposal on narrative techniques
Chi 2001 workshop proposal on narrative techniquesJohn Thomas
 
Note on Tool to Measure Complexity
Note on Tool to Measure Complexity Note on Tool to Measure Complexity
Note on Tool to Measure Complexity John Thomas
 
Human computer interaction research at ibm t
Human computer interaction research at ibm tHuman computer interaction research at ibm t
Human computer interaction research at ibm tJohn Thomas
 
Panel: User Centered Design for International Development
Panel: User Centered Design for International DevelopmentPanel: User Centered Design for International Development
Panel: User Centered Design for International DevelopmentJohn Thomas
 
Meta design and social creativity
Meta design and social creativityMeta design and social creativity
Meta design and social creativityJohn Thomas
 

More from John Thomas (15)

Ppdd copy
Ppdd copyPpdd copy
Ppdd copy
 
Slideshowfor nw jct
Slideshowfor nw jctSlideshowfor nw jct
Slideshowfor nw jct
 
Sigchi extended abstractsjct
Sigchi extended abstractsjctSigchi extended abstractsjct
Sigchi extended abstractsjct
 
Social computing jct
Social computing jctSocial computing jct
Social computing jct
 
Walking People analysis
Walking People analysisWalking People analysis
Walking People analysis
 
HCII 2005 paper
HCII 2005 paper HCII 2005 paper
HCII 2005 paper
 
Ecscw 2007 workshop position paper on handovers
Ecscw 2007 workshop position paper on handovers Ecscw 2007 workshop position paper on handovers
Ecscw 2007 workshop position paper on handovers
 
Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop
 
Sensemaking position paper for chi 2005 workshop
Sensemaking position paper for chi 2005 workshopSensemaking position paper for chi 2005 workshop
Sensemaking position paper for chi 2005 workshop
 
Public accountability pattern in plml format
Public accountability pattern in plml formatPublic accountability pattern in plml format
Public accountability pattern in plml format
 
Chi 2001 workshop proposal on narrative techniques
Chi 2001 workshop proposal on narrative techniquesChi 2001 workshop proposal on narrative techniques
Chi 2001 workshop proposal on narrative techniques
 
Note on Tool to Measure Complexity
Note on Tool to Measure Complexity Note on Tool to Measure Complexity
Note on Tool to Measure Complexity
 
Human computer interaction research at ibm t
Human computer interaction research at ibm tHuman computer interaction research at ibm t
Human computer interaction research at ibm t
 
Panel: User Centered Design for International Development
Panel: User Centered Design for International DevelopmentPanel: User Centered Design for International Development
Panel: User Centered Design for International Development
 
Meta design and social creativity
Meta design and social creativityMeta design and social creativity
Meta design and social creativity
 

Recently uploaded

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Chi2006 workshop paper on trust

  • 1. Establishing Trust via Context, Content, Process, and Leadership: A Pattern Language Approach John C. Thomas IBM T. J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598 USA jcthomas@us.ibm.com (01)-914-784-7561 ABSTRACT Nonetheless, most of the interactions of most people most In this paper, we describe some often overlooked factors of the time were face to face. The characteristics of this relating to trust. We describe those parts of a socio- spatial reality automatically worked to help generate trust. technical Pattern Language that should lead to greater trust. One characteristic of typical face to face interactions is These deal with context, content, process, and leadership. reciprocity of information. When I speak, we can both hear We describe how some of these apply to a series of large, what I am saying. If I can see you, you can see me. on-line events called “Jams.” Moreover, if we are in close physical proximity, the possibility for doing physical harm is always present. Author Keywords When physical harm does not occur, though it could, trust is Trust, community-building, collaboration, on-line built. Furthermore, it is relatively easy for us to look at an communities, problem solving, virtual communities, pattern artifact or vista from nearly the same angle; that is, we are language. largely subject to and aware of the same physical stimuli. The possibility exists for rhythmically coordinated physical ACM Classification Keywords action such as dancing, singing, clapping, rowing a boat, H5.m. Information interfaces and presentation (e.g., HCI): pulling on a rope, and so on. The act of engaging in such Miscellaneous. activities makes us seem to be part of a larger whole. Even in speech, people tend to coordinate their gestures and INTRODUCTION rhythms. When strangers meet face to face, they often People in industry, academia, politics, and commerce often engage in shared ritualistic behavior as well; e.g., stating find themselves engaged in communication, collaboration, names, shaking hands, saluting, exchanging small talk, and transactions taking place at a distance, sometimes with striving to “find connections” of shared experiences, strangers, often without face to face contact. In our people, or places. evolutionary history, this is a relatively recent development, though not unique to the recent proliferation of computing In the widespread remote collaborations that people engage and communication equipment and the Internet. For the in today, some of these many methods for creating and last few thousand years, some people have followed maintaining trust do not naturally occur. Yet, we know that “orders” purportedly given by kings, priests, and military trust is important. For example, a high degree of mutual leaders, often without personal contact with those leaders. trust is one of four major characteristics of long-lived Various mechanisms were put in place to insure the organizations deGues, [1]. Putnam et al [2] found it to be veracity of these communications; e.g., a letter might be an excellent indicator of which regions in Italy were sealed with the “King’s Seal;” officers might wear the color “successful” and which ones were not. Researchers writing of the King’s army and insignia designating rank. In many on trust have variously distinguished two, three, or even cases, a chain of trusted associations was used to transfer seven types or dimensions of trust. While these distinctions information across time and space. are important, there is no consensus on a typology. In this paper, I argue that the patterns presented help build mutual trust without specifying the type(s) of trust most affected. I describe some of the aspects of context, content, process, and leadership that may lead to greater mutual trust and show how these may be applied in the case of remote collaborations. I then show how some of these means were used in a series of on-line collaborations called “Jams.” Space does not permit a complete rendering of each of the ideas presented; they are more fully explained in the form of a socio-technical pattern language. A pattern is a named recurring problem along with the outline of a solution. A 1
  • 2. pattern language is an organized set of patterns designed to • An expectation of what happens (based on story cover a field [3]. The author’s may be found at and experience) can help mold what does happen. www.truthtable.com/websitewelcome_page_index.html and a more extensive collaborative site can be found at Solution: All the sub-groups that need to cooperate in a http://trout.cpsr.org/program/sphere/patterns/. larger group should get together periodically for a meeting of “Greater Gathering.” This should be periodic and structured. Activities need to be formulated that help PATTERNS RELATING TO CONTEXT What is appropriate at a “beer bash” is quite different from everyone visualize and experience common ground. what is appropriate at a wedding, a funeral, or a cocktail Eating, drinking, dancing, singing, athletic contests, and party. In the physical world, we have numerous cues about other physical activities should also be included since these the types of behavior expected in various places. This is are experiences people will relate to and enjoy regardless captured in a pattern called, Context-setting Entrance of which sub-group they belong to or which sub-problem which explains that it is important that the initial screen of a they are working on. website or collaborative interface provide cues about the Examples: Company picnics. Company sponsored sporting type of behavior that will be appropriate; e.g., how formal events, Boy Scout Jamborees, CHI Conferences, Family or informal the behavior is expected to be. When people reunions,early IBM yearly 100 % club meetings, the “Jams” are given such cues and they behave appropriately, trust is referred to later in this paper. enhanced. When they do not, trust is diminished, but appropriately so. Without such cues, people may behave in Abstract Social Proxy is a pattern that refers to a display, a way to “accidentally” reduce trust. available equally to all participants, that shows various properties of participation. For example, such a Another pattern relevant to setting a trust-inducing context representation might show who is “present” in a is Greater Gathering. To give a flavor for the basic format collaboration space, each person’s recent level of activity, of a pattern, this one is shown in shortened form below: history of activity, what tasks they are working on and the Greater Gathering level of completion. Richer descriptions of such proxies and the design rationale behind them may be found in [4]. Context: A group of people has been attempting to accomplish a task effectively and efficiently. To do this, a Another related pattern of use in generating trust is common method is to break down a large, complex task Reminders of Shared Goals. While this reminding may into smaller, less complex tasks. Often, those people also be dynamically introduced by proper leadership working on a subtask naturally spend more time with others activity, a collaborative tool or website can help by on that subtask. Since people spend a lot of time together, providing a statement or icon that reminds people of why they may develop common interests and also spend leisure they are collaborating in the first place. For example, the time together as well. Sharing common sub-goals, physical home page of Greenpeace has this statement prominently contexts, and leisure activities and working on the same displayed along with poignant and apt images: subtasks may eventually lead to an “in-group” feeling. “Welcome to Greenpeace International: Greenpeace exists Problem: People in the “in-group” may begin to limit their because this fragile Earth deserves a voice. It needs learning because of a lack of diversity in perspective. solutions. It needs change. It needs action.” Furthermore, they may come to work so hard to solve their PATTERNS RELATED TO PROCESS own sub-problem that they lose sight of the larger problem and make sub-optimizing decisions. Other patterns relate to various processes that may help the group to be more productive while simultaneously helping Forces: to build trust. One of these is Small Successes Early. Here is a short version of this pattern. • People working on a common problem often bond as well. Small Successes Early • People working on a common sub-problem often Context: A complex undertaking requires the interaction lose sight of the larger problem. of many people with various backgrounds, skills, and temperaments. They have not worked together before. The • Social sanctions can lead to a lack of diversity of group wants to get started and wants to be successful. perspectives. Problem: Although diversity is a potential source of • All people share certain basic drives. strength, at first, when strangers try to work together, there • Shared special events help build social bonds. is likely to be natural confusion about how to proceed because people will have different experiences about the • People enjoy novel experiences and viewpoints, best way to organize and proceed. This natural confusion, under some circumstances
  • 3. combined with different backgrounds may lead to mistrust, ignored if they are temporarily unavailable for a discussion block communication, and limit future success. or decision. Such a process helps bind the interests of the community across the peculiarities of a specific situation. Discussion: At the kick-off to a software development project, rather than “throw” an event for them, encourage Another useful process pattern is presented below. them to organize a party, cookout, pot-luck, song-fest, or Support Flow and Breakdown. storytelling event among themselves. In the process, they will learn about each other’s styles, to trust each other, and Context: A group of people has been attempting to be encouraged by success. accomplish some task as effectively and efficiently as possible. To do this, they naturally have developed various Alternatively, the team might simply work on an easy individual habits, social conventions, and have adopted aspect of the problem to be solved, provided it is something certain technologies. Now, some change in some aspects of fairly clear that will result in “success” quickly. For work is needed. This can be due to a change in the nature instance, the team might initially work profitably on a short of the problem, the nature of the context in which they are presentation, poster, or scenario. working, learning, or the invention of new technological Solution: Therefore: support. A plan is being developed to manage change. When bringing new teams or organizations together, it is Problem: How can people re-organize their work to reflect useful to begin with a small success. In this way, people the new situation while at the same time retaining progress begin to learn about each other and trust each other. This that has been made, keeping what still works and avoiding makes tackling more difficult problems later relatively the case where people resist change? One way of easier. minimizing the need for change being too sudden or radical is to allow change to be more evolutionary and part of the Another process pattern is Who Speaks for Wolf? See [5] ongoing process of a workgroup, community, or for an expanded version of this pattern based on a Native organization. How can such learning be incorporated into American story recounted by Paula Underwood [6]. work processes in such a way that it minimizes any Who Speaks for Wolf? negative impact on productivity? Context: A group is designing and developing a complex Forces: system such as a new social institution or a complex • People have a drive to learn and practice new interactive system. There are many stakeholders. skills. Problem: Those responsible for the system may not be aware of the goals, contexts, expertise and perspectives of • People have a drive to acquire new experiences. all the stakeholders. Without these views, the builders will • People have a drive to defend against change that build a system that will probably not be accepted and will is too sudden, radical, or where the consequences probably be deficient in major ways. are perceived to be too negative or too uncertain. Discussion: Briefly, a tribe had someone so empathic with • The costs of change tend to be more front-loaded wolves that he was known as “Wolf.” While he was away than the benefits. on a long hunting expedition, the tribe decided to move to a new location. Shortly after, they discovered that they had • People are most productive when they are in a moved into the spring breeding ground of the wolves which state of “flow.” were now stealing food and threatening the children. The • In order to learn effectively, people need to be in a tribe now decided to move again, but asked themselves, reflective state about their own behaviors. “How can we prevent ourselves from making a similar mistake in the future?” “If Wolf had been present, he Solution: Intelligent change should be supported by would have counseled against our move. From now on, instrumenting on-going productive processes so that all when we make decisions, we will ask, ‘Who speaks for relevant data is collected with no or minimum impact on wolf?’ to remind us about missing stakeholders.” productivity. When flow breaks down or an integral piece of work is finished, use the data collected during productive Solution: Therefore, provide automated reminders of work to guide a feedback, reflective learning and practice stakeholders who are not present. These could be cycle. procedural (as the Native Americans who ask, "Who Speaks for Wolf?") or technological. Examples: It is not helpful to analyze your strengths and weaknesses and make corrections during a golf match, a Such a process has benefit beyond an improved solution to speech, or a tightly scheduled software development. It is the problem. As community members observe this process, helpful to set aside specific times, places, and processes for they gain trust that their viewpoints and interests will not be 3
  • 4. getting feedback and practicing changes. facilitators should encourage behaviors that reflected other patterns such as Expressive Communication Builds Such a pattern helps build trust for two reasons. First, Mutual Trust, and Follow the Pain. The training sessions people are not interrupted during on-going work flow in a themselves which included demonstration and practice with way that draws attention and blame. Second, they can work Babble, constituted a use of Small Successes Early. more confidently in the moment knowing that there will be a later time for reflection and improvement. Several additional Jams have been held; for instance, July 29th through August 1, 2003, all IBMers worldwide were PATTERNS RELATING TO CONTENT encouraged to participate in a 3 day on-line collaborative Patterns also provide some guidance about content. For discussion to develop new defining values for IBM. Fifty instance, Expressive Communication Builds Mutual Trust thousand IBMers viewed some of the Jam content, and over suggests that communications such as stories that reveal 10,000 posted. Within a few weeks of the summary being something about the personality, interests, and values of the posted, over 200,000 IBMers globally viewed the article on teller are more trust-inducing than are merely the Intranet. The design rationale for using this mechanism “instrumental” communications that describe objective to develop values is laid out in a Harvard Business Review reality or attempt to achieve some business goal. interview with the IBM CEO (2004). One of the patterns that can help guide on-line discussions On December 1-3, 2005, IBM co-sponsored, along with is Follow the Pain, an expression taken from Gerry Spence UN-Habitat and the government of Canada, a world-wide [7]. Basically, he suggests that when someone gets angry, on-line Jam to discuss how to make cities better and more the natural reaction is to become defensive and get angry sustainable. In the spirit of Who Speaks for Wolf? a back. A more effective technique is to determine what the number of mechanisms were used to extend this Jam to hurt is beneath the anger and to address that hurt. stakeholders who had no direct access to the Internet. Jam participants registered from all 191 UN-member countries. Another guide for effective content (on-line or face to face) There were 459,402 page hits. is to focus on “I-talk” rather than “you-talk.” “I get nervous when the car is moving so fast” typically causes less CONCLUSION defensiveness than, “You drive too fast.” Patterns provide a succinct way to capture what works in terms of facilitating on-line trust. These can be used both to PATTERNS RELATING TO LEADERSHIP aid in the design of on-line systems and in guiding human Several patterns relate specifically to suggestions about behavior in the use of the systems. leadership. For example, a higher level pattern is Special Roles and then there are several specific varieties such as REFERENCES Rater, Facilitator, Moderator, Stake Warrior, and 1.De Gues, A. (1997). The living company. Boston, MA: Authority Figure. Harvard Business School Press. EXAMPLE: PATTERNS INHERENT IN ON-LINE “JAMS” 2.Putnam, R.D., Leonardi, R., Nanetti, R. (1993). Making Partly inspired by a paper [8], in May 21-24, 2001, all democracy work: Civic traditions in modern Italy. 300,000 IBMers were invited to participate in “WorldJam”, Princeton, NJ: Princeton University Press. an on-line collaborative meeting to improve IBM organized 3.Alexander, C., Ishikawa, S., Silverstein, M. Jacobson, M., around 10 topics. Fifty two-thousand visitors showed up Fiksdahl-King, I. and Angel, S. (1977). A pattern and viewed an average of six postings each. Over 6000 language. New York: Oxford University Press. suggestions were made. Results were analyzed into 4.Erickson, T. and Kellogg, W.A. (2000). Social categories using natural language clustering techniques. translucence: An approach to designing systems that The Jam itself was an example of Greater Gathering. support social processes. ACM Transactions on The prospect of having employees discuss company Computer-Human Interaction, 7(1), pp. 59-83. problems and how to solve them could prove daunting. In 5.Thomas, J. (2002). “Who Speaks for Wolf?” IBM this case, people used their normal user ID’s and hence Research Report. RC-22644. contributions were easily traceable to individuals. Moreover, both the website itself and preliminary publicity 6.Underwood, P. (1983). Who speaks for Wolf: A Native were used to create a Context-Setting Entrance. An American Learning Story. Georgetown TX (now San Abstract Social Proxy was designed into the website. Anselmo, CA): A Tribe of Two Press. Another was also provided a back-channel (Babble) for 7.Spence, G. (1995). How to argue and win every time. moderators, facilitators, and the technical support staff to New York: St. Martin’s Press. communicate any problems or solutions (Support Flow 8.Thomas, J. C. (2001). An HCI Agenda for the Next and Breakdown).. The site also used Reminders of Shared Millennium: Emergent Global Intelligence. In R. Goals. In training sessions, we suggested moderators and
  • 5. Earnshaw, R. Guedj, A. van Dam, and J. Vince (Eds.), Springer-Verlag. Frontiers of human-centered computing, online communities, and virtual environments. London: 5