SlideShare una empresa de Scribd logo
1 de 44
Trust
Human Computer Interaction
perspective
Plan for today
• We will start by setting
– The theoretical underpinnings of
• Human Computer Trust
• Design Persuasion, Emotion & Trust
– Address the key principles of design for
– Persuasion, Emotion & Trust
– Focus on design for Trust
Trust and HCI
• HCI
– Study computing and computational artifacts as
they relate to the human condition.
• Trust
– Study the dynamic nature of trust in relationships
Human Computer Trust
– how trust influences the human interactions
• Study the socio-technical nature of trust
• Study the role of Trust in user leverage engagement
Theoretical underpinnings
• Persuasion is…
– The act of changing people’s behaviors and beliefs
• Dictionary
– The action or process of persuading
• To make someone to act or believe in something
• HCI perspective
– Design actions or processes of persuading
• To change an attitude or behavior
Theoretical underpinnings
• HCI perspective
– Studding design methodologies to:
• Incentives people to become
– More engaged; and
– More connected with a certain product or ecosystems
• Change an attitude or behavior
– Attitude:
» reflects the way we think of fell about something
– Behaviour:
» reflects The way in which one acts or conducts oneself,
special towards the other
Persuasion, Emotion
& Trust
Design for…
key principles
• The ongoing cultural shift
– The existing ever-widening range of digital
artifacts is transforming our daily lives.
• New design methodologies are needed
– More engaging, compelling, and effective
• PET complements classic
– Usability & user experience best practices
Key principles
• PET aims is to
– Facilitates the “will do”
• Motivates people to complete the task
– Encourage. Motivates, constrains
• Usability aims is to
– Facilitates the “can do”
• Facilitates activities
key principles
• PET assumptions
– Persuasion
• Foster triggers actions;
– Emotion
• Generate an emotional response; and
– Trust
• Leverage credibility and cooperation.
WHY TRUST….
The trust role in…
• Leverage credibility and cooperation
– To assures the success of
• the action/process of persuading
• How it works?
?
Trust is crucial element
• Create trust enabling actions to make…
– activities proceed more smoothly,
– Ensure more transparent behaviours,
– people work with greater confidence.
• To encourage people to
– Cooperate
– Accept certain technologies
– Execute more positive actions
– Creates social bounds
– Establish empathic relations
Trust represents a key value
• In foster more
– Social participation
• eParticipation through civil engagement
– Cooperation
• Peer to peer work
• In encouraging
– Economical transactions
• Ecommerce
– sharing practices
• sharing economy
– Sustainability
• Changing user behaviours incentive more reuse practices
Trust represents a key value
• In incentive designers
– To provide
• GOOD DESIGN patterns
– Avoiding the Evil UX design
• Done by not so honest people
– That deliberately design to fool, trick or exploit users
– To balance on what some refer to
• The vision and values of dark vs good design patterns.
• Examples of this exist on the web,
in software and even in the real world
See http://darkpatterns.org
The challenge to design for trust
• Lies on two main approaches
– one that reflects a strict operational standpoint; and
another
– that sees trust as an internal quality.
• Although both views seem divergent in nature
– We believe that they complement each other
• One focus on technical aspects
– designing for reliable systems with the main aim of preventing
risks
• The other supports the social component of the system
– that sits upon a technical base
Trust is a of a state of mind
• Trust reflects
– a confidence and the predisposition to trust another.
• This come based on a set of perceptions of
– another as 'trustworthy’.
– Gain by the ability to observe reinsurance elements
• Looking for a balance between
– an individual's commitments and the risk involved
Trust is a reinsurance element,
• Trust reflects certain properties that
– help users to cope with the risk
– Support users to perceive intended behaviours
• Trust reflects a balance between
– individual's commitments to engage with
• a certain Tasks,
• a certain person,
• A system or community
– and the risk involved
How it works?
• Trust is dynamic
– It changes through time
• It is likely to have impact on the parties and on the
relationship.
• To trust we rely on
– The identification of certain
• Trustworthy making qualities
– The identification of signs that lead you to perceive
• A society, a person, and or a technological artifact
– Is in fact 'trustworthy’
Common touch points
• Within the user centered design framework
Analysis Design Implementation
Evaluation
Contextual inquiry
Ethnographic research
Competitive research
Interviews
Personas and scenarios
Information architecture
Prototyping
Standard & guidelines
Mental mapping
Design frameworks
Storyboards
Cognitive walkthrough
Usability testing
Wizard of OZ
Thinkaloud protocol
Design challenge
• Contextual overview
– The Sharing Economy has brought new attention
to the everyday practice of sharing.
– Digital tools are changing both what we can do
together across neighbourhoods and
• Reshaping the way we
– think about sharing our time, materials and skills.
• By fostering more trustful sharing practices.
Design challenge
• Create a set of
– Trust enabling sharing task scenarios to persuade
TLU students to
• share time, materials and skills among themselves.
– Context the TLU student community
• The exchange students
• Students that use the dormitory.
The design process
User
Research
&
Understanding
STARTS
Set the Goals
Definition &
Design
Create task
scenarios
ENDS
Procedure
• Step 1
– Create a set of possible sharing goals;
– and
• Step 2
– Create a set of possible sharing tasks;
• Step 3
– Create a set of Trust enabling sharing actions;
• Step 4
– Select the most relevant actions to your trust enabling
sharing scenario
STEP 1 – WHAT DO WE SHARE
What do we share?
• space,
• time,
• things,
• transport,
• skills,
• childcare,
• buying decisions,
• meals,
• celebration
STEP 2 - WHY DO WE SHARE?
Why do we share?
• For sustainability…
– For cooperation and trust
– When facing difficult times;
– For sense and purpose
– Create more gainful activities that give a sense of
purpose;
– To spend less, waste less, consume less.
Why do we share?
• Create a set possible sharing behaviours
What makes us share Why we avoid sharing
To save money Unclear responsibilities and legal
issues of what happens to the property
Students travel light, sharing
is convenient
The fear of not getting one’s item
back.
Get to know people The question of who’s responsible
when an item gets broken.
Third step
• inspection technique
– Use the toolkit to identify a set of
• Trust enabling sharing actions
• The products we will examine are
– http://neighborgoods.net
– http://www.streetbank.com
– https://www.peerby.com
– http://www.justshareit.com
– https://www.airbnb.com
STEP 3 – ANALYTIC TECHNIQUES
The socio-technical model of trust
Trust Predisposition
Competency
Predictability
Reciprocity
Benovelence
Honesty
Motivation
Willingness
Expectations
Rational perception
Emotional
perception
Relationships
Commitments
Engagement
AttitudesQualities IntentionsBeliefs
The model
• This model depicts trust as a construct
– informed by 7 (seven) individual qualities
• The model determines the extent
– to which one relates with one's social and
technical environment.
Toolkit
• Working with user’s expectations
– Incentive or Motivate
• Represents the degree to which an individual believes
(even under conditions of vulnerability and
dependence) h/she has the ability to perform specific
beneficial actions when using a computer.
– Creating Willingness
• Reflects positive or negative feelings about performing
a given action while considering the risk and incentives.
Toolkit
• Working with user’s perceptions
– Perceiving competency
• Reflects the degree of ease of use when associated
with the use of the system.
– Perceiving predictability
• Represents a user's confidence that the system will
help him to perform a desired action in accordance
with what is expected.
Toolkit
• Working with user’s emotions
– Express benevolence
• reflects a user's perception that most people share
similar behaviours and values.
– Show reciprocity
• represents the degree to which an individual sees
oneself as a part of a group.
– Transmit honesty
• reflects an insurance quality when facing apprehension,
or even fear with the possibility of being deceived.
STEP 4 – ANALYTIC TECHNIQUES
Fourth step
• Perform a starfish analysis
– Connecting steps 1 and 2 With 3
• Look at the previous identified set of
– Trust enabling sharing task scenarios;
– Possible sharing goals;
– Possible sharing activities; and
• Select
– The ones that…
Stop
The ones that…
do not bring any added value to
your design solution
Starfish method
Less
The ones that…
don’t bring so much benefits to your
design solution
Starfish method
Keep
The ones that…
are good examples or practices and
you want to use...
Starfish method
More
The ones that…
are good examples or practices that
you fell that you should focus more
on.
Starfish method
Start
The ones that represent the…
Atomic actions or ideas that a team
wants to bring into the design.
Starfish method
Solution
• Create a set of
– Trust enabling sharing scenarios to persuade TLU
students to share time, materials and skills among
themselves.
Resources
• Sousa et al. (2014). A design space for trust
enabling interaction design. In Proceedings of the
International Conference on Multimedia,
Interaction, Design and Innovation MIDI 2014.
ACM.
• Sousa et al. (2015). Value creation through trust
in technologically-mediated social participation.
Technology, Innovation and Education, 1 - 9.
[forthcoming]
• https://humancomputertrust.wordpress.com

Más contenido relacionado

Destacado

Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
Sónia
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
Sónia
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
Sónia
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Final
jhustad1
 

Destacado (20)

Nettets genkomst?
Nettets genkomst?Nettets genkomst?
Nettets genkomst?
 
Lesson 17
Lesson 17Lesson 17
Lesson 17
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer Science
 
My ph.d Defence
My ph.d DefenceMy ph.d Defence
My ph.d Defence
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & Transparency
 
Trust workshop
Trust workshopTrust workshop
Trust workshop
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviews
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Final
 
Workshop 1
Workshop 1Workshop 1
Workshop 1
 

Similar a Trust from a Human Computer Interaction perspective

5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs
Jacobs Australia
 

Similar a Trust from a Human Computer Interaction perspective (20)

The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in Chicago
 
PET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and TrustPET: Designing for Persuasion, Emotion and Trust
PET: Designing for Persuasion, Emotion and Trust
 
Modeling and Measuring DevOps Culture
Modeling and Measuring DevOps CultureModeling and Measuring DevOps Culture
Modeling and Measuring DevOps Culture
 
4youthcitizens 2
4youthcitizens 24youthcitizens 2
4youthcitizens 2
 
Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020
 
Decision making
Decision makingDecision making
Decision making
 
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...5 steps to becoming a social & collaborative enterprise -  Andrew Bishop - Ja...
5 steps to becoming a social & collaborative enterprise - Andrew Bishop - Ja...
 
5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs5 steps to becoming a social enterprise andrew bishop-jacobs
5 steps to becoming a social enterprise andrew bishop-jacobs
 
120903 IMID social media presentation
120903  IMID social media presentation120903  IMID social media presentation
120903 IMID social media presentation
 
Scrum
ScrumScrum
Scrum
 
An effective way to change organizations
An effective way to change organizationsAn effective way to change organizations
An effective way to change organizations
 
Workforce webinar september 30, 2015
Workforce webinar   september 30, 2015Workforce webinar   september 30, 2015
Workforce webinar september 30, 2015
 
Introduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual InquiryIntroduction to UX Research: Fundamentals of Contextual Inquiry
Introduction to UX Research: Fundamentals of Contextual Inquiry
 
10 Ways to Prove the Business Value of Social
10 Ways to Prove the Business Value of Social10 Ways to Prove the Business Value of Social
10 Ways to Prove the Business Value of Social
 
Managerial Decision-Making
Managerial Decision-MakingManagerial Decision-Making
Managerial Decision-Making
 
Technologies and Innovation – Decision Making
Technologies and Innovation – Decision MakingTechnologies and Innovation – Decision Making
Technologies and Innovation – Decision Making
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision Making
 
Enterprise digital transformation
Enterprise digital transformationEnterprise digital transformation
Enterprise digital transformation
 
Design Operations
Design OperationsDesign Operations
Design Operations
 
Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015Vicsport Insights and Innovation Lab February 2015
Vicsport Insights and Innovation Lab February 2015
 

Más de Sónia

Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)
Sónia
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-final
Sónia
 

Más de Sónia (15)

MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)MGA 673 – Evaluating User Experience (part1)
MGA 673 – Evaluating User Experience (part1)
 
MG673 - Session 1
MG673 - Session 1MG673 - Session 1
MG673 - Session 1
 
Ifi7184.DT lesson 2
Ifi7184.DT lesson 2Ifi7184.DT lesson 2
Ifi7184.DT lesson 2
 
IFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languagesIFI7184.DT lesson1- Programming languages
IFI7184.DT lesson1- Programming languages
 
IFI7184.DT about the course
IFI7184.DT about the courseIFI7184.DT about the course
IFI7184.DT about the course
 
Comparative evaluation
Comparative evaluationComparative evaluation
Comparative evaluation
 
Ifi7155 Contextualization
Ifi7155 ContextualizationIfi7155 Contextualization
Ifi7155 Contextualization
 
Hcc lesson7
Hcc lesson7Hcc lesson7
Hcc lesson7
 
Hcc lesson6
Hcc lesson6Hcc lesson6
Hcc lesson6
 
eduHcc lesson2-3
eduHcc lesson2-3eduHcc lesson2-3
eduHcc lesson2-3
 
Human Centered Computing (introduction)
Human Centered Computing (introduction)Human Centered Computing (introduction)
Human Centered Computing (introduction)
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction Design
 
Ifi7155 project-final
Ifi7155 project-finalIfi7155 project-final
Ifi7155 project-final
 
Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)Workshop 1 (analysis and Presenting)
Workshop 1 (analysis and Presenting)
 
Workshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluationWorkshop 1 - User eXperience evaluation
Workshop 1 - User eXperience evaluation
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Trust from a Human Computer Interaction perspective

  • 2. Plan for today • We will start by setting – The theoretical underpinnings of • Human Computer Trust • Design Persuasion, Emotion & Trust – Address the key principles of design for – Persuasion, Emotion & Trust – Focus on design for Trust
  • 3. Trust and HCI • HCI – Study computing and computational artifacts as they relate to the human condition. • Trust – Study the dynamic nature of trust in relationships Human Computer Trust – how trust influences the human interactions • Study the socio-technical nature of trust • Study the role of Trust in user leverage engagement
  • 4. Theoretical underpinnings • Persuasion is… – The act of changing people’s behaviors and beliefs • Dictionary – The action or process of persuading • To make someone to act or believe in something • HCI perspective – Design actions or processes of persuading • To change an attitude or behavior
  • 5. Theoretical underpinnings • HCI perspective – Studding design methodologies to: • Incentives people to become – More engaged; and – More connected with a certain product or ecosystems • Change an attitude or behavior – Attitude: » reflects the way we think of fell about something – Behaviour: » reflects The way in which one acts or conducts oneself, special towards the other
  • 7. key principles • The ongoing cultural shift – The existing ever-widening range of digital artifacts is transforming our daily lives. • New design methodologies are needed – More engaging, compelling, and effective • PET complements classic – Usability & user experience best practices
  • 8. Key principles • PET aims is to – Facilitates the “will do” • Motivates people to complete the task – Encourage. Motivates, constrains • Usability aims is to – Facilitates the “can do” • Facilitates activities
  • 9. key principles • PET assumptions – Persuasion • Foster triggers actions; – Emotion • Generate an emotional response; and – Trust • Leverage credibility and cooperation.
  • 11. The trust role in… • Leverage credibility and cooperation – To assures the success of • the action/process of persuading • How it works? ?
  • 12. Trust is crucial element • Create trust enabling actions to make… – activities proceed more smoothly, – Ensure more transparent behaviours, – people work with greater confidence. • To encourage people to – Cooperate – Accept certain technologies – Execute more positive actions – Creates social bounds – Establish empathic relations
  • 13. Trust represents a key value • In foster more – Social participation • eParticipation through civil engagement – Cooperation • Peer to peer work • In encouraging – Economical transactions • Ecommerce – sharing practices • sharing economy – Sustainability • Changing user behaviours incentive more reuse practices
  • 14. Trust represents a key value • In incentive designers – To provide • GOOD DESIGN patterns – Avoiding the Evil UX design • Done by not so honest people – That deliberately design to fool, trick or exploit users – To balance on what some refer to • The vision and values of dark vs good design patterns. • Examples of this exist on the web, in software and even in the real world See http://darkpatterns.org
  • 15. The challenge to design for trust • Lies on two main approaches – one that reflects a strict operational standpoint; and another – that sees trust as an internal quality. • Although both views seem divergent in nature – We believe that they complement each other • One focus on technical aspects – designing for reliable systems with the main aim of preventing risks • The other supports the social component of the system – that sits upon a technical base
  • 16. Trust is a of a state of mind • Trust reflects – a confidence and the predisposition to trust another. • This come based on a set of perceptions of – another as 'trustworthy’. – Gain by the ability to observe reinsurance elements • Looking for a balance between – an individual's commitments and the risk involved
  • 17. Trust is a reinsurance element, • Trust reflects certain properties that – help users to cope with the risk – Support users to perceive intended behaviours • Trust reflects a balance between – individual's commitments to engage with • a certain Tasks, • a certain person, • A system or community – and the risk involved
  • 18. How it works? • Trust is dynamic – It changes through time • It is likely to have impact on the parties and on the relationship. • To trust we rely on – The identification of certain • Trustworthy making qualities – The identification of signs that lead you to perceive • A society, a person, and or a technological artifact – Is in fact 'trustworthy’
  • 19. Common touch points • Within the user centered design framework Analysis Design Implementation Evaluation Contextual inquiry Ethnographic research Competitive research Interviews Personas and scenarios Information architecture Prototyping Standard & guidelines Mental mapping Design frameworks Storyboards Cognitive walkthrough Usability testing Wizard of OZ Thinkaloud protocol
  • 20. Design challenge • Contextual overview – The Sharing Economy has brought new attention to the everyday practice of sharing. – Digital tools are changing both what we can do together across neighbourhoods and • Reshaping the way we – think about sharing our time, materials and skills. • By fostering more trustful sharing practices.
  • 21. Design challenge • Create a set of – Trust enabling sharing task scenarios to persuade TLU students to • share time, materials and skills among themselves. – Context the TLU student community • The exchange students • Students that use the dormitory.
  • 22. The design process User Research & Understanding STARTS Set the Goals Definition & Design Create task scenarios ENDS
  • 23. Procedure • Step 1 – Create a set of possible sharing goals; – and • Step 2 – Create a set of possible sharing tasks; • Step 3 – Create a set of Trust enabling sharing actions; • Step 4 – Select the most relevant actions to your trust enabling sharing scenario
  • 24. STEP 1 – WHAT DO WE SHARE
  • 25. What do we share? • space, • time, • things, • transport, • skills, • childcare, • buying decisions, • meals, • celebration
  • 26. STEP 2 - WHY DO WE SHARE?
  • 27. Why do we share? • For sustainability… – For cooperation and trust – When facing difficult times; – For sense and purpose – Create more gainful activities that give a sense of purpose; – To spend less, waste less, consume less.
  • 28. Why do we share? • Create a set possible sharing behaviours What makes us share Why we avoid sharing To save money Unclear responsibilities and legal issues of what happens to the property Students travel light, sharing is convenient The fear of not getting one’s item back. Get to know people The question of who’s responsible when an item gets broken.
  • 29. Third step • inspection technique – Use the toolkit to identify a set of • Trust enabling sharing actions • The products we will examine are – http://neighborgoods.net – http://www.streetbank.com – https://www.peerby.com – http://www.justshareit.com – https://www.airbnb.com
  • 30. STEP 3 – ANALYTIC TECHNIQUES
  • 31. The socio-technical model of trust Trust Predisposition Competency Predictability Reciprocity Benovelence Honesty Motivation Willingness Expectations Rational perception Emotional perception Relationships Commitments Engagement AttitudesQualities IntentionsBeliefs
  • 32. The model • This model depicts trust as a construct – informed by 7 (seven) individual qualities • The model determines the extent – to which one relates with one's social and technical environment.
  • 33. Toolkit • Working with user’s expectations – Incentive or Motivate • Represents the degree to which an individual believes (even under conditions of vulnerability and dependence) h/she has the ability to perform specific beneficial actions when using a computer. – Creating Willingness • Reflects positive or negative feelings about performing a given action while considering the risk and incentives.
  • 34. Toolkit • Working with user’s perceptions – Perceiving competency • Reflects the degree of ease of use when associated with the use of the system. – Perceiving predictability • Represents a user's confidence that the system will help him to perform a desired action in accordance with what is expected.
  • 35. Toolkit • Working with user’s emotions – Express benevolence • reflects a user's perception that most people share similar behaviours and values. – Show reciprocity • represents the degree to which an individual sees oneself as a part of a group. – Transmit honesty • reflects an insurance quality when facing apprehension, or even fear with the possibility of being deceived.
  • 36. STEP 4 – ANALYTIC TECHNIQUES
  • 37. Fourth step • Perform a starfish analysis – Connecting steps 1 and 2 With 3 • Look at the previous identified set of – Trust enabling sharing task scenarios; – Possible sharing goals; – Possible sharing activities; and • Select – The ones that…
  • 38. Stop The ones that… do not bring any added value to your design solution Starfish method
  • 39. Less The ones that… don’t bring so much benefits to your design solution Starfish method
  • 40. Keep The ones that… are good examples or practices and you want to use... Starfish method
  • 41. More The ones that… are good examples or practices that you fell that you should focus more on. Starfish method
  • 42. Start The ones that represent the… Atomic actions or ideas that a team wants to bring into the design. Starfish method
  • 43. Solution • Create a set of – Trust enabling sharing scenarios to persuade TLU students to share time, materials and skills among themselves.
  • 44. Resources • Sousa et al. (2014). A design space for trust enabling interaction design. In Proceedings of the International Conference on Multimedia, Interaction, Design and Innovation MIDI 2014. ACM. • Sousa et al. (2015). Value creation through trust in technologically-mediated social participation. Technology, Innovation and Education, 1 - 9. [forthcoming] • https://humancomputertrust.wordpress.com